Skip to main content

Home/ Groups/ Digiteen
1More

What is Global Competence? | Asia Society - 0 views

  • The world is demanding citizens and workers have the knowledge, skills and dispositions to act creatively and effectively on issues of global significance. And American schools are trying to respond to this urgent demand.
2More

Gaming Addiction Statistics - Facts, Articles, & Research - TechAddiction - 0 views

  • Gaming addiction is not yet classified as a mental health disorder or "true" addiction like gambling or alcohol addiction. However, some gamers clearly struggle to keep their playing habits under control and may place more importance on their gaming accomplishments than their happiness and success in the real world (e.g., academic achievement, friendships, relationships, career advancement, health, etc.). As gaming addiction becomes more of a concern for parents, spouses, families, educators, and those in the mental health community, it is important for those hoping to learn more about this issue to get their gaming addiction statistics and facts from reputable sources.
  •  
    Addition is a way to damage your health. Your health is very important and addiction can damage it in a minutes. "Gaming addiction is not yet classified as a mental health disorder or "true" addiction like gambling or alcohol addiction. However, some gamers clearly struggle to keep their playing habits under control and may place more importance on their gaming accomplishments than their happiness and success in the real world (e.g., academic achievement, friendships, relationships, career advancement, health, etc.). As gaming addiction becomes more of a concern for parents, spouses, families, educators, and those in the mental health community, it is important for those hoping to learn more about this issue to get their gaming addiction statistics and facts from reputable sources. "
1More

Cultural literacy - Wikipedia, the free encyclopedia - 0 views

  •  
    Cultural literacy is important because you need to know the importance of getting along with different cultures. Anyone can join social networks, so you need to learn how you can get along with everyone. "Cultural literacy is familiarity with and ability to understand the idioms, allusions, and informal content that create and constitute a dominant culture. From being familiar with street signs to knowing historical references to understanding the most recent slang, literacy demands interaction with the culture and reflection of it. Knowledge of a canonical set of literature is not sufficient in and of itself when engaging with others in a society, as life is interwoven with art, expression, history, and experience. Cultural literacy requires familiarity with a broad range of general knowledge and implies the use of that knowledge in the creation of a communal language and collective knowledge. Cultural literacy stresses the knowledge of those pieces of information that content creators will assume the audience already possesses."
1More

Man Arrested for Stalking Girls Through Xbox Live | GameFront - 0 views

  •  
    stalking is a real problem on Xbox Live, and you should report it immediately if it happens to you.
1More

3D Virtual Worlds List - 0 views

  •  
    Here are some of the virtual worlds on the web today.
1More

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
1More

Why Teachers Need Digital Citizenship « coal cracker classroom - 0 views

  •  
    This is a very good site for how to be aware of friending people on facebook
1More

What Is A Copyright? - 1 views

  •  
    This page has a lot of information about copyrights.
2More

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
2More

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
1More

Respecting Others Online - Adoption Search - 0 views

  •  
    This article says that when you have a disagreement with someone online, you should either privately talk to each other about it, or you both should agree to move on. "If a disagreement breaks out, tempers can get hot. If this happens, think about how you would react if the person you disagree with were standing in front of you. Treat others with respect. If you can't agree, don't rehash everything hoping to convince everyone that you are right. You may want to take the disagreement to corresponding via private email or simply agree to disagree and move on."
1More

10 Things Parents Need to Know About Xbox LIVE and Kids Safety - 0 views

  •  
    10 things to do to be safe on xbox live "It's more than just a gaming site. Xbox LIVE users can also chat with each other, send and receive friend requests, and share their profile and gaming stats.xBox Kids Safety uKnowKids Gamertags need to be chosen wisely. Never let your child use part of their name, hometown, or other identifying information in their gamertag. Profiles follow the child, not the console. A child can still access all his Xbox LIVE information from a friend's house. Kids can play games with strangers. Xbox LIVE has a "matchmaking" feature to help your child connect with gamers who have certain gamerscores or live in a certain location. People can privately chat with each other. Up to 8 people can play and talk all at once, but two of them can pair off and talk privately if they want to. You can make your permission mandatory. Through console controls, you can require your permission for your child to send and receive friend requests, accept game or chat invites, or buy Xbox merchandise. You can block who your child hears. You can choose "everyone," "friends," or "no one." Parents are required to help their children set up an account. If your under-18 child has an account and you didn't help set it up, he or she is registered as an adult. Default settings vary by age. Child and teen accounts are mostly "friends only" by default and some features are blocked, but adult profiles are public and have full access to all features. Deactivating Xbox LIVE doesn't cancel the child's account. On the Xbox console there is a setting to disallow Xbox LIVE access from that console - but your child can still access it on others unless you cancel his account."
2More

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
1More

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
1More

Bloggers need social awareness - ucanews.com - 0 views

  •  
    This is a good sight for social awareness
1More

Connect With Kids and Parents of Different Cultures | Scholastic.com - 0 views

  •  
    " Everything we do regarding time, personal space, body language, voice volume, small talk, and so on is shaped by our culture. Most of the participants in my workshops named eye contact as the most important feature in communication. Yet people from many cultures, including some Asians, Native Americans, Africans, and Hispanics/Latinos, don't make eye contact like Caucasian Americans do in some cultures, in fact, making eye contact is considered an insult. You can learn a lot about other cultures from your coworkers. Organize an after-school gathering for teachers and other school staff to bring in a favorite dish from their culture and to share cultural characteristics. "
1More

Virtual World Addiction's Deadly Costs | Virtual Navigator - 0 views

  •  
    Addiction to virtual worlds is a horrible thing, and you should leave the website if you have an addiction to it.
2More

Bridging the Online Language Barrier: Translating the Internet : All Tech Considered : NPR - 0 views

  • But some language combinations work much better than others and even when the translation’s good, it’s never perfect. “Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating,” says Goolgle’s Michael Galvez. I’m skeptical that “gestations” will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol’ humans. “The idea is a Wikipedia-style approach to translation,” says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages.
  •  
    "But some language combinations work much better than others and even when the translation's good, it's never perfect. "Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating," says Goolgle's Michael Galvez. I'm skeptical that "gestations" will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol' humans. "The idea is a Wikipedia-style approach to translation," says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages."
1More

Ground Rules For Group Work - Art and Authenticity in the Digital Age - 0 views

  •  
    We should all remember that we all have our own opinions and thoughts, and that just because someone has a different thought than you, it doesn't mean that they are wrong. "-Respect each other's ideas -Respect the other group members -Don't interrupt each other -Everyone's opinion should count -Be honest with each other"
2More

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
« First ‹ Previous 1321 - 1340 Next › Last »
Showing 20 items per page