Skip to main content

Home/ Digital Citizenship in Schools/ Contents contributed and discussions participated by John Pearce

Contents contributed and discussions participated by John Pearce

John Pearce

Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data | Th... - 0 views

  •  
    "Here's what she found: hiding from big data is so inconvenient and expensive that even Vertesi doesn't recommend it as a lifestyle choice. (She presented her findings at the Theorizing the Web conference in New York last week.) So what does that mean for companies who say users can just "opt out" if they aren't happy with (so-called) privacy policies? Can you be a person on the internet without sacrificing all your data to the Google Powers That Be? I talked to Vertesi about her experiment, its implications, and why hiding from big data can make you look like a criminal"
John Pearce

5 ways to save face online: dealing with criticism on social media - 1 views

  •  
    "The internet can be a dark place. For businesses, a mismanaged customer complaint online can spell the end for a well-established reputation, especially if the results go viral. By learning to deal with trolls and dissatisfied customers, businesses can turn negative word-of-mouth into satisfied consumers. Here are six ways you can make the most of online complaints, and hopefully increase brand loyalty."
John Pearce

Moving to the Cloud? What should you consider? | Lucacept - intercepting the Web - 2 views

  •  
    "What I gained from this exercise was a thorough understanding of issues surrounding Cloud Computing and the information I needed to be able to speak confidently with my school community about the move we were making. If you're a school looking to move into the Cloud Computing space, then measures like this are necessary. If you're an Australian school looking for links to assist you with the process, then take a look at the following."
John Pearce

Dutch girl who threatened American Airlines with terrorist attack arrested - 0 views

  •  
    " A Dutch teenager was arrested in Rotterdam on Monday afternoon after she tweeted a terrorist threat at American Airlines that quickly went viral online, police officials said. It was not immediately known what charges she could face."
John Pearce

Sweeping Away a Search History - NYTimes.com - 5 views

  •  
    "YOUR search history contains some of the most personal information you will ever reveal online: your health, mental state, interests, travel locations, fears and shopping habits. And that is information most people would want to keep private. Unfortunately, your web searches are carefully tracked and saved in databases, where the information can be used for almost anything, including highly targeted advertising and price discrimination based on your data profile."
John Pearce

Would The Real 'Alec Couros' Please Stand Up? | open thinking - 1 views

  •  
    "Last September, I wrote a post about how scammers had been using my photos to lure women into online, romantic relationships for the purpose of 'borrowing' or extorting money. Since that time, the scams have continued. I get, on average, one new report a day from women (and occasionally men) who have been tricked, or nearly tricked, into sending money. In many cases, individuals have reported forming deep attachments or even falling in love with these scammers. This has been a frustrating predicament that has been going on for many years now. In this post, I thought I would share a few of the things that I've learned about the scams, the scammers, and their potential victims."
John Pearce

Msg to mum: don't sweat the cyber stuff - 0 views

  •  
    "Cyber-bullying, update-addiction, sexting - from the perspective of a parent raising a ''digital native'' child, social media seems fraught with dangers. But new research suggests the risks inherent in social media use by younger generations might be overblown. danah boyd, assistant research professor at Harvard and principal researcher for Microsoft Research - like k.d.lang, she prefers the lower case - has completed a large-scale study on how US teenagers use the internet in general, and social media in particular. Her book is called It's Complicated, and is the result of in-depth interviews with scores of teens over an eight-year period."
John Pearce

The attack that could destroy the internet - 1 views

  •  
    "Almost since the birth of the internet there have been computer users who have attacked and hacked other computers out of malice or just because they could. One of these types of attacks features quite regularly in mainstream news; a Denial of Service or DoS attack. That's the general name they're given but actually a DoS attack is quite an old form of web attack and one that is largely unused. "
John Pearce

Henry Sibley Presents: Managing Your Digital Footprint - YouTube - 1 views

  •  
    "Published on 25 Sep 2013 Henry Sibley High School believes in educating students now for the digital realm of the future. This means being aware of the implications that today's online interaction can have down the road. This 15 minute video walks students through how to protect themselves online, and how to create and manage a positive digital footprint. Special Thanks to Azul 7, the University of Minnesota, and the Mendota Heights Police Department."
John Pearce

South Korean schools are remotely disabling students' smartphones | The Verge - 1 views

  •  
    "Following small-scale trials, Korean officials are reportedly moving forward with a plan to install remote management software on students' smartphones. iSmartKeeper is an app that restricts what services and apps students have access to. With the app installed, teachers have the ability to lock phones down in one of six modes. Educators can choose to lock all of the phones in the school, allow only emergency calls, allow only phone calls, allow calls and SMS, or turn off specific apps. The idea is to prevent distractions in class, and iSmartKeeper can also allow access to only a single app, ensuring that educational apps can still be used as teaching aids."
John Pearce

Phil Bradley's weblog: Search privately using your favorite search engine. - 1 views

  •  
    "As we all know, search engines like tracking you - your IP address, your search terms and so on. They use this to build up profiles, store the data and so on. It can be a real pain trying to search without this information being stored, but you can try Disconnect Private Search. This routes your search queries through their proxy servers before they go to the popular search engines, including Google, Bing and Yahoo."
John Pearce

Digital Citizenship | An Ethical Island - 2 views

  •  
    "The more our students are online, the more information they will encounter. It is important for them not only be able to access this information, but also to be the best digital citizens that they can be. Here are some ideas. I am sure there are lots and lots more."
John Pearce

e-Learning Acupuncture: Are you new to social media curation in online learning? [VIDEO] - 3 views

  •  
    "This great video produced by Vanessa Dennen (Florida State University) for the Social Media for Active Learning MOOC (#SMOOC2014), will give you a quick overview of social media curation. It's a great topic that all online instructors will love exploring."
John Pearce

Beyond Blocking: Social Media Schools - Edudemic - 3 views

  •  
    "While the first instinct in schools and districts is often to block services such as Facebook, Twitter, Pinterest, and even some blogging platforms, the positives of these tools often outweigh the negatives. When used well, social media tools connect all stakeholders in a school community in a ways that have never before been possible. "
John Pearce

Combatting the cyberbully myth - 1 views

  •  
    "Why do we keep telling children that the law cannot protect them against severe cyberbullying? Time and time again politicians and the press claim that there is nothing police or parents can do if a child is being bullied on the internet, and that government needs to step in."
John Pearce

Mobile phone tracking: it's not personal - 1 views

  •  
    "Mobile phone tracking techniques are becoming more commonplace. Waste bins target ads. Shopping centres follow customers. Spooks follow airport passengers. Will the Privacy Act's new definition of personal information provide enhanced protections against mobile phone tracking? Not really. Here's why."
John Pearce

Spring Cleaning Who Has Access to Your Data - NYTimes.com - 0 views

  •  
    "Whether you realize it or not, dozens - if not hundreds - of apps and services have access to your social accounts and can see everything you're doing online. Tweets, Likes, your location, are all there for the taking. What's worse, there's a pretty good chance you unwittingly gave them permission."
John Pearce

Free wi-fi hotspots are a data risk: SSO Alert Priority Moderate | Stay Smart Online - 2 views

  •  
    "Subscribers should be cautious about using free wireless hotspots. In particular, you should avoid sending sensitive or personal information over these untrusted networks. Free wi-fi hotspots can be found in coffee shops and public establishments, offering convenient internet access over a wireless connection. You can connect to these hotspots using devices such as mobile phones or laptops with wireless capabilities. However, it is important to be aware that most of these hotspots are unsecured, meaning that all the information you send across them is vulnerable."
John Pearce

Why digital privacy is only for the rich | Arwa Mahdawi | Comment is free | theguardian... - 0 views

  •  
    "The growing privacy industry isn't changing the fact that most people are products sold to advertisers - it's just changing the way they are sold."
John Pearce

Get off my cloud: when privacy laws meet cloud computing - 1 views

  •  
    "What does privacy mean in an age of ongoing privacy breaches? With new privacy law coming online in Australia on March 12, our Privacy in Practice series explores the practical challenges facing Australian business and consumers in a world rethinking privacy."
« First ‹ Previous 41 - 60 of 159 Next › Last »
Showing 20 items per page