Skip to main content

Home/ Digiteen/ Group items matching "on" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Kelby W

Internet Use Raises Privacy Concerns - 0 views

  •  
    We need to be more alert about who we chat with how we use the internet.  "The Internet brings us great websites full of information and entertainment, and email and chat have revolutionized communication. But there's a dark side, too, as Internet users are increasingly concerned about how much of their personal information they're giving up in exchange. VOA's Art Chimes reports on the debate over Internet privacy. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we're disclosing, but which advertisers and commercial websites can use to sell us goods and services. Sometimes the information is openly requested: you register on a website and you fill out a form. Next time you log into the site, you find ads for sporting equipment if you registered as a young man, or maybe cosmetics if you're a woman. Other times, websites and advertisers seem to magically know our interests. They can do this because of cookies, little text files created on your computer that contain information left there by the websites you visit"
Kelby W

Privacy & Identity | Internet Society - 0 views

  •  
    A big part of the Internet's value is the ability to interact online without giving away your personal stuff.  "Privacy is about retaining the ability to disclose data consensually, and with expectations about the context and scope of sharing. Identifiability, linkability of data, and the mining of vast quantities of aggregated information all erode the individual's ability to manage disclosure, context and scope. Networks depend on the use of unique (and often identifying) numbers, and facilitate the instant global dissemination of information; increasingly, devices and applications gather and use geolocation data that builds up into a unique 'track' for each user. A growing commercial ecosystem based on targeted and behavioural advertising results in an inexorable financial pressure for service providers to exploit personal data. The privacy implications of the current Internet represent a significant and growing concern.   Our Work The Internet Society's Trust and Identity initiative includes dedicated outreach activities on identity and privacy. These are aimed at technology vendors and adopters, to encourage privacy-respecting technology deployment, and at policymakers and legislators to provide the necessary counter-balances to commercial expediency. The Trust and Identity initiative also aims to ensure that users are better informed about the benefits of good online privacy, so that they can make better privacy choices and make use of appropriate privacy-enhancing tools online."
Emma S

U.S. Underwrites Internet Detour Around Censors Abroad - NYTimes.com - 0 views

  •  
    The content of the web site is informing, the more interesting part is the map graphic on the left side of the page its the third picture down if you start with the head line picture. The picture shows countries and their restrictions on internet searches and how the government controls what a person views on the internet.
Brianna W

Steve Harvey's ex-wife blasts comedian in YouTube videos - CNN - 2 views

  •  
    This is about a comedian's ex wife putting videos of their marriage falling apart on youtube. She is being sued for not having rights to post stuff about him on youtube. She posted 3 26 minute videos on it.
Ashley C

Privacy News Articles - 1 views

  •  
    These articles are about how the government can track what your doing online and what your doing on your cell phones. They can see whats on your computer and whats on your cell phone.
Haley M

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a persOn violates that intellectuals rights. Though Once that copyright is sold it no lOnger belOngs to them. This article discusses Feist PublicatiOns V. Rural Tele Services CO, PrincetOn University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
Vicki Davis

ACLU Sues School For Punishing 12-Year-Old Over Facebook Comment - 2 views

  •  
    You'll want to read this lawsuit as it lies on the cusp of what we will experience in schools in the future. In this case, a 12 year old girl (on Facebook, despite the fact she is technically too young to be) is suing a school district (via the ACLU) for punishment because of her use of Facebook. I think the school went too far when it required her to hand over her Facebook and email login to the school, but we'll see what the courts decide. The ACLU says this is a violation of free speech. Stay tuned and realize that students have a right to hate you, say unkind things about you, etc. There is a fine line in what is allowed and what isn't. Just because we CAN deal with issues relating to bullying of other children - that doesn't mean we can wear our own chips on our shoulders and require that kids pretend to like us. It is hurtful when children say unkind things and many don't realize everyone is watching. If students are not understanding the consequences of their actions, then I partially blame any school that doesn't step up and teach digital citizenship.
Vicki Davis

Facebook keeps 'deleted' user photos for years - 13 views

  • Even if you delete incriminating photos on your Facebook profile, the company is keeping them accessible to anyone online for up to 30 months.
    • Antonio R
       
      woahhhhh that seems really creepy. i dont think that is right for a company to have a deleted photo of you for 30 months. if you delete it, then you delete it for a reason, not so even more people that are in a company to see you doing something that you thought people to see but then relized it was stupid to put this on in the first place.
  •  
    This article points out that up to 30 months after photos are deleted from Facebook that they are still there. If someone has the direct URL to a photo, it is still accessible. Students should be taught about this and we should educate ourselves as well. once something is uploaded it is out there. Period. You cannot take it back.
  • ...5 more comments...
  •  
    Facebook is keeping photos up to 30 months after they are deleted!
  •  
    this is a really interesting article. I wonder if other IM sites like MySpace or AIM.
  •  
    this artical is very interesting and it is true that facebook is keeping the deleted photos up for 30 months after they are deleted !!!!!!
  •  
    i think this artical is really interesting because it is good to know that you should be careful when posting pictures on facebook.
  •  
    This is a very interesting article. Safety is really important and dont every do anything stupid because it will never be deleted. You should NEVER do anything bad on the internet because it is not a different life it is just the internet!
  •  
    i think this is an interesting article and its good to no about the information it gave us and that you should be careful what you post on the internet. its the interenet and its not a different life and anyone can see it
  •  
    WOW! 30 months? That's amazing, yet horrible. Very interesting article, it shows that there's more to social media than you think. Great post. You really should be careful when posting things on the internet.
Julie Lindsay

Classroom Resources to Counter Cyber Bullying - Portal Page - 0 views

  •  
    The Internet has created a whole new world of social communications for young people who are using e-mail, social networking Web sites, instant messaging, chat rooms and text messaging to stay in touch with friends and make new ones. While most interactions are positive, increasingly kids are using these communication tools to antagonize and intimidate others. According to a 2008 University of Toronto cyber bullying survey, nearly one in five Canadian students surveyed reported having been bullied online in the past three months.[1] An Alberta study found that one-third of students who had cyber bullied, had also been victims themselves.[2]
Miller S.

How Adult Learners are Using the Internet - 0 views

  • Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
    • Miller S.
       
      Adults using the internet
  •  
    Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
Vicki Davis

Digital literacy and the classroom « Rhondda's Reflections - wandering around the Web - 1 views

  • We don’t leave our students alone and expect that they will figure out the disciplines of science, maths, English, etc. We guide them through each of these disciplines, educating them on the principles that work and help them gain knowledge and learning as they negotiate their way through the many ideas and directions made known to them.
  • Why is it, then, that schools expect students to work out effective digital strategies on their own
  • We need to help our students develop the skills and processes to negoitate their way through safely and effectively using the option that are available today and for the future developments.
  •  
    I love Rhondda's reflections on digital citizenship. She makes very profound, reasonable arguments as a teacher in the trenches and she has my vote 100% on what she's saying!!
Vicki Davis

Canada's Privacy Commissioner Takes on Facebook « Canada's World - 0 views

  • concerned users should exert their power, and use social network’s the connectivity potential these facts abundantly clear to their friends.
  •  
    This article on Facebook's privacy problems shows how Jenifer Stoddart, Canada's Privacy Commissioner, is taking on Facebook, who has 30 days to comply with the commissioner's request.
  •  
    Concerns about Facebook privacy loopholes are important to understand in this year's research.
Julie Lindsay

`Don't post that!' - networking etiquette emerges - 0 views

  •  
    In an age in which instant news and constant life streams from Facebook and Twitter change the way we communicate, the rules of etiquette surrounding these interactions are still evolving. What happens when I expected a phone call about something and read about it in a status update instead? What's the polite response to a distant friend posting bad news on Facebook? What to do with sensitive information? Making matters trickier, good etiquette on Facebook might not apply on Twitter or in an e-mail. These days, milestones like marriage, pregnancy, breakups and divorce are being described over more forms of communications than ever.
Erin B

Xbox Live - Wikipedia, the free encyclopedia - 0 views

shared by Erin B on 05 Oct 09 - Cached
  •  
    Xbox Live is a great example of internet commerce and freedom. "Xbox Live (trademarked as Xbox LIVE[1]) is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. It is currently the only online gaming service (on consoles) that charges users a fee to play multiplayer gaming. It was first made available to the Xbox system in 2002. An updated version of the service became available for the Xbox 360 console at that system's launch in 2005. on the Windows platform, the service is named Games for Windows - Live, which makes most aspects of the system available on Windows computers. Microsoft has announced plans to extend Live to other platforms such as handhelds and mobile phones as part of the Live Anywhere initiative.[2]"
Brody C

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and informatiOn from the federal government to help cOnsumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making Online purchases, avoiding phishing scams (with a fun Flash animatiOn On how to tell if you’re being phished), and defending cell phOnes and PDA’s against attack.
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Merritt D

Let's keep children safe in the cyber age | BlueRidgeNow.com - 2 views

  •  
    I firmly believe as a child of a very "nosy" mother, that I is the parents duty to keep their children in check, but I do not agree with this! If you don't trust you child enough to NOT read their messages, then maybe they don't need one! All this does is give them doubts of your trust, they will feel as if you are invading their privacy, and will be deleting things constantly. Parents need to understand that trust works both ways. This conversation is going to be award and neither the parents nor the child wants to have it, but you need to. It's one way of protecting your child without destroying their trust and doubting yours! Quotes: "I routinely check the texts and photos on their cell phones," says Susan Kain." "let's all talk to our children about Internet safety, social networking sites and "sexting."
Garrett E

How wireless technology can affect the body - Health - CBC News - 1 views

  •  
    Phones send waves of radiation. About five billion wireless subscriptions world wide, which is given by WHO's estimate. Long-term exposure to the the electromagnetic fields (EMF), which cellphones communications create, has been given attention to by researchers. In May of this year, the WHO's International Agency for REsearch on Cancer found that the evidence was too inadequate to make any conclusions about risk. Many studies have been done, but no solid proof has been found. Another study was done on a case of glioma, a type of brain cancer, and acoustic neuroma,, a slow-growing non-cancerous tumour in the inner ear that results in hearing loss. Although the group found the evidence also lacking. however, the evidence was significant enough to warrant classifying radio frequency electromagnetic fields as "possibly carcinogenic to humans." WHO places this in a category known as 2B. Mind, coffee and pesticide DDT are also classified as "possibly carcinogenic to humans." Placing calls rather than emailing or texting has been proved that the risk is higher since the radio frequency energy is higher. Even though the evidence is limited, many countries advise children especially should limit their use of cellphones. The United Kingdom, German, Belgium, Israel, Russia, France, Canada, and India are all included. James McNamee, division chief for health effects and assessments in Health Canada's bureau of consumer and clinical radiation protection, said, "There has been relatively little science done on children and children's cellphone use, and children are going to be using these devices for a much larger period of their life span. Their brains and immune systems are still developing." Health Canada said cellphone users may take practical steps to reduce exposure, such as: Limit the length of cellphone calls. Replace cellphone calls with text messages or use "hands-free" devices. Encourage those under the age of 18 to limit the cellphone use.
WestR WHSB

Fair Use Teaching Tools | Center for Social Media - 0 views

  •  
    used for teaching fair use to students "these clips allow students to practice explaining why something is fair use" "you could divide the class into groups and have every group discuss the same scenario and then come back together to see if groups agree. Or you could divide up the class and give every group a difference scenario to discuss. The groups could then report back and see if their classmates agree or disagree with them. Finally, you could choose one scenario and divide the class in half. Have one group argue for fair use and one argue against fair use. Whose argument is stronger and what does the class ultimately believe is the right answer? " "Have them give any and all arguments that they think explain why the video is fair use. "
  •  
    "The Center for Social Media has created a set of teaching tools for professors who are interested in teaching their students about fair use. The tools include power points with lecture notes, guidelines for in-class discussions and exercises, assignments and grading rubrics." the center of social media has created a set of teaching tools for teacher to teach their students about fair use.
Brandon P

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sectiOns that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someOne said. The green highlight shows 7 tips that are very important for not Only students, but everyOne else to stay safe Online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
« First ‹ Previous 61 - 80 of 588 Next › Last »
Showing 20 items per page