Skip to main content

Home/ Digiteen/ Group items tagged meaning

Rss Feed Group items tagged

Julie Lindsay

The Tell-All Generation Learns When Not To, at Least Online - NYTimes.com - 0 views

  •  
    "The conventional wisdom suggests that everyone under 30 is comfortable revealing every facet of their lives online, from their favorite pizza to most frequent sexual partners. But many members of the tell-all generation are rethinking what it means to live out loud. "
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
PatG_mca MCA

Digital Law - 0 views

  •  
    Digital law is the electronic responsibility of actions or deed done with technology. It deals with the ethics of the technology and the unethical uses it for the crimes and damage it does to society. These laws apply to everyone including kids who use it in school and try downloading things or stealing them also. http://digiteen.wikispaces.com/Digital+Law
  •  
    This source is about what "Digital Law" means. Digital Law is "electronic responsibility for actions and deeds which are either ethical or unethical". This is the right that people have on an Internet.
radhika chatterjee

The Internet - Your Main Entertainment Hub - 0 views

  • However, one aspect you may have over looked is that it is a central hub for entertainment.
  • Access to free entertainment could not be easier and what is better than playing in the convenience of your own home. You do not even have to leave your sofa if you do not wish to, meaning that you are able to set the scene in which you can relax, unwind and simply have fun.
  • Taking advantage of free games means you can keep all your pennies firmly in your pocket. The entertaining free games available on the net tend to be easy and come with a full set of instructions. You can enhance your game playing skill with absolutely no risk of handing over any cash.  This can boast your confidence before you decided to take part in any games that are played for real money.
Steve Madsen

Mean girls: mother speaks out on Ascham bullying - Technology - smh.com.au - 0 views

  •  
    Australian news on cyberbullying.
  •  
    THE mother of a former student at the prestigious Sydney girls' school embroiled in a cyber-bullying scandal has spoken out about the claimed culture of intimidation at Ascham.
Callie S

Online Safety - 0 views

  • How could we live without the Internet?
  • Smart Surfing First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers Most credible people and companies will never ask for this type of information online. So if someone does, it's a red flag that they may be up to no good.
  •  
    safety and security
  •  
    How could we live without the internet? The internet plays a big role in our lives. Teens surfing the internet is a big problem now days because they are looking at things that they don't need to be looking at. Quotes: 'But besides the millions of sites to visit and things to do, the Internet offers lots of ways to waste time - and even get into trouble. And just as in the non-cyber world, some people you encounter online might try to take advantage of you - financially or physically.' From the Website.
  •  
    educational website for teens, parents and kids
Ivy F.

Scrutiny - Wikipedia, the free encyclopedia - 0 views

  •  
    this is talking about the meaning of scrutiny
  •  
    digiteen 09
Vicki Davis

Can the law keep up with technology? - CNN.com - 2 views

  • Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
  • it's typically difficult to predict or anticipate technology innovations.
  • Is the Web a unique, separate space or is it really an extension of real space?
  • ...7 more annotations...
  • "We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
  • the school provided alternative reasons for denying Snyder a degree
  • Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
  • In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
  • The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
  • "It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
  • "We should never expect that the judges are going to save us from our own worst impulses."
  •  
    An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues. This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
  •  
    Excellent article about the changing legal issues of the Internet.
Riya P

Parents should control use of technology - 1 views

  • 1. Power down at mealtimes. This means no television, computers or texting. This is the time to really connect with each other without the technological distractions that can be so overwhelming throughout the day. 2. No computers in kids' bedrooms until at least high school. Please trust me on this one. The risks just aren't worth it. Keep computers in public areas of your house, and regularly monitor their usage. 3. Limit or eliminate television viewing on school nights. You'll be amazed at the impact this will have on your family. Kids play games, become creative and interact with us and their siblings. 4. No social media networks until at least high school, and supervise their use. Many kids just don't have the impulse control to adequately control this technology, and the effects on them and others can be substantial. 5. Supervise cell phone use, including texting. You need to be guided by the maturity of your child, but irresponsible behavior should result in increased supervision. 6. Learn about technology. Don't be afraid of texting, video-conferencing, iPads, or Facebook. They are fun and great ways to stay connected with your kids.
  •  
    Tips for parents that think their kids are spending too much time with technology
Merritt D

Keeping your child safe online - Crimewatch - East Coast Radio - 0 views

  •  
    Keeping your children safe online! This website stresses the importance of being aware of your child's online activity! Childline's five tips for parents with children on social networking sites. · Set very clear rules for online use and clear consequences if they are broken. · Discuss some of the unique aspects of behaviour in cyberspace-like anonymity and what it means for your child and for others. · Watch the time. Use an alarm clock or timer if you or your child lose track of time. · In addition, many young teenagers are interested in "chatting." Be aware of who they are chatting to · Make sure your teenager knows the legal implications of online behavior
Liz D

UK online safety expert proposes Pet Society feature as dangerous to children - 2 views

  • Conway, a self-touted "online safety expert,"
  • stranger danger"
  • By being in the Cafe, you're bound to meet strangers. Even though all you can do once you get to another pet's home is some pre-set actions (e.g. hug, kiss, dance, laugh, and punch), there's also the option to visit the real Facebook profile of a someone you might not know at all. Conway demonstrated this by creating an avatar named "BunnyPig" to demonstrate to a group of foster care and social workers.
  • ...3 more annotations...
  • Because Facebook games require players to have lots of friends to earn virtual money and goods, Conway concludes that kids will be tempted to friend strangers
  • And in turn, he estimates that malevolent strangers can scope out kids who play the game. This "Go to profile" option is clearly a valid concern and does exist in the game.
  • kids under 13 years-old could still lie to Facebook about their age just to have a Facebook account.
  •  
    This article is by Charles Conway. He says that children must friend a lot of people to get coins or money for Pet Society , a fast growing Facebook game. This means children under the age of 13 are becoming interested in this website. They might even lie to create an account. Adding people they do not know will be a bad habit for children at this youngof age.
Brian M

Designing for Safety in Turkey and Other Earthquake Zones - NYTimes.com - 0 views

  •  
    this is how turkey will be requiring for the other earthquake zones which means that the schools will be structurley sound.
emory b

OnLineRespect.pdf (application/pdf Object) - 0 views

  •  
    You may not mean something that you say online to someone but it still could hurt them. No one knows what someone they don't know is going through.
Morgan S.

Wamogo infusing more technology into education - 0 views

  •  
    "Wamogo infusing more technology into education- The Register Citizen ""Students are driving the learning,"" LITCHFIELD - You may have heard of No Child Left Behind, but have you heard of no child left offline? Ricky Campbell talks about the technology innovation is the classroom at Wamogo Regional High School. Technology has inspired students to pay more attention to learning and reaches them in more of their way. Principal William Egan states, "Students are driving the learning." He means that because of all the help the web brings, and having teachers that know how to use it, the students are able to create their own ways to study, learn, and do assignments."
Molly S

The World Clock - Time Zones - 0 views

  • The World Clock – Time Zones Africa | North America | South America | Asia | Australia/Pacific | Europe | Capitals | Custom ClockSort by: CityCountryTimeCity Search: SettingsAccraMon 1:38 PMCasablancaMon 1:38 PMKiritimatiTue 3:38 AMPragueMon 2:38 PMAddis AbabaMon 4:38 PMChicago *Mon 8:38 AMKolkataMon 7:08 PMReykjavikMon 1:38 PMAdelaide *Tue 12:08 AMColumbus *Mon 9:38 AMKuala LumpurMon 9:38 PMRio de Janeiro *Mon 11:38 AMAlgiersMon 2:38 PMCopenhagenMon 2:38 PMKuwait CityMon 4:38 PMRiyadhMon 4:38 PMAlmatyMon 7:38 PMDallas *Mon 8:38 AMKyivMon 3:38 PMRomeMon 2:38 PMAmman *Mon 4:38 PMDar es SalaamMon 4:38 PMLa PazMon 9:38 AMSalt Lake City *Mon 7:38 AMAmsterdamMon 2:38 PMDarwinMon 11:08 PMLagosMon 2:38 PMSan Francisco *Mon 6:38 AMAnadyrTue 1:38 AMDenver *Mon 7:38 AMLahoreMon 6:38 PMSan JuanMon 9:38 AMAnchorage *Mon 5:38 AMDetroit *Mon 9:38 AMLas Vegas *Mon 6:38 AMSan SalvadorMon 7:38 AMAnkaraMon 3:38 PMDhakaMon 7:38 PMLimaMon 8:38 AMSantiago *Mon 10:38 AMAntananarivoMon 4:38 PMDohaMon 4:38 PMLisbonMon 1:38 PMSanto DomingoMon 9:38 AMAsuncion *Mon 10:38 AMDubaiMon 5:38 PMLondonMon 1:38 PMSao Paulo *Mon 11:38 AMAthensMon 3:38 PMDublinMon 1:38 PMLos Angeles *Mon 6:38 AMSeattle *Mon 6:38 AMAtlanta *Mon 9:38 AMEdmonton *Mon 7:38 AMMadridMon 2:38 PMSeoulMon 10:38 PMAuckland *Tue 2:38 AMFrankfurtMon 2:38 PMManaguaMon 7:38 AMShan
Molly S

Global Competence Definition | Asia Society - 0 views

  • What is Global Competence? Help us better define global competence. Send in your students' work. Be a part of a ground-breaking effort to assess student global competence. We are collecting samples of work that demonstrate student global knowledge and skills at various developmental levels. Once the work is published, it will help teachers strengthen instruction and better evaluate student work and provide examples for students to help them strive for greater achievement. With each submission, you will be entered into a regular drawing for $500 Staples gift certificates. Learn more and get involved (PDF download). A globally competent student can Investigate the World Recognize Perspectives Communicate Ideas Take Action Students investigate the world beyond their immediate environment. Students recognize their own and others’ perspective. Students communicate their ideas effectively with diverse audiences. Students translate their ideas and findings into appropriate actions to improve conditions. Students can: Generate and explain the significance of locally, regionally or globally focused researchable questions. Identify, collect and analyze the knowledge and evidence required to answer questions using a variety of international sources, media and languages. Weigh, integrate and synthesize evidence collected to construct coherent responses that is appropriate to the context of issues or problems. Develop an argument based on compelling evidence that considers multiple perspectives and draws defensible conclusions. Students can: Recognize and articulate one’s own perspective on situations, events, issues or phenomena and identify the influences on that perspective. Articulate and explain perspectives of other people, groups or schools of thought and identify the influences on those perspectives. Explain how the interaction of ideas across cultures influences the development of knowledge and situations, events, issues or phenomena. Articulate how the consequences of differential access to knowledge, technology and resources affect the quality of life and influences perspectives. Students can: Recognize that diverse audiences may perceive different meanings from the same information. Use appropriate language, behavior and strategies to effectively communicate, both verbally and non-verbally, with diverse audiences. Explain how effective communication impacts understanding and collaboration in an interdependent world. Select and effectively use appropriate technology and media to communicate with diverse audiences. Students can: Recognize one’s capacity to advocate for and contribute to improvement locally, regionally, or globally. Identify opportunities for personal and collaborative action to address situations, events, issues or phenomena in ways which can make a difference. Assess options for action based on evidence and the potential for impact, taking into account varied perspectives and potential consequences for others. Act creatively and innovatively to contribute to improvement locally, regionally or globally both personally and collaboratively.
Callie S

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
Molly S

Global Competence: Prepare Youth to Engage with the World | Asia Society - 0 views

  • This new reality helps us more clearly define the role that education must play in preparing all students for success in an interconnected world. The United States have invested unprecedented resources in education, betting that our outmoded, factory-age system can be fundamentally transformed to prepare students for the rigors of a global economy. 
  •  Globally competent students understand that audiences differ on the basis of culture, geography, faith, ideology, wealth, and other factors and that they may perceive different meanings from the same information.  They can effectively communicate, verbally and non-verbally, with diverse audiences.  Because it is increasingly the world's common language for commerce and communication, globally competent students in the US and elsewhere are proficient in English as well as in at least one other world language. Communicating ideas occurs in a variety of culturally diverse settings, and especially within collaborative teams.  Globally competent students are able to situate themselves in a variety of cultural contexts, organize and participate in diverse groups, and work effectively toward a common goal.
Maggie B

Etiquette for Using Personal Technology at Work - Career Couch - 0 views

  •  
    Q. Your company allows employees to bring their own portable electronic devices - like phones and tablets - to the office. Does that mean you should feel free to use them whenever you see fit? A.
Haley M

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
« First ‹ Previous 41 - 60 of 87 Next › Last »
Showing 20 items per page