Skip to main content

Home/ Digiteen/ Group items matching "Digital" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Vicki Davis

Totally Free Commercial Use Images ✔ The Ultimate Photo Resource Guide - 1 views

  •  
    As students work on projects, permissions for photos is important, this website lists 50 of the top places to get free photos.
Micah K

Ground Rules For Group Work - Art and Authenticity in the Digital Age - 0 views

  •  
    We should all remember that we all have our own opinions and thoughts, and that just because someone has a different thought than you, it doesn't mean that they are wrong. "-Respect each other's ideas -Respect the other group members -Don't interrupt each other -Everyone's opinion should count -Be honest with each other"
Haley M

Copyright Law - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • Copyright Law DefinedCopyright law, as defined in Title 17 of the United States Code, protects "original works of authorship fixed in a tangible medium of expression" for a limited period. Copyright protection includes, for instance, the legal right to publish and sell literary, artistic, or musical work, and copyright protects authors, publishers and producers, and the public.  Copyright applies both to traditional media (books, records, etc.) and to digital media (electronic journals, web sites, etc.). Copyright protects the following eight categories of works: literary works musical works dramatic works pantomimes and choreographic works pictorial, graphic, and sculptural works motion pictures and other audiovisual works sound recordings architectural works Ownership of a copyrighted work includes the right to control the use of that work. Use of such work by others during the term of the copyright requires either permission from the author or reliance on the doctrine of fair use. Failure to do one or the other will expose the user to a claim of copyright infringement for which the law provides remedies including payment of money damages to the copyright owner.
Callie S

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
Woody H

Internet Access and the New Divide - NYTimes.com - 0 views

  •  
    talks about how much america is online .
Woody H

For minorities, new 'digital divide' seen - USATODAY.com - 0 views

  •  
    it tells what race is more likely to use the internet. "latinos and blacks are more likely to access the web by cellular phones than the general public"
Blakelee H

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
October H

FTC Urges Congress to Pass Digital-Privacy Law - WSJ.com - 0 views

  •  
    "Frustrated by a flood of privacy violations, the Federal Trade Commission on monday issued a strong call for commercial-data collectors to adopt better privacy practices and called for Congress to pass comprehensive privacy legislation."
  •  
    This is a blog about the FTC wanting the Congress passing a new privacy law.
Taylor B

Nine Elements - 0 views

  • Nine Themes of Digital Citizenship
  •  
    These are some themes about how to use the internet properly and how to respect people while doing so.
Kelby W

Digital Literacy Resource - Privacy and the Internet - 0 views

  •  
    You should always think about what you are going to post before you do it.  "It's your profile, you can include what you want to include-right? Before you post, think. Are you prepared to have those words and images represent you for months, and even years to come? Your postings on profiles and to chats and blogs may have cyberlives much longer than what you might have imagined or intended, and may reach a much wider audience than you could have anticipated. This simple fact is illustrated in the following examples from around the country: Students who posted party photos online later found that those photos were used by their university's administration when it needed to make a case regarding alcohol abuse among minors. A student's application for a position as a resident advisor was rejected by university staff who reviewed the applicant's Facebook page and found the material there to be inappropriate. A graduate's job application was rejected when the hiring organization deemed objectionable some of the content he had posted online. Students were reprimanded for extreme and possibly libelous statements they made about a professor in Facebook postings. Are your online postings private? No, not at all. Many postings can and will be viewed by hiring committees, admissions personnel, marketing agencies, and other unintended audiences. Privacy is a complicated matter in American law, evoking everything from Fourth Amendment rights to civil rights. Explore the following topics to learn more about the ins and outs of privacy in the online environment."
Nolan C

Netiquette - 1 views

shared by Nolan C on 19 Mar 12 - Cached
  •  
    When talking to people on the internet that you don't know that well, it is important that you sound educated. Making sure you use spell check, and capitalize ketters where they should be capitalized, is important.
  •  
    Netiquette, a cyber word created by David Chiles, is synonymous with internet etiquette and digital manners. It is the social code of the internet. There are core rules and various other netiquettes. It comes from the combination network and etiquette.
Vicki Davis

Teens, Kindness and Cruelty on Social Network Sites - 3 views

  •  
    "Fully 95% of all teens ages 12-17 are now online and 80% of those online teens are users of social media sites." This important report that just came out November 8, 2011 looks into how studens are using these online sites. "88% of social media-using teens have witnessed other people be mean or cruel on social network sites." -- We have bystanders we need them to speak out. 25% of social media teens have had an experience on a social network site that resulted in a face-to-face argument or confrontation with someone. * 22% have had an experience that ended their friendship with someone. * 13% have had an experience that caused a problem with their parents
Gil Anspacher

Clive Thompson on Why Kids Can't Search | Magazine - 1 views

  •  
    All subjects need to teach students how to search for, analyze and utilize digital information within the subject area. Be grateful for your "how to search" teaching librarian.
Audrey b

GIC | Article - 0 views

  • Given the public interest in cyberbullying, we asked young people about it, only to be continually rebuffed. Teenagers repeatedly told us that bullying was something that happened only in elementary or middle school. ''There's no bullying at this school'' was a regular refrain.
  • Interventions must focus on positive concepts like healthy relationships and digital citizenship rather than starting with the negative framing of bullying. The key is to help young people feel independently strong, confident and capable without first requiring them to see themselves as either an oppressed person or an oppressor.
« First ‹ Previous 261 - 280 of 372 Next › Last »
Showing 20 items per page