Skip to main content

Home/ Ed Tech Crew/ Group items tagged Digital Identity

Rss Feed Group items tagged

Ian Guest

21 Things 4 Students - 6 views

  •  
    A ready-made course of study with activities and resources to support a digital literacy programme.
John Pearce

Dos and Don'ts when using social networks - YouTube - 4 views

  •  
    "Do you act correctly when using social networks? Check out the video and get valuable safety tips . Get full list of do's and don'ts at http://eu.computers.toshiba-europe.com/innovation/generic/toshiba-mcafee-news..."
John Pearce

The Awkward 'Privacy Talk' Parents Should Have With Their Kids | Wired Opinion | Wired.com - 1 views

  •  
    "Parents across the globe today - from Lagos to Los Angeles and from Myanmar to Moscow - need to have a new conversation with their kids. No, it's not about how their kids are behaving in class, why they should never talk to strangers, or when they need to be home at night. It's not even the talk that parents usually brace themselves for, about sex. It's something new, something parents never considered as a critical issue 20 or 10 or even 5 years ago - but something that is just as pervasive as any of the other issues in their children's lives and, in so many ways, just as important. It's data permanence. How we can preserve our reputations in the digital era?"
Camilla Elliott

3 Step plan for a digital makeover - 2 views

  •  
    Includes excellent walk through activity.  From Lisa Neilson.
John Pearce

Fix Tracking! - 2 views

  •  
    Some advice from Duck, Duck Go on how to restrict tracking that can occur when browsing the web.
Roland Gesthuizen

The "digital divide"? - Parental involvement in preventing and responding to cyberbully... - 3 views

  • Being better informed than their parents led to examples in another study where at times, students had needed to remind their own parents of basic cybersafety rules
  •  
    "Although statistics show that the use of the Internet by adults is high and continues to rise,3 McGrath (2009) suggested that young people use technology in a different way to adults - adult use tends to be for more practical or business purposes, whereas for young people, technology is a vital part of their social life and identity development."
twitteraccounts1

Buy Verified Coinbase Account- 100% Fully Verified & cheap.. - 0 views

  •  
    Buy Verified Coinbase Account Coinbase is the world's largest cryptocurrency exchange and offers its users a platform to buy, sell, and store digital assets. In order to use Coinbase, users must create an accounts and verify their identity. Once an account is created, users can then link their bank account or debit card and begin buying and selling cryptocurrencies. Coinbase is one of the most popular cryptocurrency exchanges and allows users to buy and sell Bitcoin, Ethereum, and Litecoin. In order to use Coinbase, users must create an accounts and verify their identity. Once an account is created, users can then link their bank account or debit card and begin buying and selling cryptocurrencies.
John Pearce

Home - 1 views

  •  
    "This website is funded by the Australian Government Department of Education, Employment and Workplace Relations. The Safe Schools Toolkit explores the detailed characteristics of the National Safe Schools Framework, providing case studies and an online audit tool to pinpoint the areas of priority."
Ian Guest

Digital Literacies Toolkit - 7 views

  •  
    "The purpose of this set of learning resources is to help students: explore the educational uses of Web 2.0 tools and services; familiarise themselves with a range of useful applications for study-related purposes; highlight good practice in the use of social software and the internet, in general."
John Pearce

8 must-reads detail how to verify information in real-time, from social media, users | ... - 2 views

  •  
    Over the past couple of years, I've been trying to collect every good piece of writing and advice about verifying social media content and other types of information that flow across networks. This form of verification involves some new tools and techniques, and requires a basic understanding of the way networks operate and how people use them. It also requires many of the so-called old school values and techniques that have been around for a while: being skeptical, asking questions, tracking down high quality sources, exercising restraint, collaborating and communicating with team members. Post also contains a great Slideshare.
Andrew Williamson

4 Fantastic Network Visualization Tools | Edelman Digital - 0 views

  • As internet usage has grown, so too have the various online networks which connect family, friends, colleagues and people with shared interests. Whilst it is often easy to gain a numerical overview of connections, friends or followers, this tends to add context, rather than insight – the fact remains, it can be difficult to dig that bit deeper and see how people within networks are linked. This poses a challenge for digital communicators as we want to tap into big, social data and visualise networks; so we can see how ideas may spread, understand who knows whom and identity people that are influential within a particular context. After all, if you can understand a network, you gain insight into who people may trust, find influential and credible.
  •  
    In short; being able to accurately visualise networks has big implications for influencer mapping, identification and outreach. If you can discover who the idea starters, amplifiers or adapters are, you are at a distinct advantage (check out 'The Fire Hose, Ideas, and 'Topology of Influence' by my Edelman colleague, Jonathan Hargreaves for more information on influence).
John Pearce

The Sad State of Social Media Privacy [Infographic] | Tech the Plunge - 4 views

  •  
    "Privacy issues are a very hot topic for anyone using social media. As educators, I believe it is our responsibility to teach our students the ins and outs of how to responsibly use social media. ...... I believe social media is important for educators and students. But I also believe it must be used responsibly and that cannot be accomplished without knowing the intricacies of social media privacy. Take a look at this infographic from MDG about the sad state of social media privacy."
Aaron Davis

Want To Get Noticed On Twitter? Be Yourself - 0 views

  •  
    An interesting post be 'edmerger' on 'being' yourself online, rather than someone else's agenda. I agree with the basic principle of the piece, but feel that it is also slightly too simple. Whether we admit it or not, post comments and links can be considered as some kind of digital branding. We are branding ourselves whether we mean to or not. I think if you try too hard, then that is the issue, not necessarily branding itself.
Ian Guest

Otherwise Engaged - 1 views

  •  
    The perils of the status update?
John Pearce

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | W... - 1 views

  •  
    "No matter how complex, no matter how unique, your passwords can no longer protect you."
John Pearce

Search me: online reputation management | Technology | The Guardian - 0 views

  •  
    Past scandals, bad photos, critical comments: the internet has a long memory. As the EU considers the 'right to be forgotten', we investigate the growing business of online reputation management - and learn how you can airbrush your own past
John Pearce

How To Download All Your Personal Data From Facebook | Business Insider - 1 views

  •  
    "Storing information in the cloud is great, but sometimes it's nice to have your personal data right on your hard drive. There's a way to export your personal information from your various Google accounts, and now you can on Facebook, too. If you'd like to download a copy of your Facebook data, there's an easy way to do it. That way you can keep all your personal information - videos and pictures from your wall, for example - on your computer, without worrying about ever losing your stuff, should your account get hacked. Here's how:"
Ian Guest

Good to Know - 4 views

  •  
    "A guide to staying safe and secure online " from Google
RAKESH MURMU

computer support l ustechsupport247 - 0 views

  •  
    Draft Code of perform suggests that "Staff associate degreed/or freelancers United Nations agency management content for computer support promotional education ought to wait an appropriate length of your time (eg, a "wash-out" amount of vi to twelve months) before performing on informative content within the identical therapeutic space.http://www.ustechsupport247.com/
‹ Previous 21 - 40 of 41 Next ›
Showing 20 items per page