Skip to main content

Home/ Digiteen/ Group items tagged searches

Rss Feed Group items tagged

Blakelee H

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
Maggie H

Causes Of Internet Addiction - What Causes Internet Addiction Disorder - 0 views

  • Looking for something? SEARCH Causes Of Internet Addiction  0  0   With more than 100 million users worldwide, the internet has become one of the most universal methods for communication. From e-mail to the possibly billions of web pages, the amount of information flowing is infinite. It gives the user freedom to talk and mingle with others online and access MUD (Multi-User Dimensional) games. No doubt, the World Wide Web (www) is informative, convenient, resourceful and fun, but this freedom comes along with the possibilities of abuse and addiction.   Inte
  • et Addiction, also kn
  • Intern
  • ...1 more annotation...
  • own as Pathological Internet Use, can simply be termed as ‘addiction over Internet or other activities dependent exclusively on the use of Internet’.
  •  
    Pathological Internet Use (Internet Addiction) is termed as addiction over the internet
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Abi W

ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident - Technology News - redOrbit - 1 views

  •  
    A 12 year old student at a school in Minnewaska was forced to give up her password and username in order for her school to view comments made about the student. The ACLU filed a suit on behalf of the student against the Minnewaska Area Schools.  
  • ...3 more comments...
  •  
    A girl in Minnesota had her passwords and usernames forcefully taken from her by a school. The school said it was cyberbulling, but many people disagree. A rights group took up the case for the girl and i suing on the 4th amendment search and seizure and the 1st amendment right to free speech.
  •  
    Girl posts something about a hall monitor hating her on Facebook, school demands she gives them her username and password. The students parents were not present. No warrant was issued by the police. The student filed a law suit with the ACLU against the school.
  •  
    This article is about a 12 year old girl (R.S.) that had to give her Facebook username and password to her school because of a hall monitor she didn't like. The school didn't notify her parents, and her parents never said the school to take that action. The ACLU is suing the school under the first amendment law (Unlawful search and seizure). 
  •  
    This article is about a girl who was forced to give her username and password for her Facebook account, to her school. The school didn't have a warrant or permission of any kind to take her information, which violates her constitutional rights. The American Civil Liberties Union is suing the school for this violation.
  •  
    The article "ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident" was about a 12-year old girl. The girl in this article was refered as R.S. Issues starting coming up when R.S. had something on Facebook that said the school's hall monitor hated her. The school forced her to give them her username and password then searched her page. After, a son's mom complained to the school that R.S. and her son were talking about sex online. Once the school demanded to go through her account again, the ACLU charged them for not giving her the freedom of speech and unreasonably searching though her stuff. This was violating the First and Fourth Amendment since the two incidents. In the end R.S. didn't get in trouble but the school did.
Nolan C

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
Steve Madsen

Google digging deeper to improve search results - web - Technology - smh.com.au - 0 views

  •  
    Unlike Google's traditional search results, the spreadsheet experiment, called "Google Squared", doesn't simply show a set of web links related to a search request. Instead, it fishes through Google's massive database to organize pertinent facts and other content in rows and columns.
Mark Meyers

Google Web Search Lessons for Students - 2 views

  •  
    I'm finding that my students, just like me, are not using the full power of the Google search engine. We search and click on the first few results, taking the information as valid and relevant. These lessons explain how Google works and how to get better results. I plan to incorporate this into my Digiteen curriculum.
Johnny H

Fair use and theft | Kris Straub | humor scientist - 0 views

  •  
    "The reason why eBaumsworld gets away with so many video thefts is that there's no way to search for a video or picture if it doesn't have associated text you could search for." I think that every video and picture should have associated words so no they could not take the video and take credit for it.
Lindsey B

Keeping your privacy safe on Google - 0 views

  •  
    How to keep your google searches safe online
Gil Anspacher

Clive Thompson on Why Kids Can't Search | Magazine - 1 views

  •  
    All subjects need to teach students how to search for, analyze and utilize digital information within the subject area. Be grateful for your "how to search" teaching librarian.
StephenK_mca MCA

Feds Doing More Secret Searches - 0 views

  •  
    The growing number of secret searches and wiretaps by federal investigators has privacy advocates up in arms about the impact on civil liberties. The use of such measures jumped 30 percent in 2002, according to a recent report. By Julia Scheeres.
anonymous

Why Google Wants You To Google Yourself - TIME - 0 views

  • To give people a bit more control over search results, Google introduced a new feature this week it calls a "Google profile" that users can create so that a thumbnail of personal information appears at the bottom of U.S. name-query search pages. Once users create a Google profile, their name, occupation, location (and photo if they choose), appears in a box on the first page of the search results for their name. Next to the thumbnail info, there's a link to a full Google profile page that in many ways resembles a Facebook page.
  • And if you're already using Gmail for email, Google Maps for directions, and Google's Picasa for photo sharing, you may wind up spending more time with your Google profile than your Facebook or MySpace page.
Julie Lindsay

Research: Search, Collect, Evaluate on Vimeo - 0 views

  •  
    "Supervisor for Instructional Technology John Hendron (Goochland County, Virginia) talks to middle school students about conducting research online using a three-step system: Search, Collect, and Evaluate. This is being used to encourage "Research 2.0" skills as part of our efforts to promote twenty-first century skills. glnd.k12.va.us/wiki/index.php/Handouts/G21-Research"
Molly S

The World Clock - Time Zones - 0 views

  • The World Clock – Time Zones Africa | North America | South America | Asia | Australia/Pacific | Europe | Capitals | Custom ClockSort by: CityCountryTimeCity Search: SettingsAccraMon 1:38 PMCasablancaMon 1:38 PMKiritimatiTue 3:38 AMPragueMon 2:38 PMAddis AbabaMon 4:38 PMChicago *Mon 8:38 AMKolkataMon 7:08 PMReykjavikMon 1:38 PMAdelaide *Tue 12:08 AMColumbus *Mon 9:38 AMKuala LumpurMon 9:38 PMRio de Janeiro *Mon 11:38 AMAlgiersMon 2:38 PMCopenhagenMon 2:38 PMKuwait CityMon 4:38 PMRiyadhMon 4:38 PMAlmatyMon 7:38 PMDallas *Mon 8:38 AMKyivMon 3:38 PMRomeMon 2:38 PMAmman *Mon 4:38 PMDar es SalaamMon 4:38 PMLa PazMon 9:38 AMSalt Lake City *Mon 7:38 AMAmsterdamMon 2:38 PMDarwinMon 11:08 PMLagosMon 2:38 PMSan Francisco *Mon 6:38 AMAnadyrTue 1:38 AMDenver *Mon 7:38 AMLahoreMon 6:38 PMSan JuanMon 9:38 AMAnchorage *Mon 5:38 AMDetroit *Mon 9:38 AMLas Vegas *Mon 6:38 AMSan SalvadorMon 7:38 AMAnkaraMon 3:38 PMDhakaMon 7:38 PMLimaMon 8:38 AMSantiago *Mon 10:38 AMAntananarivoMon 4:38 PMDohaMon 4:38 PMLisbonMon 1:38 PMSanto DomingoMon 9:38 AMAsuncion *Mon 10:38 AMDubaiMon 5:38 PMLondonMon 1:38 PMSao Paulo *Mon 11:38 AMAthensMon 3:38 PMDublinMon 1:38 PMLos Angeles *Mon 6:38 AMSeattle *Mon 6:38 AMAtlanta *Mon 9:38 AMEdmonton *Mon 7:38 AMMadridMon 2:38 PMSeoulMon 10:38 PMAuckland *Tue 2:38 AMFrankfurtMon 2:38 PMManaguaMon 7:38 AMShan
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Micah K

Respecting Others Online - Adoption Search - 0 views

  •  
    This article says that when you have a disagreement with someone online, you should either privately talk to each other about it, or you both should agree to move on. "If a disagreement breaks out, tempers can get hot. If this happens, think about how you would react if the person you disagree with were standing in front of you. Treat others with respect. If you can't agree, don't rehash everything hoping to convince everyone that you are right. You may want to take the disagreement to corresponding via private email or simply agree to disagree and move on."
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Haley M

legal compliance - Google Search - 0 views

  • Web definitionsYou agree to comply with all applicable domestic and international laws, statutes, ordinances and regulations regarding your use of the Site and the Content and Materials provided therein.
  •  
    This defines legal compliance. It helps to better our understanding of legal compliance.
1 - 20 of 57 Next › Last »
Showing 20 items per page