Recent Changes

Thursday, May 22

  1. msg Nice Work message posted Nice Work You had a lot of good information.
    Nice Work
    You had a lot of good information.
    5:14 pm

Tuesday, January 17

  1. comment Online Privacy and Identity Protection comment added Jackie, Your Wiki layout is great especially your table of problem and solution. I was not aware t…
    comment added
    Jackie,
    Your Wiki layout is great especially your table of problem and solution. I was not aware that teachers were victims also. This was very enlightening. (CDG)
    4:41 am
  2. page Internet Acceptable Use Policies edited ... Organizational responsibilities. Other sources have a different criteria of the AUPs structur…
    ...
    Organizational responsibilities.
    Other sources have a different criteria of the AUPs structure: preamble, a definition section, a policy statement, an acceptable uses section, a violations/sanctions section.
    ...
    AUP anyway?
    {Picture2.jpg}
    More Resources:
    (view changes)
    4:37 am
  3. comment Internet Acceptable Use Policies comment added Carmin, This was very informative and I loved the video. Parents should establish AUP at home so i…
    comment added
    Carmin,
    This was very informative and I loved the video. Parents should establish AUP at home so it will be easy to follow the ones established at school and later, in the workplace. (CDG)
    4:37 am

Monday, January 16

  1. page Online Privacy and Identity Protection edited ... {http://farm5.static.flickr.com/4120/5433359435_9f4c21650b.jpg} Problem: Soluton: Soluti…
    ...
    {http://farm5.static.flickr.com/4120/5433359435_9f4c21650b.jpg}
    Problem:
    Soluton:Solution:
    Personal information is secretly obtained by visiting unsecured websites.
    Pay attention to URL of website. Those beginning with https are secure.
    (view changes)
    8:11 pm

Sunday, January 15

  1. page Harrassment and Cyber Bullying edited ... With the rampant growth of Internet and technology usage, more and more of our youth and young…
    ...
    With the rampant growth of Internet and technology usage, more and more of our youth and young children have access and utilize the Internet and technology tools for fun and education. With this increase comes safety and security concerns for parents and educators alike as to how we can make this access safe and secure as well as a fun experience for our children today. One of the rapidly growing problems that has resulted from increased utilization is cyber bullying.
    {http://assets.safetyweb.com/Posters/CyberBullying/Cyberbullying_FINAL.jpg}
    Cyber bullyingisbullying is the cruel
    Cyber bullying comprises of activities such as:
    threats
    (view changes)
    5:47 pm
  2. page Harrassment and Cyber Bullying edited ... flooding of email messages computer virus infections The Research is still being performed…
    ...
    flooding of email messages
    computer virus infections
    TheResearch is still being performed on when cyber bullying actually began but it has been increasing as more and more children obtain access to technology and the Internet. Deaths that have occurred as a result of cyber bullying has been recorded since 2000 (McKenna, 2010). The statistics are
    42% of kids reported of being bullied online.
    35% of kids reported of being threatened online
    ...
    Heyugly.org. (n.d.). Cyberbullying. Retrieved from http://heyugly.org/CyberBullying.php.
    LawBrain.com (2010). Cyberbullying. Retrieved from http://lawbrain.com/wiki/Cyberbullying.
    McKenna, P. (2010). The rise of cyber bullying. Retrieved from http://www.readersdigest.com.au/cyberbullies/.
    Ribble, M. and Bailey, B. (2007). Digital citizenship in schools. Washington, DC: International Society for Technology in Education.
    WiredKids, Inc. (n.d.). Stop Cyberbullying. Retrieved from http://www.stopcyberbullying.org/prevention/index.html.
    (view changes)
    5:44 pm

More