Get flash to fully experience Pearltrees
January 3, 2013 06:00 AM ET Computerworld - The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware. If those findings, documented in the company's latest annual Internet Security Threat Report , cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror. That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds. "Compliance is necessary, but it's not sufficient," says Malcolm Harkins, vice president and chief information security officer at Intel.
Apps There are thousands of mobile apps available at the click of “download.” Watch this video to learn more about apps and making smart choices when downloading them. Learn more ► New Social Media
Bullying in Network Era
September 19, 2012 The Berkman Center for Internet & Society at Harvard University is pleased to share a new literature review by the Youth and Media team, contributing to The Kinder & Braver World Project led by danah boyd and John Palfrey: " Bullying in a Networked Era: A Literature Review ", by Nathaniel Levy, Sandra Cortesi, Urs Gasser, Edward Crowley, Meredith Beaton, June Casey, and Caroline Nolan, presents an aggregation and summary of recent academic literature on youth bullying and seeks to make scholarly work on this important topic more broadly accessible to a concerned public audience, including parents, caregivers, educators, and practitioners. The document is guided by two questions: “What is bullying?”
Internet users spend the equivalent of nearly 4 million years online every month, including 32 hours per person here in the US alone according to Web technology provider Go Gulf. As online privacy advocates caution, that's a lot of time to be in front of your smartphone, tablet or PC - including many prime opportunities for criminals specializing in identity theft to potentially swipe personal information. According to the Federal Trade Commission (FTC), it's actually the number one consumer complaint, with Javelin Research estimating identity fraud costs to Americans at $18 billion alone in 2011. Luckily a few simple steps can help keep you from becoming a victim.
How to permanently delete yr FB data
[ UPDATE: A PDF version of these talking points is now available.] For Leadership Day 2012 , I thought I would gather in one place many of the talking points that I use with principals and superintendents about Internet safety… Even though they may use fancy terms and know more than you do about their domain, you never would allow your business manager or special education coordinator to operate without oversight. So stop doing so with your technology coordinator.
Google to launch education campaign
teens text code
Amazon to guess religion
comprendre les reseaux sociaux
TVs are a thing of the past, but the internet could be a dangerous place for children. That is why KIDO'Z TV is so great – parents can create their kids' TV channels and programs The Skinny
Fly A Kite Online Safety
Welcome to YouTube! The location filter shows you popular videos from the selected country or region on lists like Most Viewed and in search results.To change your location filter, please use the links in the footer at the bottom of the page. Click "OK" to accept this setting, or click "Cancel" to set your location filter to "Worldwide".
I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective. One question which I fielded surrounded whether or not there is risk to children via the various social media networks (i.e., Facebook) or should one accept that if someone really wants to hurt my family they don’t need Twitter to find us. First the observation is absolutely spot-on – a miscreant doesn’t need Twitter or Facebook to find you, there are a myriad of other means available. My response: The reality is that the social networks allow those with malevolent intent to find your family via social networking, a capability that didn’t exist 20 years ago, and this is, therefore, another avenue available to identify and target individuals and their families. Thus, I think each of us should be mindful of the actions we take in sharing our family’s data, and work to bring the odds of something happening to you or your family to as close to zero as possible .
CATS research projects (for a detailed up to date information on all CATS projects read our latest Newsletter ) Mapping the landscape: Support for offenders and their families A project funded (£98,000) by the Ministry of Justice exploring best practice amongst community organisations providing support and educational advice for offenders, in custody and the community, and their families. It has begun in November 2012. The KU team will be led by Profs Davidson and Bifulco. CAT’s Jeffrey DeMarco will be working on the project. Cyberbullying amongst young people: A comparison of the UK and Qatar This is a three year project funded by the Qatar National Research Foundation ($930,000).
Sexting: Youth Practices and Legal Implications by Dena Sacco, Rebecca Argudin, James Maguire, Kelly TallonDena Sacco Harvard University - Berkman Center for Internet & Society Rebecca Argudin Harvard Law School - Cyberlaw Clinic James Maguire
SafetyWeb is excited to provide the online safety community with a Free Poster illustrating some alarming statistics about Cyberbullying. We encourage everyone to download and utilize this free resource to help educate your community about online safety! In addition to this free resource, you can also visit the following links to purchase custom sizes of our other poster selections to include Sexting, Internet Addiction, and Cyberbullying!
Are you a teacher, librarian, youth worker, or someone else who could use a copy of my new young adult novel FOR THE WIN? As I've done with my previous three books, I've set up a matchmaking service for people who need copies of my books and people who want to buy copies of my printed books as a way of paying me back for the free, downloadable versions I make available on my site. If you work at an institution that could use a free copy, please send your details to firstname.lastname@example.org.
View Professor Solove speaking about The Future of Reputation at Google, Inc. (Mountainview, CA) on YouTube : Click here to view the video on YouTube in a larger size .
ConnectSafely.org is for parents, teens, educators, advocates - everyone engaged in and interested in the impact of the social Web. The user-driven, all-media, multi-platform phase of the Web has begun, we all have much to learn about it, and this is the central space - linked to from social networks across the Web - for learning about safety on Web 2.0 together. ConnectSafely.org is for parents, teens, educators, advocates - everyone engaged in and interested in the impact of the social Web. The user-driven, all-media, multi-platform phase of the Web has begun, we all have much to learn about it, and this... <p style="text-align:right;color:#A8A8A8"></p>
Norton Safety Minder Gizmo's Freeware award as the best product in its class! Combines a web service with a stand-alone program comprehensive; multiple profiles on each PC; settings stored with your account the paid version is needed for time quotas and useful reporting; unblocking is time-consuming; no XP 64-bit
Web-monitoring tool gathers data on kid chat