Skip to main content

Home/ Digiteen/ Group items tagged messages

Rss Feed Group items tagged

Haley M

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
Blakelee H

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
Blakelee H

Cyber-Bullying and its Effect on our Youth - 2 views

  • Between cell phones, social media Web sites, and online gaming, children today seem to have more outlets for interacting with each other virtually than they do for interacting with each other in person. However, with all of the good social interaction that is done as a result of these technologies also comes the bad. In addition to the physical and verbal bullying that may take place at school, cyber-bullying in the form of harassing text messages and derogatory posts on children’s Facebook pages is now commonplace. Even though it may not take place in person, the emotional and psychological effects of cyber-bullying are just as destructive. Since new media and cell phones are harder to track and monitor, parents need to take preventive measures that can help minimize the effects of cyber-bullying on their children. 
  •  
    Cyber bullying takes a bad affect on health of today's youth.
Audrey b

GIC | Article - 0 views

  • Rules of 'Netiquette' include no advertising, replying via E-mail rather than posting to the entire group when possible and avoiding rude messages called 'flames
  • rules of Netiquette: No advertising, no flaming (sending rude or antagonistic responses), and remember to reply via E-mail rather than posting to the whole group whenever possible
Susan Davis

10 Best Rules of Netiquette - Associated Content from Yahoo! - associatedcontent.com - 3 views

  • 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason.
  • Good internet etiquette (netiquette) is all about being courteous to others online to make the internet a fun experience for everyone.
  •  
    "1.The Golden Rule: Treat others as you would like to be treated. This rule is an oldie but a goodie and can get you through just about any situation, online or off! 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. Harassing or insulting someone will not likely help you gain many online friends! 3. Respect Others' Copyrights: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. Copying the works of someone else without permission or saying it is your own will not only ruin your online reputation, but could land you with hefty fines and lawsuits! 4. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. 5. Don't Spam: As a blog owner, I get hundreds of spam messages each day. Most of them aren't even legible, with things like "kjhgsawu" typed in the comments and links to sites with adult or inappropriate content. I don't appreciate it! Some spammers are getting really sneaky, as they use the same generic post over and over again like "I really like your blog" - if you own multiple blogs like I do though you can quickly identify these types of spammers! There's a fine line between spam and self-promotion, do it very carefully! "
Vicki Davis

Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment - 1 views

  • The CyberBully Alert software is a tool for parents to equip their children with the ability to immediately communicate and document any threats or cyberbullying their children experience when online. Th
  • Experts agree that the best way to address cyberbullying and online threats is to immediately communicate the incident with an adult, as well as document what the threat is.
    • Vicki Davis
       
      I think that every internet browser should have an easy, built in way to take a screen shot and send it to someone. We need this for many safety reasons. It is to protect those who need it most and are often the most technically challenged.
  • A text and email message immediately notifies pre-specified recipients of the online threat - assuring rapid communication between adults and children.
  • ...1 more annotation...
  • CyberBully Alert gives parents the security of immediately being there for their kids when a threat occurs—whether they are at work, in a meeting, on the road, or simply in another room.
  •  
    Software program to mention in cyberbullying section of the wiki.
  •  
    New software that allows children to document and report harmful harrassment online. I would love to test this tool, I find it very interesting. I think this kind of thing is good, but never replaces a parent talking to a child. However, if there is nothing that "can be done" because local laws and others have no method of dealing with it, then I don't know if it will breed frustration. I think every computer should have an easy way to grab screenshots like my fireshot program in firefox. I think this should be part of every web browser.
Vicki Davis

FOXNews.com - Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - Sc... - 1 views

  • An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
  • Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
  • 85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someone about it.
    • Vicki Davis
       
      This is important research to share.
  • ...10 more annotations...
  • Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
  • she went to a mental-health clinic
  • assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
  • They think that’s just part of online life,
  • Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
  • Cyberbullying peaks in 4th and 7th grade
  • 4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
    • Vicki Davis
       
      This is essential to discuss in 4th and 7th grades as this says these are the places where this happens most.
  • The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
    • Vicki Davis
       
      Taking cell phones is part of cyberbullying.
  • “This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
    • Vicki Davis
       
      Friends don't ask friends for passwords, that is an important thing to share!!
  • October as National Cyber Security Awareness Month,
    • Vicki Davis
       
      October - National Cyber Security Awareness Month
  •  
    Important article about cyberbullying and some recent legislation.
  •  
    Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children. There are mention of several websites including one I'd never heard of called CyberBully Alert.
Vicki Davis

FOXNews.com - Florida Teen Commits Suicide Before Live Webcam Audience - Local News | N... - 0 views

  • "He was blogging between 3 and 4 a.m. on the 19th, Wednesday, at which time he inserted a link in the blog to a live webcam and posted a suicide note, and then was seen lying down on the bed," Crane told FOXNews.com.
  • But he acknowledged that an investigation into the delay in notifying authorities was "possible."
  • A message posted to his final MySpace blog by his mother Friday mentioned a history of mental illness.
  •  
    We need a way to report online crime.
  •  
    Oh my goodness - this is terrible. A florida teen committeed suicide via webcam. This is horrible. Knowing how to report online crime is something we need to be able to do - a sort of e911 for online is what we need.
Steve Madsen

Consumers Haven't Learned Not to Divulge Private Info Online | News & Opinion | PCMag.com - 0 views

  •  
    Despite warnings from privacy advocates to protect your personal information while online, many adults are still engaging in risky behavior via social networking sites, according to a new study from Consumer Reports.
  •  
    Apparently, the adults are not getting the safet message. Are young digital citizens getting it?
Steve Madsen

Twitter user convicted after 'menacing' message - AfterDawn - 1 views

  •  
    UK citizen Paul Chambers has been convicted this week of sending a 'menacing' tweet via Twitter, with the British Court fining him £1000 and slapping him with a criminal record.
  •  
    Chambers lost his job after being arrested, and appears to be the first person to ever be convicted of a crime just for tweeting.
stephanie j

Anytime, Anywhere Learners: Online Safety in the Virtual World - 0 views

  • Don't give your real name on gaming sitesBest not to have anyone on your IM (instant messaging) list that you don't know in the real worldYou can block people in IM and chat areasBest not to meet people you meet online, they might not be who they say they areTell an adult you trust if an online friend asks to meet youReport a contact to CEOP if you think they might be an adult
  •  
    Here are some helpful tips about online safety in a virtual world.
Mary Westbrook

Teen Texting Soars; Will Social Skills Suffer? : NPR - 0 views

  • At schools where cell phones are forbidden, 58 percent of students with mobile phones say they've sent a text message during class.
    • Mary Westbrook
       
      Teens are sacrificing grades.
Susan Davis

Online Etiquette - 0 views

  • 1. Avoid language that may come across as strong or offensive. Language can be easily misinterpreted in written communication. If a point must be stressed, review the statement to make sure that an outsider reading it would not be offended, then post the statement. Humor and sarcasm may easily be misinterpreted as well, so try to be as matter-of-fact and professional as possible.2. Keep writing to a point and stay on topic. Online courses require a lot of reading. When writing, keep sentences poignant and brief so that readers do not get lost in wordy paragraphs and miss the point of the statement. Also, do not introduce new topics; it may just confuse the readers.3. Read first, write later. It is important to read all posts or comments of students and instructors within the course discussion before personally commenting to prevent repeating commentary or asking questions that have already been answered.4. Review, review, then send. There’s no taking back a comment that has already been sent, so it is important to double-check all writing to make sure that it clearly conveys the exact intended message.5. An online classroom is still a classroom. Though the courses may be online, appropriate classroom behavior is still mandatory. Respect for fellow classmates and the instructors is as important as ever.6. The language of the Internet. Though still a fairly young type of communication, certain aspects of this form of communication are becoming conventional. For example, do not write using all capital letters, because it will appear as shouting. Also, the use of emoticons can be helpful when used to convey nonverbal feelings (example: :-) or :-( ), but avoid overusing them.7. Consider the privacy of others'. Ask permission prior to giving out a classmate's email address or other information.8. If possible, keep attachments small. If it is necessary to send pictures, change the size to an acceptable 100k.9. No inappropriate material. Do not forward virus warnings, chain letters, jokes, etc. to classmates or instructors. The sharing of pornographic material is forbidden.
  •  
    rules
Audrey b

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
Mary Westbrook

How to Tell If You Are Addicted to Technology | LiveScience - 0 views

  • "You become irritable when you can't use it. The Internet goes down and you lose your mind. You start to hide your use."
  • "The first thing to do is take a long, hard look at how you are using technologies, and then to start to set some limits," he said. "You have to take off a couple hours and make those hours important enough that you don't allow yourself to be interrupted. I think we should have certain rules. We don’t break up, fire people or break traumatic news to people via e-mail or text message."
Madison T.

Internet Safety - YouTube - 1 views

  •  
    Internet Safety video , Kinda creepy haha, but speaks the truth.
anonymous

Yahoo! Messenger - Chat, Instant message, SMS, PC Calls and More - 0 views

shared by anonymous on 08 May 09 - Cached
  • Keep friends at your fingertips with Yahoo! Messenger 9.0
    • anonymous
       
      this shows how communication has evolved over time, how this "mesenging" system would have been thought of as impossible back in the best.
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
« First ‹ Previous 61 - 80 of 84 Next ›
Showing 20 items per page