Skip to main content

Home/ Digiteen/ Group items matching "2" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Vicki Davis

Neustar Launches Social Media Digital Citizenship Program for  Kentucky Schools | EON: Enhanced Online News - 0 views

  •  
    A program from Neustar to Kentucky schools about Digital Citizenship. Lots of people are jumping on this "bandwagon." I think my biggest concern is that: #1 It needs to be "real" and not based on preachy scare-based tactics #2 Students should talk with those who share the program - if it is just videos and worksheets, that doesn't cut it.  #3 To talk about and learn social media, you should be doing it. (That is what we do on Digiteen.) a major new initiative to bring social media digital literacy education to students across the state of Kentucky through a program called "My Digital Life." Neustar will partner with EverFi, Inc., a leading education technology company, to provide this innovative, online student experience to all Kentucky schools interested in teaching and certifying their students in digital literacy skills and responsibility. Most importantly, Neustar's partnership is making the cutting-edge program available free of cost to the schools and state.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Blakelee H

STOP cyberbullying: Are you a cyberbully? - 0 views

  • Often, people who are victims are also bullies. Before you feel too bad for yourself, take the quiz below to find if you, too, are part of the cyberbullying problem! Rate yourself on the following point scale according to if, and how many times, you have done the below activities. Give yourself 0 points if you’ve never done it, 1 point if you have done it 1 or 2 times, 2 points if you have done it 3-5 times, 3 points if you have done it more than 5 times.
  •  
    An online cyber bullying quiz that allows a person to know if they are a cyber bully. One can find through the questions what characteristics are of a cyber bully.
Haley M

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
Susan Davis

10 Best Rules of Netiquette - Associated Content from Yahoo! - associatedcontent.com - 3 views

  • 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason.
  • Good internet etiquette (netiquette) is all about being courteous to others online to make the internet a fun experience for everyone.
  •  
    "1.The Golden Rule: Treat others as you would like to be treated. This rule is an oldie but a goodie and can get you through just about any situation, online or off! 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. Harassing or insulting someone will not likely help you gain many online friends! 3. Respect Others' Copyrights: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. Copying the works of someone else without permission or saying it is your own will not only ruin your online reputation, but could land you with hefty fines and lawsuits! 4. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. 5. Don't Spam: As a blog owner, I get hundreds of spam messages each day. Most of them aren't even legible, with things like "kjhgsawu" typed in the comments and links to sites with adult or inappropriate content. I don't appreciate it! Some spammers are getting really sneaky, as they use the same generic post over and over again like "I really like your blog" - if you own multiple blogs like I do though you can quickly identify these types of spammers! There's a fine line between spam and self-promotion, do it very carefully! "
Julie Lindsay

Classroom Resources to Counter Cyber Bullying - Portal Page - 0 views

  •  
    The Internet has created a whole new world of social communications for young people who are using e-mail, social networking Web sites, instant messaging, chat rooms and text messaging to stay in touch with friends and make new ones. While most interactions are positive, increasingly kids are using these communication tools to antagonize and intimidate others. According to a 2008 University of Toronto cyber bullying survey, nearly one in five Canadian students surveyed reported having been bullied online in the past three months.[1] An Alberta study found that one-third of students who had cyber bullied, had also been victims themselves.[2]
Vicki Davis

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
Julie Lindsay

FRONTLINE: digital nation: press release | PBS - 0 views

  •  
    Coming on Feb 2 another PBS Frontline series on digital citizenship
Becca B

Top 26 Most Important Rules of Email Etiquette - About Email - 0 views

  •  
    "2. Do Not Default to "Reply All" - Email Etiquette Tip "Reply" is good. "Reply to All" is better. Right? 3. Keep Emails Short - Email Etiquette Tip Do not intimidate recipients with too much text. 4. Properly Format Your Email Replies, and Be Lazy - Email Etiquette Tip Do you think quoting original text in your email replies perfectly is a lot of work? Don't let the '>' intimidate you! Here's a very comfortable, relaxed, quick and still clean and compatible way to reply properly. 5. Write Perfect Subject Lines - Email Etiquette Tip Do you make these mistakes in your email subjects? (The key to getting your messages read is not to be clever.) 6. Clean Up Emails Before Forwarding Them - Email Etiquette Tip Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation. 7. When in Doubt, Send Plain Text Email, Not HTML - Email Etiquette Tip Not everybody can receive your fancily formatted emails. Some may even react furious. To be safe rather than sorry, send plain text emails only when in doubt. 8. Don't Forward Hoaxes - Email Etiquette Tip Email hoaxes often contain stories that are intriguing, and sure to irritate. Here's how to spot and stop urban legends. Sponsored Links Business EtiquetteWorkshop materials to teach proper busines etiquete.CorporateTrainingMaterials.com Virus and Trojan RemoverDownload Free Trojan & Virus Scan Recommended and Used By The Expertswww.pctools.com 9. Use Current Antivirus Software, Keep it Up to Date, Scan for Free Make sure you're not spreading worms and viruses via email or act as a vehicle for spreading spam. All this can be caused by malicious emails. Fortunately, there's protection. 10. Say Why You Think What You Forward Will Interest the Recipient More and better communication makes better relationships. Here's a way to spot and share relevant information and foster ties by forwarding emails and links."
Becca B

Netiquette - The Code of Conduct for the Internet - By Jason - 0 views

  •  
    "Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt. Here are some key points to keep in mind: * It's not nice to hurt other people's feelings. Who are you trying to prove anything to? Just keep offensive comments to yourself and try to be constructive. * Never type a whole message in caps, whethere its an instant message, a reply to a post in a message board, or in an email. writing a whole message in caps means that one is yelling (unless you do not mean it that way). If you do not mean it to come across that way, make sure you tell people you are not yelling. Remember, people can not tell what mood you are in by just typing something (unless you are using a webcam and microphone of course...). So please please please do not use caps to write messages. Thanks! * Never mail or post anything you wouldn't say to your reader's face. The internet is not a place to find or pick a fight. There are people out there with the same intentions you have of just researching and just finding useful information and that is all. No need to start any trouble. Please ;] * Notify your readers when flaming. For those of you who do not know what flaming is, here is the basic definition. Flaming is when a person or group of people decide to express their negativity about a certain situation, maybe a world event or something. The reason one is told to notify people when doing this is because some people may not know you are flaming. I mean, this is the internet. It's not like you have the person sitting in front of you where you can look at their face and tell they are mad or annoyed about something. So please, let people know that the post or message you are about to post is of this kind. On a side note, flaming can also be toward people. It can be toward their beliefs, comments they may have made, ideas, etc. Please do not do this kind of flaming. Again, we are trying to eliminate unneccessary confrontations o
Becca B

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
Becca B

Online Etiquette - 1 views

  • However, some things don't change: the practices of courtesy and respect that apply in the ordinary classroom also apply online, and require even more attention
  • Participate
  • Be persistent
  • ...8 more annotations...
  • Share tips
  • Think before you push the Send button
  • Remember that we can't see the grin on your face when you make a sarcastic comment,
  • Ask for feedback
  • "Flaming,"
  • unacceptable
  • derogatory or inappropriate comments
  • Plagiarism
  •  
    " 1. Participate. In the online environment, it's not enough to show up! We need to hear your voice to feel your presence, and we especially need your comments to add to the information, the shared learning, and the sense of community in each class. 2. Be persistent. Remember that we're all working in a fairly new environment. If you run into any difficulties, don't wait! Send an email immediately to your instructor or post on the Bulletin Board. Most problems are easily solved, but your instructor (and your course colleagues) have to hear from you before they can help. 3. Share tips, helps, and questions. For many of us, taking online courses is a new frontier. There are no dumb questions, and even if you think your solution is obvious, please share it by posting it on the Bulletin Board or other communication tool. 4. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? While you can't anticipate all reactions, do read over what you've written before you send it. 5. Remember that we can't see the grin on your face when you make a sarcastic comment, we can't see the concern on your face if you only say a couple of words, and we can't read your mind and fill in the gaps if you abbreviate your comments. So: help us "see" you by explaining your ideas fully. 6. Ask for feedback if you're not sure how your ideas and comments will be taken. Remember there's a person on the other side. If you disagree with what someone has said, practice all your communication skills as you express that disagreement. 7. "Flaming," or flying off the handle and ranting at someone else is unacceptable; it's the equivalent of having a tantrum, something most of us wouldn't do in an onsite, face to face classroom. 8. Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to the sa
DaneY_mca MCA

Digital Freedom Network "Advancing freedom worldwide through information & technology." Homevar showDateShort = 1;var showDate= 2;var showDateTime= 3;var showTime= 4;function ShowDateTime(dateStyle){var today = new Date();var dStr = - 0 views

  •  
    digital freedom network, has the facts on freedom all around the world and is up to date with most countries. It has current events, the frontline, and freedom pages.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Steve Madsen

Public Sphere | Kate Lundy - 0 views

  •  
    An Australian politician sets up mechanisms for the public to participate in discussions that have political importance.
  •  
    A "Public Sphere" is a space that "…through the vehicle of public opinion it puts the state in touch with the needs of society" [2]. This kind of engagement in public policy is a great way to represent different views and harness a broad range of expertise, particularly on topical issues of the day.
mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
Riley F.

digiteen09-2 - Health & Wellness - 0 views

  • Using your computer improperly could lead to various health injuries, such as Carpal Tunnel Syndrome also known as ''computer back''. Being aware of digital health and wellness could prevent such injuries.When you make the wrong choices on the internet by bullying someone, you could get in trouble but you could also get that person you are bullying to start thinking about suicide etc.
  •  
    what might happen if you aren't careful.
  •  
    This is so true. You never know what the person is going through that you are bullying. They could be having a lot of trouble in their life, and them someone comes along and bullies them online. Then they have no safe haven because even online they are being bullied. There is know escape. It is very possible they would start having thoughts of suicide. You would sure hate to know that you are part of why somebody little kid died. I know I wouldn't be able to live with my self.
Erin B

Xbox Live - Wikipedia, the free encyclopedia - 0 views

shared by Erin B on 05 Oct 09 - Cached
  •  
    Xbox Live is a great example of internet commerce and freedom. "Xbox Live (trademarked as Xbox LIVE[1]) is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. It is currently the only online gaming service (on consoles) that charges users a fee to play multiplayer gaming. It was first made available to the Xbox system in 2002. An updated version of the service became available for the Xbox 360 console at that system's launch in 2005. On the Windows platform, the service is named Games for Windows - Live, which makes most aspects of the system available on Windows computers. Microsoft has announced plans to extend Live to other platforms such as handhelds and mobile phones as part of the Live Anywhere initiative.[2]"
‹ Previous 21 - 40 of 176 Next › Last »
Showing 20 items per page