Skip to main content

Home/ Digiteen/ Group items tagged action

Rss Feed Group items tagged

Vicki Davis

danah boyd | apophenia » Why Parents Help Children Violate Facebook's 13+ Rule - 2 views

  •  
    Danah Boyd writes a great article about how parents are helping their kids break the 13 year old rule. I have some Digiteens doing their own research /action project on this. I will be sharing the video in December.
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Maggie H

Causes Of Internet Addiction - What Causes Internet Addiction Disorder - 0 views

  • Looking for something? SEARCH Causes Of Internet Addiction  0  0   With more than 100 million users worldwide, the internet has become one of the most universal methods for communication. From e-mail to the possibly billions of web pages, the amount of information flowing is infinite. It gives the user freedom to talk and mingle with others online and access MUD (Multi-User Dimensional) games. No doubt, the World Wide Web (www) is informative, convenient, resourceful and fun, but this freedom comes along with the possibilities of abuse and addiction.   Inte
  • et Addiction, also kn
  • Intern
  • ...1 more annotation...
  • own as Pathological Internet Use, can simply be termed as ‘addiction over Internet or other activities dependent exclusively on the use of Internet’.
  •  
    Pathological Internet Use (Internet Addiction) is termed as addiction over the internet
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
William H

1_Tuunainen.pdf (application/pdf Object) - 0 views

  •  
    Abstract Online social networking offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others. However, the increasing number of actions in online services also gives a rise to privacy concerns and risks. In an attempt to understand the factors, especially privacy awareness, that influence users to disclose or protect information in online environment, we view privacy behavior from the perspectives of privacy protection and information disclosing. In our empirical study, we present results from a survey of 210 users of Facebook. Our results indicate, that most of our respondents, who seem to be active users of Facebook, disclose a considerable amount of private information. Contrary to their own belief, they are not too well aware of the visibility of their information to people they do not necessarily know. Furthermore, Facebook's privacy policy and the terms of use were largely not known or understood by our respondents.
Abi W

ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident - Technology News - redOrbit - 1 views

  •  
    A 12 year old student at a school in Minnewaska was forced to give up her password and username in order for her school to view comments made about the student. The ACLU filed a suit on behalf of the student against the Minnewaska Area Schools.  
  • ...3 more comments...
  •  
    A girl in Minnesota had her passwords and usernames forcefully taken from her by a school. The school said it was cyberbulling, but many people disagree. A rights group took up the case for the girl and i suing on the 4th amendment search and seizure and the 1st amendment right to free speech.
  •  
    Girl posts something about a hall monitor hating her on Facebook, school demands she gives them her username and password. The students parents were not present. No warrant was issued by the police. The student filed a law suit with the ACLU against the school.
  •  
    This article is about a 12 year old girl (R.S.) that had to give her Facebook username and password to her school because of a hall monitor she didn't like. The school didn't notify her parents, and her parents never said the school to take that action. The ACLU is suing the school under the first amendment law (Unlawful search and seizure). 
  •  
    This article is about a girl who was forced to give her username and password for her Facebook account, to her school. The school didn't have a warrant or permission of any kind to take her information, which violates her constitutional rights. The American Civil Liberties Union is suing the school for this violation.
  •  
    The article "ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident" was about a 12-year old girl. The girl in this article was refered as R.S. Issues starting coming up when R.S. had something on Facebook that said the school's hall monitor hated her. The school forced her to give them her username and password then searched her page. After, a son's mom complained to the school that R.S. and her son were talking about sex online. Once the school demanded to go through her account again, the ACLU charged them for not giving her the freedom of speech and unreasonably searching though her stuff. This was violating the First and Fourth Amendment since the two incidents. In the end R.S. didn't get in trouble but the school did.
Matt B

Gale World History In Context - Document - 0 views

  •  
    Never has this fact been starker than in alarming statistics on Internet security breaches released by Incidents.org which tracks system incursions around the world.
Ben B

Gale World History In Context - Document - 0 views

  •  
    This article discusses the different way to communicate online.
Ben B

Gale World History In Context - Document - 0 views

  •  
    This article talks about how bullying has changed from being a face-to-face act to being someone that can be done online.
Sidney m

Gale Student Resources In Context - Document - 0 views

  •  
    This shows how different things people spend a majority of their time on which could lead to health problems as well
Margaret s

Gale Opposing Viewpoints In Context - Document - 0 views

  •  
    a story about how women are learning computer literacy skills all over the world
Sam V

Gale World History In Context - Document - 0 views

    • Sam V
       
      This document is talking about how more and more students are enrolling in technical schools in Brazil. I was thinking this might go along with what Jason had said about PLN's . It's just an example.
  •  
    This document talks about how the college enrollment had gone up in Brazil.
Sam V

Gale World History In Context - Document - 2 views

    • Sam V
       
      I'm not sure how much information this might give us, but I think it's a good start!
  •  
    This document talks about technical awareness and youths who are trained to use certain technology.
Sam V

Gale World History In Context - Document - 0 views

  • LOCAL corporate leaders, captains of industry and senior Government officials gathered in Windhoek on Wednesday to witness the launch of the country's UN Global Compact Network.
  • The newly launched business initiative is a global concept whereby companies integrate a number of social and environmental concerns into their business operations and in their interaction with their stakeholders on a voluntary basis, with the aim of advancing corporate social responsibility in the country.
  • Compact Network will generally facilitate access to business information, tools and technical inputs through its strong relations with other UN entities, development agencies and civil society.
  • ...3 more annotations...
  • Within the Namibian UN Global Compact Network, companies can choose their mode of engagement, which may be either collectively or individually", he explained.
  • Tim Parkhouse, said local participating companies would not only benefit from better public relations, but also from an increased understanding amongst their stakeholders of the private sector's potential as an agent for sustainable development.
    • Sam V
       
      Again with this one, I'm not sure if it entirely fits our topic, but I'm pretty sure the main idea does fit. If others in the group don't agree, we don't have to use it.
  •  
    This document talks about how the Namibian UN Global Compact Network can change the way companies interact with stakeholders and how they interact with each other.
Miller S.

Usenet: Not dead yet - 0 views

  •  
    As with anything that has been around as long as Usenet, and been so important to so many people, there's a great deal of folklore that's grown up around it, reflected in terms like "Big 8" and "The Great Renaming," "Netiquette" and "Never-ending September." Usenet's technological underpinnings predate its association with the Internet, resting on dial-up-based store-and-forward e-mail BBS systems and UUCP protocols and programs. Although its name makes it sound monolithic, Usenet is perhaps best described as a huge, loose collection of informal information-exchange communities that have little in common beyond their naming convention and their reliance on the Network News Transfer Protocol used to manage Usenet messages. The basic unit is the newsgroup, a threaded discussion devoted to a topic. Newsgroups are organized by topic into hierarchies. Google Groups, which provides access to Usenet, lists more than 1,000 top-level hierarchies. Many of these are named for a country or city, company or product. The Microsoft hierarchy, for example, includes 3,337 newsgroups, such as microsoft.public.mac.office.entourage, microsoft.public.scripting.vbscript and microsoft.public.outlook.calendaring.
‹ Previous 21 - 40 of 51 Next ›
Showing 20 items per page