Skip to main content

Home/ Digiteen/ Group items tagged on

Rss Feed Group items tagged

2More

Keep your kids safe on Facebook - 1 views

  • First step, if you don't have a Facebook account, get one and learn about it before you allow your teen to get one. Another suggestion, teach your kids to use common sense. Don't put your social security number, address or phone number online. Finally, don't teach your kids to be dishonest!
  •  
    What parents should do to keep their kids and family safe on Facebook.
2More

My Struggle with Internet Addiction and How I Will Overcome It - 0 views

  • Awful things Internet addiction has done to me:- Internet addiction has made me a very lazy and unwilling fellow who would usually take 2-3 hours to start the day off.- Internet addiction has caused me great amounts of stress and anxiety. (For example, I have lots of pornographic material scattered around my two laptops and I start getting paranoid when people ask me if they can use my computer to check something.) The death of a loved one 2 years ago only made my situation worse.- Internet addiction has prevented me from exercising and staying fit.- Internet addiction has put lots of strain into my eyes, from constantly staring at the monitor for about 6+ hours a day. (Not natural.)- Internet addiction has made me less social with my friends and made me feel more impatient (like when I would wait longer than 5-10 minutes for a friend on an instant messenger program to respond to me and I'd start wondering if I said something that could have offended them or if I am bugging them too much).- Internet addiction has turned me away from playing some of my favorite video game consoles (I grew up with the Super Nintendo and still have it). Thankfully, at least I never got into MMORPGs or any other online game services. I mainly emulated.- Internet addiction has made me very obsessed with atheism and religion. Of course I am glad to no longer subscribe to any organized religion (I hold no grudges against those who do, just the ones that try to shove their beliefs down others' throats because I find it very inhumane), but I don't want to continue obsessing over it; it makes me feel very depressed. I don't want this.- Internet addiction has made me very untidy. Currently I have 4 stacks of plates, 2 stacks of cereal bowls, 3 stacks of 8 oz glass cups, and 2-3 forks and knives and 7 spoons. I have bits of shed hair (I have long, frizzy hair) here and there on the carpet and it is quite embarrassing!- Internet addiction has made me procrastinate on class assignments and fail school indubitably. - Internet addiction has wasted so much of my precious, precious time that could have been used for other things that are more worthwhile and productive. In fact, my one-year-and-a-half Facebook addiction has worsened me to the point where I just had to delete my account once and for all.- Internet addiction has made me forget about the usefulness and convenience of doing real-life alternatives, such as mailing out letters/post cards to friends instead of just refreshing my e-mail inbox every 1 hour when I am awake, or listening to my massive cassette/CD/record collection instead of just sitting around my computer listening to MP3s.So you see, I am in a SERIOUS need of a change! I am sick and tired of living this sad and pathetic lifestyle. The stupidity of sites like 4chan inspired me to leave the Internet behind.
  •  
    A list of negative effects the internet has played on one person's life. This ranges from physical pain to mental disorder.
3More

Internet Addiction : Counseling Center : Texas State University - 0 views

  • Internet addiction? Sounds unlikely, right? How can the use of a positive, dynamic force like the Internet become a negative, debilitating factor in someone’s life. Simple. Just like the use of food, the drinking of alcohol, or the purchasing of material things can escalate into misuse and abuse, so can one’s interest in and preoccupation with using the Internet become an addiction. Let’s take a look at several key facets of this developing phenomenon of Internet Addiction, starting with a basic definition which is taken from Dr. Kimberly B. Young’s book Caught in the Net.
  • Do you feel preoccupied with the Internet (think about previous on-line activity or anticipate next on-line session)? Do you feel restless, moody, depressed, or irritable when attempting to cut down or stop Internet use? Do you stay on-line longer than originally intended? Have you jeopardized or risked the loss of significant relationship, job, educational or career opportunity because of the Internet? Have you lied to family members, therapist, or others to conceal the extent of involvement with the Internet? Do you use the Internet as a way of escaping from problems or of relieving a dysphoric mood (e.g., feelings of helplessness, guilt, anxiety, depression)?
  • Although any one of us can become addicted, some trends do exist. Some people are drawn to a “faceless community,” one where a person can enter into multiple cyber-relationships with anonymity and create one or multiple new on-line personas. Certainly persons with quite a lot of discretionary time on their hands are susceptible, including homebound people or college students adjusting to the new schedule on a university campus. Gender does seem to influence the types of applications and underlying reasons for Internet addiction. Men tend to seek out power, status, dominance and sexual fantasy on-line, gravitating more toward the sources of information glut, aggressive interactive games, and sexually explicit chat and cyber-porn sites. Women seek out supportive friendships, romantic partners, and prefer anonymous communication in which to hide their appearance. It seems to be a natural conclusion that attributes of gender played out in Cyberspace parallel the stereotypes men and women have in our society.
6More

Internet Safety - 4 views

  • The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world. But that access can also pose hazards. For example, an 8-year-old might do an online search for "Lego." But with just one missed keystroke, the word "Legs" is entered instead, and the child may be directed to a slew of websites with a focus on legs — some of which may contain pornographic material. That's why it's important to be aware of what your kids see and hear on the Internet, who they meet, and what they share about themselves online. Just like any safety issue, it's wise to talk with your kids about your concerns, take advantage of resources to protect them, and keep a close eye on their activities. Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first. COPPA requires websites to explain their privacy policies on the site and get parental consent before collecting or using a child's personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or participate in a contest. But even with this law, your kids' best online protection is you. By talking to them about potential online dangers and monitoring their computer use, you'll help them surf the Internet safely.
  • Listen
  •  
    This is a good website that tells you how to be safe on the web.
  • ...1 more comment...
  •  
    How often do you let your children or siblings use the computer? In fact a lot of kids use the internet not only at home but also at school. This page helps teach younger kids internet safety for when no one is around. Quote: 'The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world.'
  •  
    This paragraph begins by disscussing kids and safety on the internet. offers tools to be involved in kids online safety. The article the importance of sharing an email account with a child and keeping the computer where you can see it. The article suggests having basic rules like never trading pictures and never revealing personal information. It also discusses being aware of preditors. So finally the article ends with warning signs like long hours online especially at night.
  •  
    "Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first."
3More

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device. "
2More

Parents should control use of technology - 1 views

  • 1. Power down at mealtimes. This means no television, computers or texting. This is the time to really connect with each other without the technological distractions that can be so overwhelming throughout the day. 2. No computers in kids' bedrooms until at least high school. Please trust me on this one. The risks just aren't worth it. Keep computers in public areas of your house, and regularly monitor their usage. 3. Limit or eliminate television viewing on school nights. You'll be amazed at the impact this will have on your family. Kids play games, become creative and interact with us and their siblings. 4. No social media networks until at least high school, and supervise their use. Many kids just don't have the impulse control to adequately control this technology, and the effects on them and others can be substantial. 5. Supervise cell phone use, including texting. You need to be guided by the maturity of your child, but irresponsible behavior should result in increased supervision. 6. Learn about technology. Don't be afraid of texting, video-conferencing, iPads, or Facebook. They are fun and great ways to stay connected with your kids.
  •  
    Tips for parents that think their kids are spending too much time with technology
1More

teachers | Idea Flight - 0 views

  •  
    "Idea Flight is the only tool you need to share your ideas easily on iPad. Captivate your audience in a whole new way, keep everyone on the same page and network on the fly." Westwood beta tested Idea Flight on iPads that they sent over. It was presentation/learning app that help the teachers "fly" us through the lessons at her own pace, keeping all the student on the same page (unless she unbuckled our seat belts.) It was very cool having the presentation right in the palm of your hand so you could be up close and personal with the presentation.
5More

Kids and Electronics: New Study Shows Kids Spend More Than 7 Hours a Day With Electroni... - 0 views

  • The average kid sponges in 2.5 hours of music each day, almost five hours of TV and movies, three hours of Internet and video games, and just 38 minutes of old-fashioned reading
  • And that doesn't even include the hour and a half spent text messaging each day, and the half hour kids talk on the cell phone.
  • But what about homework?
  • ...1 more annotation...
  • members of the multitasking generation pays a price for their digital lives on their report cards.
  •  
    TECHNOLOGY>SCHOOLWORK? This article shows the studies on kids and how much time they spend with technology everyday. Average kid spends (everyday): 2.5 hrs. on music 5 hours of TV and music 1.5 hrs. on texting .5 hrs. on cellphone ONLY 38 minutes reading books!
1More

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
14More

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
5More

How technology affects rascism - 0 views

  • “On the Internet, nobody knows you’re a dog.”
  • Ms. Nakamura said she has been more surprised by completely new kinds of racism on some popular online video games that now count players around the world.
  • Many of the players chose to play as a female dwarf, a class in the game that can more easily win treasure on solo missions
  • ...1 more annotation...
  • “Race doesn’t happen because of biology—it happens because of culture,” she concluded.
  •  
    RASCISM Video games and computers also affect rascism. This article talks about that. "Race doesn't happen because of biology-it happens because of culture," she concluded Many of the players chose to play as a female dwarf, a class in the game that can more easily win treasure on solo missions. "Ms. Nakamura said she has been more surprised by completely new kinds of racism on some popular online video games that now count players around the world" "On the Internet, nobody knows you're a dog."
1More

10 Things Parents Need to Know About Xbox LIVE and Kids Safety - 0 views

  •  
    10 things to do to be safe on xbox live "It's more than just a gaming site. Xbox LIVE users can also chat with each other, send and receive friend requests, and share their profile and gaming stats.xBox Kids Safety uKnowKids Gamertags need to be chosen wisely. Never let your child use part of their name, hometown, or other identifying information in their gamertag. Profiles follow the child, not the console. A child can still access all his Xbox LIVE information from a friend's house. Kids can play games with strangers. Xbox LIVE has a "matchmaking" feature to help your child connect with gamers who have certain gamerscores or live in a certain location. People can privately chat with each other. Up to 8 people can play and talk all at once, but two of them can pair off and talk privately if they want to. You can make your permission mandatory. Through console controls, you can require your permission for your child to send and receive friend requests, accept game or chat invites, or buy Xbox merchandise. You can block who your child hears. You can choose "everyone," "friends," or "no one." Parents are required to help their children set up an account. If your under-18 child has an account and you didn't help set it up, he or she is registered as an adult. Default settings vary by age. Child and teen accounts are mostly "friends only" by default and some features are blocked, but adult profiles are public and have full access to all features. Deactivating Xbox LIVE doesn't cancel the child's account. On the Xbox console there is a setting to disallow Xbox LIVE access from that console - but your child can still access it on others unless you cancel his account."
1More

Protecting Personal Privacy Online | Common Sense Media - 2 views

  •  
    This is an article to help kids learn the risks of revealing personal information online.  "Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created can get copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. Each time your child fills out a profile without privacy controls, comments on something, posts a video, or texts a picture of themselves to friends, they potentially reveal themselves to the world. Why privacy matters Digital life is very public and often permanent. If our kids don't protect their privacy, what they do online will create digital footprints that wander and persist. Something that happens on the spur of the moment -- a funny picture, a certain post -- can resurface years later. And if kids aren't careful, their reputations can get away from them and third parties -- like marketers or potential employers -- can access what kids thought was private information. Your kids may think they just sent something to a friend -- but that friend can send it to a friend's friend, who can send it to their friends' friends, and so on. That's how secrets become headlines and how false information spreads fast and furiously. The stakes only rise when we remember that everything takes place in front of huge invisible audiences. Kids' deepest secrets can be shared with thousands of people they've never even met. New technologies make controlling privacy more challenging. With GPS-enable cell phones and location-sharing programs, kids can post their whereabouts. This information can go out to friends, strangers, and companies who will show them ads targeted to their location.  Advice for parents Explain that nothing is really private. No matter what kids think. Privacy settings aren't infallible. It's up to kids to protect themselves by thinking t
1More

Miles J. Feldman: Is Privacy Dead? - 0 views

  •  
    Whatever you look up or plan on the internet people can see it. If the government pays for it they can see what you are looking at. People can stalk you on the internet. "Are you planning a trip? A wedding? Have you been searching your medical symptoms on WebMD, or Google stalking your high school crush? Did all of your friends wish you a Happy Birthday on your Facebook page? If so, your financial status, religious beliefs, medical history, birth date and hometown have all been exposed, recorded and compiled into a virtual database that functions as your digital alter ego, a sort of online avatar. That critical mass of information may be accessible to the government or to anyone else who asks (or pays) for it."
5More

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
2More

An Update to the Children's Internet Protection Act (CIPA) « Thumann Resources - 0 views

  •  
    New rules from the CIPA act in the US.
  •  
    Lisa thuman blogged about the recent changes to the Children Internet Protection Act (CIPA) -- to those people who have rejected social networking and chats -- you're required to "educate minors on appropriate online safety including cyberbulling and interacting with others on social networking sites and in chat rooms." How are you going to do this without using safe alternatives and then coach them on it? This is REQUIRED in the US if you get erate funds. Get out there and get busy -- time for pushback. Lisa Thuman's article on this is an excellent read.
4More

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
3More

ADHD and Internet Addiction - 0 views

  • The Causes of Internet Addiction Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play
  • Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
  • Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
1More

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
31More

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
‹ Previous 21 - 40 of 588 Next › Last »
Showing 20 items per page