Skip to main content

Home/ Digiteen/ Group items matching "Digital" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
radhika chatterjee

Obama: Broadband, Computers Part of Stimulus Package - PC World - 0 views

  • To help our children compete in a 21st century economy, we need to send them to 21st century schools," Obama said
  • The plan will also include rolling out broadband, both to places where it isn't available and to health-care facilities, Obama said. It is "unacceptable" that the U.S. ranks 15th in the world in broadband adoption
  • Obama also called for hospitals to be connected to each other through the Internet. Modernizing the U.S. health-care system "won't just save jobs, it will save lives,"
  • ...1 more annotation...
  • "In our 21st-century society, having a connection to a fast and affordable Internet is no longer a luxury -- it's a public necessity," Josh Silver, executive director of Free Press, said in a statement. "Right now, more than 40 percent of American homes are not connected to broadband. This digital divide isn't just costing us our ranking as global Internet leader -- its costing us jobs and money at a time when both are urgently needed."
Julie Lindsay

Digital Safety in an Interconnected World - 0 views

  •  
    Proceedings from conference in UK
Julie Lindsay

The rigors of life unplugged - Los Angeles Times - 0 views

  •  
    Students try to go a week without any media devices.....!
James D

Stand Up For Your Digital Rights - Do You Have the Right to Be Informed if a Company Leaks Private Electronic Information About You? - Solutions by PC Magazine - 0 views

  • California is the only state where businesses are required to notify customers if the privacy of their personal or financial information is compromised. There is, however, a similar measure being discussed for New York State, and federal laws like California's may follow.
  • And one last thing to remember about your identity online is that posing as another person can get you in hot water.
Riley F.

digiteen09-2 - Health & Wellness - 0 views

  • Using your computer improperly could lead to various health injuries, such as Carpal Tunnel Syndrome also known as ''computer back''. Being aware of digital health and wellness could prevent such injuries.When you make the wrong choices on the internet by bullying someone, you could get in trouble but you could also get that person you are bullying to start thinking about suicide etc.
  •  
    what might happen if you aren't careful.
  •  
    This is so true. You never know what the person is going through that you are bullying. They could be having a lot of trouble in their life, and them someone comes along and bullies them online. Then they have no safe haven because even online they are being bullied. There is know escape. It is very possible they would start having thoughts of suicide. You would sure hate to know that you are part of why somebody little kid died. I know I wouldn't be able to live with my self.
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Steve Madsen

Worse than jail: sentenced to life on YouTube - 0 views

  •  
    "Our story yesterday about the laptop thief who returned it and apologised after an embarrassing clip of him dancing was posted on YouTube by the computer's owner"
Julie Lindsay

Why digital citizenship's a hot topic (globally) | NetFamilyNews.org - 1 views

  •  
    different definitions around the world
Haley M

Creative Commons - 1 views

  • Mission What is Creative Commons? Creative Commons helps you share your knowledge and creativity with the world. Creative Commons develops, supports, and stewards legal and technical infrastructure that maximizes digital creativity, sharing, and innovation.
  •  
    We are going to need to know about Creative Commons for our project. I hope this website helps you as well as me.
Margaret O.

How Students Use Technology to Cheat - 0 views

  • How Students Use Technology to Cheat
  • Academic dishonesty—ahem, cheating—has only gotten easier in the digital age. Students have Wolfram Alpha, Google, and crowdsourced question-and-answer sites like Quora at their fingertips. Students have cameras on their phones that let them take pictures of a test in an instant. Even Microsoft Word has built-in functionality that helps them game the system.
  • There's an old saying that students who cheat in their academic work are only cheating themselves. Today's professors still largely agree with this statement, with one telling me that it's like weight-training: "I can give them the information and I can coach them through the process, but if they don't put in the work, they will never see results."
  •  
    "I can give them the information and I can coach them through the process, but if they don't put in the work, they will never see the results." Students who cheat in their academic work by using technology to get past teachers who don't understand it are only cheating themselves.
Riya P

Kids and Electronics: New Study Shows Kids Spend More Than 7 Hours a Day With Electronics - ABC News - 0 views

  • The average kid sponges in 2.5 hours of music each day, almost five hours of TV and movies, three hours of Internet and video games, and just 38 minutes of old-fashioned reading
  • And that doesn't even include the hour and a half spent text messaging each day, and the half hour kids talk on the cell phone.
  • But what about homework?
  • ...1 more annotation...
  • members of the multitasking generation pays a price for their digital lives on their report cards.
  •  
    TECHNOLOGY>SCHOOLWORK? This article shows the studies on kids and how much time they spend with technology everyday. Average kid spends (everyday): 2.5 hrs. on music 5 hours of TV and music 1.5 hrs. on texting .5 hrs. on cellphone ONLY 38 minutes reading books!
Kerrie D

mtvU: Putting a Stop to Bullying, On and Offline - 0 views

  • "I wanted to team up with a problem or issue that I can contribute and relate to," Guadagnino explained. "I think people will listen to me because of who I am."
  • This tragedy was inspiration for one of the principal story-lines in MTV's new original movie, "(DIS)CONNECTED," a story of digital drama created to combat the growing issue of cyber-bullying.
  •  
    Website stating how important to stop cyberbullying. MTV's new movie "(DIS)CONNECTED". "I wanted to team up with a problem or issue that I can contribute and relate to," Guadagnino explained. "I think people will listen to me because of who I am."
Julia B

Faceted Id/entity:Managing representation in a digital world - 0 views

  •  
    This is explaining the consequences in the internet and stuff that follows. "Awareness empowers individuals, as it gives them the ability to understand their position in a given system and use that knowledge to operate more effectively. In social interactions, people want to be aware of their own presentation, of what is appropriate in the given context, and how others perceive them"
  •  
    How to be aware
Caitlin Roberts

Be Web Aware - Cyberbullying - 2 views

  • Cyberbullying
  • In school ... you don't want anyone to think of you as a "gossip" or someone who says things about other people. Everyone wants to be "nice." You don't have to be nice if you don't want to online. 13 year old girl, Edmonton
  • There is little doubt that cyberbullying, which can be the equivalent of "social death" for many young people, is traumatic. It differs from traditional, face-to-face bullying in that it is relentless and public and at the same time anonymous. Cyberbullying has turned the usual image of "the bully" on its head; it's no longer only the "tough kids" who may act aggressively – it can just as easily be the shy, quiet types, hidden behind their computers. Added to this is the potential presence of countless, invisible witnesses and/or collaborators to the cyberbullying, which creates a situation where victims are left unsure of who knows, and whom to fear.
  • ...3 more annotations...
  • Technology also extends the reach these young people have, enabling them to harass their targets anywhere and at anytime. While these situations should be reported, it can be difficult for young people to step forward: how do you report an attack that leaves no physical scars and is committed by a nameless attacker? Will the consequences of telling an adult that you are being cyberbullied be worse than the bullying itself? Adults want to help, but many feel ill-equipped to handle bullying in a digital world.
  • On social networking sites, you can now tag images with the names of people who are in the photo. This simple act can lead to cyberbullying, as these photos will appear in any search into this person’s name and it could be that misappropriated profile settings do not protect access to them.
  • Multiplayer online games and virtual worlds can be venues for harassment and cyberbullying when kids are playing or using the chat features to talk to other players. According to a 2008 Pew Internet & American Life Project report, more than half of teens who play games report seeing or hearing “people being mean and overly aggressive while playing”; a quarter of them report that this happens “often.”
  •  
    Students need to know that cyberbullying is dangerous: it can take lives, it can ruin lives, and it is not acceptable behavior for us. We are supposed to be the enlightened generation, so why don't we act like it?
  • ...2 more comments...
  •  
    Cyberbullying is probably one on the worst kinds of bullying. Its a type of bullying that never stops and never goes away. Bullies who are online can cause people to take their own lives. This isnt acceptable behavior for anyone.
  •  
    I agree with Brenna Edwards. It is one of the worst also because at school, only a hand full of people may see it, but online everyone can see it. No one should cyberbully
  •  
    I think that Brenna is right. It is really bad that people bully on the internet.
  •  
    Cyberbullying is probably one of the worst types of bullying because you can't figure out who the bully is to put a stop to it. Cyberbullies don't know how serious this is, people take their own lives because of it.
« First ‹ Previous 341 - 360 of 372 Next ›
Showing 20 items per page