Skip to main content

Home/ Digiteen/ Group items matching "government" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
StephenK_mca MCA

Do Privacy Fears Allow Terrorism? - 0 views

  •  
    At a gathering of technology and privacy experts, a lawyer for a conservative think tank has one request: Stop the "hysterical cries" over loss of privacy and let the government do what it must to prevent terrorism. Michelle Delio reports from New York.
Julie Lindsay

Teen's death highlights cyber bullying trend - 0 views

  •  
    ABC News (Australian Broadcasting Corporation) I find this disturbing. If the Internet was used in a more meaningful way so that teenagers had a viable online support network and learning community the Internet would be seen as a valid tool to help people when distressed. Governments and community groups should be building this support networks online and not shutting down or blocking online access.
Steve Madsen

Parents get sext message - Technology - smh.com.au - 1 views

  •  
    Australian focus: Schools to be sent fact sheets that will go to parents and students.
  •  
    A NSW State Government campaign starting this week will remind youngsters and their parents that the growing practice of sending saucy pictures through cyberspace can have lifetime consequences.
Brody C

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something Online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s Online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and information from the federal government to help consumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making online purchases, avoiding phishing scams (with a fun Flash animation on how to tell if you’re being phished), and defending cell phones and PDA’s against attack.
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 1 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
  •  
    Net neutrality deserves a mention in the Digiteen project and is an important topic being debated here in the US.
Margaret O.

Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension | Threat Level | Wired.com - 0 views

  • Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension
  • A former Florida high school student who was disciplined for "cyberbullying" a teacher on Facebook is suing the school principal on allegations of violating her free speech rights.
  • The case highlights the legal challenges facing courts and school administrators as they grapple with campus civil order and free expression in an online world.
  • ...4 more annotations...
  • "We’re in the very first generation of this and there’s nothing ripe for the U.S. Supreme Court to hear," said Frank LoMonte, executive director of the Virginia-based Student Press Law Center.
  • The lawsuit, filed Monday in a Florida federal court, concerns Katherine Evans, now 19, who was suspended as a senior last year after creating a Facebook group devoted to her English teacher. The group was called "Ms. Sarah Phelps is the worst teacher I’ve ever met!," and featured a photograph of the teacher, and an invitation for other students to "express your feelings of hatred." After people’s comments derided Evans for the online stunt, and expressed support for the teacher, she deleted the group. But Pembroke Pines Charter High School, which did not respond for comment, suspended Evans for three days for "disruptive behavior" and for "Bullying / Cyber Bullying Harassment towards a staff member," according to the lawsuit, which is backed by the American Civil Liberties Union.
  • The lawsuit (.pdf) is one of about a dozen across the United States that are part of the fallout as schools confront cyberbullying and the explosion of social networking sites. A Texas high school volleyball coach in September went so far as to declare a ban on student Facebook and MySpace profiles, a decision the Northside Independent School District reversed (.pdf). Last month, Tennessee State University blocked the online gossip site JuicyCampus at the school firewall. In June, Missouri enacted a law against "cyberbullying" in the wake of the Megan Meier suicide tragedy, which was triggered by a hoax MySpace account.
  • There’s no bright-line rule on what constitutes free, student speech in the online world. And as schools start to regulate off-campus student speech on the internet, lawsuits are following.
  •  
    The internet bullying has got to stop. It's created a dogma for our government: they haven't seen anything like this before and they don't know how to handle it.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Maggie H

Cyberbullying - 0 views

  • Cyberbullying is a growing concern around the world. It is clear that cyberbullying has a world-wide impact, but existing laws and increased education about the issue can help countries respond to and eliminate the problem. The Internet industry works to prevent and stop cyberbullying. One common solution to help stop cyberbullying on social networking sites is the ability to report abuse.
  • Cyberbullying is a global problem but government responses vary by country. This issue cannot be solved by the criminal punishment of teens; instead, the best solution is to encourage kids to make the right choices online in the first place.
  •  
    Cyberbullying is a growing world-wide problem. Different countries respond to cyberbullying differently.
Sam V

Gale World History In Context - Document - 0 views

  • LOCAL corporate leaders, captains of industry and senior Government officials gathered in Windhoek on Wednesday to witness the launch of the country's UN Global Compact Network.
  • The newly launched business initiative is a global concept whereby companies integrate a number of social and environmental concerns into their business operations and in their interaction with their stakeholders on a voluntary basis, with the aim of advancing corporate social responsibility in the country.
  • Compact Network will generally facilitate access to business information, tools and technical inputs through its strong relations with other UN entities, development agencies and civil society.
  • ...3 more annotations...
  • Within the Namibian UN Global Compact Network, companies can choose their mode of engagement, which may be either collectively or individually", he explained.
  • Tim Parkhouse, said local participating companies would not only benefit from better public relations, but also from an increased understanding amongst their stakeholders of the private sector's potential as an agent for sustainable development.
    • Sam V
       
      Again with this one, I'm not sure if it entirely fits our topic, but I'm pretty sure the main idea does fit. If others in the group don't agree, we don't have to use it.
  •  
    This document talks about how the Namibian UN Global Compact Network can change the way companies interact with stakeholders and how they interact with each other.
Haley M

Copyright - Wikipedia, the free encyclopedia - 0 views

  • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.[clarification needed][1]
  •  
    copyright definition
  •  
    This website defines copyright to help you better understand what copyright really is.
Ivy F.

digiteen2008 - Digital Access - 0 views

  • The reason this page is here is to tell people about digital access, what problems there are and how we can solve them. Digital Access is insuring that everyone no matter who they has access to the internet.
    • Ivy F.
       
      This will help!
  • Access is a very important thing in life. The ten most important terms that have to do with Access are: connect, internet, access, obtain, retrieve, regain and gate way which all mean that there is or you can access something although in particular, the internet.
  • Identity is a topic that people may not think about as access. Although it is. Identity can be shown on the computer or on the internet. When you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network. It is a positive thing because now you can show your identity to other people around the world.
  • ...27 more annotations...
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Adults
  • Identity is a topic that people may not think about as access
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Adults
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • In Australia 74.3 people access the internet but only 22.8 percent of people have broadband access.
  • you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Infrastructure can be very useful although on the other hand can be bad.
  • Education is very important as well
  • Censorship is another problem although it can also be helpful
  • Identity is a topic that people may not think about as access
  • positive thing because now you can show your identity to other people around the world
    • Ivy F.
       
      this will help many people, i should hope!
  • Digital Divide is probably the most important and simplest topic
  • They can get internet on computers by joining a local wi-fi like at a coffee shop, at school, or at a business. Digital Access is how everyday people access their computers and the Internet.
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • mostly go to websites that have games for kids to play. Millsberry, Build a bear, Webkinz, and Club penguin are all places that children could create their own animated avatar type stuff
  • Censorship is when you are not allowed to do something and if you do you will be in trouble by the government. For example, in China they have censorship and they are not allowed to look certain things up on the internet
  • Digital Divide is basically having a line and putting the people that don’t have access to the internet on one side and the ones that do on the other side.
    • hannah h
       
      The digital divide here in south Georgia USA would be like those people who have high speed internet vs. those who have dial up or don't have INternet that are in the country.
  • one of the main problems for adults and kids with accessing the Internet around the world is, simply, their location. People who live in the city would have no problem finding a computer to go on the Internet and do as they want,
  •  
    this is the Access page. from last year.
  •  
    Access page from 2008
Christine Davis

untitled - 1 views

  • CHILDREN in Bahrain are to get 'driving lessons' - in cyber-space. They are to be taught how to navigate their way around the electronic world of computers and the Internet under a GCC-wide scheme. Children aged up to 12 in schools across the country are to be included in the free International Computer Driving Licence (ICDL) digital literacy certification scheme. The scheme's governing body, the ICDL GCC Foundation, is offfering free ICDL certification to thousands of children across the region. The initiative, which started in September this year, aims to develop computer literacy at an early age, to prepare Arab youngsters to use information technology as a tool for education.
Hayes G.

Privacy - Wikipedia, the free encyclopedia - 0 views

    • Hayes G.
       
      Privacy is something that everyone needs to have, especially on the internet.
  • Privacy (from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively
radhika chatterjee

Using the Internet to Increase Access to HIV information :: United Nations Development Programme :: China - 0 views

  • The internet has long been identified as a key platform to increase user’s access to HIV awareness and prevention information. Current internet based interventions consist of establishing websites and chat rooms. However, these mechanisms alone have been ineffective in providing key access to the majority of internet users.
  • This partnership builds on UNDP’s ongoing efforts to increase access to HIV awareness information to millions of Chinese by working with commercial media and advertisement companies, government partners, production companies, people living with HIV and UN partners.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
    • anonymous
       
      Impact > government
anonymous

AMAX Information Technologies | NVIDIA® Tesla™ High Performance Computing (HPC) Solutions - 0 views

  • Ideal for life sciences, geosciences, engineering & sciences, molecular biology, medical diagnostics, electronic design automation (EDA), government and defense, visualization, financial modeling, and oil & gas applications.
    • anonymous
       
      How speed changed the way we interpert data, and work with different ideas.
Ivy F.

Censorship - Wikipedia, the free encyclopedia - 0 views

  • Censorship is the suppression of speech or deletion of communicative material which may be considered objectionable, harmful, sensitive, or inconvenient to the government or media organizations as determined by a censor.
  •  
    this on CENSORSHIP
Vicki Davis

Can the law keep up with technology? - CNN.com - 2 views

  • Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
  • it's typically difficult to predict or anticipate technology innovations.
  • Is the Web a unique, separate space or is it really an extension of real space?
  • ...7 more annotations...
  • "We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
  • the school provided alternative reasons for denying Snyder a degree
  • Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
  • In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
  • The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
  • "It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
  • "We should never expect that the judges are going to save us from our own worst impulses."
  •  
    An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues. This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
  •  
    Excellent article about the changing legal issues of the Internet.
Ridge C

Social interaction of virtual worlds - 0 views

  • According to Daden, there were four basic types of virtual worlds three years ago — gaming worlds like World of Warcraft, 3D chat platforms like IMVU, open virtual worlds like Second Life, and proprietary simulations used for training in businesses, government and education settings. There are technical reasons why game engines are used for gaming worlds rather than virtual world platforms, due better graphics and scalability. Similarly, simulations are often created using simulation engines.
‹ Previous 21 - 40 of 40
Showing 20 items per page