Skip to main content

Home/ Digiteen/ Group items tagged interacting

Rss Feed Group items tagged

Meghan S

Technology integration - Wikipedia, the free encyclopedia - 0 views

  • Interactive whiteboards are used in many schools as replacements for standard whiteboards and provide a way to allow students to interact with material on the computer. In addition, some interactive whiteboards software allow teachers to record their instruction and post the material for review by students at a later tim
  • 3D virtual environments are also used with interactive whiteboards
  •  
    this shows that the interactive whiteboards are helpful in many schools.
Sam V

Gale World History In Context - Document - 0 views

  • LOCAL corporate leaders, captains of industry and senior Government officials gathered in Windhoek on Wednesday to witness the launch of the country's UN Global Compact Network.
  • The newly launched business initiative is a global concept whereby companies integrate a number of social and environmental concerns into their business operations and in their interaction with their stakeholders on a voluntary basis, with the aim of advancing corporate social responsibility in the country.
  • Compact Network will generally facilitate access to business information, tools and technical inputs through its strong relations with other UN entities, development agencies and civil society.
  • ...3 more annotations...
  • Within the Namibian UN Global Compact Network, companies can choose their mode of engagement, which may be either collectively or individually", he explained.
  • Tim Parkhouse, said local participating companies would not only benefit from better public relations, but also from an increased understanding amongst their stakeholders of the private sector's potential as an agent for sustainable development.
    • Sam V
       
      Again with this one, I'm not sure if it entirely fits our topic, but I'm pretty sure the main idea does fit. If others in the group don't agree, we don't have to use it.
  •  
    This document talks about how the Namibian UN Global Compact Network can change the way companies interact with stakeholders and how they interact with each other.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Kerrie D

Cyber-Bullying: Detection and Prevention - 0 views

  • “Dr. Caudle advises that, in addition to interacting more with their children, parents should also take the necessary preventive measures to create safe places for their children to get away from cyber-bullying. “The home should be a safe place where open discussion is not only allowed, but invited,” says Dr. Caudle. Parental supervision and involvement in a child’s social interactions allows for a sense of comfort and protection from bullying. ”
  • “Dr. Caudle also notes that one must not forget about the bullies themselves. Often, bullying is a cry for help and can usually be traced to a time when the bully was in fact a victim of this type of behavior. Thus, creating a safe environment where one’s child feels comfortable enough to talk about being bullied can help put a stop to bullying before it ever starts.”
  • “According to Dr. Caudle, in order to prevent cyber-bullying, parents must be actively involved in their children’s cyber lives. “Communication with one’s children is the key to bully prevention,” says Dr. Caudle. So send them a friend request on Facebook. Play some XBOX Live—or another system with online gaming—with them. Parents who are proactively involved with their children’s interactions online are subsequently able to monitor these interactions more closely. Therefore, such parents will be exponentially more informed with regard to what bullies, if any, exist in their children’s lives, both online and off. ”
  •  
    Tells you how to create a safe place at home and how to get involved if you know someone that is being bullied online. Be able to prevent cyberbullying by creating a safe environment at home.
Dru F

CEC | The Hidden Curriculum-Unwritten Rules that Students with Disabilities Often Miss - 0 views

  • Richard Lavoie described the hidden curriculum as important social skills that everyone knows but no one is taught. This includes assumed rules, adult or student expectations, idioms, and metaphors. Understanding the hidden curriculum is difficult for everyone, but it is especially so when compounded with a deficit in social interactions.
  •  
    This bookmark is about how hidden curriculum is a skill that everyone must learn on there own. It cant be taught it has to be observed and learned that way. "Richard Lavoie described the hidden curriculum as important social skills that everyone knows but no one is taught. This includes assumed rules, adult or student expectations, idioms, and metaphors. Understanding the hidden curriculum is difficult for everyone, but it is especially so when compounded with a deficit in social interactions."
Blakelee H

Cyber-Bullying and its Effect on our Youth - 2 views

  • Between cell phones, social media Web sites, and online gaming, children today seem to have more outlets for interacting with each other virtually than they do for interacting with each other in person. However, with all of the good social interaction that is done as a result of these technologies also comes the bad. In addition to the physical and verbal bullying that may take place at school, cyber-bullying in the form of harassing text messages and derogatory posts on children’s Facebook pages is now commonplace. Even though it may not take place in person, the emotional and psychological effects of cyber-bullying are just as destructive. Since new media and cell phones are harder to track and monitor, parents need to take preventive measures that can help minimize the effects of cyber-bullying on their children. 
  •  
    Cyber bullying takes a bad affect on health of today's youth.
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Miller S.

Behaveyourself.com: Online Manners Matter | Edutopia - 1 views

  • So what, exactly, is good netiquette? "A lot of it has to do with tone -- how you ask for things," says Shawn Morris, administrative coordinator of Wichita eSchool, a virtual public school in Wichita, Kansas, that reviews netiquette dos and don'ts with students. No "SHOUTING" and avoiding IM-speak in formal messages are among the most common guidelines. (See "Don't Even Think About It: The Basics of Netiquette," below, and "Beyond Emily: Post-ing Etiquette.") Good online communication is especially important in virtual schools, where most interaction happens digitally. But with the Internet an ever-larger part of most students' lives, brick-and-mortar schools from Longmont, Colorado, to Modesto, California, are starting to teach netiquette, too.
  • call it Online Manners and Ethics 101.
  •  
    edutopia article about netiquette
  •  
    So what, exactly, is good netiquette? "A lot of it has to do with tone -- how you ask for things," says Shawn Morris, administrative coordinator of Wichita eSchool, a virtual public school in Wichita, Kansas, that reviews netiquette dos and don'ts with students. No "SHOUTING" and avoiding IM-speak in formal messages are among the most common guidelines. (See "Don't Even Think About It: The Basics of Netiquette," below, and "Beyond Emily: Post-ing Etiquette.") Good online communication is especially important in virtual schools, where most interaction happens digitally. But with the Internet an ever-larger part of most students' lives, brick-and-mortar schools from Longmont, Colorado, to Modesto, California, are starting to teach netiquette, too.
stephanie j

Virtual Worlds Online - 2 views

  • Virtual worlds online are computer-generated environments where users interact using avatars.
  • the user will be presented with various scenarios, realistic and imagined, in which he can interact.
  • Virtual worlds online can mimic the real world and real life situations or can be totally based on fantasy Rules and other measures usually exist in a virtual world to give directions to users.
  • ...2 more annotations...
  • An avatar is a user’s online personality or a 3D figure created to represent the user while he is in virtual space. The ability to have avatars interact is the main impetus behind virtual worlds online.
  • Millions of users log onto virtual worlds every day. These users find alternative realities in a virtual world and use these online worlds for gaming and communicating with others.
Nolan C

Social media - Wikipedia, the free encyclopedia - 0 views

  • Social media are media for social interaction, using highly accessible and scalable communication techniques
  • People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
  •  
    this is the importance of social media and why everyone uses it
  •  
    Social media includes web-based and mobile based technologies which are used to turn communication into interactive dialogue between organizations, communities, and individuals. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content."
Kerrie D

Virtual Worlds - Wikipedia - 0 views

  • A virtual world is a genre of online community that often takes the form of a computer-based simulated environment, through which users can interact with one another and use and create objects[1].
    • stephanie j
       
      definition of a virtual world
  • Virtual worlds are intended for its users to inhabit and interact, and the term today has become largely synonymous with interactive 3D virtual environments, where the users take the form of avatars visible to others graphically
  • One perception of virtual worlds requires an online persistent world, active and available 24 hours a day and seven days a week, to qualify as a true virtual world
  • ...6 more annotations...
  • According to K Zero, a virtual world consultancy service, there are nearly 1 billion (1,009,000,000) people worldwide registered in virtual worlds today.[33]
  • I envision virtual worlds evolving for business and cultural development as the medium becomes more ubiquitous."
  • "synthetic worlds" is a better term for these cyberspaces
  • can encompass computer conferencing and text based chatrooms.
  • Such modeled worlds and their rules may draw from the reality or fantasy worlds.
  • Massively multiplayer online games depict a wide range of worlds, including those based on fantasy, science fiction, the real world, super heroes, sports, horror, and historical milieus.
  •  
    Virtual Worlds summary. Virtual Worlds; better term for cyberspaces "synthetic worlds". Help people learn about Virtual Worlds and how they are used.
Ridge C

Download Details - Microsoft Download Center - Social Interaction and Xbox LIVE Party - 0 views

  • The new Xbox LIVE Party feature extends the concept of social interaction on Xbox LIVE with 8-person voice chat. It also provides simple mechanisms for the Xbox LIVE Party group to play multiplayer games together. This session reviews the Xbox LIVE Party feature and discusses how to integrate your game to create cutting-edge social experiences. Come find out how to make your title interact seamlessly with Xbox LIVE Party, and how doing so will improve your user experience. If you are currently enabling your title for Xbox LIVE, or are just interested in learning more about the latest features, this talk is for you.
Matthew T

Virtual world, online world to play, chat and flirt in 3D | Smeet - 0 views

  •  
    This is an example of a virtual world. "Show off your creativity by building and decorating your avatar world, a full 3D Home that expands as you play! You can also meet new people in public hangout spaces, attend live events within Smeet, try out items brought to you by our partnerships with popular artists and brands and complete fun tasks. In order to make Smeet a personalized and user-friendly experience, we also offer a special virtual world for teens where they can interact with other users their own age and chat about everything from Pop stars, music and movies to teachers, classes, and homework. The virtual world for adults allows users the opportunity to show off the latest Smeet styles, playfully meet and flirt with new people, and create an exciting online life."
Morgan G

Cultural literacy - Wikipedia, the free encyclopedia - 0 views

  •  
    Cultural literacy is important because you need to know the importance of getting along with different cultures. Anyone can join social networks, so you need to learn how you can get along with everyone. "Cultural literacy is familiarity with and ability to understand the idioms, allusions, and informal content that create and constitute a dominant culture. From being familiar with street signs to knowing historical references to understanding the most recent slang, literacy demands interaction with the culture and reflection of it. Knowledge of a canonical set of literature is not sufficient in and of itself when engaging with others in a society, as life is interwoven with art, expression, history, and experience. Cultural literacy requires familiarity with a broad range of general knowledge and implies the use of that knowledge in the creation of a communal language and collective knowledge. Cultural literacy stresses the knowledge of those pieces of information that content creators will assume the audience already possesses."
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Dru F

Technology's Language Barrier - Forbes.com - 0 views

  • Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier.As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media.
  •  
    The language barrier can present problems in interactions when different languages are being used in business. "Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier. As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media."
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
Summer T

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
Kelby W

Privacy & Identity | Internet Society - 0 views

  •  
    A big part of the Internet's value is the ability to interact online without giving away your personal stuff.  "Privacy is about retaining the ability to disclose data consensually, and with expectations about the context and scope of sharing. Identifiability, linkability of data, and the mining of vast quantities of aggregated information all erode the individual's ability to manage disclosure, context and scope. Networks depend on the use of unique (and often identifying) numbers, and facilitate the instant global dissemination of information; increasingly, devices and applications gather and use geolocation data that builds up into a unique 'track' for each user. A growing commercial ecosystem based on targeted and behavioural advertising results in an inexorable financial pressure for service providers to exploit personal data. The privacy implications of the current Internet represent a significant and growing concern.   Our Work The Internet Society's Trust and Identity initiative includes dedicated outreach activities on identity and privacy. These are aimed at technology vendors and adopters, to encourage privacy-respecting technology deployment, and at policymakers and legislators to provide the necessary counter-balances to commercial expediency. The Trust and Identity initiative also aims to ensure that users are better informed about the benefits of good online privacy, so that they can make better privacy choices and make use of appropriate privacy-enhancing tools online."
1 - 20 of 57 Next › Last »
Showing 20 items per page