Skip to main content

Home/ Digiteen/ Group items tagged of

Rss Feed Group items tagged

Blakelee H

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
Julie Lindsay

Seven Questions to Ask About Texting in Class | MindShift - 1 views

  •  
    "# What's the impact of messages related to classwork when they're part of a large stream of messages students receive from friends, family, horoscope advice, sports scores and so on? # What sort of learning happens best (or is reinforced best, perhaps) via SMS? # How can these sorts of messages be adapted to students' progress and how can they be sequenced and scaffolded over time? # How many students are able and willing to participate in these sorts of educational activities via their mobile phone? Can students afford the texting fees? Do they want to use their text-messaging allocations for this purpose? # Can we subsidize this sort of SMS traffic for student populations? # If these sorts of messages between home and school become more common, will there be a way to include parents and parents' phones in the loop? # Can these quizzes be sent to parents' phones so that they can have the opportunity to pose a question to their children? "
Garrett E

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with on-line access scored higher in the areas of information management, communication, and the presentation of ideas. According to one article the use of instructional technology offers great promise in helping "students become independent, critical thinkers, able to find information, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Blakelee H

Top 4 Health Problems Caused By Computer Use | Healthy Health List (heheli.com) - 0 views

  • I am frequent computer user. Of course it’s interesting to know how danger for my health computer can be. Working with computer for whole day is not rare nowadays. If it’s an aspect of our work or if we use computers just for fun, there are certain risks involved with prolonged computer use. 1. Eye Disease It’s the first what occur to us, when we talk about computer harm (right?). Prolonged computer use could be linked to glaucoma, especially among those who are short-sighted. Our eyes are very badly affected by how long you stare at that bright screen. We stop blinking and start staring which makes our eyes strain and dry out. Make sure you look away from the screen and close them for a few seconds every few minutes. We can find many information about eyes health, as Snuz made. And it’s very important not to forget about our eyes while working on computer. 2. Bad Posture Bad posture is enemy number one. Check your posture now! You should be able to reach the keyboard and mouse whilst bending your elbows at 90 degrees, with your shoulders relaxed. If you are stretching, this could cause problems. Your back should be straight and the top of the monitor should be just below eye level. If your monitor is to the left or right of your keyboard you are putting strain on your neck. Long periods of time at the computer while blogging, working or reading often leads to pain in the lumbar region of the back. Neck and shoulder problems also result from poor seating and the poor organization of equipment on the desk (stretching for the telephone or files etc). 3. Hurting Hands Your hand and wrist ache after working at the computer all day, and they sometimes start feeling numb. Research in recent years has found that things like typing and sewing rarely cause carpal tunnel. Wear splints while you work to keep your wrists from bending too high or low, and use a keyboard tray or adjust your chair so the keyboard and mouse are below your elbows and your wrists are level. It is really important to give your fingers, wrists and hands a break from resting on the keyboard all day. A tennis ball is a great way to do this. Every time you need to think you should grab the ball and give it a few quick squeezes. This will do wonders for your joints and muscles. 4. Computer Stress Injuries Many people suffer from structural problems related to the physical stress of sitting incorrectly, or for too long in front of their computers. So there are chances you’ve experienced a fair amount of computer stress, from minor frustrations here and there to a virtual visit to computer hell. High levels of stress can kill you, don’t make mistakes! Highly stressful workers have a higher risk of developing heart diseases and even cancer. So make sure that you can manage your stress. Start making something to reduce it, don’t wait till computer stress will be the main problem in your life. Taking frequent breaks is an important step in preventing repetitive computer stress injuries. Thus, it shows up that there are several problems that occur with prolonged computer use. It is also clear, however, that if certain rules of using computer are observed the risk of any of these problems can be minimized and computer users affected with computer related disorders can avoid or treat them. I consider that persons should have active lifestyle and an ergonomic computer work station, thereby even hardly computer working can’t affect their health. What do you think?
  •  
    The top 4 health risks are Eye Disease, Bad Posture, Computer Stress Injuries, and Hurting Hands
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Vicki Davis

World of Warcraft Obsession - has 36 accounts, Raids by Himself | Ripten Video Game Blog - 0 views

  •  
    Addictive behaviors is a concern when talking about online games or anything that people like -- I think this person is a perfect example of an addiction to a game, World of Warcraft, gone haywire.
  •  
    There are hobbyists and there are fanatics. I cannot imagine the pricetag for the computer set up shown here and have to hope that these 11 computers used simultaneously to play world of warcraft are put to "good use" at other times during the day. I also see someone who is online but is not connected with others. To me, if I do things online - I like social spaces because of the "interaction" -- sort of like creating your own friend network of 36 different people and tweeting yourself all day -- sort of Sybil-ish, I think. Addictive behaviors is definitely part of digital health and wellness and helping people know when to draw the line.
Becca B

Online Etiquette - 1 views

  • However, some things don't change: the practices of courtesy and respect that apply in the ordinary classroom also apply online, and require even more attention
  • Participate
  • Be persistent
  • ...8 more annotations...
  • Share tips
  • Think before you push the Send button
  • Remember that we can't see the grin on your face when you make a sarcastic comment,
  • Ask for feedback
  • "Flaming,"
  • unacceptable
  • derogatory or inappropriate comments
  • Plagiarism
  •  
    " 1. Participate. In the online environment, it's not enough to show up! We need to hear your voice to feel your presence, and we especially need your comments to add to the information, the shared learning, and the sense of community in each class. 2. Be persistent. Remember that we're all working in a fairly new environment. If you run into any difficulties, don't wait! Send an email immediately to your instructor or post on the Bulletin Board. Most problems are easily solved, but your instructor (and your course colleagues) have to hear from you before they can help. 3. Share tips, helps, and questions. For many of us, taking online courses is a new frontier. There are no dumb questions, and even if you think your solution is obvious, please share it by posting it on the Bulletin Board or other communication tool. 4. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? While you can't anticipate all reactions, do read over what you've written before you send it. 5. Remember that we can't see the grin on your face when you make a sarcastic comment, we can't see the concern on your face if you only say a couple of words, and we can't read your mind and fill in the gaps if you abbreviate your comments. So: help us "see" you by explaining your ideas fully. 6. Ask for feedback if you're not sure how your ideas and comments will be taken. Remember there's a person on the other side. If you disagree with what someone has said, practice all your communication skills as you express that disagreement. 7. "Flaming," or flying off the handle and ranting at someone else is unacceptable; it's the equivalent of having a tantrum, something most of us wouldn't do in an onsite, face to face classroom. 8. Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to the sa
Nolan C

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
Brody C

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something Online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s Online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and information from the federal government to help consumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making online purchases, avoiding phishing scams (with a fun Flash animation on how to tell if you’re being phished), and defending cell phones and PDA’s against attack.
Jenna A

Literacy Rate - How Many Are Illiterate - 0 views

  •  
    "The literacy rate in the US has many educators in search of answers about this problem that has plagued our country for decades. Instead of decreasing, the numbers of literacy has steadily increased over the years. This raises a lot of questions about our education system, how it is ran, and why there is such a problem with illiterate people in our country. The NAAL (National Assessment of Adult Literacy) administered tests which revealed that an estimated 14% of US residents would have extreme difficulty with reading and written comprehension. These people can legally be defined as illiterate. This could lead to numerous problems for these people now and in the future. When looking to apply for a job, there are forms that have to be filled out. Adults with literacy issues are unable to fill out these forms which decrease their chances of getting a job and raises unemployment issues."
  •  
    This tells about the way literacy has increased in the US, and how people with low literacy rates are illiterate.
Haley M

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
Riley F.

digiteen2008 - Digital Health and Wellness - 2 views

  • Digital Health and Wellness is how to stay physically fit.
  • . A few months ago a train wrecked because the driver was texting and not paying attention to how fast he was going
  • I think that alot of middle aged students would be interested in playing the nintendo wii fit.
  • ...14 more annotations...
  • Just a bit of advice for the middle and high school students, put the phone on silent and leave it alone while you are driving because you can really get hurt!
  • Also you can still teach kids to sit correctly when your on a computer
  • So they are just naturally harder to teach than anyone else
  • one of the teachers said that walking into a room without computers was like walking into a desert.
  • This video is all about minor cases of what can and will happen if you text and drive.
  • Here are some pictures of some of the worse things that can happen.
  • Middle school and high school students are more likely to text and drive because they don't know all about the dangers of texting and driving
    • d l
       
      This is true. Texting and driveng is very dangerous.
  • A good saying for this is," I hear and I forget, I see and I remember, I do and I understand." Confucious.
    • d l
       
      I agree.
  • One is that they are more affected by predators
  • The second is WE have to keep them from getting too much computer consumption
  • Doctors say kids should only get 1 or 2 hours of "screen time" a day.
  • People of all ages are becoming more and more dependent on computers and mobile phones.
  • Digital health and wellness is about staying fit and healthy I think. People that spend to much on computers or use there mobile phones to much should cut down heaps.
  • A. Elementary Aged Students Don't let them stay on the computer for extended amounts of time, don't let them get on Myspace or Facebook, and when they are on the computer the parents should always be watching them no matter what. B. Middle / High School Aged Students The middle school students should be allowed a little more freedom but by the same token i don't think that they should be allowed to get on Myspace or Facebook. Those things will bring a lot more trouble than anything else. Do you think that the people on Myspace are looking for a good christian page or a page that has a lot of bad pictures on it? I don't have a Myspace or Facebook and truly I don't want one. C. Adults Adults should be allowed to do what they want. I mean really what can we do to stop them? Nothing!! We can try all that we want to but adults get more addicted and are harder to get out of that habit. Then again I think that the adults will be the best influence for the young kids and if they will try and spread the word for the kids they can do anything for them that they want to
  •  
    This is last years info about my topic.
  •  
    This is the page from last year.
  •  
    this states what digital health and wellness is and it gives an example of what the author means.
Vicki Davis

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
Becca B

Why is Netiquette Important? | Why - 0 views

  • DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude.
  • Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone.
  • The very basic rule in Netiquette is thinking before posting.
  • ...1 more annotation...
  • Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); Share 
  •  
    "Why is Netiquette Important? The internet is now a medium of communication for most people nowadays. Everything from business transactions, buying and selling, socializing or simply blogging your thoughts are conducted over the internet. Net etiquette is a fusion of the internet and good manners in cyberspace. Though nothing is really concrete in cyberspace it is important to bear in mind that the internet involves millions of people. It is like a world in a gadget, but the people you are dealing with on the other end are real and not mere avatars. Our generation now lives in the internet; there are formalities and guidelines to follow to render professionalism, courtesy, and order making the internet more useful and effective as possible. The very basic rule in Netiquette is thinking before posting. Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone. Unsolicited messages are spam and detested by everyone. Chain letters can be one example; it would be best to delete it and not forward it. Be careful when spreading warnings about Internet viruses sometimes it may just be a hoax. Many get fooled by this and immediately copy paste and send it to everyone in their mail list. You may end up getting a lot of junk mail or spam in the process. DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude. Lessen the use of acronyms, BRB for “be right back” and etc. Not everyone is familiar with this internet lingo. Acronyms may be ideal in the chat room but unprofessional in email. Make use of the FAQ, Frequently Asked Questions, it is a form of orientation for news groups and social networks. Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. Share "
Susan Davis

UWC Online - Online Etiquette - 1 views

  • Given the absence of face-to-face clues, written text can easily be misinterpreted. Avoid the use of strong or offensive language and the excessive use of exclamation points. If you feel particularly strongly about a point, it may be best to write it first as a draft and then to review it, before posting it, in order to remove any strong language.
  • If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion is also new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.
  • Although electronic communication is still young, many conventions have already been established. DO NOT TYPE IN ALL CAPS. This is regarded as shouting and is out of place in a classroom. Acronyms and emoticons (arrangements of symbols to express emotions) are popular, but excessive use of them can make your message difficult to read. Some common ones include:
  • ...6 more annotations...
  • Messages may often appear perfectly clear to you as you compose them, but turn out to be perfectly obtuse to your reader. One way to test for clarity is to read your message aloud to see if it flows smoothly. If you can read it to another person before posting it, even better.
  • You may be familiar with many of the previous points if you have participated in other forms of electronic communication in the past. But Web-based courses have some added constraints not present in other arenas. Keep in mind these additional four points:
  • Be as concise as possible when contributing to a discussion. Web-based courses require a lot of reading, and your points might be missed if hidden in a flood of text. If you have several points that you want to make, it might be a good idea to post them individually, in several more focused messages, rather than as a single, lengthy, all-encompassing message.
  • Contributions to a discussion should have a clear subject header, and you need to stick to the subject. Don't waste others' time by going off on irrelevant tangents.
  • Don't add your comments to a discussion before reading the comments of other students unless the assignment specifically asks you to. Doing so is tantamount to ignoring your fellow students and is rude. Comments related to the content of previous messages should be posted under them to keep related topics organized, and you should specify the person and the particular point you are following up on.
  • A key distinguishing feature of an online course is that communication occurs solely via the written word.
mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
Merritt D

Keeping your child safe online - Crimewatch - East Coast Radio - 0 views

  •  
    Keeping your children safe online! This website stresses the importance of being aware of your child's online activity! Childline's five tips for parents with children on social networking sites. · Set very clear rules for online use and clear consequences if they are broken. · Discuss some of the unique aspects of behaviour in cyberspace-like anonymity and what it means for your child and for others. · Watch the time. Use an alarm clock or timer if you or your child lose track of time. · In addition, many young teenagers are interested in "chatting." Be aware of who they are chatting to · Make sure your teenager knows the legal implications of online behavior
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Callie S

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
« First ‹ Previous 41 - 60 of 757 Next › Last »
Showing 20 items per page