Skip to main content

Home/ Digiteen/ Group items tagged news

Rss Feed Group items tagged

Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
William B

Internet addiction changes brain similar to cocaine: Study - HealthPop - CBS News - 0 views

  • iStockPhoto (CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS One, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves DogsAre social networking sites turning teens into substance abusers? The researchers found more patterns of  "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowden Jones, consultant psychiatrist at Imperial College in London, who runs the U.K.'s only clinic for Internet addicts, said hardcore gamers are more likely to be addicted to the Internet. "The majority of people we see with serious Internet addiction are gamers - people who spend long hours in roles in various games that cause them to disregard their obligations," Jones told The Independent. "I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game." According to the independent, an estimated 5 to 10 percent of Internet users are unable to control their usage and are considered addicts.
  •  
    Internet addiction is just as harmful to your brain than alcohol. you don't need to damage you brain so dont drink or get addicted to anything. "(CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS One, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves Dogs Are social networking sites turning teens into substance abusers? The researchers found more patterns of "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowde
JustinM_mca MCA

Innovation & Technology News - 0 views

  •  
    This news site gives perfect examples in innovations of technology. It contains articles explaining new ideas conceived or at work to help understand and make things more efficient. One article tells of an idea how trapping and using light, instead of electrons, in computers can really boost computer speed and data processing.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Erin B

E-Commerce News: E-Commerce - 0 views

  •  
    This seems like a new way advertisers may be using ecommerce to their advantage. "Smartphones Get More AdSense October 05, 2009 Google has developed a new JavaScript snippet for AdSense aimed at high-end mobile phones, giving advertisers yet another option for using its mobile platform. The new feature allows publishers to run larger-scale text and image ads on smartphones. As more people use these devices, more advertisers want to be able to target them, noted a Google engineer in a blog post on the rollout."
Vicki Davis

Magid: Treating kids on the Web in a new way - San Jose Mercury News - 0 views

  • a watershed moment in the 16-year history of online safety education.
  • in that young people were viewed less as potential victims of online crimes and more as participants in a global online community.
  • the "predator panic" that was rampant a few years ago has largely been put to rest as safety experts and law enforcement studies from the Crimes Against Children Research Center and elsewhere show that, statistically, the odds of a prepubescent child being sexually molested by an
  • ...7 more annotations...
  • online stranger is virtually zero and the odds of it happening to a teenager are very low, especially when compared with children who are harmed by family members and others they know from the real world.
  • the culprit is far more likely to be a fellow young person.
  • Kids are affected by their own behavior ranging from posting pictures or comments online that could come to haunt them later to "sexting," sending nude or nearly nude pictures of themselves to others.
  • a few misguided ones have used these laws against children.
  • others continue to perpetuate myths about Internet dangers.
  • "one size doesn't fit all.
  • There was a lot of discussion about the lack of interactive social media in schools.
  •  
    If you are working with technology in schools, educational Internet pioneer Larry Magid's new article in the San Jose Mercury News is a MUST READ. Excellent
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
William B

Help Protect Your Child's Online Reputation From Damage | Safetyweb - 0 views

  • Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associated with the Internet and actually adapt their physiology, developing problems such as ADHD, and becoming generally more impatient than people raised without the instant gratification offered by the Internet
  •  
    Internet addiction is one of the main addictions. Many people are addicted to the Internet. Many people need to learn not to be addicted to the Internet cause it is a bad for your health. "Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associate
Miller S.

How Adult Learners are Using the Internet - 0 views

  • Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
    • Miller S.
       
      Adults using the internet
  •  
    Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
Julie Lindsay

Zero to Eight: Children's Media Use in America | Common Sense Media - 1 views

  •  
    The study shows that everything from iPods to smartphones to tablet computers are now a regular part of kids' lives, with kids under 8 averaging two hours a day with all screen media. Among the key findings: 42% of children under 8 years old have a television in their bedroom. Half (52%) of all 0- to 8-year-olds have access to a new mobile device, such as a smartphone, video iPod, or iPad/tablet. More than a third (38%) of children this age have used one of these devices, including 10% of 0-to 1-year-olds, 39% of 2- to 4-year-olds, and more than half (52%) of 5- to 8-year-olds. In a typical day, one in 10 (11%) 0- to 8-year-olds uses a smartphone, video iPod, iPad, or similar device to play games, watch videos, or use other apps. Those who do such activities spend an average of 43 minutes a day doing so. In addition to the traditional digital divide, a new "app gap" has developed, with only 14% of lower-income parents having downloaded new media apps for their kids to use, compared to 47% of upper-income parents. Clearly, media has become a staple in young kids' daily lives and influences them in ways we don't yet fully understand. But by getting involved in your kid's media life, you can help them create healthy lifelong patterns that will truly make a difference in their lives
Vicki Davis

Poke! Facebook Launches New App For Sending 'Self-Destructing' Messages -- AppAdvice - 1 views

  •  
    Facebook has launched its response to Snapchat, with Facebook Poke, the self destructing message deliverer? Why would you want a message to self destruct or delete itself if a person tried to do a screengrab on their phone? Well, so you can send goofy pics to your friends with no trace left behind! Never fear, however, teenagers are here. They've been talking to me about how they get around this - if you're snap chatting a friend and you have a friend with you - get the friend up close to be ready to take a picture with their camera phone and then post the pic on Facebook that was delivered with Snapchat. They think it is hilarious but admit that this app is also being used as a new way to "flash" others. How long will it take for everyone to learn that you can't ever really destroy anything any more? If it is done it is permanent - the easiest way to keep private things private is to never do them in the first place. This article goes into more about Facebook poke if you really get into that sort of thing or want to keep up with what the kids are doing.
Vicki Davis

Regulators shut down global PC 'tech support' scam | Politics and Law - CNET News - 0 views

  •  
    Scareware. Yes, it is a term. Scaring people into thinking they have a virus. Knowledge is power and it will also save you money. Being educated about computers pays over your life. It is time for all of us to be educated and savvy. I know someone taken by this scam. "English-speaking consumers in the United States, Canada, Australia, Ireland, New Zealand, and the U.K. were targeted in the global scam, regulators said. Most of the scammers were based in India, but some also came from the U.S. and U.K. The scam involved cold callers who claimed to work for major technology companies, such as Microsoft or Google, and who told consumers they had viruses on their PCs, according to regulators. The callers would attempt to dupe users into giving them remote access to their computers, locking the user out while attempting to "fix" the malware that the scammer claimed was on the machine."
Vicki Davis

France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 0 views

  •  
    The French data protection authority said Tuesday that Google's new privacy policy appeared to violate European Union law, raising the stakes in a showdown with the company only days before it planned to put the new system into effect.
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Steve Madsen

Facebook to Adopt New Terms of Service - WSJ.com - 0 views

  •  
    Facebook changed its governing documents afer being scrutinised by users earlier.
  •  
    Facebook Inc. said it would move to implement two new governing documents after preliminary results showed that 74.4% of Facebook users who participated in a vote on the new documents supported them.
Julie Lindsay

`Don't post that!' - networking etiquette emerges - 0 views

  •  
    In an age in which instant news and constant life streams from Facebook and Twitter change the way we communicate, the rules of etiquette surrounding these interactions are still evolving. What happens when I expected a phone call about something and read about it in a status update instead? What's the polite response to a distant friend posting bad news on Facebook? What to do with sensitive information? Making matters trickier, good etiquette on Facebook might not apply on Twitter or in an e-mail. These days, milestones like marriage, pregnancy, breakups and divorce are being described over more forms of communications than ever.
Steve Madsen

Web helps nastiness rise to new levels - Technology - smh.com.au - 0 views

  •  
    Offers some advice for parents
  •  
    But new technology enables girls to be even meaner, Australia's foremost expert on cyber bullying says.
mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
1 - 20 of 328 Next › Last »
Showing 20 items per page