Skip to main content

Home/ educators/ Group items tagged e-safety

Rss Feed Group items tagged

yc c

WEB|WISE|KIDS - E Rate, Internet Safety Tips, Internet Safety for Teen, Child Internet ... - 1 views

  •  
    Web Wise Kids is about empowering today's youth to make wise choices online. Through state-of-the-art Internet Safety computer games (based on real-life scenarios) as well as Internet Safety tips for kids, teens and parents, Web Wise Kids creates a safer, friendlier internet experience. These, coupled with involvement of community, youth leaders and parents, provides an environment where your child's Internet Safety becomes their first line of defense while navigating through cyberspace.
Martin Burrett

Safer Internet Centre - 4 views

  •  
    Safer Internet Day is an annual event in early February that highlights e-safety. This site has many good child-friendly resources and downloadable school packs about e-safety. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

E-safety policy for schools via @esafety_Kent - 0 views

  •  
    "With technological advances moving spectacularly fast, it is difficult for schools to keep updated with e-safety policy, procedures and advice for their staff and pupils. Ensuring that everyone is informed through following policy directives can be time-consuming, and producing the documents can be equally laborious."
Vicki Davis

Good "Geofences" Make Good Neighbors in Age of Mobile Alerts : New England Board of Hig... - 3 views

  •  
    Geofencing is a new concept in safety notifications. Schools can literally notify anyone entering an area (i.e. notify vendors and parents they must check in with the office when entering a certain area), leaving an area, or within an area of issues. This could be used to notify and protect students, teachers, and anyone on campus in the case of an emergency of any kind.  This article is one of the best I've seen about geofencing and how it works, although it is promoting an app (Ping4alerts) it is very useful for safety leaders and it directors to read and understand the potential of this very useful technology. "Hyperlocal alerts are a new capability made possible by the rise of smart devices and "geofencing" technology. A geofence is a virtually "fenced-off" area or geographic location. When this concept is applied to mobile devices, it refers to the ability of users to receive automatic alerts or notifications when entering, leaving or moving within a geographic area specifically defined by a virtual geofence. That area could be as small as a single building or as large as a state or region of the country. System administrators draw a square on a map through their portal interface to designate the location and size of the geofenced in area."
Martin Burrett

Budd:e Cybersecurity Education - 14 views

  •  
    A superb e-safety resource with separate sections for primary and secondary students to work through. Choose to sign in to save progress or use without signing in. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

GovTrack: S. 1492 [110th]: Text of Legislation, Enrolled Bill - 0 views

  • ‘(iii) as part of its Internet safety policy is educating minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms and cyberbullying awareness and response.’.
  •  
    A school receiving e-rate funds must now: "'(iii) as part of its Internet safety policy is educating minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms and cyberbullying awareness and response.'."
Martin Burrett

Think U Know - 13 views

  •  
    This is a widely used e-safety website with games and activities to help your students understand how to be safe online.
Martin Burrett

Be Internet Awesome - 1 views

  •  
    "A superb set of e-safety resources and tools from Google, including the amazing games in Interland."
Martin Burrett

Digital Passport - 2 views

  •  
    "A set of fun games and resources which explore digital privacy and e-safety issues."
Martin Burrett

Cyber Tree House - 5 views

  •  
    A well made, child friendly flash site with videos, interactive games and other resources about Internet safety and smart thinking online. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

Budd-e Stay Smart Online - 15 views

  •  
    A superb e-safety resource with separate sections for primary and secondary students to work through. Choose to sign in to save progress or use without signing in.
Martin Burrett

KS1 Internet Safety by @letsjustwaitfor - 2 views

  •  
    Contains I can… talk about how I use the internet, that internet takes me to far away paces and people, that staying safe on internet is like staying safe in real life, I understand what info is private and how to keep it that way.
Martin Burrett

Online safeguarding: trends, tools and guidelines by @CaynsleyEsafety - 1 views

  •  
    "While every school knows the importance of safeguarding in our digital world, it's also important that they know and understand the most effective strategies to help safeguard their pupils online, both in and out of the classroom. The UK Council for Child Internet Safety (UKCCIS), have recently launched a framework which aims to highlight, across all key stages, the skills and knowledge children should have in order to feel safe, and act responsibly, online so that they are able to enjoy the online world."
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Martin Burrett

Thinkuknow - 6 views

shared by Martin Burrett on 07 Feb 12 - Cached
  •  
    This is a widely used e-saftey website with games and activities to help your students understand how to be safe online. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

Save The Pacific Northwest Tree Octopus - 2 views

  •  
    A wildlife conservation site which aims to save the rare Pacific Northwest tree octopus from extinction... except it isn't. A great site to use that illustrates that not all information on the web can be trusted. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

All About Explorers - 1 views

  •  
    "This is an interesting history site about explorers… except it isn't. If you look at the information it is wildly wrong and the site is designed to teach about fact checking and to show children that not all information on the Internet is trustworthy."
Martin Burrett

10 GDPR Questions Answered - 1 views

  •  
    "As you will see below you can do very little without gaining express permission, yet if you are clear about how you will use the data and strictly adhere to this, in addition to evidencing this permission, you can do so much."
Martin Burrett

Tree Octopus - 2 views

  •  
    "A wildlife conservation site which aims to save the rare Pacific Northwest tree octopus from extinction… except it isn't. A great site to use that illustrates that not all information on the web can be trusted."
Ed Webb

An unseen disadvantage : The focus on independence at American universities can undermi... - 5 views

  • For middle-class students, college is “the ultimate symbol of independence” and also allows students to “distinguish themselves from their parents and realize their individual potential.” By contrast, students from working-class backgrounds are likely to have been socialized with different “rules of the game” —rules that emphasize interdependence with others (i.e., being part of a community).
  • “Many students from working-class families are influenced by limited financial resources and lack an economic safety net, and thus must rely on family and friends for support. Thus, these students’ expectations for college center around interdependent motives such as working together, connecting to others, and giving back,” said Stephens. “Given the largely independent college culture and the ways in which students’ social class backgrounds shape their motives for attending college, we questioned whether universities provide students from these different backgrounds with an equal chance of success.”
  • Admissions materials and university mission statements could be revised to reflect the importance of interdependent norms  In the classroom, professors could emphasize the importance of collaboration, require more group work, and seek to develop ongoing relationships with their students. Universities could provide students with more structured opportunities that encourage ongoing connections with peers and faculty.
1 - 20 of 24 Next ›
Showing 20 items per page