Skip to main content

Home/ Groups/ Digiteen
William H

Why Teachers Need Digital Citizenship « coal cracker classroom - 0 views

  •  
    This is a very good site for how to be aware of friending people on facebook
Nicholas C

What Is A Copyright? - 1 views

  •  
    This page has a lot of information about copyrights.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
William B

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
Micah K

Respecting Others Online - Adoption Search - 0 views

  •  
    This article says that when you have a disagreement with someone online, you should either privately talk to each other about it, or you both should agree to move on. "If a disagreement breaks out, tempers can get hot. If this happens, think about how you would react if the person you disagree with were standing in front of you. Treat others with respect. If you can't agree, don't rehash everything hoping to convince everyone that you are right. You may want to take the disagreement to corresponding via private email or simply agree to disagree and move on."
Matthew T

10 Things Parents Need to Know About Xbox LIVE and Kids Safety - 0 views

  •  
    10 things to do to be safe on xbox live "It's more than just a gaming site. Xbox LIVE users can also chat with each other, send and receive friend requests, and share their profile and gaming stats.xBox Kids Safety uKnowKids Gamertags need to be chosen wisely. Never let your child use part of their name, hometown, or other identifying information in their gamertag. Profiles follow the child, not the console. A child can still access all his Xbox LIVE information from a friend's house. Kids can play games with strangers. Xbox LIVE has a "matchmaking" feature to help your child connect with gamers who have certain gamerscores or live in a certain location. People can privately chat with each other. Up to 8 people can play and talk all at once, but two of them can pair off and talk privately if they want to. You can make your permission mandatory. Through console controls, you can require your permission for your child to send and receive friend requests, accept game or chat invites, or buy Xbox merchandise. You can block who your child hears. You can choose "everyone," "friends," or "no one." Parents are required to help their children set up an account. If your under-18 child has an account and you didn't help set it up, he or she is registered as an adult. Default settings vary by age. Child and teen accounts are mostly "friends only" by default and some features are blocked, but adult profiles are public and have full access to all features. Deactivating Xbox LIVE doesn't cancel the child's account. On the Xbox console there is a setting to disallow Xbox LIVE access from that console - but your child can still access it on others unless you cancel his account."
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Morgan G

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
William H

Bloggers need social awareness - ucanews.com - 0 views

  •  
    This is a good sight for social awareness
Morgan G

Connect With Kids and Parents of Different Cultures | Scholastic.com - 0 views

  •  
    " Everything we do regarding time, personal space, body language, voice volume, small talk, and so on is shaped by our culture. Most of the participants in my workshops named eye contact as the most important feature in communication. Yet people from many cultures, including some Asians, Native Americans, Africans, and Hispanics/Latinos, don't make eye contact like Caucasian Americans do in some cultures, in fact, making eye contact is considered an insult. You can learn a lot about other cultures from your coworkers. Organize an after-school gathering for teachers and other school staff to bring in a favorite dish from their culture and to share cultural characteristics. "
Michael C

Virtual World Addiction's Deadly Costs | Virtual Navigator - 0 views

  •  
    Addiction to virtual worlds is a horrible thing, and you should leave the website if you have an addiction to it.
Dru F

Bridging the Online Language Barrier: Translating the Internet : All Tech Considered : NPR - 0 views

  • But some language combinations work much better than others and even when the translation’s good, it’s never perfect. “Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating,” says Goolgle’s Michael Galvez. I’m skeptical that “gestations” will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol’ humans. “The idea is a Wikipedia-style approach to translation,” says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages.
  •  
    "But some language combinations work much better than others and even when the translation's good, it's never perfect. "Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating," says Goolgle's Michael Galvez. I'm skeptical that "gestations" will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol' humans. "The idea is a Wikipedia-style approach to translation," says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages."
Micah K

Ground Rules For Group Work - Art and Authenticity in the Digital Age - 0 views

  •  
    We should all remember that we all have our own opinions and thoughts, and that just because someone has a different thought than you, it doesn't mean that they are wrong. "-Respect each other's ideas -Respect the other group members -Don't interrupt each other -Everyone's opinion should count -Be honest with each other"
Callie S

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
Micah K

Create a culture of teamwork with mutual trust and respect | TechRepublic - 0 views

  •  
    This article helps the reader remember that we all make mistakes, and we are all different. "Management expert Mark Scureman approaches every job and every problem with three basic assumptions: People are different. Life is complex. No one is perfect."
William B

Internet Addiction & Health Effects | LIVESTRONG.COM - 0 views

  • Anna Cocke graduated from CUNY with a Master of Arts in Journalism, specializing in health and medicine reporting. She has helped produce segments for the Association of Health Care Journalists on health care reform and reported on diabetes in the South Bronx. She has been writing professionally for more than seven years. Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. if(typeof disable_adsense_2 === "undefined") { ad_order_2 = (typeof ad_order_2 === "undefined") ? "2" : ad_order_2; ad_client = "ca-livestrong_html"; num_ads = "1"; type = "text"; channels = "art_sub_top_Addiction_Recovery,article_top_diseases,article_top"; class_name = "adsense_afc"; print_google_ad(ad_order_2, num_ads, type, channels, ad_client , class_name ); } Sponsored LinksHow to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidence also suggests that internet overuse can contribute to sleep disturbances. Studies of Chinese and American children, published in the "Journal of Sleep" and the "Journal of the American Academy of Pediatrics," found that computer use among adolescents was associated with later bed times, later waking times, less restful sleep and an overall decrease in sleep. The use of computers before bedtime has also raised concerns among sleep experts, including Phyllis Zee, a neuroscience professor at Northwestern University, that the light from screens is affecting circadian rhythms and possibly contributing to insomnia.
  •  
    Addiction can be very harmful to your life. You do not to be addicted to anything. Keep your health up and your body healthy. " Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. Sponsored Links How to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidenc
Morgan G

Building Relationships with People from Different Cultures - 0 views

  •  
    Creating a relationship with different cultures can get you a long way in life and I believe that having this relationship is very important. "Relationships are powerful. Our one-to-one connections with each other are the foundation for change. And building relationships with people from different cultures, often many different cultures, is key in building diverse communities that are powerful enough to achieve significant goals. "
Savana R

How to Deal With Facebook Stalkers: 11 steps - wikiHow - 0 views

  •  
    Stalkers are all over Facebook and that is the most populated place on the internet these days. Everyone needs to be cautions on the internet because you don't know who could be watching you. "Dealing with a situation of being stalked on Facebook can be complicated by the fact that Facebook causes us to view our connections as "friends". That can make getting rid of these stalkers tough, because they just don't seem to go away, and you don't want to be mean to them. Yet, allowing their behavior to diminish your enjoyment of Facebook is no option at all, and there are some things you can try to get them to stop Facebook stalking."
Callie S

How to Be Safe and Smart on the Internet (with pictures) - 0 views

  • Cyber Bully Warnings! Cyber bullies are people on the internet who try to hurt other people emotionally. Cyber bullying can often lead to stress, depressing feelings and even suicide. Avoiding cyber bullies can be really hard. If a cyber bully ever approaches your way, don't let their nasty talks get to you. You know that you're a great person. If a cyber bully ever tries to hurt you, tell someone immediately. Sure cyber bullying can be depressing sometimes, but it's important to keep faith in yourself. Never ever commit suicide because you've been cyber bullied. Cyber bullies are really people in real life who's afraid to speak up and is lonely. If you ever run across a cyber bully, ignore them. Don't even talk to them.
  •  
    cyber bullying is very serious and these bullets tell you how to react when being cyber bullied.
Michael C

Internet Addiction - Symptoms, Signs, Treatment, and FAQS - TechAddiction - 0 views

  •  
    Addiction to virtual worlds has symptoms and cures that are very helpful to people that suffer from it.
« First ‹ Previous 1321 - 1340 Next › Last »
Showing 20 items per page