SlideShare une entreprise Scribd logo
1  sur  84
Raising Digital CitizensMARTI 2011
http://social-media-and-society.wikispaces.com/
A 2008 study sponsored by the MacArthur Foundation found that online time is key part of the social development process of teen, and that  parents do no understand the way youth interact online.
UCLA study citing that71% of 12-17 have been cyber bullied in the last year. Only 1 out of 10 reported it to parents or adults.WHY??
46% fearedrestrictions of their online activities from their parents
Privacy, Push and ParentingA Digital Compass for the 21st Century
Generation Z Generation M Generation Q	 Generation Nymity
Sniffing Their Trails: Two  Camps
The Dis-inhibition Effect: Trolls
THE EROSIONOF PRIVACY
“I’m  Connected” “There is a tendency to be impulsive and not to always look at possible consequences, plus the sense of invincibility that masks vulnerability beneath” Elaine Leader
The Social Generation
A downside: Is it a  potential source of addiction and neurosis?
“The reality is that nothing on Facebook is really confidential. Facebook is founded on a radical social premise -- that an inevitable enveloping transparency will overtake modern life."
The Machine is US/ing Us http://www.youtube.com/watch?v=6gmP4nk0EOE
Take the Quizhttp://www.aclu.org/privacyquiz/
The Importance of Critical Thinking Skills“Missing” as Facilitator of Healthy Skepticism. Youth as actively constructing their social and cultural worlds, not as innocent victims or passive recipients of media messages
danaboyd - Researcher at Microsoft Research New England and a Fellow at the Harvard Berkman Center for Internet and Society. Boyd’s Law: “Adding more users to a social network (site) increases the provability that it will put you in a awkward circumstance.”
Facebook: The Entire Web Will Be SocialBy Liz Gannes Apr. 21, 2010 Social plugins are little widgets that bring Facebook to the rest of the web. They offer “instant personalization” Creates a persistent relationship with you around that content. Sites give Facebook semantic information around the thing you liked — for instance, the title, type, genre and city for a band you like on Pandora. http://www.pandora.com/#/stations/create/
                              Privacy ParadoxAn Oxymoron YoungpeoplewillfreelygiveuppersonalinformationtojoinsocialnetworksontheInternet. Afterwards,theyaresurprisedwhentheirparentsreadtheirjournals. "There'sabigdifferencebetweenpubliclyavailabledataandpublicizeddata.” Dr.DanaBoyd,co-authoranewlypublishedbook: HangingOut,MessingAround,andGeekingOut:KidsLivingandLearningwithNewMedia. This book is available FREE – See next slide.
“We believe that current youth adoption of digital media production and ‘social media’ is happening in a unique historical moment, tied to longer-term and systemic changes in sociability and culture.”This Path finding Book is Available Free Here!! http://mitpress.mit.edu/books/full_pdfs/hanging_out.pdf
Where and how you give up your privacy(anyone can badmouth you with the world and you may be helpless to stop it) Messaging and online communication Photo and video sharing sites Giving reviews and opinions Social bookmarking and tagging Communities and groups Virtual worlds and gaming Collaboration and sharing
Networked publics differ from traditional teen publics (such as the mall or the school) in some important ways. Unlike unmediated publics, networked publics are characterized by their persistence, searchability, replicability, and invisible audiences.
A Social Media Collaborative Work in Progress Proceed immediately to: http://www.reclaimprivacy.org/
A Guide for Classroom Use http://www.scribd.com/doc/39495302/The-Very-Unofficial-Facebook-Privacy-Manual
YOU ARE WHERE YOU'VE BEENLocation Technologies' Deep Privacy Impact
George Orwell’s Vision?Monitoring of Animal-Embedded Chips
RFID Chips in Children School ID Cards “To help protect our children, smart photo ID cards can contain vital information in case of a medical emergency or if the child goes missing.”
http://youropenbook.org/
Software Snooping
http://www.privacyrights.org/Online-Privacy-and-Technology
Web Surfing History Very sophisticated predictive algorithms -  Feedback loops
“Do Not Track” Legislation “But there’s good news. From what I have been reading it seems that even if this legislation passes most people won’t go through the trouble of adding themselves to the list. Why is this you might ask? Because most Americans are not that concerned about being tracked on the Internet. So, all in all this legislation is not going to affect online marketers and SEOs in any significant way.. ”
Facebook shuts down 'Breakup Notifier' despite stalking app's surge in popularity
Browse in the “Privacy Mode”
http://www.privacychoice.org/trackerblock/ie9
https://chrome.google.com/webstore/detail/hhnjdplhmcnkiecampfdgfjilccfpfoe
Posting your Whereabouts on Facebook www.pleaserobme.com
http://goanimate.com/movie/0L2gKHEHiG8U/1
Best 90 Free Windows Programs to Protect  You and Your Computer http://www.makeuseof.com/pages/best-windows-software
Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
Just how gullible are we?
Cell phone data charges Ring tones Vanity fraud Meet My Children  - Sean, Lindsay, Ryan. Each of them was scammed!
“It can’t happen to me!”
Without protection, its just a craps game. Really? What are the odds?
“You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.”The National Safety Council 1 in 146,107,962.00 could potentially win the power ball lottery grand prize1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball1 in 3000 will be killed by lighting in any given year  1 in 1,313 chance of being killed by a doctor  	1 in 314 chance of being killed by a firearm 1 in 84 chance of being killed in a car crash over your lifetime1 in 3 has had their personally identifiable                information lost this year!!
A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
WIRE ME MONEY !FACEBOOK HACK
http://www.youtube.com/watch?v=0zvPEfksbyQ Punked!  Lots of tools on the net for people who may want to take advantage of you.
Knowledge is the key. Click on this link and sign up for the free newsletter. http://www.scambusters.org/
When in doubt about a potential scam check the Internet Crime Complaint Centerhttp://www.ic3.gov/about/default.aspx
A word or two about passwordsand…. hacking Facebook(the following presentation is a bit scary, but you can protect yourself with the steps that follow)http://www.youtube.com/watch?v=V_kvQC5DH34&feature=related ,[object Object]
No mother’s maiden name
No universal password
Yes to long passwords (over eight characters)
Yes to random patterns – first letter of each word in your favorite song with your favorite number.
Yes to changing it frequently,[object Object]
http://www.onguardonline.gov/games/overview.aspx
Who are the bad guys? Small time crooks
http://www.youtube.com/watch?v=HwtLZV010-M Trans- national crime gangs.  Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra
Phishing Beware of the push!! Why do people fall for it  ???
Greed…..
Greed = Scam…..
Fear….
Fear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
Curiosity…..
Curiosity = Scam
Temptation…..Grooming Ref. Number:EGOGHS255125600419   Batch Number: 14/ 01259/ IPD   Ticket Number:113-2471-752-209   Serial Number: 5063-11   Attention   We are pleased to inform you of the result of the Winners   in our UNIVERSAL STAKES Lottery Program held on the 20th   JULY, 2004.Your e-mail address attached to ticket number   27522465896-6453 with serial number 3772-554 drew lucky   numbers 7-14-18-31-45 which consequently won in the 2ND   category, you have therefore been approved for a lump sum   pay out of USD$1,500,000 ( One Million Five Hundred   Dollars) Only  .CONGRATULATIONS!
SCaREWARE 	Pretends to detect a virus and offers  	to help with inexpensive debugging  	software (usually around $50) – then.. You give your credit card # for the software fix! http://www.youtube.com/watch?v=m_bZiEMkd5Y

Contenu connexe

Tendances

DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...iCAADEvents
 
Facebook- Intro, facts n statistics
Facebook- Intro, facts n statisticsFacebook- Intro, facts n statistics
Facebook- Intro, facts n statisticsAshish Gupta
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4jkarl2
 
Problems On The Internet With New Technology
Problems On The Internet With New TechnologyProblems On The Internet With New Technology
Problems On The Internet With New Technologyucarrie27
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...Stephen Carrick-Davies
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowVA Simple Services
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Aol & Nielsen content sharing study
Aol & Nielsen content sharing studyAol & Nielsen content sharing study
Aol & Nielsen content sharing studyMitya Voskresensky
 
Media Gone Wrong And What To Do Next
Media Gone Wrong And What To Do NextMedia Gone Wrong And What To Do Next
Media Gone Wrong And What To Do NextDeb Evans, CFE
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboBeth Gallaway
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 

Tendances (20)

Social media webinar jeclei
Social media webinar jecleiSocial media webinar jeclei
Social media webinar jeclei
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
 
Facebook- Intro, facts n statistics
Facebook- Intro, facts n statisticsFacebook- Intro, facts n statistics
Facebook- Intro, facts n statistics
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4
 
Quiz 4 Ppt
Quiz 4 PptQuiz 4 Ppt
Quiz 4 Ppt
 
Problems On The Internet With New Technology
Problems On The Internet With New TechnologyProblems On The Internet With New Technology
Problems On The Internet With New Technology
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...
 
Darkside
DarksideDarkside
Darkside
 
Pp 410
Pp 410Pp 410
Pp 410
 
Usa today 2011.01.05
Usa today 2011.01.05Usa today 2011.01.05
Usa today 2011.01.05
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
Care2 womenmam
Care2 womenmamCare2 womenmam
Care2 womenmam
 
Rent Wiki Social Prez
Rent Wiki Social PrezRent Wiki Social Prez
Rent Wiki Social Prez
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Aol & Nielsen content sharing study
Aol & Nielsen content sharing studyAol & Nielsen content sharing study
Aol & Nielsen content sharing study
 
Media Gone Wrong And What To Do Next
Media Gone Wrong And What To Do NextMedia Gone Wrong And What To Do Next
Media Gone Wrong And What To Do Next
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 

Similaire à Marti digital citizen presentation

Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy Ray Brannon
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationAlec Couros
 
Social networking & effects
Social networking & effectsSocial networking & effects
Social networking & effectsHarish Chandak
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet PptMary Danko
 

Similaire à Marti digital citizen presentation (20)

Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Social networking & effects
Social networking & effectsSocial networking & effects
Social networking & effects
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 

Plus de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Plus de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Dernier

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Marti digital citizen presentation

  • 2.
  • 3.
  • 4.
  • 5.
  • 7. A 2008 study sponsored by the MacArthur Foundation found that online time is key part of the social development process of teen, and that parents do no understand the way youth interact online.
  • 8. UCLA study citing that71% of 12-17 have been cyber bullied in the last year. Only 1 out of 10 reported it to parents or adults.WHY??
  • 9. 46% fearedrestrictions of their online activities from their parents
  • 10. Privacy, Push and ParentingA Digital Compass for the 21st Century
  • 11. Generation Z Generation M Generation Q Generation Nymity
  • 13.
  • 14.
  • 15.
  • 18. “I’m Connected” “There is a tendency to be impulsive and not to always look at possible consequences, plus the sense of invincibility that masks vulnerability beneath” Elaine Leader
  • 20. A downside: Is it a potential source of addiction and neurosis?
  • 21. “The reality is that nothing on Facebook is really confidential. Facebook is founded on a radical social premise -- that an inevitable enveloping transparency will overtake modern life."
  • 22. The Machine is US/ing Us http://www.youtube.com/watch?v=6gmP4nk0EOE
  • 24. The Importance of Critical Thinking Skills“Missing” as Facilitator of Healthy Skepticism. Youth as actively constructing their social and cultural worlds, not as innocent victims or passive recipients of media messages
  • 25. danaboyd - Researcher at Microsoft Research New England and a Fellow at the Harvard Berkman Center for Internet and Society. Boyd’s Law: “Adding more users to a social network (site) increases the provability that it will put you in a awkward circumstance.”
  • 26. Facebook: The Entire Web Will Be SocialBy Liz Gannes Apr. 21, 2010 Social plugins are little widgets that bring Facebook to the rest of the web. They offer “instant personalization” Creates a persistent relationship with you around that content. Sites give Facebook semantic information around the thing you liked — for instance, the title, type, genre and city for a band you like on Pandora. http://www.pandora.com/#/stations/create/
  • 27. Privacy ParadoxAn Oxymoron YoungpeoplewillfreelygiveuppersonalinformationtojoinsocialnetworksontheInternet. Afterwards,theyaresurprisedwhentheirparentsreadtheirjournals. "There'sabigdifferencebetweenpubliclyavailabledataandpublicizeddata.” Dr.DanaBoyd,co-authoranewlypublishedbook: HangingOut,MessingAround,andGeekingOut:KidsLivingandLearningwithNewMedia. This book is available FREE – See next slide.
  • 28. “We believe that current youth adoption of digital media production and ‘social media’ is happening in a unique historical moment, tied to longer-term and systemic changes in sociability and culture.”This Path finding Book is Available Free Here!! http://mitpress.mit.edu/books/full_pdfs/hanging_out.pdf
  • 29. Where and how you give up your privacy(anyone can badmouth you with the world and you may be helpless to stop it) Messaging and online communication Photo and video sharing sites Giving reviews and opinions Social bookmarking and tagging Communities and groups Virtual worlds and gaming Collaboration and sharing
  • 30. Networked publics differ from traditional teen publics (such as the mall or the school) in some important ways. Unlike unmediated publics, networked publics are characterized by their persistence, searchability, replicability, and invisible audiences.
  • 31.
  • 32. A Social Media Collaborative Work in Progress Proceed immediately to: http://www.reclaimprivacy.org/
  • 33. A Guide for Classroom Use http://www.scribd.com/doc/39495302/The-Very-Unofficial-Facebook-Privacy-Manual
  • 34. YOU ARE WHERE YOU'VE BEENLocation Technologies' Deep Privacy Impact
  • 35. George Orwell’s Vision?Monitoring of Animal-Embedded Chips
  • 36. RFID Chips in Children School ID Cards “To help protect our children, smart photo ID cards can contain vital information in case of a medical emergency or if the child goes missing.”
  • 37.
  • 41. Web Surfing History Very sophisticated predictive algorithms - Feedback loops
  • 42.
  • 43. “Do Not Track” Legislation “But there’s good news. From what I have been reading it seems that even if this legislation passes most people won’t go through the trouble of adding themselves to the list. Why is this you might ask? Because most Americans are not that concerned about being tracked on the Internet. So, all in all this legislation is not going to affect online marketers and SEOs in any significant way.. ”
  • 44.
  • 45. Facebook shuts down 'Breakup Notifier' despite stalking app's surge in popularity
  • 46.
  • 47. Browse in the “Privacy Mode”
  • 50. Posting your Whereabouts on Facebook www.pleaserobme.com
  • 52.
  • 53. Best 90 Free Windows Programs to Protect You and Your Computer http://www.makeuseof.com/pages/best-windows-software
  • 54. Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
  • 55. Just how gullible are we?
  • 56. Cell phone data charges Ring tones Vanity fraud Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
  • 57. “It can’t happen to me!”
  • 58. Without protection, its just a craps game. Really? What are the odds?
  • 59. “You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.”The National Safety Council 1 in 146,107,962.00 could potentially win the power ball lottery grand prize1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball1 in 3000 will be killed by lighting in any given year 1 in 1,313 chance of being killed by a doctor 1 in 314 chance of being killed by a firearm 1 in 84 chance of being killed in a car crash over your lifetime1 in 3 has had their personally identifiable information lost this year!!
  • 60. A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
  • 61. WIRE ME MONEY !FACEBOOK HACK
  • 62.
  • 63. http://www.youtube.com/watch?v=0zvPEfksbyQ Punked! Lots of tools on the net for people who may want to take advantage of you.
  • 64. Knowledge is the key. Click on this link and sign up for the free newsletter. http://www.scambusters.org/
  • 65. When in doubt about a potential scam check the Internet Crime Complaint Centerhttp://www.ic3.gov/about/default.aspx
  • 66.
  • 69. Yes to long passwords (over eight characters)
  • 70. Yes to random patterns – first letter of each word in your favorite song with your favorite number.
  • 71.
  • 73. Who are the bad guys? Small time crooks
  • 74. http://www.youtube.com/watch?v=HwtLZV010-M Trans- national crime gangs.  Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra
  • 75. Phishing Beware of the push!! Why do people fall for it ???
  • 77.
  • 80. Fear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
  • 83. Temptation…..Grooming Ref. Number:EGOGHS255125600419   Batch Number: 14/ 01259/ IPD   Ticket Number:113-2471-752-209   Serial Number: 5063-11   Attention   We are pleased to inform you of the result of the Winners   in our UNIVERSAL STAKES Lottery Program held on the 20th   JULY, 2004.Your e-mail address attached to ticket number   27522465896-6453 with serial number 3772-554 drew lucky   numbers 7-14-18-31-45 which consequently won in the 2ND   category, you have therefore been approved for a lump sum   pay out of USD$1,500,000 ( One Million Five Hundred   Dollars) Only .CONGRATULATIONS!
  • 84. SCaREWARE Pretends to detect a virus and offers to help with inexpensive debugging software (usually around $50) – then.. You give your credit card # for the software fix! http://www.youtube.com/watch?v=m_bZiEMkd5Y
  • 86. Texting for Dollars Text message from your bank or credit card company to call right away and verify account information! OR You’ve won a free gift from a reputable vendor like Sears or Macy’s
  • 87. Bogus Love“Wire me some money for an airline ticket so that I can be with you forever.” http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#! 1) Fake photos: You may be virtual dating with somebody else. 2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees. 3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc.
  • 88. “Make ME your favorite charity…please :( ”http://www.youtube.com/watch?v=FyzfdTVvV5k Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.
  • 89. Log on here:The hot-spot Hot seat“Coming to a location near you.” http://telkomhell.com/wi-fi-hotspot-security.html

Notes de l'éditeur

  1. Cheerios story.
  2. 4chan
  3. Facebook users AFRE concerned but ignore it anyway
  4. Empathy – carcissism social capital = addiction about the same as other adictions
  5. The new Facebook Privacy setting have delayed the roll out of this open source project.Subscribe and stay tuned.
  6. launch of Facebook Places, a location-based service that allows users to “check in” to a specific place or event and share that information with their friends. It also allows others to “tag” or check you in at a location, provided you are Facebook friends, and this has drawn fire from the ACLU and other privacy advocates.
  7. SANTA FE USES RADIO FREQUENCY TRACKING BADGESPublished October 18, 2010 SANTA FE — Secondary students in the Santa Fe district are required to wear badges on campus that track their whereabouts using radio frequency identification technology.School officials issued the badges this fall to ensure student safety and achieve more accurate attendance reporting.Attendance rates haven’t been an issue in the district, but a reliable reporting system might allow Santa Fe to recover more state money from average daily attendance funding, district spokeswoman Patti Hanssard said. The monitoring system only tracks students on campus.…Since issuing the tracking badges in 2008, Spring has received a $194,000 increase in attendance funding, Hanssard said.
  8. Social media will take your data and give other people access to it. Just assume that no matter how private you think it is, its going to find a way to someone else. there is no going back to the “simpler times” before Facebook and social networking. Every social, cultural, economic and political aspect of our lives, is affected and some would say dominated by digital connectivity.
  9. Gmail looks at content to serve up adsWho tracks it? Advertisers
  10. Not only tracks your visits but predicts where you might end up surfing – sophisticated algorithms.
  11. Why aren’t we more upset? When we don't like it or don't want it, it's an invasion of privacy. When we like it or want it, it's the price we pay. We will readily forgo our privacy in exchange for convenient and useful services, particularly if they’re free. That’s a trade-off you make all the time on the Internet. Even if people were more conscious of how this information might be exploited, I doubt most would change their behavior. In a nutshell, ask anyone if they care about their privacy and almost 100% of them will say, yes, absolutely. But then ask them about what they do both online and offline on a daily basis and most of them will reveal a very different set of preferences or values when it comes to what “protecting privacy” would mean in practice. That’s because privacy is, as Harper notes, a highly subjective condition, and that’s true even in a micro sense. We’re constantly making privacy trade-offs on the fly. Every time we enter a contest, sign up for a shopper discount card, enter absurd amounts of personal info on social networking sites, and so on, we are making privacy trade-offs. Sometimes we think them through carefully; other times we don’t. But most of the time people will trade away their supposed “privacy rights” in for even the most trivial thing.The fact is that privacy is already really, really dead. Howard Lindzonnailed it the other day when he said “Equifax, Transunion, Capital One, American Express and their cousins raped our privacy,” Everything we do, everything we buy, everywhere we go is tracked and sitting in a database somewhere. Our location via our phone, or our car GPS. Our credit card transactions. Everything. Honestly, a picture of you taking a bong hit in college is mice nuts compared to the mountain of data that is gathered and exploited about every single one of us every single day. You just don’t really see that other stuff because those companies don’t like to talk about the data their gathering.
  12. Blippy is a service that lets users publish everything they buy with their credit cards.Crazy right? Who’d want to do that? Well, apparently a lot do. The company has let in 2,500 people so far. Those 2,500 people are publishing $200,000 worth of purchases a day to their friends. It’s less than a month old and they’ve tracked $3.8 million in transactions already, with an average transaction size of $46.And more than 10,000 people are on the waiting list to get an account and gladly share their consumption behavior with the world.
  13. Do you like somebody and want to know when they get dumped or have dumped the person you despise for being with the person you’d rather be holding or held by? The whole point of stalking is that it’s fairly anonymous and most people who have or develop that tendency don’t always tell their closest friends about it.
  14. Some viewers of Gilligan’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew.This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
  15. Starting next week, Verizon will double the early-termination fee for smartphones......The phone is designed in such a way that you can almost never avoid getting $1.99 charge on the bill. Around the OK button on a typical flip phone are the up, down, left, right arrows. If you open the flip and accidentally press the up arrow key, you see that the phone starts to connect to the web. So you hit END right away. Well, too late. You will be charged $1.99 for that 0.02 kilobytes of data......Every month, the 87 million customers will accidentally hit that key a few times a month! That’s over $300 million per month in data revenue off a simple mistake!..
  16. Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable.Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.
  17. Don’t do any banking unless you know it a secure location. How? Look for “https” (not just http) in the URL and the small padlock icon in the lower right hand corner of your browser.