Skip to main content

Home/ Digiteen/ Group items tagged twitter

Rss Feed Group items tagged

Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
Steve Madsen

ABC The Drum - Tweeps of NSW politics - 0 views

  •  
    The Premier Kristina Keneally does not rely on a notebook to communicate with the public - she uses Twitter. Some MPs use the social networking site to simply make announcements, but the Premier actively engages Twitter users who make contact with her.
  •  
    Is twitter becoming a new way to communicate in politics? For it to be effective, does there have to be 2-way communication?
Lindsey B

Twitter Privacy - 0 views

  •  
    How to keep your tweets safe while on Twitter
Julie Lindsay

Roxburgh Homestead Primary School defends classroom Twitter accounts for children | Her... - 0 views

  •  
    Article showing both sides of the argument for letting younger students use social media (including Twitter) for learning.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Steve Madsen

Twitter co-founder's next big thing: mobile payments - 0 views

  •  
    "Square, a new venture from a co-founder of Twitter, has launched a free application that allows anyone to accept credit card payments on the iPhone, iPad and Android phones."
  •  
    Why would this appeal to people in business? How secure are the transactions?
Karly D

Facebook Vs Twitter: Do You Have To Choose? - Forbes - 1 views

  •  
    So there's a war between Facebook and Twitter and one of them must win, right?
Karly D

Twitter Versus Facebook, A Comparison Of The Top Users - 0 views

  •  
    This is comparing the two popular social networks, Facebook and Twitter.
Julie Lindsay

`Don't post that!' - networking etiquette emerges - 0 views

  •  
    In an age in which instant news and constant life streams from Facebook and Twitter change the way we communicate, the rules of etiquette surrounding these interactions are still evolving. What happens when I expected a phone call about something and read about it in a status update instead? What's the polite response to a distant friend posting bad news on Facebook? What to do with sensitive information? Making matters trickier, good etiquette on Facebook might not apply on Twitter or in an e-mail. These days, milestones like marriage, pregnancy, breakups and divorce are being described over more forms of communications than ever.
Steve Madsen

Twitter's Spectacularly Awful 24 Hours - 0 views

  •  
    Good example of how an organisation was scrutinised and copped bad public relations. A must read if you are aware of Twitter
  •  
    Twitter just went through an awful 24-hour stretch. It included taking away a feature some people loved, probably being misleading about it, getting a huge amount of backlash, halfway bringing the feature back, and getting railed by the press for it all - with bouts of downtime mixed in for good measure.
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 1 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
  •  
    Net neutrality deserves a mention in the Digiteen project and is an important topic being debated here in the US.
Braxton R

What Parents should know about Twittering? - Family and Child Online Safety Blog - Safe... - 0 views

  •  
    Tips and information for parents about how their child can stay safe on twitter.
Steve Madsen

Twitter user convicted after 'menacing' message - AfterDawn - 1 views

  •  
    UK citizen Paul Chambers has been convicted this week of sending a 'menacing' tweet via Twitter, with the British Court fining him £1000 and slapping him with a criminal record.
  •  
    Chambers lost his job after being arrested, and appears to be the first person to ever be convicted of a crime just for tweeting.
Steve Madsen

SF Mayor Gavin Newsom Tweets His Way Into The Race For California Governor - 0 views

  •  
    an example of twitter in California
  •  
    This morning San Francisco mayor Gavin Newsom announced his bid for California Governor via Twitter,
Steve Madsen

How much information is too much in cyberspace? - web - Technology - smh.com.au - 0 views

  • Twitter, Facebook and other similar online services are making it easier than ever for people to share their thoughts with others. But the obsession many people have for posting updates also raises the question: When does sharing about one's personal life cross the line and become too much information?
  •  
    Twitter, Facebook and other similar online services are making it easier than ever for people to share their thoughts with others. But the obsession many people have for posting updates also raises the question: When does sharing about one's personal life cross the line and become too much information?
  •  
    When does sharing about one's personal life cross the line and become too much information?
Kristin Hokanson

6 Facebook, Twitter mistakes that can get you fired - CSO Online - Security and Risk - 2 views

  •  
    Don't make these mistakes
Riya P

Effects of Technology on Culture - 0 views

  • Technology has had an outstanding effect on modern society and culture.  It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter.  Internet communities promote freedom of expression that may not be as feasible in real life.  Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously
  •  
    Cultrual! This is a really long article about how cultures overlap. "Technology has had an outstanding effect on modern society and culture. It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter. Internet communities promote freedom of expression that may not be as feasible in real life. Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously"
Vicki Davis

Steganos infographic - data privacy » TechWeekEurope UK - 1 views

  •  
    The biggest privacy offenders (hat tip Lifehacker podcast) include Facebook, gmail, MSN Live, Skype, Twitter, Dropbox, Google Plus. This demonstrates whoch internet service providers share your personal data without an official court order. If you look at the infographic, you'll see that Facebook is more than twice the second offender, gmail. Many concerned about privacy are moving to services like PATH for just that reason.
Savana R

Is the Internet Destroying Privacy? : Discovery News - 1 views

  •  
    Facebook doesn't have good privacy because when you post a status it shows where you are at the time. "Today, oversharing has become typical of online social networking, with people publicizing real-time information of where they are (Foursquare, Gowalla) and what they're doing (Twitter, Facebook)."
1 - 20 of 36 Next ›
Showing 20 items per page