InfoCommons

Yes, social networking can be kid-friendly | Education IT | ZDNet.com

Posted in Uncategorized by coda on April 29, 2009
  • tags: no_tag

    • Many administrators, teachers, and parents simply associate MySpace and FaceBook with the term social networking, possibly adding Twitter to the mix and generally writing off the technology as an unsafe liability. However, we all need to expand our view of what social networking can be. Kid-friendly social media also doesn’t need to mean Club Penguin and Webkins.

Advertisements

Top News – Child-friendly social networking tools

Posted in Uncategorized by coda on April 29, 2009

MySpace vs. Facebook Safety – LoveToKnow Social Networking

Posted in Uncategorized by coda on April 29, 2009

Designing Informational Safety.

TXlTcGFjZSB2cy4gRmFjZWJvb2sgU2FmZXR5IC0gTG92ZVRvS25vdyBTb2NpYWwgTmV0d29ya2luZw==

Posted in Uncategorized by coda on April 29, 2009

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

[slideshare] Beyond Blocking: Embracing the Social Web at melanie mcbride online

Posted in Uncategorized by coda on April 29, 2009

A thoughtful and refreshing take on embracing the social web.

W3NsaWRlc2hhcmVdIEJleW9uZCBCbG9ja2luZzogRW1icmFjaW5nIHRoZSBTb2NpYWwgV2ViIGF0IG1lbGFuaWUgbWNicmlkZSBvbmxpbmU=

Posted in Uncategorized by coda on April 29, 2009

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

Identity Theft Resource Center Fact Sheet 120 – Identity Theft and Children

Posted in Uncategorized by coda on April 29, 2009
  • tags: no_tag

    • Child Identity Theft occurs when a child’s identity is used by another person for the imposter’s personal gain. The perpetrator may be a family member or someone known by the family. It could also be a stranger who purposely targets children because of the lengthy time between the theft of the information and the discovery of the crime.

      There are some cases that appear to be identity theft but are not. Receiving a pre-approved credit card offer in your child’s name might upset you as a parent. However, it might only be an innocent marketing tool sent by an affiliate of your bank because you opened a college fund for your child. A quick check of credit reports will help you sort out the truth. Currently, all three reporting agencies are automated systems. You should call them (numbers at end) and request a credit report for your child. If you are told that there is no credit report, this is probably not a case of financial identity theft.

This is a particular problem faced by children who are victims of cyberbullying.

iKeepSafe: 10 Ways to Protect Your Kids Against Identity Theft

Posted in Uncategorized by coda on April 29, 2009

Twitter Handbook for Teachers

Posted in Uncategorized by coda on April 29, 2009
  • tags: no_tag

    • view_page.set_view_container(); var analytics = new Analytics(); var seo_query = null, seo_keywords = null; if (analytics.isSearchEngineVisitor()) { seo_query = analytics.getSearchEngineQuery(); seo_keywords = analytics.getSearchEngineKeywords(); } if (seo_query && $(‘disable_highlighting’)) { $(‘query_highlighting’).innerHTML = seo_query.replace(/</g, '/g, ‘>’); $(‘disable_highlighting’).show(); $(‘ipaper_highlighting_box’).show(); }

      view_page.set_view_main();

      Twitter Handbook for Teachers

       

       

[QUICKTIP] Enjoy our Second Life Quickstart Guide! – TNT – Second Life Tips & Tricks – Second Life Blogs

Posted in Uncategorized by coda on April 29, 2009

Virtual Worlds, an excellent guide