Skip to main content

Home/ Digiteen/ Group items tagged searches

Rss Feed Group items tagged

6More

How to handle a cyberstalker - CNN.com - 11 views

  • At Northwestern University, "Lauren Cohn" racked up 143 friends -- none of whom knew who she was. While we're not certain the school was involved in the fabrication, that's beside the point -- 143 people just let this chick into their social circles.
  • Still, take a gander at novelty apps like "Open Book," which allows you to search others' unprotected status updates for potentially incriminating info (I looked, and no, I would rather not know about the hot oral sex you had this a.m.),
  • cyberstalking thusly: "A course of conduct (more than one incident) that uses technology to track, intimidate, harass, threaten or scare victims." That could mean harassing you online or even using the internet to gather info that can be used for physical stalking.
  •  
    Great article about the different levels of cyberstalking and privacy concerns.
  •  
    These people are putting themselves in danger without even knowing it. These things eventually lead to cyberbullying.
  •  
    People should think wat they put before the go to far with it.
2More

cultural awareness - Google Search - 3 views

  • [PDF] 1 CULTURAL AWARENESS I. INTRODUCTION Cultural awareness and ...
  •  
    I highlighted an interesting power point site about cultural awareness
6More

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
31More

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
1More

Super safe hard - 0 views

  • * of networked storage to business users searching for the easiest and most technologically advanced way to share, secure and protect their most important data, including productivity application data, media files, backup data, and other digital files.
5More

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
6More

Internet Safety - 4 views

  • The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world. But that access can also pose hazards. For example, an 8-year-old might do an online search for "Lego." But with just one missed keystroke, the word "Legs" is entered instead, and the child may be directed to a slew of websites with a focus on legs — some of which may contain pornographic material. That's why it's important to be aware of what your kids see and hear on the Internet, who they meet, and what they share about themselves online. Just like any safety issue, it's wise to talk with your kids about your concerns, take advantage of resources to protect them, and keep a close eye on their activities. Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first. COPPA requires websites to explain their privacy policies on the site and get parental consent before collecting or using a child's personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or participate in a contest. But even with this law, your kids' best online protection is you. By talking to them about potential online dangers and monitoring their computer use, you'll help them surf the Internet safely.
  • Listen
  •  
    This is a good website that tells you how to be safe on the web.
  • ...1 more comment...
  •  
    How often do you let your children or siblings use the computer? In fact a lot of kids use the internet not only at home but also at school. This page helps teach younger kids internet safety for when no one is around. Quote: 'The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can literally access the world.'
  •  
    This paragraph begins by disscussing kids and safety on the internet. offers tools to be involved in kids online safety. The article the importance of sharing an email account with a child and keeping the computer where you can see it. The article suggests having basic rules like never trading pictures and never revealing personal information. It also discusses being aware of preditors. So finally the article ends with warning signs like long hours online especially at night.
  •  
    "Internet Safety Laws A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about it and agreeing to it first."
2More

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
6More

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
1More

teachers using ipads for student learning - Google Search - 0 views

  •  
    Ifstudents downloaded textbooks onto devices, there would be less books to carry.
1More

PERSONAL PRIVACY - 0 views

  •  
    This article gives different websites to see if your profile is being spread. It gives reasons of why you should be careful of what you put.
1More

Games.com The Blog. CityVille, FarmVille, FrontierVille games news - 0 views

  •  
    This is a good website to get article for virtual world awareness from!
2More

Your Digital Presence - 3 views

  • To get a sense of your digital presence, search yourself: A first place to start is to Google yourself and see the results. Use pipl.com or peekyou.com to find out what comes up about you. Try spezify.com for a look at your digital history. For an entirely different view, try the MIT Personas interface for a visual display of your digital presence.
  •  
    Digital Citizenship and digital footprint resources. Various tools to use with students to show what your digital history really looks like.
7More

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sections that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someone said. The green highlight shows 7 tips that are very important for not only students, but everyone else to stay safe online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
11More

Be Web Aware - Cyberbullying - 2 views

  • Cyberbullying
  • In school ... you don't want anyone to think of you as a "gossip" or someone who says things about other people. Everyone wants to be "nice." You don't have to be nice if you don't want to online. 13 year old girl, Edmonton
  • There is little doubt that cyberbullying, which can be the equivalent of "social death" for many young people, is traumatic. It differs from traditional, face-to-face bullying in that it is relentless and public and at the same time anonymous. Cyberbullying has turned the usual image of "the bully" on its head; it's no longer only the "tough kids" who may act aggressively – it can just as easily be the shy, quiet types, hidden behind their computers. Added to this is the potential presence of countless, invisible witnesses and/or collaborators to the cyberbullying, which creates a situation where victims are left unsure of who knows, and whom to fear.
  • ...3 more annotations...
  • Technology also extends the reach these young people have, enabling them to harass their targets anywhere and at anytime. While these situations should be reported, it can be difficult for young people to step forward: how do you report an attack that leaves no physical scars and is committed by a nameless attacker? Will the consequences of telling an adult that you are being cyberbullied be worse than the bullying itself? Adults want to help, but many feel ill-equipped to handle bullying in a digital world.
  • On social networking sites, you can now tag images with the names of people who are in the photo. This simple act can lead to cyberbullying, as these photos will appear in any search into this person’s name and it could be that misappropriated profile settings do not protect access to them.
  • Multiplayer online games and virtual worlds can be venues for harassment and cyberbullying when kids are playing or using the chat features to talk to other players. According to a 2008 Pew Internet & American Life Project report, more than half of teens who play games report seeing or hearing “people being mean and overly aggressive while playing”; a quarter of them report that this happens “often.”
  •  
    Students need to know that cyberbullying is dangerous: it can take lives, it can ruin lives, and it is not acceptable behavior for us. We are supposed to be the enlightened generation, so why don't we act like it?
  • ...2 more comments...
  •  
    Cyberbullying is probably one on the worst kinds of bullying. Its a type of bullying that never stops and never goes away. Bullies who are online can cause people to take their own lives. This isnt acceptable behavior for anyone.
  •  
    I agree with Brenna Edwards. It is one of the worst also because at school, only a hand full of people may see it, but online everyone can see it. No one should cyberbully
  •  
    I think that Brenna is right. It is really bad that people bully on the internet.
  •  
    Cyberbullying is probably one of the worst types of bullying because you can't figure out who the bully is to put a stop to it. Cyberbullies don't know how serious this is, people take their own lives because of it.
« First ‹ Previous 41 - 57 of 57
Showing 20 items per page