Skip to main content

Home/ Digiteen/ Group items tagged processes

Rss Feed Group items tagged

mitch g

Communication - Wikipedia, the free encyclopedia - 0 views

  • Communication is a process of transferring information from one entity to anothe
  • sign-mediated interactions
  • between at least two agents which share a repertoire of signs and semiotic rules.
  • ...3 more annotations...
  • defined as "the imparting or
  • interchange of thoughts, opinions, or information by speech, writing, or signs".
  • two-way process in
  •  
    communication- the process of transferring information from one entity to another
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Steve Madsen

Virgin Blue Mobile Boarding pass - 0 views

  •  
    Virgin Blue has launched a revolutionary, innovative new process to check in and board on domestic flights via a traveller's mobile called "Check-Mate". Gone are the days of booking the flight in advance at a desktop computer, getting to the airport, lining up to check-in and getting a printed boarding pass, with the new Check-Mate process eliminating all paper boarding passes in favour of electronic boarding passes on mobile devices including mobile phones, BlackBerry Smartphones and iPhones.
  •  
    Will this speed up boarding an aircraft? How? Is this considered an innovation in 2010?
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Alan K

Legal governance, risk management, and compliance - Wikipedia, the free encyclopedia - 1 views

  •  
    Legal Compliance is talked about in this article. It has two subsections, Legal Consistency and Legal Completeness. There are processes, rules, tools, and systems when it comes to Legal Compliance.
  •  
    This really helped me do my part of the wiki. Very good choice =D.
Vicki Davis

CBC News - Technology & Science - Facebook app tackles cyber bullying - 8 views

  • a Denver-based company has created a Facebook application for youth to report violations to Facebook officials and connect to safety and crisis-support organizations. SafetyWeb's application, launched Monday, links teens to organizations including the U.S.-based National Center for Missing & Exploited Children's CyberTipline, the National Suicide Prevention Hotline and Facebook's abuse reporting process.
  • When their child clicks the Find Help application, they are directed to phone numbers and links for reporting incidents.
  •  
    New facebook app. Encourage kids to install this. It lets them report cyberbulling with one click from Facebook and links to the US National Center for Missing & Exploited Children's Cyber Tip line, the national suicide prevention hotline and facebook's abuse reporting process.
Becca B

10 Etiquette Tips For An Online Course - 0 views

  • 1.) Participation — unlike classroom settings, you can’t just “show up” and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination — do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing — ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don’t keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread – before you press the SEND button, think about what you have written; you can’t take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express — classmates and teachers cannot “see you”, so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback — give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect — do not put down anyone’s ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution – be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn’t say it in person, don’t say it online. 9.) Cheating – treat the class like an in-room course. Do not cheat, it only hurts your learning opportunities. 10.) Work hard! — to get the most out of it, you’ve got to put your best into it! Work hard and achieve results!
  •  
    "1.) Participation - unlike classroom settings, you can't just "show up" and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination - do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing - ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don't keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread - before you press the SEND button, think about what you have written; you can't take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express - classmates and teachers cannot "see you", so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback - give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect - do not put down anyone's ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution - be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn't say it in person, don't say it online. 9.) Cheating - treat the class like an in-room course. Do not cheat, it only hurts your learning
Margaret O.

How Students Use Technology to Cheat - 0 views

  • How Students Use Technology to Cheat
  • Academic dishonesty—ahem, cheating—has only gotten easier in the digital age. Students have Wolfram Alpha, Google, and crowdsourced question-and-answer sites like Quora at their fingertips. Students have cameras on their phones that let them take pictures of a test in an instant. Even Microsoft Word has built-in functionality that helps them game the system.
  • There's an old saying that students who cheat in their academic work are only cheating themselves. Today's professors still largely agree with this statement, with one telling me that it's like weight-training: "I can give them the information and I can coach them through the process, but if they don't put in the work, they will never see results."
  •  
    "I can give them the information and I can coach them through the process, but if they don't put in the work, they will never see the results." Students who cheat in their academic work by using technology to get past teachers who don't understand it are only cheating themselves.
Jenna A

The Importance of Fluency - All Info About Reading - Promoting Literacy for All - 0 views

  •  
    " Reading fluency is a measure of how quickly, smoothly, and easily text is read. Fluency means that words are read quickly and accurately, with little or no stumbling. It allows complete comprehension because less effort is needed for decoding. More thought power is available for understanding the author's message. Fluent readers read with expression and follow the punctuation cues. They read in sensible phrases, with pauses in natural places. Fluent readers are able to read aloud without attracting attention to the reading process, and listeners get the sense that the reader has a good grasp of the author's intent. Many reading students fall short of fluency. They read well enough to get by, but not well enough to enjoy what they are doing. Struggling readers often have a very large gap between the level at which they read fluently and their grade placement level or the demands of their day-to-day life. Most find this very frustrating, and they will try to avoid reading tasks. "
  •  
    This tells you what reading fluency is and how kids fall short of it.
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Steve Madsen

How to delete your Facebook account - Telegraph - 0 views

  •  
    "This is a time-consuming process, particularly if you are insanely popular, with hundreds of "friends", but will make every aspect of controlling your privacy that much easier. Friend lists allow you to group your contacts in to groups, so that you're only sharing certain information with certain people. For example, you might create four lists: "Close friends", "Acquaintances", "Family", and "Work""
  •  
    Do teenagers configure their privacy settings properly in Facebook?
Becca B

Why is Netiquette Important? | Why - 0 views

  • DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude.
  • Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone.
  • The very basic rule in Netiquette is thinking before posting.
  • ...1 more annotation...
  • Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); Share 
  •  
    "Why is Netiquette Important? The internet is now a medium of communication for most people nowadays. Everything from business transactions, buying and selling, socializing or simply blogging your thoughts are conducted over the internet. Net etiquette is a fusion of the internet and good manners in cyberspace. Though nothing is really concrete in cyberspace it is important to bear in mind that the internet involves millions of people. It is like a world in a gadget, but the people you are dealing with on the other end are real and not mere avatars. Our generation now lives in the internet; there are formalities and guidelines to follow to render professionalism, courtesy, and order making the internet more useful and effective as possible. The very basic rule in Netiquette is thinking before posting. Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone. Unsolicited messages are spam and detested by everyone. Chain letters can be one example; it would be best to delete it and not forward it. Be careful when spreading warnings about Internet viruses sometimes it may just be a hoax. Many get fooled by this and immediately copy paste and send it to everyone in their mail list. You may end up getting a lot of junk mail or spam in the process. DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude. Lessen the use of acronyms, BRB for “be right back” and etc. Not everyone is familiar with this internet lingo. Acronyms may be ideal in the chat room but unprofessional in email. Make use of the FAQ, Frequently Asked Questions, it is a form of orientation for news groups and social networks. Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. Share "
Steve Madsen

Technology and Education - Box of Tricks - 0 views

  •  
    An example of digital literacy (if a person learns how to use it).
  •  
    Diigo offers a fantastic way to tap into the way our students operate by allowing the annotation of web pages which can then be shared with your students and, by doing so, you facilitate the process of research for your students and you set them on the right track for further independent study.
JustinM_mca MCA

Innovation & Technology News - 0 views

  •  
    This news site gives perfect examples in innovations of technology. It contains articles explaining new ideas conceived or at work to help understand and make things more efficient. One article tells of an idea how trapping and using light, instead of electrons, in computers can really boost computer speed and data processing.
Steve Madsen

10 Privacy Settings Every Facebook User Should Know - 0 views

  •  
    Whatever the reason for ending our Facebook friendship, I figured that many people would benefit from a thorough overview on how to protect your privacy on Facebook. Below is a step by step process for protecting your privacy.
WestR WHSB

What to Do With a Jailbroken iPhone Before Taking it In? | Small Business - Chron.com - 0 views

  •  
    cure your iphone of jailbreak "Jailbreaking unlocks the file system" "The jailbreak process is not supported by Apple and nullifies your warranty... . A factory restore eliminates all traces of the jailbreak software so you can feel confident walking in to the Apple store with your iPhone."
Julie Lindsay

The Possibility Post | Fostering Global Digital Citizenship - 0 views

  •  
    Ann from South Australia talks about her exploration of digital citizenship with her students. My favourite sentence, Ann, I really enjoyed reading this blog post. You have shared vital process material from your recent connection with NZ and also communicated student responses -also a necessary part of assessing the success and viability of online connection that leads to collaboration. My favourite sentence is your last one - "Global digital collaboration goes beyond research. We found out more through the learning experience of meeting and sharing knowledge." #flatconnections #GlobalCitizen New blog on my first global collaboration. http://t.co/8uJleK5Iar
Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
mitch g

digiteen2008 - Digital Communication - 1 views

  • Communication is the continuous process of giving and taking information between messenger and receiver
  • directly talking with others using language, body language, etc
  • confuse the receiver
  • ...13 more annotations...
  • body language
  • only simple things
  • face to face
  • trustful information
  • limited
  • to talk face to face
  • receiver and messenger have to stay in the
  • same place
  • have to use the same languag
  • most popular
  • using Internet
  • positive and negative
  • effects
  •  
    2008 communication wiki
1 - 20 of 26 Next ›
Showing 20 items per page