Skip to main content

Home/ OKMOOC/ Group items tagged when

Rss Feed Group items tagged

w_kwai

Harvard University admits to secretly photographing students - 11 views

  •  
    I think, its really an expensive and unnecessary experiments, if the attendance of Harvard University is low, then they have to come up with different rule to attract the interest of students. Cameras should be there for security, but not for surveillance.
  • ...10 more comments...
  •  
    Similar example to what Adobe software has done with collecting information…users/students seem to have to accept this "new-normal" of spying, etc.
  •  
    I agree. Cameras should be there for security, not for surveillance. But just like the Adobe software, before we use it we have to "agree" on its' terms. I believe very few actually read those agreements, because we have to use the software, "agreeing" on those terms might just be "agreeing" on allowing them to collect our information. I live in Vancouver, BC. I know there are people who dislike the idea of the buses with cameras. I personally like that idea, it makes me feel like I am protected. When I was in high school in Victoria, BC, I feel safe taking the taxi even when it is late, because they have cameras in every one of them. When I was in Hong Kong, I feel insecure taking a taxi even when it is noon. So even if some of our information or our identity is given away, I agree on the idea of having cameras on buses and taxi's. I wonder if there is a gender difference on this, and there is also a gender gap of taxi drivers, maybe that is also why I personally feel insecure. Back to the point, if the purpose of cameras is for security, I agree to that. If it is for surveillance, I do not think it is essential; referring to the Harvard University attendance, at least they should inform the students about it.
  •  
    This line caught my eye: "The study was approved by the US federally mandated Institutional Review Board, which assesses research and determined that the study "did not constitute human subjects research" and therefore did not require prior permission from those captured by the study." I have been debating with my own campus IRB over what constitutes human subjects research and what doesn't--they seem to be operating under the idea that if it's not invasive medical studies involving blood or drugs, it's not really human subjects. I think the issue in this Harvard study is that the IRB also has a clause that if you are collecting data in public spaces and not interacting with the people there, it doesn't require IRB approval; the question is whether these classrooms should be considered public spaces. My feeling is they aren't--in order to be in a room at a particular time, a person has to have chosen to attend that class, and within college classes it is assumed that the students can know that what they say is to some extent private among their classmates and professor. Even if the photos were destroyed after analysis, the fact remains that there were cameras inside what I would consider private spaces, without the consent of the people doing what they might feel is dangerous work (given the current assault on public intellectuals and academic freedom). My guess is that Harvard could easily have asked all the relevant parties to sign consent forms at the beginning of a semester but not indicated on which days they would be filming--people would probably continue doing what they normally do either way, but at least would have the option of asking not to be filmed. There's always a way to set up an area in a lecture hall where the cameras couldn't reach, so students who didn't want to be on film could opt out.
  •  
    Thank you so much for sharing this article, I meant to read it a few days ago and got side-tracked!
  •  
    Thanks for sharing this! I have mixed feelings about this article. At first, I was super opposed to the whole initiative Harvard did to their students because I would feel that my privacy has been violated completely, but after realizing that there are many more subtler forms of violations in privacy online (social media sites, tracking cookies etc.) I wasn't as opposed to the article. Although initially, students were not informed about their surveillance, there were told in the aftermath, and their information was destroyed. When using social media sites or installing new applications, there are terms of agreement before continuing on with the installation in which personally I don't read at all. Those terms and conditions have statements inside which notify us of tracking personal information which I have not read earlier but am still not opposed to giving. The information is probably sold to advertisers and we're probably not aware of it but we still give them the information via the signup of the program. Hence, even though there are contradictory views and feelings about their initiatives, we should be more aware and cautious of other forms of surveillance when we sign up for things (e.g. social media sites etc.)
  •  
    Thank you for sharing. This does raise some concern. I guess there may be good and bad with cameras installed in the school. The cameras installed without students' consents may be violating their privacy and rights. However, it may prevent wrong doings, i guess. When my friend was doing final exam, the prof asked the whole class to put their belongings in front of the classroom, but when he went to pick up his stuff after he was finished, his bag was missing. Through the security camera, they were able to see who stole his stuff.
  •  
    Did any body else remember George Orwell's novel (1984). By accepting this type of behavior we accepting the image of a holly power that is ethical, care and neutral. Does this exist? and who will monitor the observers?
  •  
    I think this is a really good point, who will monitor the observers? What kind of power do those people hold and what are they doing with all those information? It makes people uncomfortable.
  •  
    Interesting news! It's surprising to get to know that Harvard University places cameras without letting students know, photographs them during lectures to measure attendance. This reminds me of my high school in China. When I was in high school, I remember that cameras were installed at the back of every classroom to prevent students from distraction in class or cheating during exams. It mainly worked as threatening students, from my understanding. Because you never know when the camera will be opened, actually, it never opened. What happened in Harvard University just reminded me of that, which is quite satiric.
  •  
    Thanks for sharing this article. In my personal opinion, I think the action of secretly installed the cameras from Harvard University violates students' privacy. If it's just for measuring classroom attendance, I think Harvard University could definitely find a much better way instead of installing the camera.
  •  
    wondering if this would be a different conversation if the cameras were just picking up heat signals so that the identity of the people could not be known but they could still be counted. The technology is pretty basic and it might even be more efficient than the way they're using them now.
  •  
    Can't believe Harvard can do this thing. I think informations are sharing and revealing on internet or others more and more serious. Harvard shouldn't secretly photograph students, they should ask permission first.
kristykim

How companies collect your private information when you browse online - 1 views

  •  
    When we are browsing online, we do not think about electronic privacy and the personal information our computer leaves. Some may be aware of this, but some are not. Companies and other electronic sites are collecting our private information when we are browsing online. They keep track on the things we buy and things we may search. We need to protect our Internet privacy while surfing the Web and monitor the information our computer sends out. Another option you can do is to control your personal information online and offline. Although IP addresses can provide a fairly detailed summary of our computer, Web browser cookies provide a more complete profile of a user's preferences. Three types of cookies are sent out when we surf the Internet. The three types of cookies are session cookie, persistent cookie, and third-party ad-serving cookie. For more information check out this site.
  •  
    I had heard about it through a computer specialist a few years back. Since then, we try to be more careful but I think that if someone wants information from you the wil get it anyway.
bhowatg

Death and social media: what happens to your life online? - 0 views

shared by bhowatg on 09 Sep 14 - No Cached
  •  
    Interesting and shocking article, we are all consumed with our everyday social networking profiles, but has it ever clicked to you what happens when one kicks the bucket. Is your profile preserved, deleted or it becomes a memorial Losing a friend or family member is painful enough, but imagine the extra, unnecessary jabs when that friend's social networking profile continues to pop up in searches. Or say your friend was particularly wise or witty when posting online, but when you went back to reference something later, the entire record was gone without a trace.
Kim Baker

The Baloney Detection Kit: Carl Sagan's Rules for Bullshit-Busting and Critical Thinking - 3 views

  •  
    "Just as important as learning these helpful tools, however, is unlearning and avoiding the most common pitfalls of common sense. Reminding us of where society is most vulnerable to those, Sagan writes: In addition to teaching us what to do when evaluating a claim to knowledge, any good baloney detection kit must also teach us what not to do. It helps us recognize the most common and perilous fallacies of logic and rhetoric. Many good examples can be found in religion and politics, because their practitioners are so often obliged to justify two contradictory propositions.He admonishes against the twenty most common and perilous ones - many rooted in our chronic discomfort with ambiguity - with examples of each in action"
  •  
    The 20 fallacies: "ad hominem - Latin for "to the man," attacking the arguer and not the argument (e.g., The Reverend Dr. Smith is a known Biblical fundamentalist, so her objections to evolution need not be taken seriously) argument from authority (e.g., President Richard Nixon should be re-elected because he has a secret plan to end the war in Southeast Asia - but because it was secret, there was no way for the electorate to evaluate it on its merits; the argument amounted to trusting him because he was President: a mistake, as it turned out) argument from adverse consequences (e.g., A God meting out punishment and reward must exist, because if He didn't, society would be much more lawless and dangerous - perhaps even ungovernable. Or: The defendant in a widely publicized murder trial must be found guilty; otherwise, it will be an encouragement for other men to murder their wives) appeal to ignorance - the claim that whatever has not been proved false must be true, and vice versa (e.g., There is no compelling evidence that UFOs are not visiting the Earth; therefore UFOs exist - and there is intelligent life elsewhere in the Universe. Or: There may be seventy kazillion other worlds, but not one is known to have the moral advancement of the Earth, so we're still central to the Universe.) This impatience with ambiguity can be criticized in the phrase: absence of evidence is not evidence of absence. special pleading, often to rescue a proposition in deep rhetorical trouble (e.g., How can a merciful God condemn future generations to torment because, against orders, one woman induced one man to eat an apple? Special plead: you don't understand the subtle Doctrine of Free Will. Or: How can there be an equally godlike Father, Son, and Holy Ghost in the same Person? Special plead: You don't understand the Divine Mystery of the Trinity. Or: How could God permit the followers of Judaism, Christianity, and Islam - each in their own way enjoined to
  •  
    Wonderful post, Kim! These are great guidelines alongside which to test ideas.
kristykim

Protecting Your Digital Identity - 4 views

  •  
    I have many identities through many social media. When I post things online I wonder if I am being responsible of what I am posting. Even though I pick the people who are allowed to see my post, sometimes I wonder if people I do not know visit my profile. It is great to connect with people around the world. However, we have to take caution of what we post and whom we connect with. We need to protect our digital identities and be careful of hackers. If we are not careful, we can have our identity stolen.
  • ...1 more comment...
  •  
    Yes, it is our responsibility not to leave any personal information on internet instead of blaming fraudsters.If we use the technology gadgets appropriately it benefits us a lot else many problems too.
  •  
    I totally agree! I think protecting our digital identities is really important. I personally is a multi-social media user, I used Pinterest, Facebook, Weibo, Instagram etc. and I also write blog sometime. However i realize that for some of the social media digital platform is not allow you to delete everything all at once, and sometime if you want to make your blog post private after you have published it, but the system wouldn't let you do that. Also so many social media platform are actually tracking your location by suing the gps ect. Right now I really feel like need to be aware when using social media and be aware when you are trying to post something online.
  •  
    Thanks for the reminder once again to be wary of what and where we post online and the implications behind posting or leaving our digital identities online. I often forget that my information can easily be tracked, seen, manipulated, stolen by others when I participate in online activities such as social media sites, online shopping, and/or any other applications that requires submitting personal information.
lauren_maggio

[1410.2926] Estimating Open Access Mandate Effectiveness: I. The MELIBEA Score - 1 views

  •  
    "MELIBEA is a Spanish database that uses a composite formula with eight weighted conditions to estimate the effectiveness of Open Access mandates (registered in ROARMAP). We analyzed 68 mandated institutions for publication years 2011-2013 to determine how well the MELIBEA score and its individual conditions predict what percentage of published articles indexed by Web of Knowledge is deposited in each institution's OA repository, and when. We found a small but significant positive correlation (0.18) between MELIBEA score and deposit percentage. We also found that for three of the eight MELIBEA conditions (deposit timing, internal use, and opt-outs), one value of each was strongly associated with deposit percentage or deposit latency (immediate deposit required, deposit required for performance evaluation, unconditional opt-out allowed for the OA requirement but no opt-out for deposit requirement). When we updated the initial values and weights of the MELIBEA formula for mandate effectiveness to reflect the empirical association we had found, the score's predictive power doubled (.36). There are not yet enough OA mandates to test further mandate conditions that might contribute to mandate effectiveness, but these findings already suggest that it would be useful for future mandates to adopt these three conditions so as to maximize their effectiveness, and thereby the growth of OA. "
  •  
    Strings attached: I needed an id!
Kevin Stranack

All Is Not Vanity | Literary Review of Canada - 0 views

  •  
    "Self-publishing is at a stage analogous to the early days of Wikipedia, when users were reluctant to trust information contained in a communally written encyclopedia. It turns out that online democracy performs quite an effective self-regulating function. "
  •  
    Good points in the article: There are several good reasons a novelist chooses to self-publish: 1. Because of repeated rejection. 2. To get the book to market more quickly. 3. To have more control over the process. 4. To receive a larger share of the book's earnings. 5. To attract the attention of a major publisher.
  •  
    With digitization of publishing its now an option to self publicize especially for new writers who thing their work will never be acknowledged. But musicians are also using the self publicizing/promotion and later one it does pays on. I heard of Justin Bieber story of when the mother was busy posting you-tube videos.So its possible to go a "freenuim" way and start with e.g blogging and eventually build a fan/interest base
larssl

Light Stalking | Beautiful Photography - 0 views

  •  
    A good place to find useful help when working with photo editing.
  •  
    A good place to find useful help when working with photo editing.
kristykim

Top three reasons we choose illegal downloads - 8 views

  •  
    This site explains why people choose to illegally downloads, even if some people know that they are breaking the copyright law.
  • ...3 more comments...
  •  
    very interesting and I agree with the responses.
  •  
    Interesting share! Thank you. I didn't realize that illegal downloads also largely and universally happen in North America before I read this article. Since I grew up in China, and now I've been living in Canada for three years. I know that illegal downloading is quite common in China as there are a large number of websites are providing free access to TV shows, movies, and even American dramas movies musics, and I believe they never paid for them. They are distributing them and selling ads to make profit which is illegal. I though this is not common in Canada and America because some of my Canadian friend told me they are used to buying music from iTunes and they were surprised when I show them all the musics they like can be free downloaded from a Chinese App. However now i can see that this also largely happens in North America. I think the article is good in showing why people choose to illegally downloads, and it's quite interesting. But I think it's also worthy to research on what they are doing with those illegally downloaded stuffs. For example, somebody are just downloading for themselves and some people are actually downloading for sharing it, or even selling it, which is definitely illegal.
  •  
    I agree with resualts of online survey
  •  
    Interesting read as I'm guilty of illegally downloading/streaming TV and music. Very surprised to see that the rich are the ones who illegally download on a regular basis.
  •  
    "I'd have to wait too long to see it on TV" is the reason I hear the most about when it comes to illegal downloading. Those people generally do make an effort to watch it when it does officially come out on TV though, to off-set their piracy. The way companies will show something in one country and then sit on it for five months before letting someone in another country watch it seems silly to me at this point, though. Yes digital piracy is illegal, but it seems to be getting to the point of the Prohibition Era in the United States: yes, it's illegal, but everyone's doing it anyway. I think somebody's going to need to change things up here, and it seems doubtful that the companies producing these shows can alter the cultural norms without a lot more work than it seems they're willing to put in.
mbittman

Monitor: The language of the internet of things | The Economist - 0 views

  •  
    THERE was a time, not long ago, when access to the internet could be gained only through a computer. Now people can get to it using phones, tablets and some games...
  •  
    THERE was a time, not long ago, when access to the internet could be gained only through a computer. Now people can get to it using phones, tablets and some games...
rebeccakah

Is Social Media Keeping Science Trustworthy? - 1 views

  •  
    Online discussions and post-publication analyses are catching mistakes that sneak past editorial review. This article describes the pitfalls with editorial review and pre-publication peer review, and advocates for post-publication crowd-sourced reviewing through social media platforms.
  • ...1 more comment...
  •  
    The Advantage of online-journals is that the comments are next to the articles. In printed Versions corrections may be as far as several issues away and can easily get lost. I would think it would be great to actually correct the article to have it on an actual state. Correctors should be credited in the community same as the authors. That would reduce the production of new and new sensless articles and Reviews.
  •  
    I think having a comments section is a great way to provide feedback on the information provided. Often when I read articles the comments section allows me to understand different perspectives and interpretations of the information.
  •  
    This article, while not necessarily explicitly, managed to hint at what I find to be a source of problematic practices/outcomes in the academy, publishing, etc. That is, it is not necessarily that traditional peer review processes are ineffective at finding errors or misconduct, but rather it is when our processes and practices become so systematized that we can mindlessly or effortlessly engage in and reproduce them without our full, critical attention that they can produce problems. While I think there are good reasons to critique the notion of peer and "expert" culture within traditional peer review processes, an additional and separate critique is the problems that arise with systematization. The article implicitly addressed this when the author commented that current post-publication environments "provide a public space that is not under the control of journal editors and conference organizers." Yet, as White indicates, there exists skepticism of the value of post-publication reviews along with a simultaneous effort to build post-publication systems that have standards that put those questioning it at ease. The National Institutes of Health establishing requirements that potential post-publication reviewers must meet demonstrated this. That is, they are trying to figure out how to systematize post-publication. For me, what this article indicates is that we ought to figure out how to keep our academic and publishing processes "fresh," so to speak. This way we don't become so comfortable with our methods and practices that they allow us to simply go through the motions without fostering innovative and critical inquiry.
Kevin Stranack

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chr... - 26 views

  •  
    Text from 2011, still extremely timely, about privacy. The author, professor of Law, deconstructs the "nothing to hide" argument that says that we should not be scared to disclose private activities or information when we do nothing wrong.
  • ...11 more comments...
  •  
    Excellent, thanks for this. The "nothing to hide" argument also rests on the absurd premise that the authorities all have pure motives and will not abuse their power with this level of access to private information. To assume that all authorities, everywhere, all have noble intentions and pure motives is absurd as assuming that all human being are perfect....
  •  
    Even though it is a few years old, the topic is still relevant--and maybe even more so in the wake of Snowden. Although most of us do truly believe we have 'nothing to hide', we are all naively unaware of just how easily something innocent can be twisted to nefarious means. At the same time, if we are all being watched, are any of us really being watched? Something to ponder.
  •  
    The big problem is the concept of privacy. In Brazilian law we have three kinds of personal information (data): public, private, and restricted. The difference between public and private information is matter of personal choice, in others words, each one may decide what is matter of the public or private information. The restricted informations are those that we are required by law to give the government, but the government cannot disclose without authorization. The privacy issue is respect for this choice between private and public data. When government or anybody disrespects this choice, we have a problem. I think in virtual ambience the users ignore those distinctions and make a big mess. If in one hand government and big players have been stealing our data, in other hand the users don't have necessary care about his own private information.
  •  
    "Nothing to hide as at now" might be correct as a current status but not for the future. Human beings we always behave like we have control of our future. I may have nothing to hide as at now but in 10 years time when I ran for political office my past will surely halt me.
  •  
    True, however our real name / our real identity, if used consistently across the variety of online audiences we engage with, permits Big Data to be aggregated, defining our activity as a distinct entity, giving it greater value in the analytics marketplace -- whether we have anything to hide or not ... What price do you wish to place on your digital self as an online product is the real question.
  •  
    Makes a great point. I used to think that way, if I have nothing to hide I don't have to worry about what others find about me. But is true there is no need for everyone to have access to every single detail about you. And the point Kim and Philip made is really important, with more information available and more companies interested in making profit of it becomes more difficult to maintain control of who access your information and what it is used for.
  •  
    The article raises two important points: (1) the right to know how information is being used and (2) the right to correct incorrect inferences being made from sometimes an incomplete information sets. I begin with the assumption that,despite how I take care to protect information, there are individuals and institutions that will find ways of dong so. So I want the right to appeal and set the record straight.
  •  
    This would be a good addition to the next addition of our core reading list.
  •  
    Thank you for sharing this. I can agree on that even though we have nothing to hide, it is matter of violating our right to keep it to our selves. However, I can say that it people's opinion for public-surveillance cameras in cities and towns may be different. The cameras may have good usage in order to solve or prevent crimes. It depends on how it is used I guess.
  •  
    I like to differentiate 'privacy' which is a right every human should have, from 'privatisation' which is corporate mandates that suggest the right to hide or share information - mostly based in monetization. Technology has given us access to each other in ways never imagined, and until humanity reaches a higher order of compassion toward and consciousness with each other, this issue will eat at the very fabric of our society until our security obsessions destroy us.
  •  
    Thanks for your sharing. The example of the government has installed millions of public-surveillance cameras in cities and towns, which are watched by officials via closed-circuit television in Britain makes me reflect on two aspects. Firstly, in my personal opinion, I think public-surveillance cameras provide citizens a better sense of security especially during nights. Secondly, the key point here is how the officials deal with the documentation of public-surveillance cameras, will citizens' privacy be exposed to public?
  •  
    "With regard to individual rights,.... there exists a private domain in man which should not be regulated or violated. This realm constitutes what is deepest, highest, and most valuable in the individual human being." http://rebirthofreason.com/Articles/Younkins/Social_Cooperation,_Flourishing,_and_Happiness.shtml
  •  
    Privacy off course matters.It is right that if I have not done anything wrong then why should I hide it. On other hand we can not share our family relationship information with anyone.
talenwu

What Does Your Brain Like Better: Paper or Ebooks? - 6 views

  •  
    This is an interesting post. Thank you for your sharing. As mentioned in this post, new research shows that electronic readers promoted more deep reading and less active learning. However, from my own experience, I feel like electronic reading leads to less deep reading but more active leaning. For me, I will never choose to read electronically if I have the physical version of the book because reading from digital devices, such as e-readers, tablets and smartphones, make me feel it's not like reading, it's more like looking through some online content or some one else blog posts. When read electronic books, it easy for me to skip around, and lose focus, attention or patience. I always need to read a second time for fully understanding a paragraph, when I read electronically. Also, with out the convenient of highlighting and making notes, reading electronic books prevent me from better understanding the content and thinking deeply. However, reading electronically, especially reading online might promote active learning because in some online reading website or softwares, there's interactive section on the side where readers of the book or article post their own opinions or form a discussion. This promote people to read, think and learn actively and collaboratively.
  • ...1 more comment...
  •  
    For the topic of whether you like physical book or ebooks, we have discussed a lot during our class discussion. And the result is, all people prefer physical book other than ebook, the main reason that people said for their choices is the same one, the reading speed could be much faster when they are reading with ebook because they are scanning the texts in the device, however, by this way, they don't remember much about what they just read and have to read again and again in order to understand what the content is talking about. Reading with physical book make them feel more comfortable that they can take some notes in the margin of the book and they all like the texture of physical book.
  •  
    "electronic readers promoted more deep reading and less active learning" Some of my observations. I believe the future is for electronic reading only.
  •  
    For me, maybe I am old school, it depends on the mood. I am wired towards both the print and electronic books. I cannot wait to have a printed book in my hand this Christmas holiday. The smell of the new selection of books and the paging through is a wonderful experience.
Kim Baker

The memory of a nation in a digital world - 6 views

  •  
    "It is an irony of the digital age that at a time when we are used to having easy access to seemingly endless information and knowledge, so much of it is disappearing into a digital black hole. For 450 years the concept of legal deposit has helped to preserve the nation's intellectual record.| There is this aspect of disappearing data as well.
  • ...3 more comments...
  •  
    What form does this digital archiving take? Is it cached copies?? There is a real problem with referencing digital materials as the reference (typically including the almost meaningless date of accessing) may not be able to point to what was intended to be cited as the digital presence has been amended or deleted. Therefore the information may never be (re)retrieved in its cited form. Physical copies are of course more robust. Fascinating cultural memory issue.
  •  
    Indeed, the article raises many questions. The approach is a national one, looking at the problems of archiving digital memory for a specific country when so many of the born digital items are generated from other domains and countries beyond the control of the country (the UK in this instance). There is no global portal at this stage for archiving everything in a coordinated fashion, leading to a kind of anarchy which is not a bad thing, but which does cause problems for national (country-specific) institutions such as national archives and libraries.
  •  
    As you say, it is hard for libraries and archives services to keep up because they don't get the resources and support they need to do their work properly. Too often, we think that digital content "archives itself", that it lasts forever when, clearly, it is not the case (not to mention that keeping is not enough, content must be findable too!). I really enjoyed this reading, it touches many of my personal interests, thanks for sharing!
  •  
    See my bookmark post 'Academic citation practices ...' for some geeky stuff on the reference / citation issues.
  •  
    Jacynthe, you are welcome, and Phillip, many thanks!
mbchris

How to Read a Book - 7 views

  •  
    "When you're reading for information, you should ALWAYS jump ahead, skip around, and use every available strategy to discover, then to understand, and finally to remember what the writer has to say. This is how you'll get the most out of a book in the smallest amount of time." This has been a very useful article for me. After reading this the first time I found that every thing that I did when I was reading was the opposite of what I "should" be doing according to this article. I treated all the definitions, table, and sections that were highlighted as if they were advertisements and just ignored them. This was a very useful article in helping me get back on track when it came to learning how to study in an academic environment, and I was very happy to get new and better skills from it as well.
  • ...2 more comments...
  •  
    This is awesome stuff- thanks!
  •  
    This reading was suggested in a previous class, and it was foundational knowledge that some learners already have, but just reading and validating certain strategies while offering new strategies for thorough reading is so essential in the overload of content we are constantly sifting through.
  •  
    Muy útil para todos, gracias.
  •  
    Thanks for sharing! Great refresher and reminder on how to read (esp. for a communications student where reading and writing is essential!)
w_kwai

Stop Hating Online: "Consequences" TV Ad - 6 views

  •  
    The Canadian Government promoting how sharing private content of someone is illegal. Having the internet and our social media tools, it is so easy to share and connect with people. It is great in many ways, like education, social life, work etc. but when it comes to personal life, maybe it is not as great. People like to share because it is easy and fast, there are no physical restrictions. There are consequences but because there are too many people doing it, it is hard to target everyone. With this digital age coming so quickly, maybe rules, regulations, and education are still trying to catch up. If I have not taken this course, I would not have known that sharing a screenshot on Whatsapp with friends is actually illegal. The point is when everyone is doing it now, and we were not deeply educated on this topic beforehand, how is this going to stop? When sharing screenshots has became a trend, how is it possible to stop?
  •  
    I think this video does an excellent job of not victim-blaming, or casting any moral judgement. I think it's easy to say "don't take pictures", etc., but approaching it as a strictly legal matter may be a better route to take. Speaking of the general open access movement, I think some valuable lessons could be taken from this for raising awareness about appropriate uses of open access information. It reminds me of the Disney compilation copyright video we watched at the beginning of the course - using some very literal imagery to get a point across, and explaining what the law is, not what people are doing with it.
  •  
    I think this PSA does a really good job of communicating a 'touchy' subject in a tasteful manner. The message is simple and very relatable for adolescents. Cyberbullying is a tremendous issue among youth in Canada and I am really glad to see the government taking preventative initiatives.
w_kwai

Privacy advocates unmask Twitter troll - 1 views

  •  
    What happens when you troll Tor developers hard? You get unmasked. Towards the end of last week, a troll who had sent various aggressive tweets to a host of security experts and privacy advocates associated with the Tor project and browser, which enables online anonymity, had his identity exposed.
  •  
    It is important to stand up against all kinds of bullying, in this case it is cyberbullying. But what is the difference when it comes to someone bullies you, and you bully that person back? It is still bullying. Although I think some actions should be taken to tackle the people trolling, it is difficult because of the massive amount of people who are leaving angry or horrible responses. To monitor every netizens activity is impossible and inefficient, it also violates privacy rights (even when we know we are monitored at some point). What do you think about creating filters? I think that will restrict the freedom of speech people have. So is having freedom and open access such a brilliant thing? Would it not cause moral conflicts? Education and moral standards would not always relate, because emotions is one of the measures too.
  •  
    Thanks for your sharing. A lot of people have been the victim of cyberbullying, the reason of cyberbullying has become increasingly common might has some relationship with the advanced technology and also due to people can say whatever they want to say by hiding behind their digital identities, so they do not care about moral standard any more. And it's true that it's really hard to take action to everyone who involved in cyberbullying because the amount is huge.
buycashapp40

What Happens When You Verify Your Cash App? - Quora - 0 views

  •  
    There are a few things you need in order to get a verified CashApp account. First, you'll need to provide your full name, date of birth, and the last four digits of your Social Security number. You'll also need to link your CashApp account to a bank account or debit card. Once you have all of this information entered into the system, you'll be able to request verification. You may be asked to verify your identity by providing a photo ID. Once you've been verified, a green check mark will appear next to your name on the CashApp home screen. This means that all future payments sent or received by this account will be automatically deposited into or withdrawn from your linked bank account.
  •  
    If you're looking to buy a verified Cash App account, there are a few things you need to know. First, Cash App accounts can only be verified by the person who created them. So, if you're looking to buy a verified account from someone else, they'll need to provide you with their login information. Second, when you create a Cash App account, you'll need to provide your full name, date of birth, and Social Security number. Once your account is created, you'll be able to add a bank account or debit card and start using the app.
Eviely Simons

Cash For Importance Need Without Any Low Credit Checks - 0 views

  •  
    It is just when you look for the alternative of quick same day loans with no credit watch that you get an opportunity to deal with the fleeting instabilities. These advances are anything but difficult to infer and very possible for individuals with dreadful low credit.
mbittman

About - iStock - Build It and They Will Come - 0 views

  •  
    History of iStock In 2000, if you wanted to load up on digital stock photos you had to buy a CD-ROM. But iStock realized that in the 21st century the old way of distributing images wasn't going to work anymore. Instead of trying to sell physical copies of digital files, iStock put images online for free and saw a creative community grow around this radical idea. Web designers loved it and downloaded as many pictures as they could. Some of them had digital cameras and started uploading images of their own. When the monthly bandwidth bills topped $10,000, we asked the iStock community if they would support paying for images. The response was overwhelmingly positive.
1 - 20 of 184 Next › Last »
Showing 20 items per page