The issue of fake friends and sham accounts is becoming a problem on FAcebook. This is an extensive article about the topic that can be referenced in our project.
"Though the access varies depending on each individual's privacy settings, once a spammer has become "friends" with other users, he can then tag them in photos, post messages to their walls, chat with them, send status updates to their news feeds and connect with their friends. In this fashion, the fake friends insinuate themselves into the social networks of all of the people they reach, with each new friend reinforcing the appearance that the relationships are real and making it easier to add even more friends."
Scareware. Yes, it is a term. Scaring people into thinking they have a virus. Knowledge is power and it will also save you money. Being educated about computers pays over your life. It is time for all of us to be educated and savvy. I know someone taken by this scam.
"English-speaking consumers in the United States, Canada, Australia, Ireland, New Zealand, and the U.K. were targeted in the global scam, regulators said. Most of the scammers were based in India, but some also came from the U.S. and U.K.
The scam involved cold callers who claimed to work for major technology companies, such as Microsoft or Google, and who told consumers they had viruses on their PCs, according to regulators. The callers would attempt to dupe users into giving them remote access to their computers, locking the user out while attempting to "fix" the malware that the scammer claimed was on the machine."
This incredible article from the Atlantic talks about who is tracking you and how to understand it. It is very balanced and informative and a great post to share with students as you discuss privacy.
"As users, we move through our Internet experiences unaware of the churning subterranean machines powering our web pages with their cookies and pixels trackers, their tracking code and databases. We shop for wedding caterers and suddenly see ring ads appear on random web pages we're visiting. We sometimes think the ads following us around the Internet are "creepy." We sometimes feel watched. Does it matter? We don't really know what to think."
Facebook faces 20 years of privacy audits by the Federal Trade Commission. Similar to an agreement with Google Buzz,this shows the FTC's commitment to project consumer privacy. (Any wonder Google Buzz is going bye- bye.)
Some nice resources on creating a safe social network page. A document and an Interactive Whiteboard powerpoint file to use.
Here are some great antibullying resources to share with your school. If you're looking for some fresh ideas, I think there are some good ones here. These are taking from anti bullying week which runs the week of November 14-18 in the UK. It is good to look at resources from different countries on this important topic. We need to mix things up so we don't stay stagnant in our approach.
Common sense media has just released a new report "Zero to 8: Children's media use in America." Our students on Digiteen are reviewing this report for their research, maybe you should take a look too.
Tips from the FTC about using public wireless networks - this is important information for students and adults to know.
This article points out that up to 30 months after photos are deleted from Facebook that they are still there. If someone has the direct URL to a photo, it is still accessible. Students should be taught about this and we should educate ourselves as well. Once something is uploaded it is out there. Period. You cannot take it back.
Even if you delete incriminating photos on your Facebook profile, the company is keeping them accessible to anyone online for up to 30 months.
The new Identity theft steals children's social security numbers before they have bank accounts.
The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
"If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.
Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.
Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.
If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
"Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
Great article about the different levels of cyberstalking and privacy concerns.
At Northwestern University, "Lauren Cohn" racked up 143 friends -- none of whom knew who she was. While we're not certain the school was involved in the fabrication, that's beside the point -- 143 people just let this chick into their social circles.
Still, take a gander at novelty apps like "Open Book," which allows you to search others' unprotected status updates for potentially incriminating info (I looked, and no, I would rather not know about the hot oral sex you had this a.m.),
cyberstalking thusly: "A course of conduct (more than one incident) that uses technology to track, intimidate, harass, threaten or scare victims." That could mean harassing you online or even using the internet to gather info that can be used for physical stalking.
New service that parents can put on their child's computer that gives you educational games, ad blocking in a special browser and filtered web content. Signing up is free, although they charge for premiums services like ad blocking. Let me know when you test it and how you like it in the comments below.
If you are working with technology in schools, educational Internet pioneer Larry Magid's new article in the San Jose Mercury News is a MUST READ. Excellent
a watershed moment in the 16-year history of online safety education.
in that young people were viewed less as potential victims of online crimes and more as participants in a global online community.
the "predator panic" that was rampant a few years ago has largely been put to rest as safety experts and law enforcement studies from the Crimes Against Children Research Center and elsewhere show that, statistically, the odds of a prepubescent child being sexually molested by an
online stranger is virtually zero and the odds of it happening to a teenager are very low, especially when compared with children who are harmed by family members and others they know from the real world.
the culprit is far more likely to be a fellow young person.
Kids are affected by their own behavior ranging from posting pictures or comments online that could come to haunt them later to "sexting," sending nude or nearly nude pictures of themselves to others.
a few misguided ones have used these laws against children.
others continue to perpetuate myths about Internet dangers.
"one size doesn't fit all.
There was a lot of discussion about the lack of interactive social media in schools.
This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at.
This is an article I'm going to share with my digiteen dream team! It is an important one to share!
These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did:
1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited.
2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children?
2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks?
3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity?
4) What rights and responsibilities do we have as parents to protect the digital identities of our children?
5) How do we proceed from here? How do we help other parents to understand these important issues?
Another amazing discussion here on digital citizenship and appropriate behavior. So many teachable moments on this project.
Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children.
There are mention of several websites including one I'd never heard of called CyberBully Alert.
An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someone about it.
she went to a mental-health clinic
Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
They think that’s just part of online life,
Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
Cyberbullying peaks in 4th and 7th grade
4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
“This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
October as National Cyber Security Awareness Month,
- News (3)
- ad4dcss (10)
- curriculum (2)
- cyberbullying (3)
- digital_communications (4)
- digital_literacy (5)
- digital_responsibilities (5)
- digital_wellness (3)
- digitalcitizenship (8)
- digiteen (7)
- education (23)
- hz08 (4)
- learning (4)
- netiquette (2)
- online_course (2)
- privacy (4)
- social_entrepreneurship (2)
- worldonline (2)
Click in to find related links.