Skip to main content

Home/ Digiteen/ Group items tagged prevention

Rss Feed Group items tagged

Kerrie D

Cyber-Bullying: Detection and Prevention - 0 views

  • “Dr. Caudle advises that, in addition to interacting more with their children, parents should also take the necessary preventive measures to create safe places for their children to get away from cyber-bullying. “The home should be a safe place where open discussion is not only allowed, but invited,” says Dr. Caudle. Parental supervision and involvement in a child’s social interactions allows for a sense of comfort and protection from bullying. ”
  • “Dr. Caudle also notes that one must not forget about the bullies themselves. Often, bullying is a cry for help and can usually be traced to a time when the bully was in fact a victim of this type of behavior. Thus, creating a safe environment where one’s child feels comfortable enough to talk about being bullied can help put a stop to bullying before it ever starts.”
  • “According to Dr. Caudle, in order to prevent cyber-bullying, parents must be actively involved in their children’s cyber lives. “Communication with one’s children is the key to bully prevention,” says Dr. Caudle. So send them a friend request on Facebook. Play some XBOX Live—or another system with online gaming—with them. Parents who are proactively involved with their children’s interactions online are subsequently able to monitor these interactions more closely. Therefore, such parents will be exponentially more informed with regard to what bullies, if any, exist in their children’s lives, both online and off. ”
  •  
    Tells you how to create a safe place at home and how to get involved if you know someone that is being bullied online. Be able to prevent cyberbullying by creating a safe environment at home.
William H

Internet Predator Prevention | eHow.com - 0 views

  •  
    This is good sight for internet predator prevention at many different stages
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Kellie C

How to Prevent Culture Clashes | Africa Magazine Online | ReConnect Africa - 0 views

  • Why do cultures clash? Culture clashes occur when we judge the behaviour of a person from another culture using our own values. For example, a British approach to time may be that there is never enough and so we use it carefully and make sure we don't waste it. Another culture may see time as something they don't need to control so strictly and see a flexible response to things as more useful. These two different approaches can quickly lead to clashes in a business setting.
  •  
    This website tells about how to prevent internet culture clashes.
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | ... - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
Michelle L

What Parents Can Do About Cyberbullying - National Crime Prevention Council - 0 views

  •  
    What Parents can do to prevent Cyberbullying
Vicki Davis

Internet Crime Complaint Center (IC3) | Prevention Tips - 1 views

  •  
    Internet crime prevention tips. Will be used with digiteen this year.
Vicki Davis

CBC News - Technology & Science - Facebook app tackles cyber bullying - 8 views

  • a Denver-based company has created a Facebook application for youth to report violations to Facebook officials and connect to safety and crisis-support organizations. SafetyWeb's application, launched Monday, links teens to organizations including the U.S.-based National Center for Missing & Exploited Children's CyberTipline, the National Suicide Prevention Hotline and Facebook's abuse reporting process.
  • When their child clicks the Find Help application, they are directed to phone numbers and links for reporting incidents.
  •  
    New facebook app. Encourage kids to install this. It lets them report cyberbulling with one click from Facebook and links to the US National Center for Missing & Exploited Children's Cyber Tip line, the national suicide prevention hotline and facebook's abuse reporting process.
William B

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
October H

Surviving a Hack - 0 views

  •  
    "There's a topic that all web developers need to keep current on - regardless of whether you're a newbie or a veteran, if your site has been up for 10 years or for 10 minutes - and that topic is web site security and protecting yourself from hackers. What can be even more important than prevention is the cure in case your site is hacked."
  •  
    STOP! You might be hacked, don't panic read this blog and get that hacker off that site. It has different ways to help you stop hackers from getting inside your private life eon the internet.
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Vicki Davis

danah boyd | apophenia » Born This Way Foundation: guided by research - 0 views

  •  
    Five research papers about bullying and bullying prevention programs authored by some of the best in the business. This is in support of Lady Gaga's new "research based" foundation to promote grassroots student action to help students improve relations to each other.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
Joseph Edore

Solutions for Digital Safety - Youth and Media - 1 views

  • 1. Communication with your daughter or son is key. Build a trusting relationship through dialogue.
  • 2. Create an account to understand how the site works, but not to stalk your kids. They need room to explore, but if you are familiar with the media and technology that they consume, you can provide valuable guidance and suggestions. Surveillance, while possible, damages a trusting parent/child relationship.
  • 3. Ask your kids how they choose to represent themselves and why. Use MySpace as a resource to start a conversation about contemporary fashion, ideals, and media images.
  • ...2 more annotations...
  • 4. Talk about private/ public issues with your kids. Help them to understand the consequences of making certain information publicly accessible. Get them to think through all of the possible audiences who might come into contact with their online information
  • 5. Talk through what kids should do if they receive unwanted attention online or if they find themselves the victims of cyberbullying. A growing number of sites provide useful information about how to confront such problems, including Net Family News , NetSmartz and SafeTeens.
  •  
    "Because being connected is such an integral part of teens’ lives, some youth may hesitate telling their parents about the harassment they encounter for fear that their online privileges will be taken away. The best way to combat cyber bullying or other forms of harassment is not to reign in or limit a teen’s use of technology, but to make sure adults keep the lines of communication open. In addition to keeping the computer in a public space, parents should also become more aware of what their children are doing online. They should consider the Internet as an opportunity to engage in conversation with their children about their interests, talents, and network of friends. It is important to emphasize with youth that there is a distinct connection between what happens online and in the "real world." Adults should communicate to youth that their actions have implications in a real world setting. Regarding cyber bullying in particular, adults must also relay traditional techniques of combating bullying, among them being to report incidents, keep records, and not to engage the bully. “It’s not new bullying, it’s just a vehicle,” says Nancy Mullin-Rindler, director of the Project on Teasing and Bullying at Wellesley College (Paulson, 2003). In addition, because research has shown that the majority of cyber bullies have been victims of traditional bullying, this approach—-combating the behavior versus limiting the technology—-would ultimately help in preventing both cyber and conventional bullying. Cyber bullying poses a stickier problem for schools that are finding themselves in the middle of First Amendment debates. Despite the fact that whatever happens online (no matter where the location) typically spreads to the school environment, inevitably impacting students’ learning, does a school principal have the right to punish someone for what they say outside of school parameters? Because of this legal quagmire, schools’
Mary Westbrook

How to Prevent Computer Addiction | eHow.com - 0 views

  • Place reasonable limits on computer usage.
  • Adhere to your imposed computer usage limits.
  • Consider why you are using the computer if your usage becomes excessive. Boredom, anxiety, and depression
  • ...1 more annotation...
  • Seek assistance as soon as you realize that you are unable to properly control your computer usage.
StephenK_mca MCA

Do Privacy Fears Allow Terrorism? - 0 views

  •  
    At a gathering of technology and privacy experts, a lawyer for a conservative think tank has one request: Stop the "hysterical cries" over loss of privacy and let the government do what it must to prevent terrorism. Michelle Delio reports from New York.
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 1 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
  •  
    Net neutrality deserves a mention in the Digiteen project and is an important topic being debated here in the US.
1 - 20 of 45 Next › Last »
Showing 20 items per page