Oculus Go apps missing
- Fortnite
- Spotify
- YouTube
- ESPN
- Amazon
++++++++++++
more on OculusGo in this IMS blog
https://blog.stcloudstate.edu/ims?s=oculus+go
Fortnite in this IMS blog
https://blog.stcloudstate.edu/ims?s=fortnite
Digital Literacy for St. Cloud State University
++++++++++++
more on OculusGo in this IMS blog
https://blog.stcloudstate.edu/ims?s=oculus+go
Fortnite in this IMS blog
https://blog.stcloudstate.edu/ims?s=fortnite
Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.
In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.
You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).
Recommended topics for papers include, but are not limited to:
|
|
IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018
Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication.
Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com
Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Encyclopedia of Criminal Activities and the Deep Web
EncyclopediaCADW@igi-global.com
My note: Email is for old people (https://www.chronicle.com/article/E-Mail-is-for-Old-People/4169) compare with Trello + Slack
“The idea behind us using Slack [last fall] was to kill internal email,” says Green. That’s a common refrain in pro-Slack headlines, with good reason. Users can drop links and files into any Slack conversation.
documented here how educators use Trello to manage project-based learning activities that involve group work and peer review.
Slack has been described as “ a private Twitter on steroids.” At first glance, the tool looks like a chat room—but it’s got more going on inside.
Like Twitter, Slack features hashtags that denote specific “channels” dedicated to topics, but each channel operates like its own chat room. Users can send messages to a channel or directly to one another (one-to-one), and also create private groups for focused discussions (one-to-few).
connected Trello to Slack so that he receives a notification whenever his students make edits on a Trello card. He turns to Slack to communicate directly with students and groups, often leaving feedback on assignments. “It hasn’t been effective as a way to broadcast information to the entire class,” Green admits. “But it’s become a very important tool for us to share resources for kids, and have 1-on-1 conversations with students.”
Other educators are exploring how to use Slack as a professional learning network.
+++++++++++++++++
more on Trello in this IMS blog
https://blog.stcloudstate.edu/ims?s=trello
08/09/18 Tanner Higgin
Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat.
Use policy creation as an opportunity to take inventory of your students’ needs, how social media is already being used by your teachers, and how policy can support both responsibly.
1. Create parent opt-out forms that specifically address social media use.
2. Establish baseline guidelines for protecting and respecting student privacy.
3. Make social media use transparent to students
4. Most important: As with any technology, attach social media use to clearly articulated goals for student learning
Social media isn’t a novel phenomenon requiring separate attention. Ed tech, and the tech world in general, wants to tout every new development as a revolution. Most, however, are an iteration. While we get caught up re-inventing everything to wrestle with a perceived social media sea change, our students see it simply as a part of school life.
++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education
One teacher in Texas told BuzzFeed News she makes a $50,000 a year, but made over $200,000 in a year through Instagram.
++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education
Christopher Elliott
https://www.linkedin.com/pulse/try-new-social-media-strategies-christopher-elliott/
Research suggests more consumers are turning to Facebook, Twitter, and LinkedIn, to contact companies — whether the companies are ready or not.
“Social media is the future of customer service,” says Anna Yates, a content marketer for The Social Reach, a digital marketing agency. “Not only are consumers turning to social media more and more to learn about products and services, but new tools are available to make customer service faster, easier, and smarter.”
the three Ps — be patient, persistent, and polite. Companies tend to flip into “crisis” mode when you send angry messages that threaten lawsuits, bodily harm, or the end of civilization.
+++++++++++++
more on social media strategies in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+strategies
Ubiquitous social media platforms—including Facebook, Twitter and Instagram—have created a venue for people to share and connect with others. We use these services by clicking “I Agree” on Terms of Service screens, trading off some of our private and personal data for seemingly free services. While these services say data collection helps create a better user experience, that data is also potentially exploitable.
The news about how third parties obtain and use Facebook users’ data to wage political campaigns and the mounting evidence of election interference have shined a spotlight on just how secure our data is when we share online. Educating youth about data security can fall under the larger umbrella of digital citizenship, such as social media uses and misuses and learning how not to embarrass or endanger oneself while using the internet.
Darvasi’s students in Toronto can pool together 55 faux bitcoins to purchase and launch the BOTTING protocol against an opponent. The student targeted at Fallon’s school in Connecticut would then have 48 hours to record audio of 10 words of Darvasi’s students choosing and send it back to them through an intermediary (Darvasi or Fallon). For a higher price of 65 faux bitcoins, students can launch MORPHLING, which would give the opponent 48 hours to record a one-minute video explaining three ways to stay safe while using Facebook, while making their school mascot (or a close approximation of) appear in the video in some way during the entire minute.
+++++++++++++
more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship
markhttps://www.pinterest.com/pin/628252216744698154/
http://www.infographics4marketing.net/2013/12/how-to-generate-leads.html
https://www.edsurge.com/news/2018-04-03-what-s-your-social-brand
What is social branding?
Social branding is the way you present yourself online. All of us have a digital footprint and a digital shadow—being cognizant of what these are helps you curate what kind of persona your potential employer sees when they Google you, look you up on LinkedIn, or find you on Twitter. Social branding is when you make a decision about what you want these results to be and what parts of your experience you want to highlight.
+++++++++++
more on social branding in this IMS blog
https://blog.stcloudstate.edu/ims?s=branding
In Media Manipulation and Disinformation Online, Marwick and Lewis (2017) of the Data & Society Research Institute described the agents of media manipulation, their modus operandi, motivators, and how they’ve taken advantage of the vulnerability of online media. The researchers described the manipulators as right-wing extremists (RWE), also known as alt-right, who run the gamut from sexists (including male sexual conquest communities) to white nationalists to anti-immigration activists and even those who rebuke RWE identification but whose actions confer such classification. These manipulators rally behind a shared belief on online forums, blogs, podcasts, and social media through pranks or ruinous trolling anonymity, usurping participatory culture methods (networking, humor, mentorship) for harassment, and competitive cyber brigades that earn status by escalating bullying such as the sharing of a target’s private information.
Marwick and Lewis reported on how RWE groups have taken advantage of certain media tactics to gain viewers’ attention such as novelty and sensationalism, as well as their interactions with the public via social media, to manipulate it for their agenda. For instance, YouTube provides any individual with a portal and potential revenue to contribute to the media ecosystem. The researchers shared the example of the use of YouTube by conspiracy theorists, which can be used as fodder for extremist networks as conspiracies generally focus on loss of control of important ideals, health, and safety.
One tactic they’re using is to package their hate in a way that appeals to millennials. They use attention hacking to increase their status such as hate speech, which is later recanted as trickster trolling all the while gaining the media’s attention for further propagation
SHARED MODUS OPERANDI
Marwick and Lewis reported the following shared tactics various RWE groups use for online exploits:
teenagers in Veles, Macedonia who profited around 16K dollars per month via Google’s AdSense from Facebook post engagements
a long history of mistrust with mainstream media
If you’re a college instructor of communications or teach digital literacy as a librarian, see the corresponding syllabus for this article. It provides discussion questions and assignments for teaching students about media manipulation. To teach your students how to combat fake news online, see my post on Navigating Post-Truth Societies: Strategies, Resources, and Technologies.
+++++++++
more on fake news in this iMS blog
https://blog.stcloudstate.edu/ims?s=fake+news