Skip to main content

Home/ Digiteen/ Group items tagged responsibility

Rss Feed Group items tagged

Vicki Davis

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Joseph Edore

Internet Safety | Guest Services | Disney - 0 views

  • Internet Safety Ask Questions The best form of Online Safety begins at home with you, the parent. We offer you the following tips to keep your child safe on the Internet. The best way to know what your child is doing online is to ask. Whether you ask other parents, an Internet-savvy friend, or your child about how they use the Internet asking the right questions will help you understand what your child is doing online so you can make sure they are making safe online choices. Questions to ask your child: What sites do you visit? What do you do on those sites? Why do you go to that site? How much time do you spend on the site? Did you have to register? What information did they ask for? What information did you give? Spend time surfing the Web with your child. This is a great way to learn about what types of interactions your child is having online, and with whom.
  • Communicate Once you have an idea of how your child uses the Internet and what is available to them, you can establish online guidelines and rules. Whether it's setting guidelines about which sites to visit or what's okay to do online, it is essential to clearly communicate the rules to your child. Speak often to your child about potential risks and what to do in various situations. Encourage your child to ask questions about situations they run into. Being aware of the risks your child faces, and communicating frequently with your child about these risks, will help develop their judgment and responsibility about Internet usage.
  • Safety Rules While the Internet offers amazing opportunities for entertainment, education, connectivity, and more, anyone who goes online should understand basic Online Safety. Teaching these basics to your children is essential. When asked by friends or strangers, online or offline, never share Account IDs and Passwords. Don't reveal any personal identity information in your Screen Names, such as your birthday, hobbies, hometown or school. In any information exchange, like e-mail or chat, never give any personal information about yourself or someone else. Don't share photos of yourself, your family, or your home with people you meet online. Never open e-mails that come from unknown sources DELETE them. If you receive mean or threatening comments online, don't respond. Log off and report the activity to your parents. Nothing you write on the Web is completely private. Be careful what you write and to whom. Never make plans to meet an online "friend" in person. WHEN IN DOUBT: Always ask your parents for help. If you're not sure, log off.
stephanie j

HPCwire: Games That Matter - 0 views

  • One such popular defense tool is a virtual world game called Boarders Ahoy!.
  • The United States Secret Service is also leveraging the training power of virtual worlds to prepare for national threats.
  • First-response teams, such as the police and fire departments, are using simulation games to practice dangerous tasks that would otherwise require risky re-enactments.
  • ...1 more annotation...
  • While all the simulation tools presented above support different projects, they are united in their life-saving potential.
Joseph Edore

GetNetWise | Safety By Age 14-17 - 0 views

  • Safety By Age 14 to about 17: This can be one of the most exciting and challenging periods of a child's (and parent's) life. Your teen is beginning to mature physically, emotionally, and intellectually and is anxious to experience increasing independence from parents. To some extent that means loosening up on the reins, but by no means does it mean abandoning your parenting role. Teens are complicated in that they demand both independence and guidance at the same time. Teens are also more likely to engage in risky behavior both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is extremely low, there is always the possibility that he will meet someone online who makes him feel good and makes him want to strike up an in-person relationship. It is extremely important that teens understand that people they meet online are not necessarily who they seem to be. Although it's sometimes difficult to indoctrinate teens with safety information, they can often understand the need to be on guard against those who might exploit them. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them. The greatest danger is that a teen will get together offline with someone she meets online. If she does meet someone she wants to get together with, it's important that she not go alone and that she meet that person in a public place. It's important for parents to remember what it was like when they were teenagers. Set reasonable expectations and don't overreact if and when you find out that your teen has done something online that you don't approve of. That doesn't mean that you shouldn't take it seriously and exercise appropriate control and discipline, but pick your battles and try to look at the bigger picture. If your teen confides in you about something scary or inappropriate that he encountered online, your first response shouldn't be to take away his Internet privileges. Try to be supportive and work with your teen to help prevent this from happening in the future. And remember that your teen will soon be an adult and needs to know not just how to behave but how to exercise judgment, reaching her own conclusions on how to explore the Net and life in general in a safe and productive manner.
Joseph Edore

Safety Tips for Tweens and Teens - OnGuard Online - 0 views

  • Quick Facts While social networking sites can increase your circle of friends, they also can increase your exposure to people with less-than-friendly intentions. Here are some things you can do to socialize safely online: Think about how different sites work before deciding to join a site. Some sites allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Keep some control over the information you post by restricting access to your page. Keep your full name, Social Security number, address, phone number, and bank or credit card account numbers to yourself. Make sure your screen name doesn't say too much about you. Even if you think it makes you anonymous, it doesn't take a genius to combine clues to figure out who you are and where you can be found. Post only information that you are comfortable with others seeing and knowing. Consider not posting your photo. It can be altered or broadcast in ways you may not be happy about. Flirting with strangers online could have serious consequences. Some people lie about who they really are. Be wary if a new friend wants to meet you in person. If you decide to meet them, meet in a public place, during the day, with friends you trust. And tell a responsible adult where you're going. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust, and then report it to the police.
Joseph Edore

GetNetWise | Online Safety Guide - 0 views

  • Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.
Liz Luby

Fake Social Network Profiles: a New Form of Identity Theft in 2009 - ReadWriteWeb - 0 views

  • identity hijacking
  • We've already seen some high-profile examples of people creating fake online personas over the past year, the most notable case being that involving Lori Drew and MySpace. In this instance, a mother created a fake online identity to bully her daughter's rival
  • To test their prediction, his team was able to set up fake online identities which ended up connecting to the real network of friends and acquaintances easily.
Liz Luby

Facebook Users vs MySpace Users: We Report, You Decide - 0 views

  • MySpace is “… home for … ‘burnouts,’ ‘alternative kids,’ ‘art fags,’ punks, emos, goths, gangstas, queer kids, and other kids who didn’t play into the dominant high school popularity paradigm.
  • Facebook () and MySpace ()
LucasA_mca MCA

Digital Law - 0 views

  •  
    . It deals with the ethics of the technology and the unethical uses it for the crimes and damage it does to society. These laws apply to everyone including kids who use it in school and try downloading things or stealing them also.
radhika chatterjee

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
Liz Luby

EFF: Frequently Awkward Questions for the Entertainment Industry - 0 views

  • The RIAA has sued more than 20,000 music fans for file sharing
  • To that end, EFF has prepared a sample list of tough questions for times when you hear entertainment industry representatives speaking and want to challenge their positions. Asking hard questions is a way of "keeping honest people honest" and revealing when they're actually being deceptive.
  • DRM has clearly failed to stop songs from getting on file sharing networks
  • ...3 more annotations...
  • Recording off the radio is clearly permitted by copyright law and something Americans have done for over 25 years
  • Is it ever legal for me to use software like DVD Shrink or Handbrake to rip a digital copy of a DVD I own onto a video iPod or my laptop
  • Major entertainment companies have repeatedly brought lawsuits to block new technologies, including the VCR, Digital Audio Tape recorders, the first MP3 player, the ReplayTV PVR, and now P2P software.
TommyH_mca MCA

untitled - 0 views

  •  
    There is a lot of good information on this site about the law.
James D

Stand Up For Your Digital Rights - What are the Rights and Responsibilities of Network ... - 0 views

  •  
    stuff
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
mitch g

Top 10 Ways to Communicate Powerfully! - 0 views

  •           Top 10 Ways to Communicate Powerfully!   Communication is more than the words we speak
  • . Be clear about what you want to express
  • ...9 more annotations...
  • Tact and good manners matter.
  • . Precision matters
  • 4. Perspective matters
  • . Diversity & Common Ground
  • Alignment & Congruency
  • Silence
  • The nature of conflict.
  • Communication contains context, text and subtext.
  • . Responsibility
alex c

Internet Slang, Netiquette, Lingo, Acronyms - 1 views

  • Ironically, the origin of the smiley face is a highly controversial debate. The most accepted belief is that graphic artist Howard Ball of Worcester, MA, created the smiley when asked to design a morale boosting campaign. He started with just the smile, but soon realized disgruntled employees might turn it upside down to a frown, so he added eyes.  Other Emoticons:   :) The classic smile. "I'm happy" or "my meaning is positive." Some Word programs will automatically turn this into a graphic after hitting return.   ;)   The wink. "Just kidding," sarcasm, etc.    :-)  Smiley with a nose.   :-D     Laughing. A slightly goofier version of the smiley, this one signifies a particularly happy mood or a laughing response.   8)       Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin.    2.  Chat Acronyms.  Verdan
  • Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin. 
  • These abbreviations of commonly used chat phrases are often used in e-mail too. Although they can be great timesavers, it's easy to lose people if you overuse them.  ASAP As Soon As Possible BFN Bye For Now BTW By The Way DIY Do It Yourself FAQ Frequently Asked Questions FYA For Your Amusement FYI For Your Information K Okay KISS Keep It Simple, Stupid LMHO Laughing My Head Off LOL Laughing Out Loud OBO Or Best Offer OTL Out To Lunch OTFL On The Floor Laughing THX Thanks TIA Thanks In Advance TTFN Ta Ta For Now
  •  
    This teaches you what abbreviations mean and what emoticons are.
Becca B

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
« First ‹ Previous 61 - 80 of 82 Next ›
Showing 20 items per page