Skip to main content

Home/ Digiteen/ Group items tagged keeping

Rss Feed Group items tagged

Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Brody C

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something Online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s Online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and information from the federal government to help consumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making online purchases, avoiding phishing scams (with a fun Flash animation on how to tell if you’re being phished), and defending cell phones and PDA’s against attack.
Becca B

Netiquette - The Code of Conduct for the Internet - By Jason - 0 views

  •  
    "Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt. Here are some key points to keep in mind: * It's not nice to hurt other people's feelings. Who are you trying to prove anything to? Just keep offensive comments to yourself and try to be constructive. * Never type a whole message in caps, whethere its an instant message, a reply to a post in a message board, or in an email. writing a whole message in caps means that one is yelling (unless you do not mean it that way). If you do not mean it to come across that way, make sure you tell people you are not yelling. Remember, people can not tell what mood you are in by just typing something (unless you are using a webcam and microphone of course...). So please please please do not use caps to write messages. Thanks! * Never mail or post anything you wouldn't say to your reader's face. The internet is not a place to find or pick a fight. There are people out there with the same intentions you have of just researching and just finding useful information and that is all. No need to start any trouble. Please ;] * Notify your readers when flaming. For those of you who do not know what flaming is, here is the basic definition. Flaming is when a person or group of people decide to express their negativity about a certain situation, maybe a world event or something. The reason one is told to notify people when doing this is because some people may not know you are flaming. I mean, this is the internet. It's not like you have the person sitting in front of you where you can look at their face and tell they are mad or annoyed about something. So please, let people know that the post or message you are about to post is of this kind. On a side note, flaming can also be toward people. It can be toward their beliefs, comments they may have made, ideas, etc. Please do not do this kind of flaming. Again, we are trying to eliminate unneccessary confrontations o
Joseph Edore

Solutions for Digital Safety - Youth and Media - 1 views

  • 1. Communication with your daughter or son is key. Build a trusting relationship through dialogue.
  • 2. Create an account to understand how the site works, but not to stalk your kids. They need room to explore, but if you are familiar with the media and technology that they consume, you can provide valuable guidance and suggestions. Surveillance, while possible, damages a trusting parent/child relationship.
  • 3. Ask your kids how they choose to represent themselves and why. Use MySpace as a resource to start a conversation about contemporary fashion, ideals, and media images.
  • ...2 more annotations...
  • 4. Talk about private/ public issues with your kids. Help them to understand the consequences of making certain information publicly accessible. Get them to think through all of the possible audiences who might come into contact with their online information
  • 5. Talk through what kids should do if they receive unwanted attention online or if they find themselves the victims of cyberbullying. A growing number of sites provide useful information about how to confront such problems, including Net Family News , NetSmartz and SafeTeens.
  •  
    "Because being connected is such an integral part of teens’ lives, some youth may hesitate telling their parents about the harassment they encounter for fear that their online privileges will be taken away. The best way to combat cyber bullying or other forms of harassment is not to reign in or limit a teen’s use of technology, but to make sure adults keep the lines of communication open. In addition to keeping the computer in a public space, parents should also become more aware of what their children are doing online. They should consider the Internet as an opportunity to engage in conversation with their children about their interests, talents, and network of friends. It is important to emphasize with youth that there is a distinct connection between what happens online and in the "real world." Adults should communicate to youth that their actions have implications in a real world setting. Regarding cyber bullying in particular, adults must also relay traditional techniques of combating bullying, among them being to report incidents, keep records, and not to engage the bully. “It’s not new bullying, it’s just a vehicle,” says Nancy Mullin-Rindler, director of the Project on Teasing and Bullying at Wellesley College (Paulson, 2003). In addition, because research has shown that the majority of cyber bullies have been victims of traditional bullying, this approach—-combating the behavior versus limiting the technology—-would ultimately help in preventing both cyber and conventional bullying. Cyber bullying poses a stickier problem for schools that are finding themselves in the middle of First Amendment debates. Despite the fact that whatever happens online (no matter where the location) typically spreads to the school environment, inevitably impacting students’ learning, does a school principal have the right to punish someone for what they say outside of school parameters? Because of this legal quagmire, schools’
William B

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Computer Addiction – obsessive playing of off-line computer games, such as Solitaire or Minesweeper, or obsessive computer programming.
  • The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance.
  •  
    The Internet can be a good thing and a bad thing. some people need the Internet for work. If you are addicted to the Internet you cut you relationships and outside activities out of your life. Addiction to the Internet can damage your health. "The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person's Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it's time to strike a new balance."
Vicki Davis

Facebook keeps 'deleted' user photos for years - 13 views

  • Even if you delete incriminating photos on your Facebook profile, the company is keeping them accessible to anyone online for up to 30 months.
    • Antonio R
       
      woahhhhh that seems really creepy. i dont think that is right for a company to have a deleted photo of you for 30 months. if you delete it, then you delete it for a reason, not so even more people that are in a company to see you doing something that you thought people to see but then relized it was stupid to put this on in the first place.
  •  
    This article points out that up to 30 months after photos are deleted from Facebook that they are still there. If someone has the direct URL to a photo, it is still accessible. Students should be taught about this and we should educate ourselves as well. Once something is uploaded it is out there. Period. You cannot take it back.
  • ...5 more comments...
  •  
    Facebook is keeping photos up to 30 months after they are deleted!
  •  
    this is a really interesting article. I wonder if other IM sites like MySpace or AIM.
  •  
    this artical is very interesting and it is true that facebook is keeping the deleted photos up for 30 months after they are deleted !!!!!!
  •  
    i think this artical is really interesting because it is good to know that you should be careful when posting pictures on facebook.
  •  
    This is a very interesting article. Safety is really important and dont every do anything stupid because it will never be deleted. You should NEVER do anything bad on the internet because it is not a different life it is just the internet!
  •  
    i think this is an interesting article and its good to no about the information it gave us and that you should be careful what you post on the internet. its the interenet and its not a different life and anyone can see it
  •  
    WOW! 30 months? That's amazing, yet horrible. Very interesting article, it shows that there's more to social media than you think. Great post. You really should be careful when posting things on the internet.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Callie S

Internet Safety - 4 views

  • The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world. But that access can also pose hazards. For example, an 8-year-old might do an online search for "Lego." But with just one missed keystroke, the word "Legs" is entered instead, and the child may be directed to a slew of websites with a focus on legs — some of which may contain pornographic material. That's why it's important to be aware of what your kids see and hear on the Internet, who they meet, and what they share about themselves online. Just like any safety issue, it's wise to talk with your kids about your concerns, take advantage of resources to protect them, and keep a close eye on their activities. Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first. COPPA requires websites to explain their privacy policies on the site and get parental consent before collecting or using a child's personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or participate in a contest. But even with this law, your kids' best online protection is you. By talking to them about potential online dangers and monitoring their computer use, you'll help them surf the Internet safely.
  • Listen
  •  
    This is a good website that tells you how to be safe on the web.
  • ...1 more comment...
  •  
    How often do you let your children or siblings use the computer? In fact a lot of kids use the internet not only at home but also at school. This page helps teach younger kids internet safety for when no one is around. Quote: 'The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world.'
  •  
    This paragraph begins by disscussing kids and safety on the internet. offers tools to be involved in kids online safety. The article the importance of sharing an email account with a child and keeping the computer where you can see it. The article suggests having basic rules like never trading pictures and never revealing personal information. It also discusses being aware of preditors. So finally the article ends with warning signs like long hours online especially at night.
  •  
    "Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first."
Riya P

Keep your kids safe on Facebook - 1 views

  • First step, if you don't have a Facebook account, get one and learn about it before you allow your teen to get one. Another suggestion, teach your kids to use common sense. Don't put your social security number, address or phone number online. Finally, don't teach your kids to be dishonest!
  •  
    What parents should do to keep their kids and family safe on Facebook.
Lindsey B

Keeping your privacy safe on Google - 0 views

  •  
    How to keep your google searches safe online
Vicki Davis

Poke! Facebook Launches New App For Sending 'Self-Destructing' Messages -- AppAdvice - 1 views

  •  
    Facebook has launched its response to Snapchat, with Facebook Poke, the self destructing message deliverer? Why would you want a message to self destruct or delete itself if a person tried to do a screengrab on their phone? Well, so you can send goofy pics to your friends with no trace left behind! Never fear, however, teenagers are here. They've been talking to me about how they get around this - if you're snap chatting a friend and you have a friend with you - get the friend up close to be ready to take a picture with their camera phone and then post the pic on Facebook that was delivered with Snapchat. They think it is hilarious but admit that this app is also being used as a new way to "flash" others. How long will it take for everyone to learn that you can't ever really destroy anything any more? If it is done it is permanent - the easiest way to keep private things private is to never do them in the first place. This article goes into more about Facebook poke if you really get into that sort of thing or want to keep up with what the kids are doing.
William B

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
Kelby W

Protecting Personal Privacy Online | Common Sense Media - 2 views

  •  
    This is an article to help kids learn the risks of revealing personal information online.  "Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created can get copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. Each time your child fills out a profile without privacy controls, comments on something, posts a video, or texts a picture of themselves to friends, they potentially reveal themselves to the world. Why privacy matters Digital life is very public and often permanent. If our kids don't protect their privacy, what they do online will create digital footprints that wander and persist. Something that happens on the spur of the moment -- a funny picture, a certain post -- can resurface years later. And if kids aren't careful, their reputations can get away from them and third parties -- like marketers or potential employers -- can access what kids thought was private information. Your kids may think they just sent something to a friend -- but that friend can send it to a friend's friend, who can send it to their friends' friends, and so on. That's how secrets become headlines and how false information spreads fast and furiously. The stakes only rise when we remember that everything takes place in front of huge invisible audiences. Kids' deepest secrets can be shared with thousands of people they've never even met. New technologies make controlling privacy more challenging. With GPS-enable cell phones and location-sharing programs, kids can post their whereabouts. This information can go out to friends, strangers, and companies who will show them ads targeted to their location.  Advice for parents Explain that nothing is really private. No matter what kids think. Privacy settings aren't infallible. It's up to kids to protect themselves by thinking t
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Kelby W

Online Privacy: Using the Internet Safely | Privacy Rights Clearinghouse - 0 views

  •  
    Knowing how to use the internet will help us be a little more private and keep our identity a little more safety.  "The Internet enables us to improve communication, erase physical barriers, and expand our education. Its absorption into our society has been extraordinary.  It touches nearly every part of our lives from how we apply for jobs and where we get our news, to how we find friends.  A few Web sites have virtually replaced some things, like the encyclopedia and the phone book.  But with acceptance comes a decrease in skepticism.  You may assume that the same laws or societal rules that protect your privacy in the physical world apply to the digital world as well.  But the Internet remains largely unregulated and the policies governing it underdeveloped.  Laws concerning online privacy are still being developed. To date, the U.S. Supreme Court largely has taken a hands-off approach to regulating the Internet and online privacy in favor of free speech.  However, the federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.  One important thing to keep in mind when relying on the law to protect you is that if U.S. law is broken in another country, prosecuting the criminal may prove difficult or impossible. "
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Becca B

Top 26 Most Important Rules of Email Etiquette - About Email - 0 views

  •  
    "2. Do Not Default to "Reply All" - Email Etiquette Tip "Reply" is good. "Reply to All" is better. Right? 3. Keep Emails Short - Email Etiquette Tip Do not intimidate recipients with too much text. 4. Properly Format Your Email Replies, and Be Lazy - Email Etiquette Tip Do you think quoting original text in your email replies perfectly is a lot of work? Don't let the '>' intimidate you! Here's a very comfortable, relaxed, quick and still clean and compatible way to reply properly. 5. Write Perfect Subject Lines - Email Etiquette Tip Do you make these mistakes in your email subjects? (The key to getting your messages read is not to be clever.) 6. Clean Up Emails Before Forwarding Them - Email Etiquette Tip Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation. 7. When in Doubt, Send Plain Text Email, Not HTML - Email Etiquette Tip Not everybody can receive your fancily formatted emails. Some may even react furious. To be safe rather than sorry, send plain text emails only when in doubt. 8. Don't Forward Hoaxes - Email Etiquette Tip Email hoaxes often contain stories that are intriguing, and sure to irritate. Here's how to spot and stop urban legends. Sponsored Links Business EtiquetteWorkshop materials to teach proper busines etiquete.CorporateTrainingMaterials.com Virus and Trojan RemoverDownload Free Trojan & Virus Scan Recommended and Used By The Expertswww.pctools.com 9. Use Current Antivirus Software, Keep it Up to Date, Scan for Free Make sure you're not spreading worms and viruses via email or act as a vehicle for spreading spam. All this can be caused by malicious emails. Fortunately, there's protection. 10. Say Why You Think What You Forward Will Interest the Recipient More and better communication makes better relationships. Here's a way to spot and share relevant information and foster ties by forwarding emails and links."
Hayes G.

hearusnow.org: Internet Privacy - 0 views

  • In the age of the Internet, it is not always easy to be left alone or to keep your business private.  What's at stake in the online world is ensuring that the information you want to keep private is kept that way. 
  •  
    It is very hard to keep your personal information private.
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Merritt D

Keeping your child safe online - Crimewatch - East Coast Radio - 0 views

  •  
    Keeping your children safe online! This website stresses the importance of being aware of your child's online activity! Childline's five tips for parents with children on social networking sites. · Set very clear rules for online use and clear consequences if they are broken. · Discuss some of the unique aspects of behaviour in cyberspace-like anonymity and what it means for your child and for others. · Watch the time. Use an alarm clock or timer if you or your child lose track of time. · In addition, many young teenagers are interested in "chatting." Be aware of who they are chatting to · Make sure your teenager knows the legal implications of online behavior
1 - 20 of 122 Next › Last »
Showing 20 items per page