Skip to main content

Home/ Digiteen/ Group items tagged tools

Rss Feed Group items tagged

Julie Lindsay

Teen's death highlights cyber bullying trend - 0 views

  •  
    ABC News (Australian Broadcasting Corporation) I find this disturbing. If the Internet was used in a more meaningful way so that teenagers had a viable online support network and learning community the Internet would be seen as a valid tool to help people when distressed. Governments and community groups should be building this support networks online and not shutting down or blocking online access.
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Johnny H

Fair Use - Columbia Copyright Advisory Office - 1 views

  •  
    " When do you need to think about fair use? Some example situations: Uploading materials to CourseWorks or another server. Clipping and copying materials into innovative teaching tools. Posting materials for distance learning. Developing databases of copyrighted works for research. Sharing articles and other materials with colleagues. Developing digital libraries. Placing copies on library reserves." this tells you about when you need to think about fair use while doing something for school, work, or a project.
Garrett E

Women's Online Habits Study | WebProNews - 0 views

  •  
    Women are also inflicted with habits online. Microsoft studies have given us interesting findings: 16 percent would have a high tendency to shop, communicate, and employ digital devices; 86 percent share their "finds" to others in their time; If forced to, they would "throw out" their television or cell phone first; only 11 percent would throw out their personal laptop; email is overwhelmingly, 85 percent, the most important tool.
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | ... - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
Morgan S.

teachers | Idea Flight - 0 views

  •  
    "Idea Flight is the only tool you need to share your ideas easily on iPad. Captivate your audience in a whole new way, keep everyone on the same page and network on the fly." Westwood beta tested Idea Flight on iPads that they sent over. It was presentation/learning app that help the teachers "fly" us through the lessons at her own pace, keeping all the student on the same page (unless she unbuckled our seat belts.) It was very cool having the presentation right in the palm of your hand so you could be up close and personal with the presentation.
Suzie Nestico

Your Digital Presence - 3 views

  • To get a sense of your digital presence, search yourself: A first place to start is to Google yourself and see the results. Use pipl.com or peekyou.com to find out what comes up about you. Try spezify.com for a look at your digital history. For an entirely different view, try the MIT Personas interface for a visual display of your digital presence.
  •  
    Digital Citizenship and digital footprint resources. Various tools to use with students to show what your digital history really looks like.
Brandon P

Game app teaches kids social networking safety - TODAY Tech - TODAY.com - 0 views

  • to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying
  • “It’s never too early to talk to kids about safe online behavior, particularly when accessing social networks,”
  • “Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices.”
  •  
    Application that teaches kids social networking safety.
  •  
    help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying "It's never too early to talk to kids about safe online behavior, particularly when accessing social networks," says Lynette Owens, director of Trend Micro Internet Safety for Kids & Families. "Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices."
  •  
    "The free mobile app BeSeen - launched in partnership with Web Wise Kids, a nonprofit specializing in Internet safety - is a single-player game that replicates a social networking site where players create a profile and travel through a condensed school year. To earn rewards, the player must make positive choices when presented with challenging social situations and solve puzzles along the way. The game is designed to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying"
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Kellie C

In Defense of the Culture Clash - 0 views

  • Because of the internet, clashes between the sensibilities of different societies will only increase. Offended parties will press publishers to keep offensive communications off the network. However, if people only publish what's acceptable to most everyone in the world, then the internet will be a far less effective tool for social and political change than it might otherwise be.
  •  
    This website has more detail and is more specific about conflict and how it effects companies and how companies can cause conflict
Haley M

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
Vicki Davis

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 6 views

  •  
    It is legal for a prospective employer during a job interview to ask you to log into your facebook page and click through your friends only posts, photos, and messages. This is a very important topic for digital citizens to understand.
  • ...7 more comments...
  •  
    This is an important article. I'm going to discuss it with my Digiteen class this morning and have them comment here.
  •  
    I don't think that is fair. The employer has no right to be a part of their personal life. Although, they need to know about what they say on the internet. I would not want someone i don't know looking at my profile page.
  •  
    This is a good and a bad thing. It is a good thing because if someone is bad than you know not to hire them. it is a bad thing because people should not be judged on what their friends post. Just because their friends might post bad things does not mean that they are bad.
  •  
    Well, for me the act of "shoulder surfing" is good as well bad. It is good because as an employer if I don't know the maybe future employee this would be good to base my opinion on whether or not to hire them. This also can be bad, as the future employee may have private conversation with his or her wife that they do not want anyone to see (this is just to give an example).
  •  
    I guess i could understand why they have this. I personally like this idea in most ways, but not all. For example, its good for finding if the person your employing is a criminal, or someone bad. But its kind of bad because what if someone is not accepted because they were talking with a 'special someone' and the employers saw. That doesn't really seem fair to me, because that is your personal PERSONAL info, and no one else needs to see it besides you and who you are talking to. Unless of course its about something bad like planning something illegal. The main downside i see in this is maybe that person created a fake Facebook that looks all great and seems like they are a good person. Then a not-so-good person might have gotten a job that they wouldn't have gotten otherwise. I can't really decide if this is good or bad, but for now, I'm going to say it's bad.
  •  
    Well i think it is 50/50, because you have to be careful of what you put out there. And i don't think they should go on your friends facebook account to look at there posts and not yours! I also don't think they should judge you by your friends!
  •  
    I dont know exactly if this is fair or not. I can see where employers are coming from by wanting to see their possible employees facebook account, but i also think that a lot of the stuff that we may post may be completely personal while being completely innocent. everyone needs privacy and if they decide to do that through facebook then they have the right.
  •  
    I think its a good video to watch because it definitely made me think. The video also scared me even thought i don't have a Facebook. I now know how to stay safe if i get one.
  •  
    I think that the post is mean. I don't really like the post because it makes the person look bad.
Emma S

International and Foreign Copyright - University of North Texas Libraries - 0 views

  •  
    This is a great website that covers a few basic international agencies and what they do to help protect copyright. It also included a few international treaties that have had a major impact on international copyright. 
Sam V

Gale World History In Context - Document - 0 views

  • LOCAL corporate leaders, captains of industry and senior Government officials gathered in Windhoek on Wednesday to witness the launch of the country's UN Global Compact Network.
  • The newly launched business initiative is a global concept whereby companies integrate a number of social and environmental concerns into their business operations and in their interaction with their stakeholders on a voluntary basis, with the aim of advancing corporate social responsibility in the country.
  • Compact Network will generally facilitate access to business information, tools and technical inputs through its strong relations with other UN entities, development agencies and civil society.
  • ...3 more annotations...
  • Tim Parkhouse, said local participating companies would not only benefit from better public relations, but also from an increased understanding amongst their stakeholders of the private sector's potential as an agent for sustainable development.
  • Within the Namibian UN Global Compact Network, companies can choose their mode of engagement, which may be either collectively or individually", he explained.
    • Sam V
       
      Again with this one, I'm not sure if it entirely fits our topic, but I'm pretty sure the main idea does fit. If others in the group don't agree, we don't have to use it.
  •  
    This document talks about how the Namibian UN Global Compact Network can change the way companies interact with stakeholders and how they interact with each other.
Vicki Davis

Collusion - 0 views

  •  
    Do you want to know who is tracking you and how? Install the Collusion Firefox add on and start understanding who is tracking you. I am going to use this with students for some education.
Summer T

Digital Citizenship - 2 views

  • Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately.
  •  
    This sight will help to be able to give better ideas for the safety and it also tells you books you can get that will help you to learn more about it.
  • ...2 more comments...
  •  
    Digital Citizenship description
  •  
    Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology.
  •  
    "The topic of digital citizenship is certainly gaining momentum"
  •  
    digital citizenship for parents
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Anne Baird

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  •  
    discussion article around the challenges that teachers face in trying to educate students on how to be safe online as opposed to blocking sites.
Christine Davis

untitled - 1 views

  • CHILDREN in Bahrain are to get 'driving lessons' - in cyber-space. They are to be taught how to navigate their way around the electronic world of computers and the Internet under a GCC-wide scheme. Children aged up to 12 in schools across the country are to be included in the free International Computer Driving Licence (ICDL) digital literacy certification scheme. The scheme's governing body, the ICDL GCC Foundation, is offfering free ICDL certification to thousands of children across the region. The initiative, which started in September this year, aims to develop computer literacy at an early age, to prepare Arab youngsters to use information technology as a tool for education.
‹ Previous 21 - 40 of 57 Next ›
Showing 20 items per page