Skip to main content

Home/ Digiteen/ Group items tagged your

Rss Feed Group items tagged

2More

How to delete your Facebook account - Telegraph - 0 views

  •  
    "This is a time-consuming process, particularly if you are insanely popular, with hundreds of "friends", but will make every aspect of controlling your privacy that much easier. Friend lists allow you to group your contacts in to groups, so that you're only sharing certain information with certain people. For example, you might create four lists: "Close friends", "Acquaintances", "Family", and "Work""
  •  
    Do teenagers configure their privacy settings properly in Facebook?
4More

How to Be Safe on the Internet: 10 steps - wikiHow - 0 views

  • Do not give out your full name, address, or phone number to anyone online
  • Don’t use lazy passwords. Choosing password or 1234 is like putting a luggage lock on the front door of your house. Also, people will be able to guess it and hack. Instead, come up with a longer password that contains both letters and numbers/characters, preferably one that references something significant only to you. For example, if the name of your beloved childhood goldfish was Sir Bubbles, swap out some of the letters for numbers and you can end up with a very nice password like s1rbubb735 that only you understand.
  •  
    "Using the Internet and surfing the web can be as sweet as candy, but not always, as sweet as it is, it's very easy to type in personal information. Here are a few ways to stay safe during your online activities. " steps to learn online safety and rules.
  •  
    If you have a good password that contains numbers and letters your identity is a lot safer.
9More

UWC Online - Online Etiquette - 1 views

  • Given the absence of face-to-face clues, written text can easily be misinterpreted. Avoid the use of strong or offensive language and the excessive use of exclamation points. If you feel particularly strongly about a point, it may be best to write it first as a draft and then to review it, before posting it, in order to remove any strong language.
  • If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion is also new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.
  • Although electronic communication is still young, many conventions have already been established. DO NOT TYPE IN ALL CAPS. This is regarded as shouting and is out of place in a classroom. Acronyms and emoticons (arrangements of symbols to express emotions) are popular, but excessive use of them can make your message difficult to read. Some common ones include:
  • ...6 more annotations...
  • Messages may often appear perfectly clear to you as you compose them, but turn out to be perfectly obtuse to your reader. One way to test for clarity is to read your message aloud to see if it flows smoothly. If you can read it to another person before posting it, even better.
  • You may be familiar with many of the previous points if you have participated in other forms of electronic communication in the past. But Web-based courses have some added constraints not present in other arenas. Keep in mind these additional four points:
  • Be as concise as possible when contributing to a discussion. Web-based courses require a lot of reading, and your points might be missed if hidden in a flood of text. If you have several points that you want to make, it might be a good idea to post them individually, in several more focused messages, rather than as a single, lengthy, all-encompassing message.
  • Contributions to a discussion should have a clear subject header, and you need to stick to the subject. Don't waste others' time by going off on irrelevant tangents.
  • Don't add your comments to a discussion before reading the comments of other students unless the assignment specifically asks you to. Doing so is tantamount to ignoring your fellow students and is rude. Comments related to the content of previous messages should be posted under them to keep related topics organized, and you should specify the person and the particular point you are following up on.
  • A key distinguishing feature of an online course is that communication occurs solely via the written word.
5More

How to Stop Your Child's Computer Addiction - wikiHow - 1 views

  • Talk with your child about his/her excessive computer usage
  • Move the computer to an open area if it’s not already in one – sometimes taking it out of the child’s bedroom is sufficient to reduce their computer usage, and it makes it easier to monitor their usage.
  • Set a password for the computer so that only you can log on to it
  • ...2 more annotations...
  • Find out how bad your child's addiction is, and what exactly your child is addicted to – does your child spend most of his/her computer time playing games, chatting online, or just browsing the Web?
  • If he/she is addicted to learning information, as long as it is legal, safe and decent, then that should not be an issue.
1More

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
5More

STOP cyberbullying: What's the Parents' Role in This? - 0 views

  • Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online. Why? Parents tend to overreact.
  • Parents need to be supportive of your child during this time
  • Let the school know so the guidance counselor can keep an eye out for in-school bullying and for how your child is handling things.
  • ...1 more annotation...
  • But there are two things you must consider before anything else. Is your child at risk of physical harm or assault? And how are they handling the attacks emotionally?  
  •  
    What parents should do in case their child is being cyberbullied.
1More

Let's keep children safe in the cyber age | BlueRidgeNow.com - 2 views

  •  
    I firmly believe as a child of a very "nosy" mother, that I is the parents duty to keep their children in check, but I do not agree with this! If you don't trust you child enough to NOT read their messages, then maybe they don't need one! All this does is give them doubts of your trust, they will feel as if you are invading their privacy, and will be deleting things constantly. Parents need to understand that trust works both ways. This conversation is going to be award and neither the parents nor the child wants to have it, but you need to. It's one way of protecting your child without destroying their trust and doubting yours! Quotes: "I routinely check the texts and photos on their cell phones," says Susan Kain." "let's all talk to our children about Internet safety, social networking sites and "sexting."
1More

Dealing with Cyberbullying: 5 Essential Parenting Tips - - TIME Healthland - 0 views

  •  
    Cyberbullying is a big part of many adults' parental lives. There are many cases of cyberbullling and they are getting more serious every day. Essential Parenting tips: 1.) Make sure your kids know cyberbulling is wrong 2.) Take interest in your kids' online behavior 3.) Check school policies on cyberbulling 4.) Set guidelines about cell-phone use 5.) Help your children respond appropriately if they are cyberbullied Elizabeth Englander, author of Understanding Violence and Jonathan Singer, at the Temple University of Social Work (I agree with a couple tips but some might be crossing the line between protecting their kids and taking over their online life.
1More

teachers | Idea Flight - 0 views

  •  
    "Idea Flight is the only tool you need to share your ideas easily on iPad. Captivate your audience in a whole new way, keep everyone on the same page and network on the fly." Westwood beta tested Idea Flight on iPads that they sent over. It was presentation/learning app that help the teachers "fly" us through the lessons at her own pace, keeping all the student on the same page (unless she unbuckled our seat belts.) It was very cool having the presentation right in the palm of your hand so you could be up close and personal with the presentation.
1More

Modern Technology Destroying the Family as We Know It - 0 views

  •  
    Your parents use to wake you up every morning, but now they are too busy on Facebook or they don't have too because you have an alarm clock on your iPod or cell phone. You wake up and immediately check your cell phone and Facebook. Quote: "We use texting as an in-house intercom, I could just walk upstairs, but they always answer their texts." - Mr. Gude, an instructor at Michigan State University
3More

Teen Safety on the Internet - 0 views

  • Teen Safety on the Internet More and more teenagers are logging on to the Internet every day. Although the Internet is a great source for research projects and other information, there are also dangers involved with surfing the Web. For example, a study conducted in 2000 found that 25 percent of kids 10 to 17 years of age received unwanted pornographic material.The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. As a result, agreeing to meet in person with someone you met over the Internet is extremely dangerous, as this can result in sexual assault or even murder. How to Stay Safe on the Internet E-mail Safety Chat Rooms Assessing a Web Site Blogging How to Stay Safe on the Internet Never give out personal information, such as your name, home address or phone number, the name of your school, pictures, credit card numbers or the names of your parents without permission from your parents.Do not meet in person with someone you met online. Do not give out your password to anyone.In chat rooms, use a name that is not gender-specific so you are less likely to receive pornographic material or other forms of harassment. If you do receive pornographic material, report it to your local police department. Back to top E-mail Safety
  • Do not open links or files from people you do not know.Never respond to e-mails with pornographic or other inappropriate material.Do not respond to advertisements -- this confirms that you have a working e-mail account, and you will only receive more junk e-mail.
  •  
    This page talks to teens about how to be safe on the internet. On e man pretended to be a 15 year when he was really 50. Some people are out there that are actually trying to talk and harm teens so be careful. Quote:"The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. "
1More

How to keep your child safe on Facebook - 0 views

  •  
    These are more tips for a parent to help their child stay safe and away from predators on facebook. "In order to keep your child's identity safe on their Facebook account you will want to talk to them about what they should and should not put in their profile. Profiles contain personal info and recent activity. It would be wise to have your child put some false information on there to mislead people who are trying to steal their identity."
1More

5 Reasons I Want an iPhone 4s Jailbreak Now - 0 views

  •  
    5 thinks a jailbreak can do 1. intelliscreenX- add better notifications to your lockscreen 2. Notification Center Widgets- adds widgets to your notification center like on the android home screen 3. Settings Widgets- quick access to certain settings from the notification center 4. Better Google Voice Integration- no need to go directly to the app to make a call 5. My 3g- downloads apps from 3g instead of making you connect to wifi "While Jailbreaking is legal, Apple has said that it voids your warranty."
2More

Your Digital Presence - 3 views

  • To get a sense of your digital presence, search yourself: A first place to start is to Google yourself and see the results. Use pipl.com or peekyou.com to find out what comes up about you. Try spezify.com for a look at your digital history. For an entirely different view, try the MIT Personas interface for a visual display of your digital presence.
  •  
    Digital Citizenship and digital footprint resources. Various tools to use with students to show what your digital history really looks like.
1More

Photography Copyright Protection: Online Resources ‹ Photography business ins... - 0 views

  •  
    Protection of copyrighted photographs  "Yes, getting your work online exposes you to risk of theft." "Shut everything down and only share images when asked directly by a potential client. This is obviously a really bad idea," -understand rights to your works -prevent theft of your works by knowing what to do if someone steals
1More

What to Do With a Jailbroken iPhone Before Taking it In? | Small Business - Chron.com - 0 views

  •  
    cure your iphone of jailbreak "Jailbreaking unlocks the file system" "The jailbreak process is not supported by Apple and nullifies your warranty... . A factory restore eliminates all traces of the jailbreak software so you can feel confident walking in to the Apple store with your iPhone."
2More

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
2More

Surviving a Hack - 0 views

  •  
    "There's a topic that all web developers need to keep current on - regardless of whether you're a newbie or a veteran, if your site has been up for 10 years or for 10 minutes - and that topic is web site security and protecting yourself from hackers. What can be even more important than prevention is the cure in case your site is hacked."
  •  
    STOP! You might be hacked, don't panic read this blog and get that hacker off that site. It has different ways to help you stop hackers from getting inside your private life eon the internet.
7More

Be Web Aware - privacy - 0 views

  •  
    "When we talk about "young people's rights to their privacy" parents are in a tough spot: they want to protect their kids and at the same time respect their privacy."
  • ...4 more comments...
  •  
    Some parents don't respect their kids privacy! It makes your child shut you out.
  •  
    Parents need to discuss the internet with their children to keep them safe.
  •  
    Parents need to tell their kids not to share that much information on the internet. Definitely not to a stranger.
  •  
    ask other parents about good educational sites for your child.
  •  
    If your teen is shopping online make sure they know the safety guidelines on the website.
  •  
    Make sure your children are doing the right thing on the internet when registering for something.
1More

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
« First ‹ Previous 61 - 80 of 321 Next › Last »
Showing 20 items per page