Skip to main content

Home/ Digiteen/ Group items matching "email" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
William B

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Computer Addiction – obsessive playing of off-line computer games, such as Solitaire or Minesweeper, or obsessive computer programming.
  • The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance.
  •  
    The Internet can be a good thing and a bad thing. some people need the Internet for work. If you are addicted to the Internet you cut you relationships and outside activities out of your life. Addiction to the Internet can damage your health. "The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person's Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it's time to strike a new balance."
alex c

Netiquette Email 101 @kassj.com - 0 views

  • 1. ALL CAPS means shouting 2. Use underscores or asterisks for emphasizing words 3. Watch your tone -- it's written, not verbal communication 4. Check your spelling 5. Quote back only what is relevant 6. Use an automatic signature, especially if you are a business 7. Where are you located if requesting goods or services? 8. Don't send unsolicited file attachments 9. Use a descriptive Subject line 10. Only forward jokes and chainletters if you are SURE the recipient wants them (and hasn't already gotten a copy or three from someone else) 11. Don't send "Check This Out" Unsolicited URLs 12. Don't expose your email routing list to spammers 13. If you are on AOL, do not use the "Forward" command 14. Don't believe every cybermyth, urban legend, hoax or virus "alert" sent to you
  •  
    These are a few rules on using E-mail etiquette.
Kerrie D

Cyberbullying: The Cruel Harsh Reality of Life in a Virtual World | OKIE Magazine - 0 views

  • Cyberbullies can send harmful messages several ways. Cyberbullying can come in the form of direct, attacking emails or text messages. These messages often contain threats, insults and sexual or racial slurs. Cyberbullying can also occur in Web forums. Bullies may pose as the person they’re trying to humiliate on public sites and post defamatory comments towards themselves. Bullies have also been known to reveal personal information (address, workplace phone number) about another individual on public forums or chat rooms as a way to solicit unwarranted contact.
  • Cyberbullying is cowardice, it’s unacceptable.
  • Do not visit the websites that have frequent bully encounters. You can also change your cell phone and home phone number to stop receiving harassing texts and calls.
  •  
    Cyberbullying is unacceptable. This tells when you start to receive nasty emails and text messages and phone calls is when it gets really bad. Virtual Worlds are the most places where you can get cyberbullied and where it mostly starts.
Micah K

Respecting Others Online - Adoption Search - 0 views

  •  
    This article says that when you have a disagreement with someone online, you should either privately talk to each other about it, or you both should agree to move on. "If a disagreement breaks out, tempers can get hot. If this happens, think about how you would react if the person you disagree with were standing in front of you. Treat others with respect. If you can't agree, don't rehash everything hoping to convince everyone that you are right. You may want to take the disagreement to corresponding via private email or simply agree to disagree and move on."
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Kelby W

Internet Use Raises Privacy Concerns - 0 views

  •  
    We need to be more alert about who we chat with how we use the internet.  "The Internet brings us great websites full of information and entertainment, and email and chat have revolutionized communication. But there's a dark side, too, as Internet users are increasingly concerned about how much of their personal information they're giving up in exchange. VOA's Art Chimes reports on the debate over Internet privacy. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we're disclosing, but which advertisers and commercial websites can use to sell us goods and services. Sometimes the information is openly requested: you register on a website and you fill out a form. Next time you log into the site, you find ads for sporting equipment if you registered as a young man, or maybe cosmetics if you're a woman. Other times, websites and advertisers seem to magically know our interests. They can do this because of cookies, little text files created on your computer that contain information left there by the websites you visit"
Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
October H

The 101 To Basic Hacking: How To Hack Facebook and Other Websites - Jack Cola.org - 0 views

  •  
    "Hacking can be very easy, or it can be quite difficult, depending on whom your target is. You could get access to someone's email account and Facebook account in less than 5 minutes or sometimes it could take a few days and a bit of effort."
  •  
    This is an example of hacking directions online.
andyjackins

Nude Heather Morris pictures - hacker blamed | Naked Security - 0 views

  •  
    Another celebrity has there personal information hacked.  Shows how we need to be more responsible for what we take photos and video of as more people are having their emails and phones hacked. 
mercades c

Your personal safety on the Internet - UsingEnglish.com - 1 views

  •  
    This article disscuses personal safety on the internet. The article suggests that you don't give out your email adress. Next you should never give contact information to anybody. The tips are to not give out your personal information and to be carful about meeting someone that you talk to on the internet.
Vicki Davis

ACLU Sues School For Punishing 12-Year-Old Over Facebook Comment - 2 views

  •  
    You'll want to read this lawsuit as it lies on the cusp of what we will experience in schools in the future. In this case, a 12 year old girl (on Facebook, despite the fact she is technically too young to be) is suing a school district (via the ACLU) for punishment because of her use of Facebook. I think the school went too far when it required her to hand over her Facebook and email login to the school, but we'll see what the courts decide. The ACLU says this is a violation of free speech. Stay tuned and realize that students have a right to hate you, say unkind things about you, etc. There is a fine line in what is allowed and what isn't. Just because we CAN deal with issues relating to bullying of other children - that doesn't mean we can wear our own chips on our shoulders and require that kids pretend to like us. It is hurtful when children say unkind things and many don't realize everyone is watching. If students are not understanding the consequences of their actions, then I partially blame any school that doesn't step up and teach digital citizenship.
Audrey b

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
Becca B

Online Etiquette - 1 views

  • However, some things don't change: the practices of courtesy and respect that apply in the ordinary classroom also apply online, and require even more attention
  • Participate
  • Be persistent
  • ...8 more annotations...
  • Share tips
  • Think before you push the Send button
  • Remember that we can't see the grin on your face when you make a sarcastic comment,
  • Ask for feedback
  • "Flaming,"
  • unacceptable
  • derogatory or inappropriate comments
  • Plagiarism
  •  
    " 1. Participate. In the online environment, it's not enough to show up! We need to hear your voice to feel your presence, and we especially need your comments to add to the information, the shared learning, and the sense of community in each class. 2. Be persistent. Remember that we're all working in a fairly new environment. If you run into any difficulties, don't wait! Send an email immediately to your instructor or post on the Bulletin Board. Most problems are easily solved, but your instructor (and your course colleagues) have to hear from you before they can help. 3. Share tips, helps, and questions. For many of us, taking online courses is a new frontier. There are no dumb questions, and even if you think your solution is obvious, please share it by posting it on the Bulletin Board or other communication tool. 4. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? While you can't anticipate all reactions, do read over what you've written before you send it. 5. Remember that we can't see the grin on your face when you make a sarcastic comment, we can't see the concern on your face if you only say a couple of words, and we can't read your mind and fill in the gaps if you abbreviate your comments. So: help us "see" you by explaining your ideas fully. 6. Ask for feedback if you're not sure how your ideas and comments will be taken. Remember there's a person on the other side. If you disagree with what someone has said, practice all your communication skills as you express that disagreement. 7. "Flaming," or flying off the handle and ranting at someone else is unacceptable; it's the equivalent of having a tantrum, something most of us wouldn't do in an onsite, face to face classroom. 8. Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to the sa
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
anonymous

Computers are the 'type' of communication seniors want | NBS.gmnews.com | North South Brunswick Sentinel - 2 views

  •  
    Kids and teenagers these days are so technologically advanced, they are able to help teach seniors to use the basic communications online like logging into the computers, and setting up email accounts to be able to communicate with other people easier.
Julie Lindsay

iNet - Student online conference - 0 views

  •  
    Connecting learners in a global world: why is this important for you? Monday 16 - Monday 23 November 2009 Deadline for emailing contributions: Friday 16 October 2009 This online conference for students will explore why it is important for students to connect with other students from around the world, and how schools can support you to do this. Students are invited to submit resources around the conference theme which could include films, poems or essays.
Steve Madsen

Is your boss your friend or foe? - Technology - smh.com.au - 0 views

  •  
    Maria's nightmare began after a long weekend when she logged on to check her emails only to find: "The boss added you as a friend on Facebook" staring at her through her inbox screen.
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
‹ Previous 21 - 40 of 78 Next › Last »
Showing 20 items per page