Skip to main content

Home/ Digiteen/ Group items matching "meaning" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

What does digital etiquette mean - 1 views

  •  
    Digital Ettiqute
12More

digiteen2008 - Digital Rights and Responsibilities - 1 views

  • Cyber-bullying is a growing problem that has torn many families apart. Some kids have actually gone as far as committing suicide
  • . Most adults are expected to show responsibiliy and follow the law while on the web.
  • extended to every digital citizen.
  • ...7 more annotations...
  • There is a basic set of rights
  • Many of their toys involve the use of the internet, and as children they may not know how to use the internet responsibly.
  • nternet is becoming a bigger and bigger part of the peaople of todays way of life this means that everybody has to contribute to keeping it safe and fun and easy to use.
  • Nine out of ten students get bullied on the web.
  • Identity theft is a crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, usually for profitable gain.
  • The internet as a whole is a privilege.
  • Our responsibility as digital citizens is to stop identity theft, and other harmful things on the internet. Here are some steps into stopping identity theft. - Keep all identification and financial documents in a safe and private place. - Check your credit reports annually - Don’t carry around credit, debit, or ATM cards you don’t need. - Update virus protection software periodically
  •  
    stuff
  •  
    james
35More

digiteen2008 - Digital Access - 0 views

  • The reason this page is here is to tell people about digital access, what problems there are and how we can solve them. Digital Access is insuring that everyone no matter who they has access to the internet.
    • Ivy F.
       
      This will help!
  • Access is a very important thing in life. The ten most important terms that have to do with Access are: connect, internet, access, obtain, retrieve, regain and gate way which all mean that there is or you can access something although in particular, the internet.
  • Identity is a topic that people may not think about as access. Although it is. Identity can be shown on the computer or on the internet. When you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network. It is a positive thing because now you can show your identity to other people around the world.
  • ...27 more annotations...
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Adults
  • Identity is a topic that people may not think about as access
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Adults
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • In Australia 74.3 people access the internet but only 22.8 percent of people have broadband access.
  • you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Infrastructure can be very useful although on the other hand can be bad.
  • Education is very important as well
  • Censorship is another problem although it can also be helpful
  • Identity is a topic that people may not think about as access
  • positive thing because now you can show your identity to other people around the world
    • Ivy F.
       
      this will help many people, i should hope!
  • Digital Divide is probably the most important and simplest topic
  • They can get internet on computers by joining a local wi-fi like at a coffee shop, at school, or at a business. Digital Access is how everyday people access their computers and the Internet.
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • mostly go to websites that have games for kids to play. Millsberry, Build a bear, Webkinz, and Club penguin are all places that children could create their own animated avatar type stuff
  • Censorship is when you are not allowed to do something and if you do you will be in trouble by the government. For example, in China they have censorship and they are not allowed to look certain things up on the internet
  • Digital Divide is basically having a line and putting the people that don’t have access to the internet on one side and the ones that do on the other side.
    • hannah h
       
      The digital divide here in south Georgia USA would be like those people who have high speed internet vs. those who have dial up or don't have INternet that are in the country.
  • one of the main problems for adults and kids with accessing the Internet around the world is, simply, their location. People who live in the city would have no problem finding a computer to go on the Internet and do as they want,
  •  
    this is the Access page. from last year.
  •  
    Access page from 2008
6More

How to handle a cyberstalker - CNN.com - 11 views

  • At Northwestern University, "Lauren Cohn" racked up 143 friends -- none of whom knew who she was. While we're not certain the school was involved in the fabrication, that's beside the point -- 143 people just let this chick into their social circles.
  • Still, take a gander at novelty apps like "Open Book," which allows you to search others' unprotected status updates for potentially incriminating info (I looked, and no, I would rather not know about the hot oral sex you had this a.m.),
  • cyberstalking thusly: "A course of conduct (more than one incident) that uses technology to track, intimidate, harass, threaten or scare victims." That could mean harassing you online or even using the internet to gather info that can be used for physical stalking.
  •  
    Great article about the different levels of cyberstalking and privacy concerns.
  •  
    These people are putting themselves in danger without even knowing it. These things eventually lead to cyberbullying.
  •  
    People should think wat they put before the go to far with it.
1More

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from your own. Consider others’ privacy. Be wary of your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
3More

Internet Safety | Guest Services | Disney - 0 views

  • Internet Safety Ask Questions The best form of Online Safety begins at home with you, the parent. We offer you the following tips to keep your child safe on the Internet. The best way to know what your child is doing online is to ask. Whether you ask other parents, an Internet-savvy friend, or your child about how they use the Internet asking the right questions will help you understand what your child is doing online so you can make sure they are making safe online choices. Questions to ask your child: What sites do you visit? What do you do on those sites? Why do you go to that site? How much time do you spend on the site? Did you have to register? What information did they ask for? What information did you give? Spend time surfing the Web with your child. This is a great way to learn about what types of interactions your child is having online, and with whom.
  • Communicate Once you have an idea of how your child uses the Internet and what is available to them, you can establish online guidelines and rules. Whether it's setting guidelines about which sites to visit or what's okay to do online, it is essential to clearly communicate the rules to your child. Speak often to your child about potential risks and what to do in various situations. Encourage your child to ask questions about situations they run into. Being aware of the risks your child faces, and communicating frequently with your child about these risks, will help develop their judgment and responsibility about Internet usage.
  • Safety Rules While the Internet offers amazing opportunities for entertainment, education, connectivity, and more, anyone who goes online should understand basic Online Safety. Teaching these basics to your children is essential. When asked by friends or strangers, online or offline, never share Account IDs and Passwords. Don't reveal any personal identity information in your Screen Names, such as your birthday, hobbies, hometown or school. In any information exchange, like e-mail or chat, never give any personal information about yourself or someone else. Don't share photos of yourself, your family, or your home with people you meet online. Never open e-mails that come from unknown sources DELETE them. If you receive mean or threatening comments online, don't respond. Log off and report the activity to your parents. Nothing you write on the Web is completely private. Be careful what you write and to whom. Never make plans to meet an online "friend" in person. WHEN IN DOUBT: Always ask your parents for help. If you're not sure, log off.
1More

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
14More

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
9More

Impact of Media on Learning - 1 views

  • All forms of media- the newspaper, radio, television and the internet are equally important in imparting education
  • Media literacy or education does not only mean to be entertained by media but to learn something from it.
  • Media Literacy: "the ability to access, analyze, evaluate and communicate information in a variety of formats." —David Considine
  • ...5 more annotations...
  • Moreover, we have seen that a large number of people depend on the internet to collect information, read news, listen to music and download movies, play games and also for work. Newspaper, Radio, Television and the internet- all form part of the media and are important in imparting education. Media offers culture, sports, information, entertainment, current affairs and education.
  • Computer-based education has transformed the traditional offerings of distance learning.
  • The students can get a vast exposure to the pop-cultural references. They can get statistics and data from the news, which can be the basis for math and science learning. The teachers can also incorporate media analysis whenever the Internet, television or video are used in the classroom.
  • The first and foremost effect of media is definitely the accumulation of General knowledge, different dialects and cultures. Television boosts the social awareness of a child to a great extent. Sports channels develop the logical mindset of a child. Cartoon channels keep the children happy. News channels increase the vocabulary of the children and inform them about the positive and negative impacts on the society. It increases the concentration and retention power of a child, which benefits their studies to a great extent.
  • Children often learn certain things, which change their perspective towards life. For example, if they watch violent scenes on TV, their nature tends to be the same. There are many incidents where children try to imitate the super heroes and it results in death. Studies often get hampered and lapse of concentration occurs due to excessive watching of television. The advertisements shown in the media often captures the mood of the individuals. Generally, girls are very vulnerable and sensitive about their physical image. When an adolescent girl watches the ads that show unless we buy a product or carry the style statement or wash our hair with a specific shampoo and look smart like a slim model, we don’t get respect in the society or get a job.
    • radhika chatterjee
       
      This is really interesting: the negative effects of free and easy access to entertainment are presented alongside with the positive.
1More

The Digital Citizen | Educational Origami - 0 views

  •  
    Great blog post by Andrew Churches looking at what it means to be a digital citizen.
14More

Kids Rules for Online Safety (for pre-teens) | SafeKids.com - 0 views

  •  I will tell my parents right away if I come across any information that makes me feel uncomfortable.
  • 7.   I will not give out my Internet password to anyone (even my best friends) other than my parents.
  • 3.   I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
  • ...9 more annotations...
  • 4.   I will never send a person my picture or anything else without first checking with my parents.*  
  • 5.   I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the service provider.
  • 6.   I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  • 1.   I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission.*  
  • 8.   I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family’s privacy*
  • 9.   I will be a good online citizen and not do anything that hurts o
  • ther people or
  • is against the law.
  • 10. I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
  •  
    safety online
  •  
    "Kids Rules for Online Safety " This website shows kids rules that they should follow for online safety. This rules will help pre-teens learn about online safety
4More

Digital Access - Digi Teen - 0 views

  • Digital Access is the topic that talks about how many people in the world have access to technology and internet.
  • Technology needs to be aware and support electronic access for everyone to create a foundation for Digital Citizenship. Digital exclusion of any kind does not enhance the growth of human beings in an electronic society. One gender should not have preferential treatment over another.
  • about how steps should be taken to let the electronic society grow, because of the many benefits that come with internet such as education. Education is better/worse in separate parts of the world, but if every single person in the world was granted access to the internet, there would be a much higher level of educated people, which will lead to a better future. There are less economically developed countries who don't have access to technology like we do. We need to work towards a future where anyone and everyone has access to the internet.
  • ...1 more annotation...
    • Ivy F.
       
      this tells you the meaning of Digital Access
7More

Internet access - Wikipedia, the free encyclopedia - 0 views

    • hannah h
       
      This shows the many different ways of internet access.
  • Internet access refers to the means by which users connect to the Internet
  • Wireless connections
  • ...3 more annotations...
  • History and types of connections
  • Power line
  • Methods and venues of connection
  •  
    This page shows the many important internet access.
2More

FEMA For Kids: Online Safety Rules For Kids - 0 views

  • Online Safety Rules For Kids I will not give out personal information such as my address, telephone number, parent's work address/telephone number, or the name and location of my school without my parents' permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way makes me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  •  
    kids safety online
2More

Plagiarism.org : Learning Center : Plagiarism Definitions, Tips on avoiding Plagiarism,... - 0 views

  • According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off (the ideas or words of another) as one's own to use (another's production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.
    • Ashley M
       
      This information helps us learn what plagiarism is and how it can be a problem in schools.
6More

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
2More

Netiquette Email 101 @kassj.com - 0 views

  • 1. ALL CAPS means shouting 2. Use underscores or asterisks for emphasizing words 3. Watch your tone -- it's written, not verbal communication 4. Check your spelling 5. Quote back only what is relevant 6. Use an automatic signature, especially if you are a business 7. Where are you located if requesting goods or services? 8. Don't send unsolicited file attachments 9. Use a descriptive Subject line 10. Only forward jokes and chainletters if you are SURE the recipient wants them (and hasn't already gotten a copy or three from someone else) 11. Don't send "Check This Out" Unsolicited URLs 12. Don't expose your email routing list to spammers 13. If you are on AOL, do not use the "Forward" command 14. Don't believe every cybermyth, urban legend, hoax or virus "alert" sent to you
  •  
    These are a few rules on using E-mail etiquette.
1More

Internet Safety - 0 views

  • WDIG'S Internet Safety Tips Keep your passwords private, even from your best friend! Your online service will never ask for them, so neither should anyone else. Use only your log-in name and/or e-mail address when chatting or sending e-mail. Never give out personal information like your name, address, or phone number. Don't share photos of yourself, your family, or your home with people you meet online. Always delete unknown e-mail attachments without opening them. They can contain destructive viruses. If a person writes something that is mean or makes you feel uncomfortable, don't respond. Just log off and tell your parents, who can report it to your online service provider. Remember that nothing you write on the Web is completely private -- including e-mail. So be careful and think about what you type and who you tell. Not everyone is as nice, cute, and funny as they may sound online. Never make plans to meet an online "friend" in person. WHEN IN DOUBT -- always ask your parents for help -- and just LOG OFF if you're not sure! You can always go back online later.
1More

123digitalcitizenship - Digital Rights and Responsibilities - 0 views

  • The topic that we choose to do is rights and responsibilities in digital citizenship. Rights and responsibilities are the privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them. Digital rights and responsibilities are things like the right of copyright, and plagiarism. Also things like downloading music, movies and television shows being downloaded for free. Other issues include the use of the internet, especially at schools. Another issue is cell phones. Plagiarism means copying or using sites that are not properly cited, or giving credit to the author. This includes books, websites, magazines etc. It is a big problem in schools, and it is good to get away from it, and get used to it at younger ages. You must site the sites etc that you use to avoid plagiarism and trouble. Especially in higher grades like grade 11 and 12 and universities where it get very serious, such as getting kicked out of the school or university. Another big problem is the copyright of music, movies, and television shows. A lot of people download music for free on the internet and various programs, which is illegal and practically stealing. But some people do not understand how serious it is. What happens is that the artists that produce the song and etc do not get money for the songs that people are downloading straight off the internet for free. The issue of the use of computers in school is a problem, and people take advantage of the computers at school sometimes. For example people going on games etc, and other things that are not school related, or used for educational purposes. Even outside of school the internet is used inappropriately, and it is your responsibility to know what is appropriate and what is not. All these issues that we found affect the student in his/her everyday school life so we need to help them understand their responsibility towards these issues.
6More

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something Online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s Online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and information from the federal government to help consumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making online purchases, avoiding phishing scams (with a fun Flash animation on how to tell if you’re being phished), and defending cell phones and PDA’s against attack.
« First ‹ Previous 61 - 80 of 86 Next ›
Showing 20 items per page