Khan Academy
Khan Academy: Learn More About the Internet on Khan Academy
Provided are links to Khan Academy content on the following subjects: Computers and the Internet; HTML/CSS; Cryptography; and SOPA/PIPA.
Ted Nellen
Cyber English (By Ted Nellen): Oppenheimer: The Computer Delusion
A controversial article from The Atlantic magazine suggesting that there is no evidence to show that using computers in schools improves either teaching or learning. Argues against cutting enriching programs in art and music to fund...
Other
Making Internet Audio Files for the Macintosh
A tutorial on making Internet audio files for the Macintosh.
University of Washington
Vinton G. Cerf: The Internet Phenomenon
An article about the development of the Internet by Vinton G. Cerf. Includes a short biography of his career.
Khan Academy
Khan Academy: Computer Malware
Learn abou9t the types of malware and how to protect computers from malware.
Goodwill
Gcf Global: Internet Safety: Wi Fi Security
Learn tips and information about securing wireless internet networks.
TESL Journal
The Internet Tesl Journal: Copyright Issues on the Web
Specific, easy to read guidelines on Copyright and Plagiarism regulations. Focuses on use of Internet material. Includes clear definitions and copyright information listings. A great resource to prevent plagiarism on your site and in...
Other
California State Univ.: Internet as Ethics Resource Tool
Site from California State University, Fullerton addresses ethical use of the internet with hyperlinks to valuable sources from the US Supreme Court to Thomas Jefferson and John Stuart Mill.
Other
Pc World: Privacy 2000 in Web We Trust?
PC World provides an enormous article on internet privacy. Includes examples, problem areas, and tips and solutions resulting in more safety and privacy on the Internet.
Get Safe Online
Get Safe Online: Use a Firewall
Firewall software forms the first line of defense against hackers and certain types of computer viruses. This site explains what a firewall can do to help secure a computer and what it cannot do. The site also discusses different types...
Get Safe Online
Get Safe Online: Use Internet Telephony Safely
Internet telephony is using the internet for voice communication. It is also called voice over IP (VOIP). This site provides some tips on how to use VOIP safely and avoid loss of privacy.
Other
Cpsr: Netiquette Training Whose Responsibility?
CPSR offers an article on the need to train new Internet users about netiquette. Includes experiences with E-mail, need for netiquette, and additional resources.
ibiblio
Ibiblio: The Ethics of Web Site Engineering
An article from Chris MacDonald on computer ethics of Web site engineering. Includes ethics, personal space, and administrave responsibility.
Other
Cpsr Newsletter: Digital Life Style for Women
An extensive general discussion of all the changes that have occurred within the culture of women in the workplace and the home and the increasing number of women academics and users of the internet.
BBC
Bbc News: Heartbleed Bug: What You Need to Know
Learn about the ways in which the Heartbleed bug has impacted internet security and what you can do to browse more safely.
Other
Hot Scripts: Ruby on Rails
This resource presents an internet directory of resources for Ruby on Rails programmers.
Other
University of Wolverhampton: Getting Started With File Transfer Protocol
An article describing the Internet File Transfer Protocol. Includes a FTP session, command choices, command formats, and FTP utilities.
International Reading Association
Reading Online: Publishing Student Work on the Internet
Explore this online article by Rachel Karchmer discussing the advantages of publishing student work on the web.
Get Safe Online
Get Safe Online: Use Webmail Wisely
Webmail is web-based email. The reason webmail is popular is because it provides convenient email processing from any internet connected computer. This site describes some of the security risks associated with webmail and how to avoid them.
Other
Western Illinois University: Plagiarism and the Web
An essay on the challenge of plagiarism for teachers and the temptation for students, with helpful suggestions.
Other
Bitlaw: Rights Granted Under Copyright Law
An article on the exclusive rights granted under the Copyright Act.
Other
Ez Talks: 7 Different Ways to Communicate Online
Online communication is a kind of communication between organizations or individuals that starts and ends on the Internet. Basically, it is how people pass information over the Internet through a network of computers. This article...
Other
The 101 Series: E Mail Etiquette
This site from the 101 Series describes different types of guidelines for sending emails. Some of the guidelines are for the convenience of the sender/receiver. Some of the guidelines have to do with etiquette (manners), and some are...
Khan Academy
Khan Academy: Public Key Encryption
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.