Skip to main content

Home/ Digiteen/ Group items matching "application" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Haley M

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneyland | TIME.com - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
Kellie C

Internet.pdf (application/pdf Object) - 0 views

  •  
    This online pdf is a person telling about his own findings and research on internet culture differences.
Kellie C

Cross-Cultural Differences in Perceived Risk of Online Shopping | JIAD - 0 views

  • There is little doubt that, in a considerably short period of time, the Internet has grown enormously in both its applications and number of users.
  •  
    This site pinpoints one topic that has issues with cultural differences.
Haley M

Copyright - Wikipedia, the free encyclopedia - 0 views

  • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.[clarification needed][1]
  •  
    copyright definition
  •  
    This website defines copyright to help you better understand what copyright really is.
Summer T

1stLL.pdf (application/pdf Object) - 1 views

  •  
    Article from L&L ISTE from Ribble and Bailey 2004
  • ...1 more comment...
  •  
    Appropriate Technology Use
  •  
    Digital citizenship can be defined as the norms of behavior with regard to technology use.
  •  
    This is the Definition of Digital Citizenship.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Rachel H

Internet Addiction : Counseling Center : Texas State University - 0 views

  • Internet addiction? Sounds unlikely, right? How can the use of a positive, dynamic force like the Internet become a negative, debilitating factor in someone’s life. Simple. Just like the use of food, the drinking of alcohol, or the purchasing of material things can escalate into misuse and abuse, so can one’s interest in and preoccupation with using the Internet become an addiction. Let’s take a look at several key facets of this developing phenomenon of Internet Addiction, starting with a basic definition which is taken from Dr. Kimberly B. Young’s book Caught in the Net.
  • Do you feel preoccupied with the Internet (think about previous on-line activity or anticipate next on-line session)? Do you feel restless, moody, depressed, or irritable when attempting to cut down or stop Internet use? Do you stay on-line longer than originally intended? Have you jeopardized or risked the loss of significant relationship, job, educational or career opportunity because of the Internet? Have you lied to family members, therapist, or others to conceal the extent of involvement with the Internet? Do you use the Internet as a way of escaping from problems or of relieving a dysphoric mood (e.g., feelings of helplessness, guilt, anxiety, depression)?
  • Although any one of us can become addicted, some trends do exist. Some people are drawn to a “faceless community,” one where a person can enter into multiple cyber-relationships with anonymity and create one or multiple new on-line personas. Certainly persons with quite a lot of discretionary time on their hands are susceptible, including homebound people or college students adjusting to the new schedule on a university campus. Gender does seem to influence the types of applications and underlying reasons for Internet addiction. Men tend to seek out power, status, dominance and sexual fantasy on-line, gravitating more toward the sources of information glut, aggressive interactive games, and sexually explicit chat and cyber-porn sites. Women seek out supportive friendships, romantic partners, and prefer anonymous communication in which to hide their appearance. It seems to be a natural conclusion that attributes of gender played out in Cyberspace parallel the stereotypes men and women have in our society.
Jerilyn J

5DT Virtual Reality Information - 0 views

  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
  • Applications of Virtual Reality (VR) Virtual Reality is an ideal training and visualization medium.
  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
Susan Davis

Social Media Etiquette for Students: 50 Crucial Rules | Online Degree Programs.com - 3 views

  • Online Degree Programs Home (Online Degrees) Blog About Contact
  • sending party invites, posting pictures of your new friends, complaining about tests, meeting dates, and keeping in touch with family back home.
  • general tips
  • ...7 more annotations...
  • Act like you would in real life:
  • Don’t discriminate just because
  • You have to earn respect:
  • Always introduce yourself:
  • : If you’re on social media sites constantly, you’ll burn yourself out and annoy other people. Find a balance so that you’re making quality contributions to the discussion, not dominating it.
  • Be extra polite
  • These Facebook-specific rules address photos, tagging, and all those applications.
stephanie j

HPCwire: Games That Matter - 0 views

  • One such popular defense tool is a virtual world game called Boarders Ahoy!.
  • The United States Secret Service is also leveraging the training power of virtual worlds to prepare for national threats.
  • First-response teams, such as the police and fire departments, are using simulation games to practice dangerous tasks that would otherwise require risky re-enactments.
  • ...1 more annotation...
  • While all the simulation tools presented above support different projects, they are united in their life-saving potential.
Jamie Davis

How to Have Good Facebook Etiquette | eHow.com - 0 views

  • Keep applications to yourself
  •  
    This is one way to have good etiqutte.
Nolan C

Social media - Wikipedia, the free encyclopedia - 0 views

  • Social media are media for social interaction, using highly accessible and scalable communication techniques
  • People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
  •  
    this is the importance of social media and why everyone uses it
  •  
    Social media includes web-based and mobile based technologies which are used to turn communication into interactive dialogue between organizations, communities, and individuals. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content."
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
Ahmed Kiyoshi El Maghraby

Super safe hard - 0 views

  • * of networked storage to business users searching for the easiest and most technologically advanced way to share, secure and protect their most important data, including productivity application data, media files, backup data, and other digital files.
anonymous

AMAX Information Technologies | NVIDIA® Tesla™ High Performance Computing (HPC) Solutions - 0 views

  • Ideal for life sciences, geosciences, engineering & sciences, molecular biology, medical diagnostics, electronic design automation (EDA), government and defense, visualization, financial modeling, and oil & gas applications.
    • anonymous
       
      How speed changed the way we interpert data, and work with different ideas.
Garrett E

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with on-line access scored higher in the areas of information management, communication, and the presentation of ideas. According to one article the use of instructional technology offers great promise in helping "students become independent, critical thinkers, able to find information, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
Destiny T

iTunes_U_Copyright_Overview.pdf (application/pdf Object) - 0 views

  •  
    this is a copyright overview of what copyrighting is in the US and the internet
emory b

OnLineRespect.pdf (application/pdf Object) - 0 views

  •  
    You may not mean something that you say online to someone but it still could hurt them. No one knows what someone they don't know is going through.
‹ Previous 21 - 40 of 42 Next ›
Showing 20 items per page