Skip to main content

Home/ Digiteen/ Group items matching "writing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
18More

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
1More

Parenting: Healthy Boundaries Improve Parent-Teen Relationships | Safetyweb Blog - 1 views

  •  
    Online parenting is just like regular parenting! Parents need to realize that if they want their kids to respect the boundaries online, they need to find a little compromise with excepting some of their son/daughter's boundaries for themselves! Don't go writing of their Facebook wall or reading messages! Some things are sacred! You can't pull the "I pay for this, Facebook is free!" Quote: "We all want our kids' respect. That's why we've got to hold them accountable for respecting our boundaries. While we're at it, we need to respect their boundaries too. Great advice, though not always easy to follow. But like I said, parenting is an art... you've got to practice to improve. Besides, we're not looking for perfection, just progress."
1More

Internet safety expert accuses The Sims Social of promoting cybersex - 0 views

  •  
    "When 40% of kids admit that they have Facebook 'friends' that they don't know in 'real life,' there's a real risk of a predator using a game like this to build a relationship with a child that could lead to real world abuse," Charles Conway writes. This quote is from a website dicussing the safety of teens online. Many of their "friends" online ask to be in relationships with them.
1More

Copyright Education: Copyright Law - Copyright Clearance Center - 0 views

  •  
    "Why Copyright Matters Information is everything. It points the way to advances in science and medicine, innovations in business and technology and achievements in education and the arts. The cost of research, writing and editing is substantial and the efforts often Herculean. Some books are the result of years of individual effort; others are the product of ground-breaking collaboration. Either way, without the protections guaranteed by our copyright laws, many of the works we enjoy and rely upon today would never exist" this shows why copyright is important, and people should look at this.
1More

danah boyd | apophenia » Why Parents Help Children Violate Facebook's 13+ Rule - 2 views

  •  
    Danah Boyd writes a great article about how parents are helping their kids break the 13 year old rule. I have some Digiteens doing their own research /action project on this. I will be sharing the video in December.
2More

Internet Addiction & Health Effects | LIVESTRONG.COM - 0 views

  • Anna Cocke graduated from CUNY with a Master of Arts in Journalism, specializing in health and medicine reporting. She has helped produce segments for the Association of Health Care Journalists on health care reform and reported on diabetes in the South Bronx. She has been writing professionally for more than seven years. Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. if(typeof disable_adsense_2 === "undefined") { ad_order_2 = (typeof ad_order_2 === "undefined") ? "2" : ad_order_2; ad_client = "ca-livestrong_html"; num_ads = "1"; type = "text"; channels = "art_sub_top_Addiction_Recovery,article_top_diseases,article_top"; class_name = "adsense_afc"; print_google_ad(ad_order_2, num_ads, type, channels, ad_client , class_name ); } Sponsored LinksHow to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidence also suggests that internet overuse can contribute to sleep disturbances. Studies of Chinese and American children, published in the "Journal of Sleep" and the "Journal of the American Academy of Pediatrics," found that computer use among adolescents was associated with later bed times, later waking times, less restful sleep and an overall decrease in sleep. The use of computers before bedtime has also raised concerns among sleep experts, including Phyllis Zee, a neuroscience professor at Northwestern University, that the light from screens is affecting circadian rhythms and possibly contributing to insomnia.
  •  
    Addiction can be very harmful to your life. You do not to be addicted to anything. Keep your health up and your body healthy. " Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. Sponsored Links How to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidenc
4More

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
4More

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
1More

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
14More

digiteen2008 - Digital Literacy - 0 views

  • Some teachers are trying to use digital literacy in there classrooms daily to try to help students become involved. Our teachers use overhead projectors, smartboards, and televisions.Many of us use computers in our classes. If we do not learn how to use computers we could soon be separated by the digital divide. The digital divide could end up leaving some of us jobless. We need to be able to use all of the technology we have access to so we can succeed. In a article called "Digitally addicted kids threaten to return to civilization to the dark ages" a girl named Megan Meier committed suicide due to Cyber bullying. A kid named Josh Evans did this, who later turned out to be Megan's ex boyfriends mom Lori Drew. There are so many examples of digital literacy. We use them in everyday life. We use computers all the time, don’t we? I know if you work in an office then you do. Also, Teens are in love with text messages, although text messaging can be very harmful. While texting you could be bullying someone. Like I said before about computers, not only do business people use them, but parents and teens, and maybe some younger children. Teens get in chat rooms all the time. Some probably don’t even know what they are getting into. In chat rooms people can be pushed to do something or even be bullied. Chat rooms and the use of text messaging can be harmful.
    • Ashley M
       
      This information is very informative.
  • The digital divide could end up leaving some of us jobless
    • Ashley M
       
      This sentence is very true. The information in the following paragraph explains how the digital divide could leave some of us jobless.
  • Tasks are being accomplished with the use of technology more than ever.
    • Ashley M
       
      I find this fact very true.
  • ...3 more annotations...
  • Relying too much on technology is a problem because it isn't always reliable.
    • Ashley M
       
      I also find this very true..The following statement explains how relying on technology too much could be a negative thing.
  • Digital literacy is trying to teach basic computer concepts and skills. Literacy isn’t being able to read and write, like used to be. It deals with being able to tell the difference between a real and fake website.
    • Ashley M
       
      This is a great definition of what Digital Literact is.
  • Teachers are beginning to use overhead projectors, clickers, and television more
    • Ashley M
       
      This statement explains how our world is relying more on technology each day.
  •  
    This page shows that things bookmarked digital_literacy through the group automatically go to the students in the project. The teachers (who all use diigo) just tag throughout the year to have things ready to go into the wiki when it is time for the project.
  •  
    This is last years information on digital literacy.
4More

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
9More

UWC Online - Online Etiquette - 1 views

  • Given the absence of face-to-face clues, written text can easily be misinterpreted. Avoid the use of strong or offensive language and the excessive use of exclamation points. If you feel particularly strongly about a point, it may be best to write it first as a draft and then to review it, before posting it, in order to remove any strong language.
  • If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion is also new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.
  • Although electronic communication is still young, many conventions have already been established. DO NOT TYPE IN ALL CAPS. This is regarded as shouting and is out of place in a classroom. Acronyms and emoticons (arrangements of symbols to express emotions) are popular, but excessive use of them can make your message difficult to read. Some common ones include:
  • ...6 more annotations...
  • Messages may often appear perfectly clear to you as you compose them, but turn out to be perfectly obtuse to your reader. One way to test for clarity is to read your message aloud to see if it flows smoothly. If you can read it to another person before posting it, even better.
  • You may be familiar with many of the previous points if you have participated in other forms of electronic communication in the past. But Web-based courses have some added constraints not present in other arenas. Keep in mind these additional four points:
  • Be as concise as possible when contributing to a discussion. Web-based courses require a lot of reading, and your points might be missed if hidden in a flood of text. If you have several points that you want to make, it might be a good idea to post them individually, in several more focused messages, rather than as a single, lengthy, all-encompassing message.
  • Contributions to a discussion should have a clear subject header, and you need to stick to the subject. Don't waste others' time by going off on irrelevant tangents.
  • Don't add your comments to a discussion before reading the comments of other students unless the assignment specifically asks you to. Doing so is tantamount to ignoring your fellow students and is rude. Comments related to the content of previous messages should be posted under them to keep related topics organized, and you should specify the person and the particular point you are following up on.
  • A key distinguishing feature of an online course is that communication occurs solely via the written word.
6More

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
4More

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
7More

Communication - Wikipedia, the free encyclopedia - 0 views

  • Communication is a process of transferring information from one entity to anothe
  • sign-mediated interactions
  • between at least two agents which share a repertoire of signs and semiotic rules.
  • ...3 more annotations...
  • defined as "the imparting or
  • interchange of thoughts, opinions, or information by speech, writing, or signs".
  • two-way process in
  •  
    communication- the process of transferring information from one entity to another
3More

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
2More

What Scares Students and Parents This Time of Year? No, Not Spiders, Witches, or Ghouls... - 0 views

  • About Sylvan Learning: Sylvan Learning is the leading provider of tutoring to students of all ages, grades and skill levels with over 30 years of experience and more than 850 centers located throughout North America. Sylvan's trained and Sylvan-certified personal instructors provide individualized instruction in reading, writing, mathematics, study skills and test-prep for college entrance and state exams. For more information, call 1-800-31-SUCCESS or visit www.SylvanLearning.com
  •  
    Students can benefit their learning by taking a technological approach on a personally fitted website
2More

Google's Vic Gundotra says Facebook overshares - Oct. 19, 2011 - 0 views

  •  
    This is about how the google guys think facebook is oversharing and people write everything on there. 
  •  
    talks about how facebook overshares stuff.  and how not everything that is on our minds, neccisarilly needs to be shared.
‹ Previous 21 - 40 of 41 Next ›
Showing 20 items per page