Skip to main content

Home/ Digiteen/ Group items tagged identity

Rss Feed Group items tagged

Kelby W

Privacy & Identity | Internet Society - 0 views

  •  
    A big part of the Internet's value is the ability to interact online without giving away your personal stuff.  "Privacy is about retaining the ability to disclose data consensually, and with expectations about the context and scope of sharing. Identifiability, linkability of data, and the mining of vast quantities of aggregated information all erode the individual's ability to manage disclosure, context and scope. Networks depend on the use of unique (and often identifying) numbers, and facilitate the instant global dissemination of information; increasingly, devices and applications gather and use geolocation data that builds up into a unique 'track' for each user. A growing commercial ecosystem based on targeted and behavioural advertising results in an inexorable financial pressure for service providers to exploit personal data. The privacy implications of the current Internet represent a significant and growing concern.   Our Work The Internet Society's Trust and Identity initiative includes dedicated outreach activities on identity and privacy. These are aimed at technology vendors and adopters, to encourage privacy-respecting technology deployment, and at policymakers and legislators to provide the necessary counter-balances to commercial expediency. The Trust and Identity initiative also aims to ensure that users are better informed about the benefits of good online privacy, so that they can make better privacy choices and make use of appropriate privacy-enhancing tools online."
Ivy F.

digiteen2008 - Digital Access - 0 views

  • The reason this page is here is to tell people about digital access, what problems there are and how we can solve them. Digital Access is insuring that everyone no matter who they has access to the internet.
    • Ivy F.
       
      This will help!
  • Access is a very important thing in life. The ten most important terms that have to do with Access are: connect, internet, access, obtain, retrieve, regain and gate way which all mean that there is or you can access something although in particular, the internet.
  • Identity is a topic that people may not think about as access. Although it is. Identity can be shown on the computer or on the internet. When you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network. It is a positive thing because now you can show your identity to other people around the world.
  • ...27 more annotations...
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Adults
  • Identity is a topic that people may not think about as access
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Adults
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • In Australia 74.3 people access the internet but only 22.8 percent of people have broadband access.
  • you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Infrastructure can be very useful although on the other hand can be bad.
  • Education is very important as well
  • Censorship is another problem although it can also be helpful
  • Identity is a topic that people may not think about as access
  • positive thing because now you can show your identity to other people around the world
    • Ivy F.
       
      this will help many people, i should hope!
  • Digital Divide is probably the most important and simplest topic
  • They can get internet on computers by joining a local wi-fi like at a coffee shop, at school, or at a business. Digital Access is how everyday people access their computers and the Internet.
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • mostly go to websites that have games for kids to play. Millsberry, Build a bear, Webkinz, and Club penguin are all places that children could create their own animated avatar type stuff
  • Censorship is when you are not allowed to do something and if you do you will be in trouble by the government. For example, in China they have censorship and they are not allowed to look certain things up on the internet
  • Digital Divide is basically having a line and putting the people that don’t have access to the internet on one side and the ones that do on the other side.
    • hannah h
       
      The digital divide here in south Georgia USA would be like those people who have high speed internet vs. those who have dial up or don't have INternet that are in the country.
  • one of the main problems for adults and kids with accessing the Internet around the world is, simply, their location. People who live in the city would have no problem finding a computer to go on the Internet and do as they want,
  •  
    this is the Access page. from last year.
  •  
    Access page from 2008
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Riya P

How to keep your child safe on Facebook - 0 views

  •  
    These are more tips for a parent to help their child stay safe and away from predators on facebook. "In order to keep your child's identity safe on their Facebook account you will want to talk to them about what they should and should not put in their profile. Profiles contain personal info and recent activity. It would be wise to have your child put some false information on there to mislead people who are trying to steal their identity."
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Liz Luby

Fake Social Network Profiles: a New Form of Identity Theft in 2009 - ReadWriteWeb - 0 views

  • identity hijacking
  • We've already seen some high-profile examples of people creating fake online personas over the past year, the most notable case being that involving Lori Drew and MySpace. In this instance, a mother created a fake online identity to bully her daughter's rival
  • To test their prediction, his team was able to set up fake online identities which ended up connecting to the real network of friends and acquaintances easily.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Valerie B.

How to Protect Yourself from Online Fraud and Identity Theft - 1 views

  •  
    How to Protect Yourself from Online Fraud and Identity Theft
James D

digiteen2008 - Digital Rights and Responsibilities - 1 views

  • Cyber-bullying is a growing problem that has torn many families apart. Some kids have actually gone as far as committing suicide
  • . Most adults are expected to show responsibiliy and follow the law while on the web.
  • extended to every digital citizen.
  • ...7 more annotations...
  • There is a basic set of rights
  • Many of their toys involve the use of the internet, and as children they may not know how to use the internet responsibly.
  • nternet is becoming a bigger and bigger part of the peaople of todays way of life this means that everybody has to contribute to keeping it safe and fun and easy to use.
  • Nine out of ten students get bullied on the web.
  • Identity theft is a crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, usually for profitable gain.
  • The internet as a whole is a privilege.
  • Our responsibility as digital citizens is to stop identity theft, and other harmful things on the internet. Here are some steps into stopping identity theft. - Keep all identification and financial documents in a safe and private place. - Check your credit reports annually - Don’t carry around credit, debit, or ATM cards you don’t need. - Update virus protection software periodically
  •  
    stuff
  •  
    james
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Trent H

Tips to Protect Your Identity - 0 views

  •  
    These are just a few tips of how to save your identity.
Vicki Davis

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
Hayes G.

Internet Privacy Law - 0 views

  • The right to privacy in Internet activity is a serious issue facing society. 1 Some users of the 'net wish to shield their identities while participating in frank discussions of sensitive topics.
  •  
    Sometimes it is very hard to shield your identity while participating in discussions over the internet.
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | ... - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
October H

Spyware, Trojans, Hackers & other PC Threats | Comodo - 0 views

  •  
    Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before."
  •  
    This is about how hackers can know where you live, what your banking is done, etc. All this is found by using Trojans,Hackers, and Spyware.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Savana R

The erosion of privacy in the Internet era | Harvard Magazine Sep-Oct 2009 - 0 views

  •  
    Technology is getting more advanced and identity is getting easier to take, like finger prints and photos. "Imagine if you waved to someone and, without your knowledge, a high-resolution camera took a photograph of your hand, capturing your fingerprints. You might be upset. Or-if you were visiting Disneyland, where they already make an image of your fingerprint to save you from waiting in a long line-you might find the novelty of the technology, and the immediate benefits…gratifying. The ambivalence we sometimes feel about new technologies that reveal identifiable personal information balances threats to privacy against incremental advantages. "
Summer T

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
Kelby W

Online Privacy: Using the Internet Safely | Privacy Rights Clearinghouse - 0 views

  •  
    Knowing how to use the internet will help us be a little more private and keep our identity a little more safety.  "The Internet enables us to improve communication, erase physical barriers, and expand our education. Its absorption into our society has been extraordinary.  It touches nearly every part of our lives from how we apply for jobs and where we get our news, to how we find friends.  A few Web sites have virtually replaced some things, like the encyclopedia and the phone book.  But with acceptance comes a decrease in skepticism.  You may assume that the same laws or societal rules that protect your privacy in the physical world apply to the digital world as well.  But the Internet remains largely unregulated and the policies governing it underdeveloped.  Laws concerning online privacy are still being developed. To date, the U.S. Supreme Court largely has taken a hands-off approach to regulating the Internet and online privacy in favor of free speech.  However, the federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.  One important thing to keep in mind when relying on the law to protect you is that if U.S. law is broken in another country, prosecuting the criminal may prove difficult or impossible. "
1 - 20 of 46 Next › Last »
Showing 20 items per page