White House staffers are using this self-destructing messages app to gossip in private — here’s how it works
more on social media in this IMS blog
more on social media in this IMS blog
open whisper system is the company
download from the NPR Marketplace Tech available here:
More on the app in the Codebreaker podcast
more on cybersecurity in this blog:
More on civil disobedience in this blog:
there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.
Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.
My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones
more on drones in this IMS blog:
Social media has the potential to facilitate much closer relationships between libraries and their patrons. Current usage of social media by the library community generally remains ad hoc and somewhat experimental, but the uptake of these tools is accelerating, and they will likely play an increasingly important role in library service provision and outreach in the future. Taylor & Francis has produced a white paper that analyzes current practices relating social media’s use in the library and how this differs by librarian job role. The sample was taken from academic librarians around the world, which also allows us to examine differences by geographic location. The goal: to establish how librarians are currently using social media in their roles, the most useful social media tools and best applications for these tools in a library setting.
http://www.ala.org/news/press-releases/2012/11/using-social-media-find-collaboration-coordination-and-focus promotes http://store.elsevier.com/Managing-Social-Media-in-Libraries/Troy-Swanson/isbn-9781780633770/
explores a variety of social media tools in terms of how they can be used to organize information and communities. Together, you will survey and use a variety of social media tools, such as Delicious, Diigo, Facebook, Goodreads, Google Hangouts, LibraryThing, Pinterest, Storify, Twitter, and more! You will also explore how social media tools can be used to organize and disseminate information and how they can be used to foster and sustain communities of learning.
With the widespread use of library technology that incorporates social media components, intelligent objects, and knowledge-sharing tools comes the ability of libraries to provide greater opportunities for patron engagement in those discovery systems through user-generated content. These features may include the ability of users to contribute commentary such as reviews, simple point-and-click rating systems (e.g. one star to five stars), or to engage in extensive discussions or other social interactions. This kind of content could transform authoritative files, alter information architecture, and change the flow of information within the library discovery system.
Across generations, concerns for privacy may dissipate with time as specific technologies take hold or as people become aware of a technology’s benefits and value those over their value for privacy.
my note: excellent blueprint for similar activities / policies at higher ed.
more on privacy in this IMS blog
New Documents and Reports Confirm AT&T and NSA’s Longstanding Surveillance Partnership
Please consider previous IMS blog entries on this topic:
Commit to a password manager to make your online life easier and more secure.
A password manager stores the passwords for your various online accounts and profiles and saves you from having to remember and enter each one each time you visit a password-protected site. Instead, your passwords are encrypted and held by your password manager, which you then protect with a master password. Since you are saved from having to remember all of your passwords, you will be less tempted by the dangerously poor idea of using the same password for all of your accounts. With a password manager, you can create strong passwords for all of your accounts and keep all of those passwords saved behind a stronger master password, leaving you to remember but a single password.
With PasswordBox, you can sign up for an account via its mobile app or the PasswordBox website on a computer. I chose the latter and downloaded PasswordBox from its website, which turned out to be a browser extension.
danah boyd, a professor at Harvard University’s Berkman Center for the Internet and Society, argues that teenagers closely scrutinize what they share online because it is a way for them to negotiate their changing identities. In her book, It’s Complicated: The Social Lives of Networked Teens, she describes how teenagers carefully curate their feeds based on the audience they are trying to reach.
Adolescents have been migrating away from Facebook and Twitter over the last few years, showing preference for sites like Snapchat, Whisper, Kik, and Secret that provide more anonymity and privacy. Part of this transition can be explained by the fact that the older social media sites stopped being cool when parents joined them, but perhaps another reason could be that teenagers growing up in the post-Snowden era implicitly understand the value of anonymity. For teens, it’s not a matter of which platform to use, but rather which works best in a particular context.
1 2 Next