Skip to main content

Home/ Digiteen/ Group items matching "state" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Vicki Davis

Can the law keep up with technology? - CNN.com - 2 views

  • Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
  • it's typically difficult to predict or anticipate technology innovations.
  • Is the Web a unique, separate space or is it really an extension of real space?
  • ...7 more annotations...
  • "We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
  • the school provided alternative reasons for denying Snyder a degree
  • Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
  • In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
  • The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
  • "It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
  • "We should never expect that the judges are going to save us from our own worst impulses."
  •  
    An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues. This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
  •  
    Excellent article about the changing legal issues of the Internet.
Braxton R

Huron Daily Tribune > Archives > News > Local News > USA hosting cyber safety seminar for parents - 0 views

  •  
    This page is for hosting cyber safety seminar for parents and giving them information about being safe online.
  •  
    The United States hosts a safety seminar for parents about social cyber safety.
WestR WHSB

Copyright Worries That Tackle Online Design and style - East Enders Coffee - 0 views

  •  
    Basics to Online Copyright Law "Copyright legislation states that when staff members build a website style for a organization they are employed by, the copyright of that website style belongs to the organization, not the employee." "if a lawsuit occursm the first designer will however be favored by the copyright law" intro to copyright
Sage S

The Health Effects of Social Networking - NYTimes.com - 0 views

  • two British scientists have recently suggested that spending all day, and — admit it — much of the night networking on a computer might in fact be bad for your body and your brain.
  • Susan Greenfield, a professor of pharmacology at Oxford University and the director of the Royal Institution of Great Britain, told a British newspaper on Tuesday that social networking sites remind her of the way that “small babies need constant reassurance that they exist”
  •  
    health effects of social networking two British scientists, professor of pharmacology at Oxford University (Susan Greenfield) and the director of the Royal Institution of Great Britain
  •  
    Could it be possible that social networking is destroying us? Well, not technically, but it can be causing major problems. If brains of the young are exposed to the outset of a world full of instant new screen images coming up with the click of a key, because such rapid changes could make the brain operate in such ways. Quote: "My fear is that these technologies are infantilizing the brain into the state of small children who are attracted by buzzing noises and bright lights, who have a small attention span and who live for the moment."- Lady Greenfield, a neuroscientist and a baroness.
Sage S

Modern Technology Destroying the Family as We Know It - 0 views

  •  
    Your parents use to wake you up every morning, but now they are too busy on Facebook or they don't have too because you have an alarm clock on your iPod or cell phone. You wake up and immediately check your cell phone and Facebook. Quote: "We use texting as an in-house intercom, I could just walk upstairs, but they always answer their texts." - Mr. Gude, an instructor at Michigan State University
Kerrie D

mtvU: Putting a Stop to Bullying, On and Offline - 0 views

  • "I wanted to team up with a problem or issue that I can contribute and relate to," Guadagnino explained. "I think people will listen to me because of who I am."
  • This tragedy was inspiration for one of the principal story-lines in MTV's new original movie, "(DIS)CONNECTED," a story of digital drama created to combat the growing issue of cyber-bullying.
  •  
    Website stating how important to stop cyberbullying. MTV's new movie "(DIS)CONNECTED". "I wanted to team up with a problem or issue that I can contribute and relate to," Guadagnino explained. "I think people will listen to me because of who I am."
Margaret O.

Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension | Threat Level | Wired.com - 0 views

  • Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension
  • A former Florida high school student who was disciplined for "cyberbullying" a teacher on Facebook is suing the school principal on allegations of violating her free speech rights.
  • The case highlights the legal challenges facing courts and school administrators as they grapple with campus civil order and free expression in an online world.
  • ...4 more annotations...
  • "We’re in the very first generation of this and there’s nothing ripe for the U.S. Supreme Court to hear," said Frank LoMonte, executive director of the Virginia-based Student Press Law Center.
  • The lawsuit, filed Monday in a Florida federal court, concerns Katherine Evans, now 19, who was suspended as a senior last year after creating a Facebook group devoted to her English teacher. The group was called "Ms. Sarah Phelps is the worst teacher I’ve ever met!," and featured a photograph of the teacher, and an invitation for other students to "express your feelings of hatred." After people’s comments derided Evans for the online stunt, and expressed support for the teacher, she deleted the group. But Pembroke Pines Charter High School, which did not respond for comment, suspended Evans for three days for "disruptive behavior" and for "Bullying / Cyber Bullying Harassment towards a staff member," according to the lawsuit, which is backed by the American Civil Liberties Union.
  • The lawsuit (.pdf) is one of about a dozen across the United States that are part of the fallout as schools confront cyberbullying and the explosion of social networking sites. A Texas high school volleyball coach in September went so far as to declare a ban on student Facebook and MySpace profiles, a decision the Northside Independent School District reversed (.pdf). Last month, Tennessee State University blocked the online gossip site JuicyCampus at the school firewall. In June, Missouri enacted a law against "cyberbullying" in the wake of the Megan Meier suicide tragedy, which was triggered by a hoax MySpace account.
  • There’s no bright-line rule on what constitutes free, student speech in the online world. And as schools start to regulate off-campus student speech on the internet, lawsuits are following.
  •  
    The internet bullying has got to stop. It's created a dogma for our government: they haven't seen anything like this before and they don't know how to handle it.
May O

Social Awareness - General Education at Ferris State University - 0 views

  •  
    Social Awareness.
Morgan S.

Wamogo infusing more technology into education - 0 views

  •  
    "Wamogo infusing more technology into education- The Register Citizen ""Students are driving the learning,"" LITCHFIELD - You may have heard of No Child Left Behind, but have you heard of no child left offline? Ricky Campbell talks about the technology innovation is the classroom at Wamogo Regional High School. Technology has inspired students to pay more attention to learning and reaches them in more of their way. Principal William Egan states, "Students are driving the learning." He means that because of all the help the web brings, and having teachers that know how to use it, the students are able to create their own ways to study, learn, and do assignments."
Julia B

Global Awareness - The Partnership for 21st Century Skills - 0 views

  •  
    Countries/states that use global awareness
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Haley M

Copyright Law - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • Copyright Law DefinedCopyright law, as defined in Title 17 of the United States Code, protects "original works of authorship fixed in a tangible medium of expression" for a limited period. Copyright protection includes, for instance, the legal right to publish and sell literary, artistic, or musical work, and copyright protects authors, publishers and producers, and the public.  Copyright applies both to traditional media (books, records, etc.) and to digital media (electronic journals, web sites, etc.). Copyright protects the following eight categories of works: literary works musical works dramatic works pantomimes and choreographic works pictorial, graphic, and sculptural works motion pictures and other audiovisual works sound recordings architectural works Ownership of a copyrighted work includes the right to control the use of that work. Use of such work by others during the term of the copyright requires either permission from the author or reliance on the doctrine of fair use. Failure to do one or the other will expose the user to a claim of copyright infringement for which the law provides remedies including payment of money damages to the copyright owner.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Nicholas C

Copyright and Fair Use - UMUC Library - 2 views

  • An Introduction to Fair Use What is Fair Use? Fair use is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1). Deciding whether the use of a work is fair IS NOT a science. There are no set guidelines that are universally accepted. Instead, the individual who wants to use a copyrighted work must weigh four factors:
  •  
    More about copyright.
  •  
    This page has lots of information about fair use.
Will W

United States Copyright Law for Music - 0 views

  •  
    here are the some copyright laws for music
Molly S

Global Competence: Prepare Youth to Engage with the World | Asia Society - 0 views

  • This new reality helps us more clearly define the role that education must play in preparing all students for success in an interconnected world. The United States have invested unprecedented resources in education, betting that our outmoded, factory-age system can be fundamentally transformed to prepare students for the rigors of a global economy. 
  •  Globally competent students understand that audiences differ on the basis of culture, geography, faith, ideology, wealth, and other factors and that they may perceive different meanings from the same information.  They can effectively communicate, verbally and non-verbally, with diverse audiences.  Because it is increasingly the world's common language for commerce and communication, globally competent students in the US and elsewhere are proficient in English as well as in at least one other world language. Communicating ideas occurs in a variety of culturally diverse settings, and especially within collaborative teams.  Globally competent students are able to situate themselves in a variety of cultural contexts, organize and participate in diverse groups, and work effectively toward a common goal.
Alan K

U.S. Copyright Office - Copyright Law of the United States - 1 views

  •  
    The Chapters and Appendixes on an official Copyrighting website supported by the government. The Chapters and Appendixes all contain different kinds of information relating to Copyrighting.
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Christine Davis

DAILY NATION - Information has power only when it's used - 0 views

  • n the US, ethnicity is an issue; whites and Asians access the internet more than the African Americans and Hispanics. In Kenya, it is probably where you live that decides your destiny with technology, for even with education and good income, reliable internet services are available only in the major towns.
  • Overall, 59 per cent of Americans have access to the internet, seven per cent in Asia and only 1.4 per cent in Africa (Internet World State, 2005).
    • Christine Davis
       
      Notice the date of this information (2005). May want to be on the look out for more recent data.
‹ Previous 21 - 40 of 53 Next ›
Showing 20 items per page