Skip to main content

Home/ Digiteen/ Group items matching "Internet" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Callie S

Online Safety - 0 views

  • How could we live without the Internet?
  • Smart Surfing First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers Most credible people and companies will never ask for this type of information online. So if someone does, it's a red flag that they may be up to no good.
  •  
    safety and security
  •  
    How could we live without the internet? The internet plays a big role in our lives. Teens surfing the internet is a big problem now days because they are looking at things that they don't need to be looking at. Quotes: 'But besides the millions of sites to visit and things to do, the internet offers lots of ways to waste time - and even get into trouble. And just as in the non-cyber world, some people you encounter online might try to take advantage of you - financially or physically.' From the Website.
  •  
    educational website for teens, parents and kids
hannah h

Internet access - Wikipedia, the free encyclopedia - 0 views

    • hannah h
       
      This shows the many different ways of internet access.
  • Internet access refers to the means by which users connect to the Internet
  • Wireless connections
  • ...3 more annotations...
  • History and types of connections
  • Power line
  • Methods and venues of connection
  •  
    This page shows the many important internet access.
Erin B

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the internet right to your TV via a Netflix ready device. "
brooke s

digiteen2008 - Digital Law - 0 views

  • This is the electronic responsibility for actions which says if something is ethical or unethical. The responsibility of the digital law deals with the ethics of technology as a whole. Digital Law deals with four main topics: copyright, privacy, ethical issues, and piracy. Unethical use of computers can form into theft or crime like piracy. People that are ethical in the use of their computers may actually be the ones being hurt by those who are not following these protective laws. A student should not be allowed to mess with other peoples work or identity with rules being applied. We have the digital Law to basically protect us; since most people don't follow it, the internet is becoming a very dangerous place.
    • brooke s
       
      this paragraph explains the four main topics dealing with the "Digital Law"
  • . There are so many new illegal ways to get what you want and not get caught that it is very hard to find the causes of viruses and other crimes. Some problems with Elementary students are that they can get on sites too mature for their age. The information on these sites may be inappropriate for their age group. Another problem may be that older people may harass them. There are also some problems with Middle/High school aged students. They may get on sites such as MySpace or Facebook and lie about their age, name, or any other aspects of their lives. This is not a very smart act considering that later they may be abused. They may use bad language on the internet or chat rooms. Predators can trick some teens that are unaware of such dangers into meeting up with them. Parents/guardians are unaware of what teens are looking at and/or doing and therefore cannot stop them from seeing and/or doing inappropriate things.
    • brooke s
       
      This paragraph explains the dangers on the internet.
  • Some teens download illegal music such as Limewire or Bearshare.This affects not only the artist, but record producing companies.
    • brooke s
       
      using internet wrongly could hurt other people financially, such as music artists and producers.
  • ...3 more annotations...
  • There are also some problems with adults. Using bad language, harassing and trapping youth, and the buying and selling of illegal merchandise are just some of the problems the adult generation faces today. Many adults are very sneaky and can use tricks to socialize with young adolescents. Some adults use Facebook, Myspace, or chatrooms to trick younger people into meeting up with them. These are just some of the main problems our generation of all different ages faces in this day and time.
    • brooke s
       
      More dangers of the internet.
  • Breaking the law: On the internet you will come upon websites that will be breaking the law and you can report this to "NETALERT" www.neralert.vic.a, they will contact the authorities and put a stop to the website. Another problem is copyright. There is an easy solution to this problem though, and this solution is creative commonscreative commons is a site that lets you easily make your own copyright laws for your work. There are rules like no one can make money off of your work, no one can change the appearence of your work, and many more. By making it a law that people have to use creative commons to put anything on the internet, you can reduce the amount of copyright laws broken. Making adults aware of the consequences of their actions should help the problem dramatically. Most adults break digital laws thinking, " Oh yeah, sure, I'm not going to get into any trouble." when in fact they are on the verge to getting very serious legal punishment.
    • brooke s
       
      more on breaking the internet law
  • There is a very interesting controversy brewing in Orange County, Florida. A 13-year-old girl Alisha Dean has a MySpace page that portrays herself as a 19-year-old divorced woman. She has been accused about lying to two men — Morris Williams, 22, and Darwin Mills, 24, about her age in two separate incidents. Both have been convicted and sent to jail for statutory rape. Digital Law for Middle School students not only has to deal with privacy but copyright and piracy.
    • brooke s
       
      controversy with young people lying about their age
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | For Locals, By Locals - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Kellie C

A Clash of Cultures on the Internet - 0 views

  • In these cultural clashes, advertisers compare the Internet to magazines and newspapers (where most people expect ads) while Internet diehards compare the Internet to telephones and interpersonal conversations (where ads would be considered intrusive). In fact, Internet areas such as Usenet are areas of two-way communication where, unlike newspapers and magazines, anyone can post messages and contribute equally to the content. Yet, unlike telephone conversations, these areas are disseminated widely, which is what attracts those interested in advertising
  •  
    This website tells you the history and what has happened with culture clashes on the internet.
Joseph Edore

GetNetWise | Online Safety Guide - 0 views

  • Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.
KaylaS_mca MCA

What is Internet Addiction - HealthyPlace - 0 views

  •  
    Learn about the five types of Internet addiction and take our Internet addiction test.
Nolan C

Talk to Kids To Keep Them Safe On The Internet (VIDEO) - 2 views

  •  
    Grimes, a internet awareness specialist, has a point! Many careless teens are going on sites such as Facebook and putting things up on the site they aren't going to be able to fix when they decide they regret in! These teens are making careless mistakes that could effect how their life turns out in the future! We need to be careful about what we put on the internet! Being your child's friend on Facebook allows you to view what you need to see without breaking trust with you children! Its a win for both! Quote: "The best thing we can do is teach our kids what the pitfalls are," he explained during his internet Awareness presentation. "What your kid posts at 15, it is going be searchable when they are 25, 35. Our kids are making mistakes for the whole world to see." "Grimes advised parents to be their child's "friend" on Facebook(NOTview through their child's page, because that would show lack of trust in your children) and see what they are posting online =. Parents should look at their child's "friend" list and find out how many are actually known and not claiming to a friend of a friend. When children are young, they are told not to talk to strangers, however with social networking the warning does not always get followed. " "Cyber Bullying is not a technology problem, it often involves friends or former friends hurting one another. He described Cyber Bullying as a small version of what terrorists do - try to alter lifestyles - in these cases those of individuals or a small group."
  •  
    Tom Grimes told parents the Internet and social networking can be wonderful tools but they must be used wisely and their children probably do not understand how to do that and it can put them at risk. "The best thing we can do is teach our kids what the pitfalls are," he explained during his Internet Awareness presentation.
Andy J

iLearn Technology » Blog Archive » 16 of the Best Internet Safety Sites for Kids - 1 views

  •  
    This page shows you 16 of the best websites for children. It is very useful and helps out a lot. Quotes: 'This is the time of year when I am usually introducing Internet Safety to my students. Internet safety is something I really stress in the computer lab. We hit it strong in the beginning of the year and revisit it several times throughout the rest of the year. If you are using the Internet with students, Internet safety needs to be covered.'
  •  
    Digiteen research website 16 of the best internet safety sites for kids
Dru F

Global digital divide - Wikipedia, the free encyclopedia - 0 views

  • The global digital divide is a special case of the digital divide, the focus is set on the fact that "Internet has developed unevenly throughout the world" [7] causing some countries to fall behind in technology, education, labor, democracy, and tourism. The concept of the digital divide was originally popularized in regard to the disparity in Internet access between rural and urban areas of the United States of America; the global digital divide mirrors this disparity on an international scale.
  •  
    "The global digital divide is a special case of the digital divide, the focus is set on the fact that "Internet has developed unevenly throughout the world" [7] causing some countries to fall behind in technology, education, labor, democracy, and tourism. The concept of the digital divide was originally popularized in regard to the disparity in Internet access between rural and urban areas of the United States of America; the global digital divide mirrors this disparity on an international scale."
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Dru F

Netiquette: Rules of Behavior on the Internet | Education.com - 0 views

  • The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules.
  •  
    "The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules."
Iyanna W

Netiquette: Rules of Behavior on the Internet | Education.com - 0 views

  •  
    Being nice, and respectful on the Internet is something that everyone should do. There are many people who don't fallow netiquette rules, and it may be hurtful to people who don't understand our humor. These guidelines are just a set of rules that make the Internet a safe and happy place for everyone to use.
Abi W

U.S. Underwrites Internet Detour Around Censors Abroad - NYTimes.com - 0 views

  •  
    Some countries have a lot more internet filtering than we do. The United States lets people post what they want and say what they want online. Even if later on in life it might come back to them badly, it's still allowed. Other countries are a lot more strict. In some countries, if you type and publish a blog online that might be offensive, you'll get arrested. Second there are some places like Burma that haven't had internet since 2007. These are examples of how different other countries are from us and how global awareness varies in many places.
mercades c

Your personal safety on the Internet - UsingEnglish.com - 1 views

  •  
    This article disscuses personal safety on the internet. The article suggests that you don't give out your email adress. Next you should never give contact information to anybody. The tips are to not give out your personal information and to be carful about meeting someone that you talk to on the internet.
Hayes G.

Internet privacy: Could the US make Internet wiretaps easier? - CSMonitor.com - 0 views

    • Hayes G.
       
      This could be a bad thing because the government would be able to easily look at what you are doing on the internet.
  • The Obama administration is pushing to make it easier for the government to tap into internet and e-mail communications. But the plan has already drawn condemnation from privacy groups and communications firms may be wary of its costs and scope.
Audrey b

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
Riya P

Effects of Technology on Culture - 0 views

  • Technology has had an outstanding effect on modern society and culture.  It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter.  internet communities promote freedom of expression that may not be as feasible in real life.  Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously
  •  
    Cultrual! This is a really long article about how cultures overlap. "Technology has had an outstanding effect on modern society and culture. It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter. internet communities promote freedom of expression that may not be as feasible in real life. Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously"
« First ‹ Previous 41 - 60 of 364 Next › Last »
Showing 20 items per page