background preloader

Digital citizenship, online safety & civility

Digital citizenship, online safety & civility
This post first appeared on CNET News by Larry Magid I’ve heard a lot of consternation about apps and sites that let users post anonymously and, indeed it is possible to use services like Whisper, Ask.FM, Secret, and Yik Yak to be annoying, mean, or downright cruel. But the same can be said for any tool that enables social interaction, whether it’s a social network, a phone, or even a place where people meet face-to-face. In fact, research has shown the in-person bullying is much more prominent than cyberbullying. But just because a service enables people to post anonymously doesn’t mean that people will necessarily use it in an inappropriate manner.

http://www.safekids.com/

Related:  Online Safety ResourcesINTERNET SAFETYbrandimw

Manage your privacy and security – For everyone – Safety Center – Google Access your settings by clicking your name or picture in the right corner then clicking Account. At the top, click Security. In the Password box, click Setup next to “2-Step verification.” You will then see a step-by-step guide which will help you through the setup process. You’ll then be taken back to 2-step verification settings. Getting started – For families – Safety Center – Google As a parent or guardian, you know what feels right for your family and how your kids learn best. To help your family navigate through new technologies, gadgets, and services in an ever-changing online world, it helps to get practical advice. That’s why we continuously talk to safety experts, parents, educators and communities around the world – to keep a pulse on what works.

Teacher's Guide to Digital Citizenship The horror stories of young people not grasping the reach and influence of the content they put online are familiar to all of us. From the loss of job opportunities due to unprofessional pictures or comments on social media, to the more serious threats of abduction, and even the self-harm inspired by cyber bullying, the stakes are high. While students may often seem clueless to these dangers, some are starting to understand the risks. In a recent Rasmussen study on digital literacy, details of which you can see in the infographic below, 37% of millennials aged 18 – 34 said they consider the internet scary, which is more than any other demographic.

Internet Safety Almost all children today have access to the Internet through schools, libraries, community centers, or their home. And most 8 to 18-year-olds, 74 percent, have Internet access from their home computers according to the Kaiser Family Foundation. Not only do more children have access to the Internet than ever before, but they are using it more, too. Many schools incorporate the Internet into their curricula and encourage online research for projects. But that’s not all kids are doing online. A Bullying Quiz Printer-friendly version Objectives: Understand how evidence regarding behavioral patterns might challenge personal beliefs and assumptions about social behavior Use evidence about bullying behavior to inform daily decisions regarding social interactions and understand the necessity of making personal decisions in bullying situations Use factual information to consider consequences and alternatives of personal behavior choices IntroductionEven students who have experienced bullying might be surprised by the statistics and studies about bullying. It's important for adults, student leaders and other educators to raise awareness about the prevalence of bullying and its detrimental effects for all involved.

Using Instructional Design to Implement Constructivist E-Learning - Learning Theory and Educational Technology Heather Smith Boise State University Abstract Constructivist learning activities help create a sense of community necessary to student engagement in an e-learning environment. Course developers can use the principles of instructional design to systematically and consciously embed constructivist learning projects in a web-based course. Adventure Games Copyright © 2001-2017 National Center for Missing & Exploited Children. All rights reserved. Animated Characters Excluding Tera Copyright © 2000-2017 National Center for Missing & Exploited Children and Boys & Girls Clubs of America.

Keep Yourself and Your Stuff Safe Online" Digital Book for Teens by Linda McCarthy from Official Microsoft Download Center Own Your Space Teen Book\Own Your Space Teen Book _All Chapters.pdf Own Your Space Teen Book _All Chapters.xps Own Your Space Teen Book\Own Your Space_Chapter 01_Protect Your Turf.pdf Own Your Space Teen Book\Own Your Space_Chapter 02_Know Your Villains.pdf Own Your Space Teen Book\Own Your Space_Chapter 03_Nasty Ware.pdf How to Teach in an Age of Distraction (CHE) At MIT, I teach a seminar on science, technology, and memoir. Enrollment is capped at 20 students. The atmosphere is intimate. We read memoirs by scientists, engineers, and designers, and then the students tell their own stories.Some of them have lived hardscrabble lives. During one recent semester, their stories were particularly poignant.

Do Facebook actually have control of there internal networks? Becoming more and more plausible are the minority claiming their are either subject to an apt infiltration in backend systems or they have an insidet threat not yet recognised by facebook management Still dangers lurking in instagram & whats app & a new kid on the block ios shortcuts Facebook is again resposible for hiding a vast malicious botnet collecting a small fortune in click/ad fraud. A bad Actor #APT utilising the faceboom dev platform & some of its popular Open source framewoks react js & open graph api. Yet more 3rd Party abuse of data for facebook users globally From Hybrid-A scan of chessmicrobase dot com /m/1koly51q + assets.chessmicrobase and insecure versions of ogp.me (/ns#)to which is part of a vast malvertising campaign starting point from bt home hubs, blocking and opt out of network cookies. bad actor replacement embedded cookies inject via helper & aged insecure help pages on hub settings access, invoke a multitude of click/ad fraud dns spoofing and multiple phishing campaigns on .gov.uk websites. Possible offline fraud via HMRC and USA border control, human trafficking Remote Access Related * Contains indicators of bot communication commands 
details
"GET /assets/favicon.png HTTP/1.1 * Accept: */* * Accept-Encoding: gzip, deflate * User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko * Host: chessmicrobase.com * DNT: 1 * Connection: Keep-Alive * Cookie: __cfduid=d23189e1675c1e89c6225ba3db616b5ea1571856069; chessmicrobase_session=54d728e5ae1df00cde56afc5917608bb; __utma=249848660.429181473.1571856075.1571856075.1571856075.1; __utmb=249848660.1.10.1571856075; __utmc=249848660; __utmz=249848660.1571856075.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1" (Indicator: "cmd=") * "GET /favicon.ico HTTP/1.1 * Accept: */* * Accept-Encoding: gzip, deflate * User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko * Host: chessmicrobase.com * DNT: 1 * Connection: Keep-Alive * Cookie: __cfduid=d23189e1675c1e89c6225ba3db616b5ea1571856069; chessmicrobase_session=54d728e5ae1df00cde56afc5917608bb; __utma=249848660.429181473.1571856075.1571856075.1571856075.1; __utmb=249848660.1.10.1571856075; __utmc=249848660; __utmz=249848660.1571856075.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1" (Indicator: "cmd=") by samanthaiphone Oct 23

Related: