Skip to main content

Home/ Digiteen/ Group items matching "on" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Nolan C

Talk to Kids To Keep Them Safe On The Internet (VIDEO) - 2 views

  •  
    Grimes, a internet awareness specialist, has a point! Many careless teens are going on sites such as Facebook and putting things up on the site they aren't going to be able to fix when they decide they regret in! These teens are making careless mistakes that could effect how their life turns out in the future! We need to be careful about what we put on the internet! Being your child's friend on Facebook allows you to view what you need to see without breaking trust with you children! Its a win for both! Quote: "The best thing we can do is teach our kids what the pitfalls are," he explained during his Internet Awareness presentation. "What your kid posts at 15, it is going be searchable when they are 25, 35. Our kids are making mistakes for the whole world to see." "Grimes advised parents to be their child's "friend" on Facebook(NOTview through their child's page, because that would show lack of trust in your children) and see what they are posting online =. Parents should look at their child's "friend" list and find out how many are actually known and not claiming to a friend of a friend. When children are young, they are told not to talk to strangers, however with social networking the warning does not always get followed. " "Cyber Bullying is not a technology problem, it often involves friends or former friends hurting one another. He described Cyber Bullying as a small version of what terrorists do - try to alter lifestyles - in these cases those of individuals or a small group."
  •  
    Tom Grimes told parents the Internet and social networking can be wonderful tools but they must be used wisely and their children probably do not understand how to do that and it can put them at risk. "The best thing we can do is teach our kids what the pitfalls are," he explained during his Internet Awareness presentation.
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | For Locals, By Locals - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
Sage S

Five clues that you are addicted to Facebook - CNN - 0 views

  •  
    A 12 year old girl can not get help from her Mom on her homework because her mother is to busy on Facebook.She preferred that her name not be used because she is ashamed of the time she spends on the computer, which is generally 20 hours a day. Half the time for work and half the time for fun. She says she can go a whole day without Facebook, but she has never made it through a whole weekend. She has tried her hardest to cut back on her social networking time but she can't do it. Quote: "It's turned into a compulsion-- a compulsion to dissociate from your real world and go live in the Facebook world." -Paula Pile, a marriage and family therapist in Greensboro, North Carolina
Riya P

How to keep your child safe on Facebook - 0 views

  •  
    These are more tips for a parent to help their child stay safe and away from predators on facebook. "In order to keep your child's identity safe on their Facebook account you will want to talk to them about what they should and should not put in their profile. Profiles contain personal info and recent activity. It would be wise to have your child put some false information on there to mislead people who are trying to steal their identity."
Caitlin Roberts

Be Web Aware - Cyberbullying - 2 views

  • Cyberbullying
  • In school ... you don't want anyone to think of you as a "gossip" or someone who says things about other people. Everyone wants to be "nice." You don't have to be nice if you don't want to online. 13 year old girl, Edmonton
  • There is little doubt that cyberbullying, which can be the equivalent of "social death" for many young people, is traumatic. It differs from traditional, face-to-face bullying in that it is relentless and public and at the same time anonymous. Cyberbullying has turned the usual image of "the bully" on its head; it's no longer only the "tough kids" who may act aggressively – it can just as easily be the shy, quiet types, hidden behind their computers. Added to this is the potential presence of countless, invisible witnesses and/or collaborators to the cyberbullying, which creates a situation where victims are left unsure of who knows, and whom to fear.
  • ...3 more annotations...
  • Technology also extends the reach these young people have, enabling them to harass their targets anywhere and at anytime. While these situations should be reported, it can be difficult for young people to step forward: how do you report an attack that leaves no physical scars and is committed by a nameless attacker? Will the consequences of telling an adult that you are being cyberbullied be worse than the bullying itself? Adults want to help, but many feel ill-equipped to handle bullying in a digital world.
  • On social networking sites, you can now tag images with the names of people who are in the photo. This simple act can lead to cyberbullying, as these photos will appear in any search into this persOn’s name and it could be that misappropriated profile settings do not protect access to them.
  • Multiplayer online games and virtual worlds can be venues for harassment and cyberbullying when kids are playing or using the chat features to talk to other players. According to a 2008 Pew Internet & American Life Project report, more than half of teens who play games report seeing or hearing “people being mean and overly aggressive while playing”; a quarter of them report that this happens “often.”
  •  
    Students need to know that cyberbullying is dangerous: it can take lives, it can ruin lives, and it is not acceptable behavior for us. We are supposed to be the enlightened generation, so why don't we act like it?
  • ...2 more comments...
  •  
    Cyberbullying is probably one on the worst kinds of bullying. Its a type of bullying that never stops and never goes away. Bullies who are online can cause people to take their own lives. This isnt acceptable behavior for anyone.
  •  
    I agree with Brenna Edwards. It is one of the worst also because at school, only a hand full of people may see it, but online everyone can see it. No one should cyberbully
  •  
    I think that Brenna is right. It is really bad that people bully on the internet.
  •  
    Cyberbullying is probably one of the worst types of bullying because you can't figure out who the bully is to put a stop to it. Cyberbullies don't know how serious this is, people take their own lives because of it.
William B

Internet addiction changes brain similar to cocaine: Study - HealthPop - CBS News - 0 views

  • iStockPhoto (CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS one, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves DogsAre social networking sites turning teens into substance abusers? The researchers found more patterns of  "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowden Jones, consultant psychiatrist at Imperial College in London, who runs the U.K.'s only clinic for Internet addicts, said hardcore gamers are more likely to be addicted to the Internet. "The majority of people we see with serious Internet addiction are gamers - people who spend long hours in roles in various games that cause them to disregard their obligations," Jones told The Independent. "I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game." According to the independent, an estimated 5 to 10 percent of Internet users are unable to control their usage and are considered addicts.
  •  
    Internet addiction is just as harmful to your brain than alcohol. you don't need to damage you brain so dont drink or get addicted to anything. "(CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS one, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves Dogs Are social networking sites turning teens into substance abusers? The researchers found more patterns of "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowde
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Maggie H

Teens addicted to internet 'more likely to be depressed, angry and use drugs' | Mail Online - 1 views

  • In findings that will worry parents across America, researchers said going online was such a compulsion for some High School students that withdrawing could cause serious medical and psychological consequences.
  • Researchers found that one in every 25 teens had 'problematic Internet use' - and these students were most likely to report serious problems when not online.
  • Asian and Hispanic students were most likely to qualify as problematic users --
  • ...1 more annotation...
  • irls were more likely to answer yes to one of the questions on problematic Internet use, but more boys said they spent in excess of 20 hours a week online -- about 17 per cent of boys, compared to 13 per cent of girls.
  •  
    Boys are more likely to spend more than 20 hours a week on the internet. one in every 25 teens are extremely addicted to the internet and might have health issues if they are forced to stop using it.
Blakelee H

How Do Computers Affect The Social Behavior Of Children? | LIVESTRONG.COM - 3 views

  • Effects of Moderate Use A moderate amount of computer use and game playing doesn't seem to affect social development. The social behavior of moderate computer users and nonusers was roughly the same in terms of sociability and relationships with friends and family. However, heavy computer users tended to believe they had less control over their lives than their classmates, a possible indication of inadequate socialization. Increased Hostility and Aggression After the massacre at Columbine High School in 1999, researchers and educators paid more attention to violent video games such as Doom, the daily game of choice for one of the two teenage killers. Many studies show that violent TV shows increase aggression and hostility in both children and adults. It appears the same is true of computer games. The key variable appears to be a preference for violent games, rather than the amount of time a child plays such games. Even playing Mortal Kombat for a short time increases a child's hostility and aggression. Violent computer games also desensitize children, who show less empathy and willingness to help others, according to research cited in "The Future of Children." Brain Drain In a small study of 18 Chinese university students, published in the "PLos onE" journal and reported on Mail online, kids who played games on their computers at least eight hours a day, six days per week showed alarming amounts of atrophy in parts of their brain, as measured by MRI scans. The scans also found abnormalities in the white matter of the brain, which coordinate communication between different areas of the mind. on Mail online, Dr. Aric Sigman of the Royal Society of Medicine called the July 2011 report a "wake-up call." Experts fear that in addition to cognitive damage, heavy Internet use might reduce the inhibitions and decision-making ability of children, leading to damaged relationships with family members, peers and authority figures.
  •  
    Moderate use of internet and computers do not affect young people. Heavy use, however creates increased hostility and aggression, and can cause one to become "brain dead."
Vicki Davis

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneyland | TIME.com - 6 views

  •  
    It is legal for a prospective employer during a job interview to ask you to log into your facebook page and click through your friends only posts, photos, and messages. This is a very important topic for digital citizens to understand.
  • ...7 more comments...
  •  
    This is an important article. I'm going to discuss it with my Digiteen class this morning and have them comment here.
  •  
    I don't think that is fair. The employer has no right to be a part of their personal life. Although, they need to know about what they say on the internet. I would not want someone i don't know looking at my profile page.
  •  
    This is a good and a bad thing. It is a good thing because if someone is bad than you know not to hire them. it is a bad thing because people should not be judged on what their friends post. Just because their friends might post bad things does not mean that they are bad.
  •  
    Well, for me the act of "shoulder surfing" is good as well bad. It is good because as an employer if I don't know the maybe future employee this would be good to base my opinion on whether or not to hire them. This also can be bad, as the future employee may have private conversation with his or her wife that they do not want anyone to see (this is just to give an example).
  •  
    I guess i could understand why they have this. I personally like this idea in most ways, but not all. For example, its good for finding if the person your employing is a criminal, or someone bad. But its kind of bad because what if someone is not accepted because they were talking with a 'special someone' and the employers saw. That doesn't really seem fair to me, because that is your personal PERSonAL info, and no one else needs to see it besides you and who you are talking to. Unless of course its about something bad like planning something illegal. The main downside i see in this is maybe that person created a fake Facebook that looks all great and seems like they are a good person. Then a not-so-good person might have gotten a job that they wouldn't have gotten otherwise. I can't really decide if this is good or bad, but for now, I'm going to say it's bad.
  •  
    Well i think it is 50/50, because you have to be careful of what you put out there. And i don't think they should go on your friends facebook account to look at there posts and not yours! I also don't think they should judge you by your friends!
  •  
    I dont know exactly if this is fair or not. I can see where employers are coming from by wanting to see their possible employees facebook account, but i also think that a lot of the stuff that we may post may be completely personal while being completely innocent. everyone needs privacy and if they decide to do that through facebook then they have the right.
  •  
    I think its a good video to watch because it definitely made me think. The video also scared me even thought i don't have a Facebook. I now know how to stay safe if i get one.
  •  
    I think that the post is mean. I don't really like the post because it makes the person look bad.
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. on more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. one-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Vicki Davis

FOXNews.com - Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - Science News | Science & Technology | Technology News - 1 views

  • An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
  • Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
  • 85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someOne about it.
    • Vicki Davis
       
      This is important research to share.
  • ...10 more annotations...
  • Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
  • she went to a mental-health clinic
  • assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
  • They think that’s just part of online life,
  • Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
  • Cyberbullying peaks in 4th and 7th grade
  • 4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
    • Vicki Davis
       
      This is essential to discuss in 4th and 7th grades as this says these are the places where this happens most.
  • The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
    • Vicki Davis
       
      Taking cell phones is part of cyberbullying.
  • “This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
    • Vicki Davis
       
      Friends don't ask friends for passwords, that is an important thing to share!!
  • October as National Cyber Security Awareness Month,
    • Vicki Davis
       
      October - National Cyber Security Awareness Month
  •  
    Important article about cyberbullying and some recent legislation.
  •  
    Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children. There are mention of several websites including one I'd never heard of called CyberBully Alert.
Garrett E

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with On-line access scored higher in the areas of informatiOn management, communicatiOn, and the presentatiOn of ideas. According to One article the use of instructiOnal technology offers great promise in helping "students become independent, critical thinkers, able to find informatiOn, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
Vicki Davis

Neustar Launches Social Media Digital Citizenship Program for  Kentucky Schools | EON: Enhanced ONline News - 0 views

  •  
    A program from Neustar to Kentucky schools about Digital Citizenship. Lots of people are jumping on this "bandwagon." I think my biggest concern is that: #1 It needs to be "real" and not based on preachy scare-based tactics #2 Students should talk with those who share the program - if it is just videos and worksheets, that doesn't cut it.  #3 To talk about and learn social media, you should be doing it. (That is what we do on Digiteen.) a major new initiative to bring social media digital literacy education to students across the state of Kentucky through a program called "My Digital Life." Neustar will partner with EverFi, Inc., a leading education technology company, to provide this innovative, online student experience to all Kentucky schools interested in teaching and certifying their students in digital literacy skills and responsibility. Most importantly, Neustar's partnership is making the cutting-edge program available free of cost to the schools and state.
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Dru F

Global digital divide - Wikipedia, the free encyclopedia - 0 views

  • The global digital divide is a special case of the digital divide, the focus is set on the fact that "Internet has developed unevenly throughout the world" [7] causing some countries to fall behind in technology, education, labor, democracy, and tourism. The concept of the digital divide was originally popularized in regard to the disparity in Internet access between rural and urban areas of the United States of America; the global digital divide mirrors this disparity on an international scale.
  •  
    "The global digital divide is a special case of the digital divide, the focus is set on the fact that "Internet has developed unevenly throughout the world" [7] causing some countries to fall behind in technology, education, labor, democracy, and tourism. The concept of the digital divide was originally popularized in regard to the disparity in Internet access between rural and urban areas of the United States of America; the global digital divide mirrors this disparity on an international scale."
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Savana R

How to Deal With Facebook Stalkers: 11 steps - wikiHow - 0 views

  •  
    Stalkers are all over Facebook and that is the most populated place on the internet these days. Everyone needs to be cautions on the internet because you don't know who could be watching you. "Dealing with a situation of being stalked on Facebook can be complicated by the fact that Facebook causes us to view our connections as "friends". That can make getting rid of these stalkers tough, because they just don't seem to go away, and you don't want to be mean to them. Yet, allowing their behavior to diminish your enjoyment of Facebook is no option at all, and there are some things you can try to get them to stop Facebook stalking."
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite Browser - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Kelby W

Internet Use Raises Privacy Concerns - 0 views

  •  
    We need to be more alert about who we chat with how we use the internet.  "The Internet brings us great websites full of information and entertainment, and email and chat have revolutionized communication. But there's a dark side, too, as Internet users are increasingly concerned about how much of their personal information they're giving up in exchange. VOA's Art Chimes reports on the debate over Internet privacy. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we're disclosing, but which advertisers and commercial websites can use to sell us goods and services. Sometimes the information is openly requested: you register on a website and you fill out a form. Next time you log into the site, you find ads for sporting equipment if you registered as a young man, or maybe cosmetics if you're a woman. Other times, websites and advertisers seem to magically know our interests. They can do this because of cookies, little text files created on your computer that contain information left there by the websites you visit"
« First ‹ Previous 41 - 60 of 584 Next › Last »
Showing 20 items per page