In this lesson students learn how to create well-defined search strings and to use tools and techniques such as bookmarking, browser filters and search engine preferences to avoid unwanted material.
In this lesson students learn how to authenticate online information by comparing “facts” from the website www.allaboutexplorers.com with more authoritative sources.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.
CIRA and MediaSmarts have partnered on a series of five tip sheets to educate Canadians about online security issues. The 5th tip sheet in the series, Socializing and Interacting Online, looks at negative issues that can come up when interacting with others through networked technologies including phishing scams and hoaxes, and strategies for dealing with them.
The new movie Zero Dark Thirty, which tells the story of the tracking and eventual killing of Osama Bin Laden, has received several Oscar nominations (including Best Picture), but it’s attracting another kind of attention as well: several writers, including Jane Meyer at The New Yorker and Peter Maass at The Atlantic, have accused it of condoning or even glorifying the use of torture by US intelligence agencies.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
Trend Micro’s “What’s Your Story?” Contest Awards $10,000 to a Trio of Ottawa High School Students: Poetry Performance Video Highlights the Internet’s Impact on a Generation
The last year has been an unusually busy one for watchers of gender representation in the news media, with not one but two high-profile women involved in the U.S. presidential race. The way in which these two politicians were covered provides a view of how gender in politics is portrayed in the media, and how this can help to explain just how unusual those two women are.
It’s ironic that as computers and other communications technology have become more accessible to the general public over the last thirty years, they have actually become less accessible to a segment of the population, one to whom access is everything: people with disabilities. More ironic still is that the history of communications technology is intimately tied to the drive to integrate people with disabilities more fully into society.
The history of the Internet – and the history of technology in general – could be described as one big demonstration of the doctrine of unintended consequences: a system designed to help researchers collaborate, and developed to protect military communications in the event of a nuclear war, wound up being used primarily for shopping, socializing and entertainment. The same is true of many of the products and services on the Internet as well. In its early years it was mostly seen as a one-to-many broadcast medium, like TV or radio, but over time it’s the more interactive elements that have proven to be most popular, with users producing at least as much online content as professionals.