Skip to main content

Home/ Digiteen/ Group items matching "your" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
8More

5 safety tips for using a public computer | Microsoft Security - 0 views

  • 5 safety tips for using a public computer
  • Don't save your logon information
  • Don't leave the computer unattended with sensitive information on the screen
  • ...5 more annotations...
  • Erase your tracks
  • Disable the feature that stores passwords
  • Delete your temporary Internet files and your history
  • Watch for over-the-shoulder snoops
  • Don't enter sensitive information into a public computer
1More

GetNetWise | Online Safety Guide - 0 views

  • Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.
2More

Technology and Education - Box of Tricks - 0 views

  •  
    An example of digital literacy (if a person learns how to use it).
  •  
    Diigo offers a fantastic way to tap into the way our students operate by allowing the annotation of web pages which can then be shared with your students and, by doing so, you facilitate the process of research for your students and you set them on the right track for further independent study.
1More

Cooliris | Discover More - 0 views

  •  
    Introducing the plugin that transforms your browser into a lightning fast, cinematic way to enjoy photos and videos from the Web or your desktop.
1More

10 Privacy Settings Every Facebook User Should Know - 0 views

  •  
    Whatever the reason for ending our Facebook friendship, I figured that many people would benefit from a thorough overview on how to protect your privacy on Facebook. Below is a step by step process for protecting your privacy.
1More

Internet and Electronic Rights Issues - 0 views

  •  
    The website linked here shows some of the responsibilities and challenges of innovation. This provides what some innovators would expect when presenting ideas. It also includes what type of hostility and indifference you may receive when presenting your ideas to your superiors in the work place. Apparently some managers aren't very open to new ideas.
1More

The Challenges of Innovation - 0 views

  •  
    The website linked here shows some of the responsibilities and challenges of innovation. This provides what some innovators would expect when presenting ideas. It also includes what type of hostility and indifference you may receive when presenting your ideas to your superiors in the work place. Apparently some managers aren't very open to new ideas.
2More

Digital Rights & Responsibilities - 0 views

  •  
    Digital rights and responsibilities are the rights given to us that we have to follow on the Internet and digital devices to stay safe and legal. Those rights and responsibilities should be understood before anyone uses anything digital.
  •  
    People have similar rights online live they do in the real world. You still have what you can and cannot do online which would be your rights. your responsibility is what you have to do and to take accountability for wrongdoing.
1More

Is your boss your friend or foe? - Technology - smh.com.au - 0 views

  •  
    Maria's nightmare began after a long weekend when she logged on to check her emails only to find: "The boss added you as a friend on Facebook" staring at her through her inbox screen.
8More

Top 7 Ways to Communicate Effectively - 0 views

  • Have self-worth
  • Get interested in other people
  • Open up a person’s heart
  • ...5 more annotations...
  • Listen at least two times more than you talk
  • Diversify yourself
  • Understand that your worth never changes Follow along…In my hand I am holding a check for a million dollars. I crumble it up. It’s still worth a million dollars. I step on it, it’s still worth a million dollars, I start rubbing it on the floor with my shoe, and it’s till worth a million dollars. You are worth a lot more than a million dollars. In fact, your worth is immeasurable. Therefore, there is no such thing as ‘rejection’ as you’re always worth the same no matter what. Nobody can reject you because nobody can change your worth. Moreover, don’t be afraid of something (rejection) that doesn’t exist. Take risks, ask for what you want, and eventually you will get what you want.
  • Understand that your worth never change
  • Follow the step-ladder to success
12More

digiteen2008 - Digital Law - 0 views

  • This is the electronic responsibility for actions which says if something is ethical or unethical. The responsibility of the digital law deals with the ethics of technology as a whole. Digital Law deals with four main topics: copyright, privacy, ethical issues, and piracy. Unethical use of computers can form into theft or crime like piracy. People that are ethical in the use of their computers may actually be the ones being hurt by those who are not following these protective laws. A student should not be allowed to mess with other peoples work or identity with rules being applied. We have the digital Law to basically protect us; since most people don't follow it, the internet is becoming a very dangerous place.
    • brooke s
       
      this paragraph explains the four main topics dealing with the "Digital Law"
  • . There are so many new illegal ways to get what you want and not get caught that it is very hard to find the causes of viruses and other crimes. Some problems with Elementary students are that they can get on sites too mature for their age. The information on these sites may be inappropriate for their age group. Another problem may be that older people may harass them. There are also some problems with Middle/High school aged students. They may get on sites such as MySpace or Facebook and lie about their age, name, or any other aspects of their lives. This is not a very smart act considering that later they may be abused. They may use bad language on the internet or chat rooms. Predators can trick some teens that are unaware of such dangers into meeting up with them. Parents/guardians are unaware of what teens are looking at and/or doing and therefore cannot stop them from seeing and/or doing inappropriate things.
    • brooke s
       
      This paragraph explains the dangers on the internet.
  • Some teens download illegal music such as Limewire or Bearshare.This affects not only the artist, but record producing companies.
    • brooke s
       
      using internet wrongly could hurt other people financially, such as music artists and producers.
  • ...3 more annotations...
  • There are also some problems with adults. Using bad language, harassing and trapping youth, and the buying and selling of illegal merchandise are just some of the problems the adult generation faces today. Many adults are very sneaky and can use tricks to socialize with young adolescents. Some adults use Facebook, Myspace, or chatrooms to trick younger people into meeting up with them. These are just some of the main problems our generation of all different ages faces in this day and time.
    • brooke s
       
      More dangers of the internet.
  • Breaking the law: On the internet you will come upon websites that will be breaking the law and you can report this to "NETALERT" www.neralert.vic.a, they will contact the authorities and put a stop to the website. Another problem is copyright. There is an easy solution to this problem though, and this solution is creative commonscreative commons is a site that lets you easily make your own copyright laws for your work. There are rules like no one can make money off of your work, no one can change the appearence of your work, and many more. By making it a law that people have to use creative commons to put anything on the internet, you can reduce the amount of copyright laws broken. Making adults aware of the consequences of their actions should help the problem dramatically. Most adults break digital laws thinking, " Oh yeah, sure, I'm not going to get into any trouble." when in fact they are on the verge to getting very serious legal punishment.
    • brooke s
       
      more on breaking the internet law
  • There is a very interesting controversy brewing in Orange County, Florida. A 13-year-old girl Alisha Dean has a MySpace page that portrays herself as a 19-year-old divorced woman. She has been accused about lying to two men — Morris Williams, 22, and Darwin Mills, 24, about her age in two separate incidents. Both have been convicted and sent to jail for statutory rape. Digital Law for Middle School students not only has to deal with privacy but copyright and piracy.
    • brooke s
       
      controversy with young people lying about their age
3More

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
1More

Download Details - Microsoft Download Center - Social Interaction and Xbox LIVE Party - 0 views

  • The new Xbox LIVE Party feature extends the concept of social interaction on Xbox LIVE with 8-person voice chat. It also provides simple mechanisms for the Xbox LIVE Party group to play multiplayer games together. This session reviews the Xbox LIVE Party feature and discusses how to integrate your game to create cutting-edge social experiences. Come find out how to make your title interact seamlessly with Xbox LIVE Party, and how doing so will improve your user experience. If you are currently enabling your title for Xbox LIVE, or are just interested in learning more about the latest features, this talk is for you.
1More

Documentary on Addiction on Technology - 0 views

  •  
    A two minute video on Technology Addiction becoming a problem in today's world. Do you think you might be addicted if you fake to go to the bathroom during dinner, just so you can check your email, reply to a text message or check your Facebook? Quote: "People post how it's changing their lives, how wired we are. Everyone is hungry to talk about this subject." - Filmmaker and Webby Awards founder Tiffany Shlain
2More

Internet and Computer Safety - 0 views

  • Internet and Computer Safety
  •  
    Getting involved in how to keep your family safe is a big thing. Being safe while surfing the internet is always a major difficulty. This page tells you how you can get involved and start helping to keep your family safe. It deals with Online privacy, Social Networking Privacy and many more. Quotes: 'Browsing the web safely and privately is concern for many people." From the Website.
1More

Internet Safety-Social Network; Information And Awareness - YouTube - 0 views

shared by carrie n on 20 Oct 11 - No Cached
  •  
    This video is a great video that explains what happens on twitter and Facebook. It talks about how dangerous it can be when your uploading pictures to the web, talking to strangers, and putting your full name, number, and postal code.
1More

GE Weekly Wellness | This new and unique blog carves a path for health reporting by min... - 1 views

  •  
    A new device called the "Tamagotchi" monitors your health and wellness in your daily life.
2More

Are You Minding your (Online) Manners? - 0 views

  • Are You Minding your (Online) Manners?
  •  
    This website shows ways that will make sure you are following your "online manners".
1More

The Possibility Post | Fostering Global Digital Citizenship - 0 views

  •  
    Ann from South Australia talks about her exploration of digital citizenship with her students. My favourite sentence, Ann, I really enjoyed reading this blog post. You have shared vital process material from your recent connection with NZ and also communicated student responses -also a necessary part of assessing the success and viability of online connection that leads to collaboration. My favourite sentence is your last one - "Global digital collaboration goes beyond research. We found out more through the learning experience of meeting and sharing knowledge." #flatconnections #GlobalCitizen New blog on my first global collaboration. http://t.co/8uJleK5Iar
4More

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
« First ‹ Previous 101 - 120 of 321 Next › Last »
Showing 20 items per page