COMP 381. Administrivia 1. Roster is fixed. 2. Team presentations Please find your partners and exchange contact info 3. Term papers Blackboard vs. Sakai.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Part I: Making Good Online Choices
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Internet Safety Basic Internet Safety Involves: You have all of this information and more on one website!
Respect for All: Digital Footprint. Lesson Objectives: Students will be able to …  Define the term digital footprint and understand how their actions.
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos,
Many of us are now on social media (Twitter, Facebook…) Many sites for children have this capability (Club Penguin, Moshi Monsters…)
Cyber bullying and internet safety Parents meeting: staying safe online.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Digital Footprints Where have you been? Where are you going?
COMP 381. Inflection Points in History PositivesNegatives  privacy  family  quality of life  survival  expanding human reach  expanding knowledge.
COMP 381. Today’s agenda  Attendance and introductions Wait List  What will the course entail? Structure Assignments.
6 October Impact of Computers (Really). Discussion: Computers in the Arts We’ve seen good and bad androids and robots, programs that take over the world,
 Definition: Building online communities of those that share interests and activities.  Examples:  Myspace  Facebook  Twitter “Online communication.
By Hope Gallaway Social Networks. What is a Social Network? A social network is a social structure made up of individuals called “nodes”, which are tied.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
 Only say what you would say face to face.  Make yourself look good online  People can save what is said online.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
 Only say what you are willing to say to someone face to face.  Make yourself look nice online.  People can save what you say online.
Laura Swearingen Bellville Independent School District 2011.
Molly S. Carsyn A. & Meaghan H..  Only say what you would say face to face.  Make yourself look good online.  People can save what is said online.
TRENDS IN COMPUTING-MOBILE PHONES GEORGIA HARRIS.
Happy Monday! Agenda: The Chosen Presentations part 2 Padlet – Technology Chat.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Internet Explorer. What’s new.?.?.? Internet Explorer 7 has a new interface that shows more of each webpage you visit Internet Explorer 7 has a new interface.
Use and Regulation of Social Media April 5, 2011 – Destin, Florida.
Lecture 2 Title: E-Business Advantages By: Mr Hashem Alaidaros MIS 326.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What is Technology?. Technology is the process by which humans modify nature to meet their needs and wants.
Computer Technology The Importance Of Technology To Your Business.
FOCUS World D’Amico, J., Mogil, C., Greenslit, A., Bartoletti, M. (April 2011) FOCUS World: An Online Resiliency Training Tool for Families. Computer Lab.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
Globalization. Hmmm…. How do you think technology effects globalization?
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Digital Citizenship Doing the Right Thing Online.
Digital Citizenship Terms & Behavior about Technology created by Samira Ali.
Digital Citizenship Working and playing in a digital word.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
E-Banking EBUS 400 Javier Valenzuela, Lyrae Perry, Adan Raya, Rania Sarraf, Scott Pochurek.
Tech. Team Future Technology program Likes and Dislikes on Technology By Alex Stephenson.
+ netiquette. + Objectives Understand the meaning of the term “Digital Citizen” Demonstrate an understanding of the need to practice cyber safety, cyber.
Uses of Internet. Advantages of Internet  Always Available  Global Audience  Immediate Distribution of Information  Relatively Inexpensive  Online.
REPORT PREPARED FOR: Individual Presentations and Reflection   BY IAN LOBKO   POSTGRADUATE DIPLOMA IN BUSINESS APMG 8119: DIGITAL ENTERPRISE.
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
 *  Facebook*  Twitter*  Instagram*  Texting!!!*  Snapchat  Ask.fm  There are new apps for faster texting but I have not explored them yet-
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
THE ELEMENTS OF CULTURE
Ethics and Morality Theory Part 3 13 September 2006.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
Without knowing Digital Citizenship, your computer can be more dangerous than you ever imagined.
LESSON 4: MEDIA, AVOID RISKY BEHAVIORS, AND GOAL SETTING tiontion drink mulled wine exclamation icon baby plane disk grass teeth real estate box trail.
What is E-business Unit 3: E-business.
Managing Technology Chapter 10 Families For Today.
Educating the Investor “ The false advertising” Dr. Fadi Khalaf Secretary General Union of Arab Stock Exchanges Cairo October
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
The influence of the Internet on our life. Positive  A lot of information  Communication  Education  Entertainment  Shopping Negative  Addiction.
Don’t Leave Your Money on the Table Your Guide to Paid Search Advertising Ron Adelman WSI Internet Marketing Consultant.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Advantages of E-business Personalized service Personalized service High-quality customer service High-quality customer service No inventory cost No inventory.
Internet Safety. Online Concerns: Contact Content Conduct.
Social Networking in Politics Alejandro Mandujano.
Creating your online identity
Social and environmental impact
Best IPTV Service Providers Eezytv.com Best IPTV Service Providers Are you looking for the finest IPTV providers online? If yes, then going to.
Presentation transcript:

COMP 381

Administrivia 1. Roster is fixed. 2. Team presentations Please find your partners and exchange contact info 3. Term papers Blackboard vs. Sakai Breadth, appropriateness 4. Arts nominations Additions Feedback

Lessig’s Behavioral Regulators  Law (sanctions)  Social norms (behavior)  Market (cost)  Architecture (self-enforcement)

How do they work?  Example: no cell phones in class How could I use each to constrain?  Strengths and weaknesses of each Most powerful? Weakest?

Architecture in Cyberspace  No need for external enforcement?  Intended and unintended results Identity Privacy Content

Architecture in Cyberspace  Is there a single architecture?  Has the architecture changed over time?

Inflection Points in History PositivesNegatives  privacy  family  quality of life  survival  expanding human reach  expanding knowledge  expanding economy  democratization  privacy invasion  disintegration of family  health  pollution  danger / misuse  misinformation  work abuse

POSITIVES PrivacyFamily  Mostly negative  Easy to track people  Façade: Can use screen name to avoid publicly asking False sense of security Feel like they can say anything  Reconnecting over long distance Facebook Ancestry.com  Security  Bring family together over entertainment Wii DVR

POSITIVES Quality of lifeSurvival  Easier Cameras Share/preserve photos Communication ( ) Access to knowledge Shopping GPS  Medical digitalization  Medical intervention  Cell phone to call for help

POSITIVES Expanding human reachExpanding knowledge  Communicate with other people Facebook Internet Cell phones  Transportation  Exploration Underwater Space  Availability of information  Searching  Sharing  Learning

POSITIVES Expanding economyDemocratization  Online shopping  Faster business communication Trade Banking  International projects  Mom and pop shops can advertise  Government transparency  Wikileaks  Voting