Skip to main content

Home/ Digiteen/ Group items matching "texting" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Julie Lindsay

Classroom Resources to Counter Cyber Bullying - Portal Page - 0 views

  •  
    The Internet has created a whole new world of social communications for young people who are using e-mail, social networking Web sites, instant messaging, chat rooms and text messaging to stay in touch with friends and make new ones. While most interactions are positive, increasingly kids are using these communication tools to antagonize and intimidate others. According to a 2008 University of Toronto cyber bullying survey, nearly one in five Canadian students surveyed reported having been bullied online in the past three months.[1] An Alberta study found that one-third of students who had cyber bullied, had also been victims themselves.[2]
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
Mary Westbrook

Teen Texting Soars; Will Social Skills Suffer? : NPR - 0 views

  • At schools where cell phones are forbidden, 58 percent of students with mobile phones say they've sent a text message during class.
    • Mary Westbrook
       
      Teens are sacrificing grades.
Susan Davis

UWC Online - Online Etiquette - 1 views

  • Given the absence of face-to-face clues, written text can easily be misinterpreted. Avoid the use of strong or offensive language and the excessive use of exclamation points. If you feel particularly strongly about a point, it may be best to write it first as a draft and then to review it, before posting it, in order to remove any strong language.
  • If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion is also new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.
  • Although electronic communication is still young, many conventions have already been established. DO NOT TYPE IN ALL CAPS. This is regarded as shouting and is out of place in a classroom. Acronyms and emoticons (arrangements of symbols to express emotions) are popular, but excessive use of them can make your message difficult to read. Some common ones include:
  • ...6 more annotations...
  • Messages may often appear perfectly clear to you as you compose them, but turn out to be perfectly obtuse to your reader. One way to test for clarity is to read your message aloud to see if it flows smoothly. If you can read it to another person before posting it, even better.
  • You may be familiar with many of the previous points if you have participated in other forms of electronic communication in the past. But Web-based courses have some added constraints not present in other arenas. Keep in mind these additional four points:
  • Be as concise as possible when contributing to a discussion. Web-based courses require a lot of reading, and your points might be missed if hidden in a flood of text. If you have several points that you want to make, it might be a good idea to post them individually, in several more focused messages, rather than as a single, lengthy, all-encompassing message.
  • Contributions to a discussion should have a clear subject header, and you need to stick to the subject. Don't waste others' time by going off on irrelevant tangents.
  • Don't add your comments to a discussion before reading the comments of other students unless the assignment specifically asks you to. Doing so is tantamount to ignoring your fellow students and is rude. Comments related to the content of previous messages should be posted under them to keep related topics organized, and you should specify the person and the particular point you are following up on.
  • A key distinguishing feature of an online course is that communication occurs solely via the written word.
Becca B

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from your own. Consider others’ privacy. Be wary of your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
Susan Davis

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
RyanG_mca MCA

Communication - 0 views

  •  
    People this day in age feel they are "naked" without their cellphone. People need there cell phones and cannot live without them they feel that everyone has them and if they do not they are a nobody. There were several persons sitting at a table and all of them were talking to somebody not at the table on their phone. Too many people have cell phones and rumors and things get spread fast. You need to know how to use a cell phone correctly and not using it all the time and using "text speek" in school.
JeremyS_mca MCA

The Cell: It's a Selling Machine - 0 views

  •  
    Who would say yes to text-message ads? Plenty of people, perhaps. Even though costs and opt-in rules may keep some users safe from spam, cell-phone advertising could be the next big thing in the United States. Randy Dotinga reports from San Diego.
Kevin Shrestha

Nokia 1100 seemingly hackable, making a big comeback - 0 views

  •  
    Someone hacked a Nokia 1100 to "receive text messaged bank passwords"
radhika chatterjee

Capturing and Holding the Attention of The Contemporary Internet Surfer: GoArticles.com - 0 views

  • he online forum has been changing the way we grab attention, and the way we give it. In the world of cyberspace, fewer and fewer people have the concentrative patience to devote long moments of attention to text.
  • Animated graphic ads and dynamic sound effects succeed in getting but not holding attention. The average internet surfer just does not have the mindset to settle on the details, and that's what a web manager wants them to do.
    • radhika chatterjee
       
      This fits in with the needs ofthe NetGen.
  • The internet format provides a unique opportunity to use blends of imagery both motion and still, sounds both effects inspired and content driven, and text both bulleted and extrapolated. We are seeing more intelligent and blended use of these mixed media methods, and the population responds to it.
  • ...1 more annotation...
  • Entertainment is a huge content sector, but so is education. Cooking shows, healthcare issues, charity efforts, financial advisors, and a near infinite list of additional subject potentials lend themselves to the task of effectively capturing and holding the attention of large bodies of internet traffic.
James D

Stand Up For Your Digital Rights - Do You Have the Right to Be Informed if a Company Leaks Private Electronic Information About You? - Solutions by PC Magazine - 0 views

  • California is the only state where businesses are required to notify customers if the privacy of their personal or financial information is compromised. There is, however, a similar measure being discussed for New York State, and federal laws like California's may follow.
  • And one last thing to remember about your identity online is that posing as another person can get you in hot water.
Erin B

E-Commerce News: E-Commerce - 0 views

  •  
    This seems like a new way advertisers may be using ecommerce to their advantage. "Smartphones Get More AdSense October 05, 2009 Google has developed a new JavaScript snippet for AdSense aimed at high-end mobile phones, giving advertisers yet another option for using its mobile platform. The new feature allows publishers to run larger-scale text and image ads on smartphones. As more people use these devices, more advertisers want to be able to target them, noted a Google engineer in a blog post on the rollout."
d l

Shocking statistics and video about texting while driving | SafeTeens.com - 1 views

  •  
    This covers all the info on health with technology.
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
Johnny H

Fair use and theft | Kris Straub | humor scientist - 0 views

  •  
    "The reason why eBaumsworld gets away with so many video thefts is that there's no way to search for a video or picture if it doesn't have associated text you could search for." I think that every video and picture should have associated words so no they could not take the video and take credit for it.
Margaret O.

If We Can Change The Way We Communicate, We Can Change The Way We Educate | Fox News - 0 views

  • Many American classrooms are almost indistinguishable from those that students' grandparents attended.  Twenty-something students still sit in desks facing the front of the classroom, with textbooks, listening to a generalist teacher.
  • A new perspective is needed.  Americans need to consider the fundamental question:  How can we most effectively teach kids the skills they need? 
  • Traditional schools may be best for some students, while others will thrive in moire high-tech learning centers. 
  • ...3 more annotations...
  • Parents can augment or even replace their children's traditional school experience with programs from companies like K-12.  This service allows parents to enroll children in virtual schools or purchase specific curriculum.  Traditional materials—worksheets, books, and other physical materials—are combined with online resources, including multimedia presentations. 
  • If We Can Change the Way We Communicate, We Can Change the Way We Educate
  • Steve Jobs' passing last week encouraged Americans to consider how technology has transformed our lives.  Fueled by the creative genius of men like Jobs, new technology has emerged allowing us to better keep in touch with friends and family, access entertainment and information, and perform work from home or wherever we happen to be at that moment.  While we've successfully integrated technology into our workplaces and personal lives, we've been comparatively slow to apply technology's power to other areas of life, like education.  That needs to change.
  •  
    This changes parents' perspectives about letting their child use technology.
  •  
    This article is about changing our environment to meet modern needs
  •  
    Riya & Margaret, Why do you think education is so slow to change the traditional education paradigm?
Merritt D

Let's keep children safe in the cyber age | BlueRidgeNow.com - 2 views

  •  
    I firmly believe as a child of a very "nosy" mother, that I is the parents duty to keep their children in check, but I do not agree with this! If you don't trust you child enough to NOT read their messages, then maybe they don't need one! All this does is give them doubts of your trust, they will feel as if you are invading their privacy, and will be deleting things constantly. Parents need to understand that trust works both ways. This conversation is going to be award and neither the parents nor the child wants to have it, but you need to. It's one way of protecting your child without destroying their trust and doubting yours! Quotes: "I routinely check the texts and photos on their cell phones," says Susan Kain." "let's all talk to our children about Internet safety, social networking sites and "sexting."
Sage S

Are Your Tech Habits Hurting Your Grades? - NYTimes.com - 0 views

  •  
    As teenagers we are always faced with certain distractions and time-wasters, but our cell phones, social networking places, and other technology are by far the worst. It is proven that it is more powerful for younger people because our brains are just now developing and can easily be habituated. When you are trying to do your homework and you hear your phone beep alerting you that you have a new text message, what do you do? Continue studying or rush to you phone to check this new message? If you rush to your phone, it might be time to try to set a limit on your use of technology. Quote; "The worry is we're raising a generation of kids in front of screens whose brains are going to be wired differently." - Michael Rich, an associate professor at Harvard Medical School and executive director of the Center on Media and Child Health in Boston.
Sage S

Documentary on Addiction on Technology - 0 views

  •  
    A two minute video on Technology Addiction becoming a problem in today's world. Do you think you might be addicted if you fake to go to the bathroom during dinner, just so you can check your email, reply to a text message or check your Facebook? Quote: "People post how it's changing their lives, how wired we are. Everyone is hungry to talk about this subject." - Filmmaker and Webby Awards founder Tiffany Shlain
« First ‹ Previous 41 - 60 of 86 Next › Last »
Showing 20 items per page