In New Ways to Think About Online Privacy, Nina Gregory shares what she heard at TED Long Beach where some major technology thinkers and innovators (some speakers, some attenders) shared their thoughts about what Gregory calls “privacy hygiene” (and about what they might be teaching their kids about the subject).
You may not have heard of some of the companies represented, but the thoughts about privacy are worth reading.
Politico, a Washington weekly newspaper that meticulously covers all things political, published this nifty Twitter graphic illustrating the tweeting environment during 2012 State of the Union (SOTU) speech. The data collection begins around 9:05 and continues until 10:40 eastern time. President Obama entered the chamber around 9:05 and the Republican response ended around 10:40.
The infographic includes a huge amount of data, illustrating the times (and issues), when the frequency of #SOTU tweets went up, and other hashtag (#) topics that people included in their tweets.
Twitter’s infographic illustrates an enormous amount of social networking activity. Use it as a classroom or dinner table conversation topic. providing a glimpse into real-time civics and history.
The December 6, 2011 ComScore Data Mine features this interesting data chart that graphs the reasons that people purchase smartphones. The leading reason?
People appreciate the convenience of smartphone ownership. Is staying in instant communication with kids one of these conveniences?
The challenge for parents when they purchase these gadgets for kids? Balancing appropriate use with convenience. Read the MediaTechParenting family mobile phone contract.
Check out graph and explanation at the ComScore site.
If I had any doubt about the efficiency of the global economy, it was put to rest these past three days as I watched my new iPhone 4s traverse the world via Fed Ex, from Shenzhen, China to my front porch in northern Virginia, USA.
The iPhone began its journey on November 2nd, though allowing for time zones and the international date line, it was probably still November 1st where I live. Nevertheless, after it left China the package made intermediate stops in Hong Kong, Anchorage, Alaska, Memphis, Tennessee, and Dulles, VA, before being loaded onto the Fed Ex delivery truck in Alexandria, VA and arriving on my front porch in the early afternoon of November 4th. The package spent the most time standing still at the Fed Ex hub in Memphis, where packages accumulate all day and then fly out at night to destinations around the United States. Continue reading “The Global Economy, My New iPhone 4s, and Grandpa’s Voyage to America”→
A September 16, 2011 press release from the FTC announces the proposed regulation changes and seeks comments from the public. The increasing use of mobile devices by children is one reason the agency believes that changes are necessary, and the expanded regulations would add locational data as additional personal information that needs to be protected.
Three Proposed Changes
1. Notify parents in advance if their children’s personal information is collected and may be used or sold.
… after surveys of American adults conducted by The Freedom Forum showed that even modern-day support for the First Amendment is neither universal nor stable. In the wake of the 2001 terrorist attacks, support for the First Amendment plummeted. Suddenly, the nation was almost evenly split on the question of whether or not the First Amendment “goes too far in the rights it guarantees.’’ Continue reading “Young Social Media Users Support the First Amendment”→
The beginning of a school year is a good time for families to set limits, explain rules, and in general, clarify expectations about technology use. Getting started in the fall, when everyone is off to a new grade and a fresh beginning, encourages healthy tech habits.
Depending on the age of your children, you may want to accomplish some or even all of the tasks on this list, encouraging everyone to think responsibly and become committed digital citizens.
Nine Back-to-School Technology Tasks
1. Place computers in central, well-traveled locations — away from bedrooms and private spaces.