Skip to main content

Home/ Digiteen/ Group items matching "sharing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Becca B

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
Haley M

Creative Commons - 1 views

  • Mission What is Creative Commons? Creative Commons helps you share your knowledge and creativity with the world. Creative Commons develops, supports, and stewards legal and technical infrastructure that maximizes digital creativity, sharing, and innovation.
  •  
    We are going to need to know about Creative Commons for our project. I hope this website helps you as well as me.
Johnny H

Fair Use - Columbia Copyright Advisory Office - 1 views

  •  
    " When do you need to think about fair use? Some example situations: Uploading materials to CourseWorks or another server. Clipping and copying materials into innovative teaching tools. Posting materials for distance learning. Developing databases of copyrighted works for research. Sharing articles and other materials with colleagues. Developing digital libraries. Placing copies on library reserves." this tells you about when you need to think about fair use while doing something for school, work, or a project.
Garrett E

Women's Online Habits Study | WebProNews - 0 views

  •  
    Women are also inflicted with habits online. Microsoft studies have given us interesting findings: 16 percent would have a high tendency to shop, communicate, and employ digital devices; 86 percent share their "finds" to others in their time; If forced to, they would "throw out" their television or cell phone first; only 11 percent would throw out their personal laptop; email is overwhelmingly, 85 percent, the most important tool.
Merritt D

How to be a better Cyber Citizen and stay safe online - Fort Lauderdale Parenting Teens | Examiner.com - 0 views

  •  
    How do your teens treat their friends - online? Teaching our kids and teens respect starts from a young age, however when it comes to technology, parents need to understand it is just as important to continue the lesson of respect digitally.
  •  
    How to be a cyber citizen and stay safe online are major topics in this day and age. Many people (not just teens) need to learn that respect should be carried into the digital world. Ten ways to be a better cyber citizen: 1.) Understand the technology available to protect you and your family's digital identity 2.)Consider using a personal security device when going online 3.)Use antivirus and antispyware software 4.)Teach family & friends about the importance of strong passwords 5.)Get involved in your child's online life 6.)Report cybercrime 7.) Protect your home or small business Wi-Fi network 8.) If you're a parent, consider parental control systems for Internet access on 3G mobile phones 9.) If your bank does not provide a smart bankcard, know the other safe ways to shop online 10.) Don't share information with web sites you don't trust
Brandon P

Online Safety Tips - 0 views

  •  
    "Online Safety Tips Safe Internet Surfing Tips for Parents and Kids Top Ten Tips for Parents to Share with their Kids About Online Behavior"
Morgan S.

teachers | Idea Flight - 0 views

  •  
    "Idea Flight is the only tool you need to share your ideas easily on iPad. Captivate your audience in a whole new way, keep everyone on the same page and network on the fly." Westwood beta tested Idea Flight on iPads that they sent over. It was presentation/learning app that help the teachers "fly" us through the lessons at her own pace, keeping all the student on the same page (unless she unbuckled our seat belts.) It was very cool having the presentation right in the palm of your hand so you could be up close and personal with the presentation.
Haley W

Google's Vic Gundotra says Facebook overshares - Oct. 19, 2011 - 0 views

  •  
    This is about how the google guys think facebook is oversharing and people write everything on there. 
  •  
    talks about how facebook overshares stuff.  and how not everything that is on our minds, neccisarilly needs to be shared.
Joey R

Digiteen 11-3 - Tagging Standards - 0 views

  •  
    new iphone operating system it allows people to share sources or known as websites
WestR WHSB

Photography Copyright Protection: Online Resources ‹ Photography business insights & tips - photo sales & marketing discussion | PhotoShelter blog - 0 views

  •  
    Protection of copyrighted photographs  "Yes, getting your work online exposes you to risk of theft." "Shut everything down and only share images when asked directly by a potential client. This is obviously a really bad idea," -understand rights to your works -prevent theft of your works by knowing what to do if someone steals
Vicki Davis

danah boyd | apophenia » Why Parents Help Children Violate Facebook's 13+ Rule - 2 views

  •  
    Danah Boyd writes a great article about how parents are helping their kids break the 13 year old rule. I have some Digiteens doing their own research /action project on this. I will be sharing the video in December.
Julie Lindsay

Choppy Connections | Tricia Friedman - 0 views

  •  
    "I've heard about (and been lucky enough to have seen her present at Learning 2.0) the amazing work that Julie Lindsay does with Flat Classrooms and Flat Connections again and again. There's a good reason her name comes up: flat connections are actually choppy connections." Tricia Friedman shares her ideas about connected learning with reference to Julie Lindsay and Flat Connections. Learning about connectivism in #COETAIL: my shout-out to @julielindsay http://t.co/RfiGYcPFmu
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Summer T

Be Web Aware - privacy - 0 views

  •  
    "When we talk about "young people's rights to their privacy" parents are in a tough spot: they want to protect their kids and at the same time respect their privacy."
  • ...4 more comments...
  •  
    Some parents don't respect their kids privacy! It makes your child shut you out.
  •  
    Parents need to discuss the internet with their children to keep them safe.
  •  
    Parents need to tell their kids not to share that much information on the internet. Definitely not to a stranger.
  •  
    ask other parents about good educational sites for your child.
  •  
    If your teen is shopping online make sure they know the safety guidelines on the website.
  •  
    Make sure your children are doing the right thing on the internet when registering for something.
Blakelee H

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
Blakelee H

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
« First ‹ Previous 61 - 80 of 103 Next › Last »
Showing 20 items per page