Skip to main content

Home/ Digiteen/ Group items tagged time

Rss Feed Group items tagged

Becca B

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from your own. Consider others’ privacy. Be wary of your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
Savana R

Invading our privacy on the Internet - Los Angeles Times - 0 views

  • privacy is among our inalienable rights
  •  
    People tracking our personal life on the internet can be bad. People can steal other peoples identity. "Internet companies track and sell advertisers virtually everything we do online. That's why a 'do not track me' system is vital. If Washington fails to act, California should create its own system."
Joseph Edore

GetNetWise | Safety By Age 14-17 - 0 views

  • Safety By Age 14 to about 17: This can be one of the most exciting and challenging periods of a child's (and parent's) life. Your teen is beginning to mature physically, emotionally, and intellectually and is anxious to experience increasing independence from parents. To some extent that means loosening up on the reins, but by no means does it mean abandoning your parenting role. Teens are complicated in that they demand both independence and guidance at the same time. Teens are also more likely to engage in risky behavior both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is extremely low, there is always the possibility that he will meet someone online who makes him feel good and makes him want to strike up an in-person relationship. It is extremely important that teens understand that people they meet online are not necessarily who they seem to be. Although it's sometimes difficult to indoctrinate teens with safety information, they can often understand the need to be on guard against those who might exploit them. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them. The greatest danger is that a teen will get together offline with someone she meets online. If she does meet someone she wants to get together with, it's important that she not go alone and that she meet that person in a public place. It's important for parents to remember what it was like when they were teenagers. Set reasonable expectations and don't overreact if and when you find out that your teen has done something online that you don't approve of. That doesn't mean that you shouldn't take it seriously and exercise appropriate control and discipline, but pick your battles and try to look at the bigger picture. If your teen confides in you about something scary or inappropriate that he encountered online, your first response shouldn't be to take away his Internet privileges. Try to be supportive and work with your teen to help prevent this from happening in the future. And remember that your teen will soon be an adult and needs to know not just how to behave but how to exercise judgment, reaching her own conclusions on how to explore the Net and life in general in a safe and productive manner.
Mary Westbrook

How to Stop Your Child's Computer Addiction - wikiHow - 1 views

  • Talk with your child about his/her excessive computer usage
  • Move the computer to an open area if it’s not already in one – sometimes taking it out of the child’s bedroom is sufficient to reduce their computer usage, and it makes it easier to monitor their usage.
  • Set a password for the computer so that only you can log on to it
  • ...2 more annotations...
  • Find out how bad your child's addiction is, and what exactly your child is addicted to – does your child spend most of his/her computer time playing games, chatting online, or just browsing the Web?
  • If he/she is addicted to learning information, as long as it is legal, safe and decent, then that should not be an issue.
Susan Davis

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
Nolan C

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
Mary Westbrook

Growing Up Digital, Wired for Distraction - NYTimes.com - 0 views

  • For some, the amplification is intense. Allison Miller, 14, sends and receives 27,000 texts in a month, her fingers clicking at a blistering pace as she carries on as many as seven text conversations at a time. She texts between classes, at the moment soccer practice ends, while being driven to and from school and, often, while studying. Most of the exchanges are little more than quick greetings, but they can get more in-depth, like “if someone tells you about a drama going on with someone,” Allison said. “I can text one person while talking on the phone to someone else.” But this proficiency comes at a cost: she blames multitasking for the three B’s on her recent progress report.
  • “I’ll be reading a book for homework and I’ll get a text message and pause my reading and put down the book, pick up the phone to reply to the text message, and then 20 minutes later realize, ‘Oh, I forgot to do my homework.’ ”
  •  
    People don't realize how texting so much can affect your life.
 Lisa Durff

Digital Footprints | Pew Research Center's Internet & American Life Project - 0 views

  •  
    When was the last time you googled yourself?
 Lisa Durff

Precious Children: Activities that Promote Racial and Cultural Awareness in the Classroom - 0 views

  •  
    Understanding another culture takes effort and time.
anonymous

Yahoo! Messenger - Chat, Instant message, SMS, PC Calls and More - 0 views

shared by anonymous on 08 May 09 - Cached
  • Keep friends at your fingertips with Yahoo! Messenger 9.0
    • anonymous
       
      this shows how communication has evolved over time, how this "mesenging" system would have been thought of as impossible back in the best.
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
PatG_mca MCA

Digital Law - 0 views

  •  
    Predigital law is the connection of the info back to the technology, which is all the information and evidence is sent to the computers and stuff to analyze it things. The second is the time period and how long a go this all happened and where. So now they know when it did and why. Then they look at all the evidence and try to find the match and find it and get the person and try the person for there crime.
  •  
    This source is about all of the different types of "Digital Law". Many different types of "Digital Law" include Predigital Law. There are many different types of previous cases of someone breaking "Digital Law".
radhika chatterjee

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
Liz Luby

EFF: Frequently Awkward Questions for the Entertainment Industry - 0 views

  • The RIAA has sued more than 20,000 music fans for file sharing
  • To that end, EFF has prepared a sample list of tough questions for times when you hear entertainment industry representatives speaking and want to challenge their positions. Asking hard questions is a way of "keeping honest people honest" and revealing when they're actually being deceptive.
  • DRM has clearly failed to stop songs from getting on file sharing networks
  • ...3 more annotations...
  • Recording off the radio is clearly permitted by copyright law and something Americans have done for over 25 years
  • Is it ever legal for me to use software like DVD Shrink or Handbrake to rip a digital copy of a DVD I own onto a video iPod or my laptop
  • Major entertainment companies have repeatedly brought lawsuits to block new technologies, including the VCR, Digital Audio Tape recorders, the first MP3 player, the ReplayTV PVR, and now P2P software.
radhika chatterjee

Obama: Broadband, Computers Part of Stimulus Package - PC World - 0 views

  • To help our children compete in a 21st century economy, we need to send them to 21st century schools," Obama said
  • The plan will also include rolling out broadband, both to places where it isn't available and to health-care facilities, Obama said. It is "unacceptable" that the U.S. ranks 15th in the world in broadband adoption
  • Obama also called for hospitals to be connected to each other through the Internet. Modernizing the U.S. health-care system "won't just save jobs, it will save lives,"
  • ...1 more annotation...
  • "In our 21st-century society, having a connection to a fast and affordable Internet is no longer a luxury -- it's a public necessity," Josh Silver, executive director of Free Press, said in a statement. "Right now, more than 40 percent of American homes are not connected to broadband. This digital divide isn't just costing us our ranking as global Internet leader -- its costing us jobs and money at a time when both are urgently needed."
Julie Lindsay

The rigors of life unplugged - Los Angeles Times - 0 views

  •  
    Students try to go a week without any media devices.....!
Callie S

Online Safety - 0 views

  • How could we live without the Internet?
  • Smart Surfing First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers Most credible people and companies will never ask for this type of information online. So if someone does, it's a red flag that they may be up to no good.
  •  
    safety and security
  •  
    How could we live without the internet? The internet plays a big role in our lives. Teens surfing the internet is a big problem now days because they are looking at things that they don't need to be looking at. Quotes: 'But besides the millions of sites to visit and things to do, the Internet offers lots of ways to waste time - and even get into trouble. And just as in the non-cyber world, some people you encounter online might try to take advantage of you - financially or physically.' From the Website.
  •  
    educational website for teens, parents and kids
mitch g

Top 7 Ways to Communicate Effectively - 0 views

  • Have self-worth
  • Get interested in other people
  • Open up a person’s heart
  • ...5 more annotations...
  • Listen at least two times more than you talk
  • Diversify yourself
  • Understand that your worth never changes Follow along…In my hand I am holding a check for a million dollars. I crumble it up. It’s still worth a million dollars. I step on it, it’s still worth a million dollars, I start rubbing it on the floor with my shoe, and it’s till worth a million dollars. You are worth a lot more than a million dollars. In fact, your worth is immeasurable. Therefore, there is no such thing as ‘rejection’ as you’re always worth the same no matter what. Nobody can reject you because nobody can change your worth. Moreover, don’t be afraid of something (rejection) that doesn’t exist. Take risks, ask for what you want, and eventually you will get what you want.
  • Understand that your worth never change
  • Follow the step-ladder to success
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
alex c

Internet Slang, Netiquette, Lingo, Acronyms - 1 views

  • Ironically, the origin of the smiley face is a highly controversial debate. The most accepted belief is that graphic artist Howard Ball of Worcester, MA, created the smiley when asked to design a morale boosting campaign. He started with just the smile, but soon realized disgruntled employees might turn it upside down to a frown, so he added eyes.  Other Emoticons:   :) The classic smile. "I'm happy" or "my meaning is positive." Some Word programs will automatically turn this into a graphic after hitting return.   ;)   The wink. "Just kidding," sarcasm, etc.    :-)  Smiley with a nose.   :-D     Laughing. A slightly goofier version of the smiley, this one signifies a particularly happy mood or a laughing response.   8)       Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin.    2.  Chat Acronyms.  Verdan
  • Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin. 
  • These abbreviations of commonly used chat phrases are often used in e-mail too. Although they can be great timesavers, it's easy to lose people if you overuse them.  ASAP As Soon As Possible BFN Bye For Now BTW By The Way DIY Do It Yourself FAQ Frequently Asked Questions FYA For Your Amusement FYI For Your Information K Okay KISS Keep It Simple, Stupid LMHO Laughing My Head Off LOL Laughing Out Loud OBO Or Best Offer OTL Out To Lunch OTFL On The Floor Laughing THX Thanks TIA Thanks In Advance TTFN Ta Ta For Now
  •  
    This teaches you what abbreviations mean and what emoticons are.
« First ‹ Previous 121 - 140 of 151 Next ›
Showing 20 items per page