Skip to main content

Home/ Digiteen/ Group items tagged messages

Rss Feed Group items tagged

Susan Davis

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
Mary Westbrook

Growing Up Digital, Wired for Distraction - NYTimes.com - 0 views

  • For some, the amplification is intense. Allison Miller, 14, sends and receives 27,000 texts in a month, her fingers clicking at a blistering pace as she carries on as many as seven text conversations at a time. She texts between classes, at the moment soccer practice ends, while being driven to and from school and, often, while studying. Most of the exchanges are little more than quick greetings, but they can get more in-depth, like “if someone tells you about a drama going on with someone,” Allison said. “I can text one person while talking on the phone to someone else.” But this proficiency comes at a cost: she blames multitasking for the three B’s on her recent progress report.
  • “I’ll be reading a book for homework and I’ll get a text message and pause my reading and put down the book, pick up the phone to reply to the text message, and then 20 minutes later realize, ‘Oh, I forgot to do my homework.’ ”
  •  
    People don't realize how texting so much can affect your life.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
JeremyS_mca MCA

The Cell: It's a Selling Machine - 0 views

  •  
    Who would say yes to text-message ads? Plenty of people, perhaps. Even though costs and opt-in rules may keep some users safe from spam, cell-phone advertising could be the next big thing in the United States. Randy Dotinga reports from San Diego.
Kevin Shrestha

Nokia 1100 seemingly hackable, making a big comeback - 0 views

  •  
    Someone hacked a Nokia 1100 to "receive text messaged bank passwords"
Steve Madsen

Parents get sext message - Technology - smh.com.au - 1 views

  •  
    Australian focus: Schools to be sent fact sheets that will go to parents and students.
  •  
    A NSW State Government campaign starting this week will remind youngsters and their parents that the growing practice of sending saucy pictures through cyberspace can have lifetime consequences.
Brandon P

Kids Rules for Online Safety (for pre-teens) | SafeKids.com - 0 views

  •  I will tell my parents right away if I come across any information that makes me feel uncomfortable.
  • 7.   I will not give out my Internet password to anyone (even my best friends) other than my parents.
  • 3.   I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
  • ...9 more annotations...
  • 4.   I will never send a person my picture or anything else without first checking with my parents.*  
  • 5.   I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the service provider.
  • 6.   I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  • 1.   I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission.*  
  • 8.   I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family’s privacy*
  • 9.   I will be a good online citizen and not do anything that hurts o
  • ther people or
  • is against the law.
  • 10. I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
  •  
    safety online
  •  
    "Kids Rules for Online Safety " This website shows kids rules that they should follow for online safety. This rules will help pre-teens learn about online safety
Joseph Edore

FEMA For Kids: Online Safety Rules For Kids - 0 views

  • Online Safety Rules For Kids I will not give out personal information such as my address, telephone number, parent's work address/telephone number, or the name and location of my school without my parents' permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way makes me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  •  
    kids safety online
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Merritt D

Let's keep children safe in the cyber age | BlueRidgeNow.com - 2 views

  •  
    I firmly believe as a child of a very "nosy" mother, that I is the parents duty to keep their children in check, but I do not agree with this! If you don't trust you child enough to NOT read their messages, then maybe they don't need one! All this does is give them doubts of your trust, they will feel as if you are invading their privacy, and will be deleting things constantly. Parents need to understand that trust works both ways. This conversation is going to be award and neither the parents nor the child wants to have it, but you need to. It's one way of protecting your child without destroying their trust and doubting yours! Quotes: "I routinely check the texts and photos on their cell phones," says Susan Kain." "let's all talk to our children about Internet safety, social networking sites and "sexting."
Merritt D

Parenting: Healthy Boundaries Improve Parent-Teen Relationships | Safetyweb Blog - 1 views

  •  
    Online parenting is just like regular parenting! Parents need to realize that if they want their kids to respect the boundaries online, they need to find a little compromise with excepting some of their son/daughter's boundaries for themselves! Don't go writing of their Facebook wall or reading messages! Some things are sacred! You can't pull the "I pay for this, Facebook is free!" Quote: "We all want our kids' respect. That's why we've got to hold them accountable for respecting our boundaries. While we're at it, we need to respect their boundaries too. Great advice, though not always easy to follow. But like I said, parenting is an art... you've got to practice to improve. Besides, we're not looking for perfection, just progress."
Garrett E

How wireless technology can affect the body - Health - CBC News - 1 views

  •  
    Phones send waves of radiation. About five billion wireless subscriptions world wide, which is given by WHO's estimate. Long-term exposure to the the electromagnetic fields (EMF), which cellphones communications create, has been given attention to by researchers. In May of this year, the WHO's International Agency for REsearch on Cancer found that the evidence was too inadequate to make any conclusions about risk. Many studies have been done, but no solid proof has been found. Another study was done on a case of glioma, a type of brain cancer, and acoustic neuroma,, a slow-growing non-cancerous tumour in the inner ear that results in hearing loss. Although the group found the evidence also lacking. however, the evidence was significant enough to warrant classifying radio frequency electromagnetic fields as "possibly carcinogenic to humans." WHO places this in a category known as 2B. Mind, coffee and pesticide DDT are also classified as "possibly carcinogenic to humans." Placing calls rather than emailing or texting has been proved that the risk is higher since the radio frequency energy is higher. Even though the evidence is limited, many countries advise children especially should limit their use of cellphones. The United Kingdom, German, Belgium, Israel, Russia, France, Canada, and India are all included. James McNamee, division chief for health effects and assessments in Health Canada's bureau of consumer and clinical radiation protection, said, "There has been relatively little science done on children and children's cellphone use, and children are going to be using these devices for a much larger period of their life span. Their brains and immune systems are still developing." Health Canada said cellphone users may take practical steps to reduce exposure, such as: Limit the length of cellphone calls. Replace cellphone calls with text messages or use "hands-free" devices. Encourage those under the age of 18 to limit the cellphone use.
Sage S

Texting While Driving - 0 views

  •  
    Texting and driving is a major cause of wrecks around the world, especially in teenagers. We have become so addicted to our phones that we can't even put them down long enough to drive to the grocery to store or out to eat with some friends. Driving requires your entire attention, but when your looking at your phone, you are not aware of your surroundings. Quote: "Driving is an activity that requires full concentration and composing, reading, and sending text messages will compromise the driver's concentration."- from the website
Sage S

Documentary on Addiction on Technology - 0 views

  •  
    A two minute video on Technology Addiction becoming a problem in today's world. Do you think you might be addicted if you fake to go to the bathroom during dinner, just so you can check your email, reply to a text message or check your Facebook? Quote: "People post how it's changing their lives, how wired we are. Everyone is hungry to talk about this subject." - Filmmaker and Webby Awards founder Tiffany Shlain
Madison T.

Facemoods' Online Safety Kit - Little Red Riding Mood - YouTube - 0 views

  •  
    Super cute !!!!! Ha, loved this so much though it may seem unrealistic because its a cartoon, its actually very true, and it adds a very intelligent , and sightfull message at the end :)
Callie S

5 Ways to Stay Safe Online | ClickID Blog - 0 views

  • 3. Be Careful with Email Emails are a common source of spam and phishing scams. Avoid opening suspicious emails or clicking questionable links (within emails or without). Even if an email contains a link to a seemingly trustworthy site that you frequent (like your email provider or bank), it is always a good idea to avoid the link and point your browser to the site manually. This can avoid phishing scams. Additionally, simply loading the pictures in a spam message can send information back to its creator notifying them that your email address is an active target. So utilize your email’s spam filter to avoid infected emails from ever loading.
  •  
    One way to protect yourself is by being careful on your email. It is common for phishing scams and spam.
Callie S

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
Maggie H

Cyberbullying - 0 views

  • 1 in 6 U.S. high school students were bullied through e-mail, chat rooms, instant messaging, websites or texting in the previous year.
  • Cyberbullying is a serious issue. In extreme cases, it may have legal and/or psychological consequences for the victim and bully.
  •  
    Cyber-bullying is a very serious problem world wide. 1 in 6 teens in the U.S. are cyber-bullied in some way
Kellie C

A Clash of Cultures on the Internet - 0 views

  • In these cultural clashes, advertisers compare the Internet to magazines and newspapers (where most people expect ads) while Internet diehards compare the Internet to telephones and interpersonal conversations (where ads would be considered intrusive). In fact, Internet areas such as Usenet are areas of two-way communication where, unlike newspapers and magazines, anyone can post messages and contribute equally to the content. Yet, unlike telephone conversations, these areas are disseminated widely, which is what attracts those interested in advertising
  •  
    This website tells you the history and what has happened with culture clashes on the internet.
Blakelee H

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
« First ‹ Previous 41 - 60 of 84 Next › Last »
Showing 20 items per page