Skip to main content

Home/ Digiteen/ Group items tagged texting

Rss Feed Group items tagged

Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Becca B

Top 26 Most Important Rules of Email Etiquette - About Email - 0 views

  •  
    "2. Do Not Default to "Reply All" - Email Etiquette Tip "Reply" is good. "Reply to All" is better. Right? 3. Keep Emails Short - Email Etiquette Tip Do not intimidate recipients with too much text. 4. Properly Format Your Email Replies, and Be Lazy - Email Etiquette Tip Do you think quoting original text in your email replies perfectly is a lot of work? Don't let the '>' intimidate you! Here's a very comfortable, relaxed, quick and still clean and compatible way to reply properly. 5. Write Perfect Subject Lines - Email Etiquette Tip Do you make these mistakes in your email subjects? (The key to getting your messages read is not to be clever.) 6. Clean Up Emails Before Forwarding Them - Email Etiquette Tip Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation. 7. When in Doubt, Send Plain Text Email, Not HTML - Email Etiquette Tip Not everybody can receive your fancily formatted emails. Some may even react furious. To be safe rather than sorry, send plain text emails only when in doubt. 8. Don't Forward Hoaxes - Email Etiquette Tip Email hoaxes often contain stories that are intriguing, and sure to irritate. Here's how to spot and stop urban legends. Sponsored Links Business EtiquetteWorkshop materials to teach proper busines etiquete.CorporateTrainingMaterials.com Virus and Trojan RemoverDownload Free Trojan & Virus Scan Recommended and Used By The Expertswww.pctools.com 9. Use Current Antivirus Software, Keep it Up to Date, Scan for Free Make sure you're not spreading worms and viruses via email or act as a vehicle for spreading spam. All this can be caused by malicious emails. Fortunately, there's protection. 10. Say Why You Think What You Forward Will Interest the Recipient More and better communication makes better relationships. Here's a way to spot and share relevant information and foster ties by forwarding emails and links."
Mary Westbrook

Growing Up Digital, Wired for Distraction - NYTimes.com - 0 views

  • For some, the amplification is intense. Allison Miller, 14, sends and receives 27,000 texts in a month, her fingers clicking at a blistering pace as she carries on as many as seven text conversations at a time. She texts between classes, at the moment soccer practice ends, while being driven to and from school and, often, while studying. Most of the exchanges are little more than quick greetings, but they can get more in-depth, like “if someone tells you about a drama going on with someone,” Allison said. “I can text one person while talking on the phone to someone else.” But this proficiency comes at a cost: she blames multitasking for the three B’s on her recent progress report.
  • “I’ll be reading a book for homework and I’ll get a text message and pause my reading and put down the book, pick up the phone to reply to the text message, and then 20 minutes later realize, ‘Oh, I forgot to do my homework.’ ”
  •  
    People don't realize how texting so much can affect your life.
Julie Lindsay

Seven Questions to Ask About Texting in Class | MindShift - 1 views

  •  
    "# What's the impact of messages related to classwork when they're part of a large stream of messages students receive from friends, family, horoscope advice, sports scores and so on? # What sort of learning happens best (or is reinforced best, perhaps) via SMS? # How can these sorts of messages be adapted to students' progress and how can they be sequenced and scaffolded over time? # How many students are able and willing to participate in these sorts of educational activities via their mobile phone? Can students afford the texting fees? Do they want to use their text-messaging allocations for this purpose? # Can we subsidize this sort of SMS traffic for student populations? # If these sorts of messages between home and school become more common, will there be a way to include parents and parents' phones in the loop? # Can these quizzes be sent to parents' phones so that they can have the opportunity to pose a question to their children? "
Riya P

Parents should control use of technology - 1 views

  • 1. Power down at mealtimes. This means no television, computers or texting. This is the time to really connect with each other without the technological distractions that can be so overwhelming throughout the day. 2. No computers in kids' bedrooms until at least high school. Please trust me on this one. The risks just aren't worth it. Keep computers in public areas of your house, and regularly monitor their usage. 3. Limit or eliminate television viewing on school nights. You'll be amazed at the impact this will have on your family. Kids play games, become creative and interact with us and their siblings. 4. No social media networks until at least high school, and supervise their use. Many kids just don't have the impulse control to adequately control this technology, and the effects on them and others can be substantial. 5. Supervise cell phone use, including texting. You need to be guided by the maturity of your child, but irresponsible behavior should result in increased supervision. 6. Learn about technology. Don't be afraid of texting, video-conferencing, iPads, or Facebook. They are fun and great ways to stay connected with your kids.
  •  
    Tips for parents that think their kids are spending too much time with technology
Sage S

Texting While Driving - 0 views

  •  
    Texting and driving is a major cause of wrecks around the world, especially in teenagers. We have become so addicted to our phones that we can't even put them down long enough to drive to the grocery to store or out to eat with some friends. Driving requires your entire attention, but when your looking at your phone, you are not aware of your surroundings. Quote: "Driving is an activity that requires full concentration and composing, reading, and sending text messages will compromise the driver's concentration."- from the website
Maggie H

Causes Of Internet Addiction - What Causes Internet Addiction Disorder - 0 views

  • Looking for something? SEARCH Causes Of Internet Addiction  0  0   With more than 100 million users worldwide, the internet has become one of the most universal methods for communication. From e-mail to the possibly billions of web pages, the amount of information flowing is infinite. It gives the user freedom to talk and mingle with others online and access MUD (Multi-User Dimensional) games. No doubt, the World Wide Web (www) is informative, convenient, resourceful and fun, but this freedom comes along with the possibilities of abuse and addiction.   Inte
  • et Addiction, also kn
  • Intern
  • ...1 more annotation...
  • own as Pathological Internet Use, can simply be termed as ‘addiction over Internet or other activities dependent exclusively on the use of Internet’.
  •  
    Pathological Internet Use (Internet Addiction) is termed as addiction over the internet
Riley F.

digiteen2008 - Digital Health and Wellness - 2 views

  • Digital Health and Wellness is how to stay physically fit.
  • . A few months ago a train wrecked because the driver was texting and not paying attention to how fast he was going
  • I think that alot of middle aged students would be interested in playing the nintendo wii fit.
  • ...14 more annotations...
  • Just a bit of advice for the middle and high school students, put the phone on silent and leave it alone while you are driving because you can really get hurt!
  • Also you can still teach kids to sit correctly when your on a computer
  • So they are just naturally harder to teach than anyone else
  • one of the teachers said that walking into a room without computers was like walking into a desert.
  • This video is all about minor cases of what can and will happen if you text and drive.
  • Here are some pictures of some of the worse things that can happen.
  • Middle school and high school students are more likely to text and drive because they don't know all about the dangers of texting and driving
    • d l
       
      This is true. Texting and driveng is very dangerous.
  • A good saying for this is," I hear and I forget, I see and I remember, I do and I understand." Confucious.
    • d l
       
      I agree.
  • One is that they are more affected by predators
  • The second is WE have to keep them from getting too much computer consumption
  • Doctors say kids should only get 1 or 2 hours of "screen time" a day.
  • People of all ages are becoming more and more dependent on computers and mobile phones.
  • Digital health and wellness is about staying fit and healthy I think. People that spend to much on computers or use there mobile phones to much should cut down heaps.
  • A. Elementary Aged Students Don't let them stay on the computer for extended amounts of time, don't let them get on Myspace or Facebook, and when they are on the computer the parents should always be watching them no matter what. B. Middle / High School Aged Students The middle school students should be allowed a little more freedom but by the same token i don't think that they should be allowed to get on Myspace or Facebook. Those things will bring a lot more trouble than anything else. Do you think that the people on Myspace are looking for a good christian page or a page that has a lot of bad pictures on it? I don't have a Myspace or Facebook and truly I don't want one. C. Adults Adults should be allowed to do what they want. I mean really what can we do to stop them? Nothing!! We can try all that we want to but adults get more addicted and are harder to get out of that habit. Then again I think that the adults will be the best influence for the young kids and if they will try and spread the word for the kids they can do anything for them that they want to
  •  
    This is last years info about my topic.
  •  
    This is the page from last year.
  •  
    this states what digital health and wellness is and it gives an example of what the author means.
Becca B

Why is Netiquette Important? | Why - 0 views

  • DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude.
  • Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone.
  • The very basic rule in Netiquette is thinking before posting.
  • ...1 more annotation...
  • Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); Share 
  •  
    "Why is Netiquette Important? The internet is now a medium of communication for most people nowadays. Everything from business transactions, buying and selling, socializing or simply blogging your thoughts are conducted over the internet. Net etiquette is a fusion of the internet and good manners in cyberspace. Though nothing is really concrete in cyberspace it is important to bear in mind that the internet involves millions of people. It is like a world in a gadget, but the people you are dealing with on the other end are real and not mere avatars. Our generation now lives in the internet; there are formalities and guidelines to follow to render professionalism, courtesy, and order making the internet more useful and effective as possible. The very basic rule in Netiquette is thinking before posting. Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone. Unsolicited messages are spam and detested by everyone. Chain letters can be one example; it would be best to delete it and not forward it. Be careful when spreading warnings about Internet viruses sometimes it may just be a hoax. Many get fooled by this and immediately copy paste and send it to everyone in their mail list. You may end up getting a lot of junk mail or spam in the process. DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude. Lessen the use of acronyms, BRB for “be right back” and etc. Not everyone is familiar with this internet lingo. Acronyms may be ideal in the chat room but unprofessional in email. Make use of the FAQ, Frequently Asked Questions, it is a form of orientation for news groups and social networks. Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. Share "
Mary Westbrook

Texting Addiction Negatively Impacting Female Teens | Addiction - 1 views

  • These teens, when they receive a text, feel they must respond to it right away.
  • In addition, 12 percent of all students are able to have cell phones at school anytime during the day; 62 percent of students are allowed a cell phone at school, but not in class; 64 percent of teens have texted in class; 24 percent attend schools that ban cell phones from school grounds, but 65 percent bring their phones to school anyway.
Erin B

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device. "
Garrett E

How wireless technology can affect the body - Health - CBC News - 1 views

  •  
    Phones send waves of radiation. About five billion wireless subscriptions world wide, which is given by WHO's estimate. Long-term exposure to the the electromagnetic fields (EMF), which cellphones communications create, has been given attention to by researchers. In May of this year, the WHO's International Agency for REsearch on Cancer found that the evidence was too inadequate to make any conclusions about risk. Many studies have been done, but no solid proof has been found. Another study was done on a case of glioma, a type of brain cancer, and acoustic neuroma,, a slow-growing non-cancerous tumour in the inner ear that results in hearing loss. Although the group found the evidence also lacking. however, the evidence was significant enough to warrant classifying radio frequency electromagnetic fields as "possibly carcinogenic to humans." WHO places this in a category known as 2B. Mind, coffee and pesticide DDT are also classified as "possibly carcinogenic to humans." Placing calls rather than emailing or texting has been proved that the risk is higher since the radio frequency energy is higher. Even though the evidence is limited, many countries advise children especially should limit their use of cellphones. The United Kingdom, German, Belgium, Israel, Russia, France, Canada, and India are all included. James McNamee, division chief for health effects and assessments in Health Canada's bureau of consumer and clinical radiation protection, said, "There has been relatively little science done on children and children's cellphone use, and children are going to be using these devices for a much larger period of their life span. Their brains and immune systems are still developing." Health Canada said cellphone users may take practical steps to reduce exposure, such as: Limit the length of cellphone calls. Replace cellphone calls with text messages or use "hands-free" devices. Encourage those under the age of 18 to limit the cellphone use.
Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
Maggie B

It's Confirmed: Driving's a Full-Time Job - How Texting Impairs Driving Performance - T... - 2 views

  •  
    The study consisted of three major steps. First, participants typed a story of their choice (usually a simple fairy tale) and also read and answered questions related to another story, both on their smart phone in a laboratory setting. They were trying to prove that texting while driving impairs your ability.
  •  
    Researchers and safety advocates have known for years that driving performance worsens when the driver is texting. Now we know just how much worse. Federal statistics suggest that distracted driving contributes to as much as 20 percent of all fatal crashes, and that cell phones constitute the primary source of driver distraction.
Ashley M

digiteen2008 - Digital Literacy - 0 views

  • Some teachers are trying to use digital literacy in there classrooms daily to try to help students become involved. Our teachers use overhead projectors, smartboards, and televisions.Many of us use computers in our classes. If we do not learn how to use computers we could soon be separated by the digital divide. The digital divide could end up leaving some of us jobless. We need to be able to use all of the technology we have access to so we can succeed. In a article called "Digitally addicted kids threaten to return to civilization to the dark ages" a girl named Megan Meier committed suicide due to Cyber bullying. A kid named Josh Evans did this, who later turned out to be Megan's ex boyfriends mom Lori Drew. There are so many examples of digital literacy. We use them in everyday life. We use computers all the time, don’t we? I know if you work in an office then you do. Also, Teens are in love with text messages, although text messaging can be very harmful. While texting you could be bullying someone. Like I said before about computers, not only do business people use them, but parents and teens, and maybe some younger children. Teens get in chat rooms all the time. Some probably don’t even know what they are getting into. In chat rooms people can be pushed to do something or even be bullied. Chat rooms and the use of text messaging can be harmful.
    • Ashley M
       
      This information is very informative.
  • The digital divide could end up leaving some of us jobless
    • Ashley M
       
      This sentence is very true. The information in the following paragraph explains how the digital divide could leave some of us jobless.
  • Tasks are being accomplished with the use of technology more than ever.
    • Ashley M
       
      I find this fact very true.
  • ...3 more annotations...
  • Relying too much on technology is a problem because it isn't always reliable.
    • Ashley M
       
      I also find this very true..The following statement explains how relying on technology too much could be a negative thing.
  • Digital literacy is trying to teach basic computer concepts and skills. Literacy isn’t being able to read and write, like used to be. It deals with being able to tell the difference between a real and fake website.
    • Ashley M
       
      This is a great definition of what Digital Literact is.
  • Teachers are beginning to use overhead projectors, clickers, and television more
    • Ashley M
       
      This statement explains how our world is relying more on technology each day.
  •  
    This page shows that things bookmarked digital_literacy through the group automatically go to the students in the project. The teachers (who all use diigo) just tag throughout the year to have things ready to go into the wiki when it is time for the project.
  •  
    This is last years information on digital literacy.
Steve Madsen

Michigan gov signs texting-driving ban on `Oprah' - BusinessWeek - 0 views

  •  
    "Twenty-three states and the District of Columbia beat Michigan to the punch when it comes to banning texting while driving. Yet it was Michigan's governor who was the one who signed it into law Friday under the approving gaze of Oprah Winfrey."
  •  
    Is texting while driving, safe?...
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Kerrie D

Cyberbullying: The Cruel Harsh Reality of Life in a Virtual World | OKIE Maga... - 0 views

  • Cyberbullies can send harmful messages several ways. Cyberbullying can come in the form of direct, attacking emails or text messages. These messages often contain threats, insults and sexual or racial slurs. Cyberbullying can also occur in Web forums. Bullies may pose as the person they’re trying to humiliate on public sites and post defamatory comments towards themselves. Bullies have also been known to reveal personal information (address, workplace phone number) about another individual on public forums or chat rooms as a way to solicit unwarranted contact.
  • Cyberbullying is cowardice, it’s unacceptable.
  • Do not visit the websites that have frequent bully encounters. You can also change your cell phone and home phone number to stop receiving harassing texts and calls.
  •  
    Cyberbullying is unacceptable. This tells when you start to receive nasty emails and text messages and phone calls is when it gets really bad. Virtual Worlds are the most places where you can get cyberbullied and where it mostly starts.
Sage S

Modern Technology Destroying the Family as We Know It - 0 views

  •  
    Your parents use to wake you up every morning, but now they are too busy on Facebook or they don't have too because you have an alarm clock on your iPod or cell phone. You wake up and immediately check your cell phone and Facebook. Quote: "We use texting as an in-house intercom, I could just walk upstairs, but they always answer their texts." - Mr. Gude, an instructor at Michigan State University
1 - 20 of 86 Next › Last »
Showing 20 items per page