Skip to main content

Home/ VITTAlearning/ Group items tagged cybersafety

Rss Feed Group items tagged

VITTA Professional Learning

Cybersafety help button download page | Department of Broadband, Communications and the... - 0 views

  •  
    "The Australian Government's cybersafety help button provides internet users, particularly children and young people, with easy online access to cybersafety information and assistance available in Australia. "
John Pearce

ACMA Portal - 0 views

  •  
    "Connect.ed is an innovative, self-paced cybersafety education program offered by the Australian Communications and Media Authority (ACMA) as part of Cybersmart. Connect.ed provides teachers with the flexibility of a self paced environment to learn about current online behaviours of students, potential risks involved in these activities, a teacher's and school's duty of care and the appropriate tools, resources and strategies to help students to have safe and positive experiences online."
Roland Gesthuizen

Top 3 ways Parents can monitor cell phones - 0 views

  •  
    "Trust between teenagers and parents can be a difficult balancing act. .. While parents have already started monitoring their teen's questionable behavior online, another significant way is monitoring cell phones. Top 3 tips for parents on how to monitor telephone usage are listed here:"
  •  
    Some cybersafety tips for mobile phone use.
Roland Gesthuizen

Eaglehawk SC - Professional Development + E-Team - FUSE - Department of Education and E... - 0 views

  •  
    Eaglehawk SC have harnessed the enthusiasm and skills of their students to form a vibrant and highly trained student team.
Roland Gesthuizen

Keep yourself safe online with our cyber safety tips - Legal & General - 0 views

  •  
    ".. social networking is putting social media users at risk of falling victim to increasingly sophisticated cyber criminals. To highlight some of the key findings from the Report, we've created a series of infographics, (images and key facts),  and a video below"
Roland Gesthuizen

How China and Others Are Altering Web Traffic - Technology Review - 0 views

  •  
    ""Invisible" servers let governments quietly intercept and modify their citizens' online communications."
John Pearce

The Web Means the End of Forgetting - NYTimes.com - 0 views

  •  
    Another great article about the perils of working within this online world, a world where our online identity can live linger than our memory.
Roland Gesthuizen

US-CERT Cyber Security Tip ST04-011 -- Using Instant Messaging and Chat Rooms Safely - 0 views

  •  
    "Although they offer a convenient way to communicate with other people, there are dangers associated with tools that allow real-time communication. "
  •  
    Good advice about cyber security in chat rooms.
John Pearce

Using Facebook in the Classroom - 0 views

  •  
    Stephen Heppell provides these eminently sensible guidelines for teachers wanting to use Facebook in conjunction with students.
John Pearce

Smokescreen § Homepage - 0 views

  •  
    "Smokescreen is a cutting-edge game about life online. We all use Facebook, MySpace, Bebo and MSN to keep up with our mates - and we've all heard the stories about parties on Facebook being mobbed, or people getting stalked on MSN. The question is, what would you do if it happened to you? Over 13 missions, Smokescreen follows the story of Max Winston and Cal Godfrey, two mates who've set up an exclusive social network called White Smoke. After Cal's involved in a car accident and falls into a coma, White Smoke becomes huge - and starts attracting huge problems. Each mission sees you explore the world of White Smoke, and find out who you can trust - and who you can't."
John Pearce

Edudemic » The Ultimate Guide To Online Privacy - 0 views

  •  
    "If you've ever visited a website that handles even the smallest bit of your personal information, there's a good chance (hopefully) that it's asked you to read through a privacy policy or two. Rather than pour over the details, many of us simply click on 'I AGREE!' and proceed with using the application. Even the companies and websites involved understand this and make it as easy as possible to satisfy lawyers as well as users. What's the harm in essentially ignoring that privacy policy? While the majority of the time it's harmless, there are some ne'er-do-wells that may gather your personal information and sell it to marketers, advertisers, or spammers. While terrible, it's not unheard of."
Roland Gesthuizen

'Dating' Site Imports 250,000 Facebook Profiles, Without Permission | Epicent... - 0 views

  • “Facebook, an endlessly cool place for so many people, becomes at the same time a goldmine for identity theft and dating — unfortunately, without the user’s control. But that’s the very nature of Facebook and social media in general. If we start to play with the concepts of identity theft and dating, we should be able to unveil how fragile a virtual identity given to a proprietary platform can be.”
  • Mark Zuckerberg, the company’s founder, made his name at Harvard in 2003 by scraping the names and photos of fellow classmates off school servers to feed a system called FaceMash. With the photos, Zuckerberg created a controversial system that pitted one co-ed against another, by allowing others to vote on which one was better looking.
  •  
    "How does a unknown dating site, with the absurd intention of destroying Facebook, launch with 250,000 member profiles on the first day? Simple. .. an approach taken by two provocateurs who launched LovelyFaces.com this week, with profiles - names, locations and photos - scraped from publicly accessible Facebook pages."
  •  
    Is scraping data off Facebook art or does this raise privacy issues? Interesting.
Mr Limb

The Task - cyberwits - 0 views

  •  
    Becoming cybersmart online. Establishing etiquette etc.
1 - 15 of 15
Showing 20 items per page