Skip to main content

Home/ Digiteen/ Group items tagged challenges

Rss Feed Group items tagged

Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
JustinM_mca MCA

The Challenges of Innovation - 0 views

  •  
    The website linked here shows some of the responsibilities and challenges of innovation. This provides what some innovators would expect when presenting ideas. It also includes what type of hostility and indifference you may receive when presenting your ideas to your superiors in the work place. Apparently some managers aren't very open to new ideas.
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Kelby W

Protecting Personal Privacy Online | Common Sense Media - 2 views

  •  
    This is an article to help kids learn the risks of revealing personal information online.  "Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created can get copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. Each time your child fills out a profile without privacy controls, comments on something, posts a video, or texts a picture of themselves to friends, they potentially reveal themselves to the world. Why privacy matters Digital life is very public and often permanent. If our kids don't protect their privacy, what they do online will create digital footprints that wander and persist. Something that happens on the spur of the moment -- a funny picture, a certain post -- can resurface years later. And if kids aren't careful, their reputations can get away from them and third parties -- like marketers or potential employers -- can access what kids thought was private information. Your kids may think they just sent something to a friend -- but that friend can send it to a friend's friend, who can send it to their friends' friends, and so on. That's how secrets become headlines and how false information spreads fast and furiously. The stakes only rise when we remember that everything takes place in front of huge invisible audiences. Kids' deepest secrets can be shared with thousands of people they've never even met. New technologies make controlling privacy more challenging. With GPS-enable cell phones and location-sharing programs, kids can post their whereabouts. This information can go out to friends, strangers, and companies who will show them ads targeted to their location.  Advice for parents Explain that nothing is really private. No matter what kids think. Privacy settings aren't infallible. It's up to kids to protect themselves by thinking t
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Anne Baird

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  •  
    discussion article around the challenges that teachers face in trying to educate students on how to be safe online as opposed to blocking sites.
JustinM_mca MCA

Internet and Electronic Rights Issues - 0 views

  •  
    The website linked here shows some of the responsibilities and challenges of innovation. This provides what some innovators would expect when presenting ideas. It also includes what type of hostility and indifference you may receive when presenting your ideas to your superiors in the work place. Apparently some managers aren't very open to new ideas.
Merritt D

Attorney General Talks Online Safety With Students - Local News Story - KIFI Idaho Falls - 0 views

  •  
    Attorney General Talks to Middle School and High School students about online safety and sends home a DVD to take home to their parents to help guide them to social media and Internet lingo dictionary to help protect their children form online predators. Quote: "We live in a digital age. There are things facing our children/students that give them a lot more opportunities as well as a lot more challenges that they have to be prepared to deal with,"**and parents need to be prepared as well to be able to better protect their children*** Jefferson County Superintendent Dr. Ron Tolman said. ***add by me***
Brandon P

Game app teaches kids social networking safety - TODAY Tech - TODAY.com - 0 views

  • to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying
  • “It’s never too early to talk to kids about safe online behavior, particularly when accessing social networks,”
  • “Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices.”
  •  
    Application that teaches kids social networking safety.
  •  
    help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying "It's never too early to talk to kids about safe online behavior, particularly when accessing social networks," says Lynette Owens, director of Trend Micro Internet Safety for Kids & Families. "Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices."
  •  
    "The free mobile app BeSeen - launched in partnership with Web Wise Kids, a nonprofit specializing in Internet safety - is a single-player game that replicates a social networking site where players create a profile and travel through a condensed school year. To earn rewards, the player must make positive choices when presented with challenging social situations and solve puzzles along the way. The game is designed to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying"
Julie Lindsay

eSmart Digital Licence - 1 views

  •  
    "The eSmart Digital Licence is an online challenge combining quizzes, videos and games, to prepare Australian children (aged ten and over) to be smart, safe and responsible digital citizens."
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Haley M

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
Sophia O

Stories of Cyberbullying: What do they say? - 13 views

What can you do to stop cyberbulling

cyberbulling

Vicki Davis

Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment - 1 views

  • The CyberBully Alert software is a tool for parents to equip their children with the ability to immediately communicate and document any threats or cyberbullying their children experience when online. Th
  • Experts agree that the best way to address cyberbullying and online threats is to immediately communicate the incident with an adult, as well as document what the threat is.
    • Vicki Davis
       
      I think that every internet browser should have an easy, built in way to take a screen shot and send it to someone. We need this for many safety reasons. It is to protect those who need it most and are often the most technically challenged.
  • A text and email message immediately notifies pre-specified recipients of the online threat - assuring rapid communication between adults and children.
  • ...1 more annotation...
  • CyberBully Alert gives parents the security of immediately being there for their kids when a threat occurs—whether they are at work, in a meeting, on the road, or simply in another room.
  •  
    Software program to mention in cyberbullying section of the wiki.
  •  
    New software that allows children to document and report harmful harrassment online. I would love to test this tool, I find it very interesting. I think this kind of thing is good, but never replaces a parent talking to a child. However, if there is nothing that "can be done" because local laws and others have no method of dealing with it, then I don't know if it will breed frustration. I think every computer should have an easy way to grab screenshots like my fireshot program in firefox. I think this should be part of every web browser.
Tristan S

Xbox LIVE - Xbox.com - Xbox.com - 0 views

shared by Tristan S on 16 Feb 11 - Cached
  • Entertainment Xbox LIVE puts your favorite entertainment right at your fingertips. Buy or rent the best in movies and stream your favorite music with Zune. Or kick back with some Hollywood magic delivered straight to your Xbox 360 via Netflix. You can follow your favorite teams with ESPN and even create personalized radio stations on Last.fm. When it comes to entertainment, Xbox LIVE delivers like no one else.
  • Mobile Game on the go and connect with friends wherever you are. Access your Xbox LIVE account right from your Windows Phone 7 and see what your friends are up to on Xbox LIVE. Add some edge to your gaming repertoire with mobile tips and tricks, track your gamer score, or deck out your avatar with the latest duds.
  • Games Download the hottest titles directly to Xbox 360 and play before you pay with free game demos and trailers. Keep the fun going with a huge library of game add-ons, or challenge friends and family around the world with online gaming. And with hundreds of titles to choose from, there’s a game for every type of gamer.
  • ...1 more annotation...
  • Friends And Family Xbox LIVE keeps you connected to all your friends and family so you never miss a thing. Access Facebook and Twitter or chat with Video Kinect right from your Xbox 360. Plan a get-together with an Xbox LIVE party and enjoy a night of movies and games with friends and family. With Xbox LIVE, it’s easy to have a social life.
  •  
    This site can help us learn how to get in touch with people while using other devices.
Joseph Edore

GetNetWise | Safety By Age 14-17 - 0 views

  • Safety By Age 14 to about 17: This can be one of the most exciting and challenging periods of a child's (and parent's) life. Your teen is beginning to mature physically, emotionally, and intellectually and is anxious to experience increasing independence from parents. To some extent that means loosening up on the reins, but by no means does it mean abandoning your parenting role. Teens are complicated in that they demand both independence and guidance at the same time. Teens are also more likely to engage in risky behavior both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is extremely low, there is always the possibility that he will meet someone online who makes him feel good and makes him want to strike up an in-person relationship. It is extremely important that teens understand that people they meet online are not necessarily who they seem to be. Although it's sometimes difficult to indoctrinate teens with safety information, they can often understand the need to be on guard against those who might exploit them. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them. The greatest danger is that a teen will get together offline with someone she meets online. If she does meet someone she wants to get together with, it's important that she not go alone and that she meet that person in a public place. It's important for parents to remember what it was like when they were teenagers. Set reasonable expectations and don't overreact if and when you find out that your teen has done something online that you don't approve of. That doesn't mean that you shouldn't take it seriously and exercise appropriate control and discipline, but pick your battles and try to look at the bigger picture. If your teen confides in you about something scary or inappropriate that he encountered online, your first response shouldn't be to take away his Internet privileges. Try to be supportive and work with your teen to help prevent this from happening in the future. And remember that your teen will soon be an adult and needs to know not just how to behave but how to exercise judgment, reaching her own conclusions on how to explore the Net and life in general in a safe and productive manner.
Tristan S

Dizzywood - fun free kids games - 1 views

shared by Tristan S on 23 Feb 11 - Cached
  • Dress up your avatar and enter fashion shows! Play with cool pets, including dragons and unicorns! Decorate your tree house and throw huge, fun parties! Play games and challenge other people Attend talk shows with famous people Explore, go on Quests, defeat evil throughout the world!
Steve Madsen

Winners of Trend Micro's 2011 "What's Your Story?" Internet Safety Video Contest Challe... - 1 views

  •  
    Trend Micro Inc. today announced the winners of the company's second annual "What's Your Story?" international video contest that empowers youth to be leaders in educating others about being safe online.
  •  
    Various winners for online safety via Trend Micro. These may be good examples for Action Projects?
Liz Luby

EFF: Frequently Awkward Questions for the Entertainment Industry - 0 views

  • The RIAA has sued more than 20,000 music fans for file sharing
  • To that end, EFF has prepared a sample list of tough questions for times when you hear entertainment industry representatives speaking and want to challenge their positions. Asking hard questions is a way of "keeping honest people honest" and revealing when they're actually being deceptive.
  • DRM has clearly failed to stop songs from getting on file sharing networks
  • ...3 more annotations...
  • Recording off the radio is clearly permitted by copyright law and something Americans have done for over 25 years
  • Is it ever legal for me to use software like DVD Shrink or Handbrake to rip a digital copy of a DVD I own onto a video iPod or my laptop
  • Major entertainment companies have repeatedly brought lawsuits to block new technologies, including the VCR, Digital Audio Tape recorders, the first MP3 player, the ReplayTV PVR, and now P2P software.
Ivy F.

The Great Beyond: Data integrity in the digital age - 0 views

  • With the emergence of web-based lab notebooks, digital image “enhancement”, and the quick and easy (and possibly dirty) generation and dissemination of colossal amounts of data, it’s becoming increasingly clear that technology provides new challenges to maintaining scientific integrity
1 - 20 of 21 Next ›
Showing 20 items per page