Category: Blog

Blog posts and news articles we published on a weekly basis

  • Parents warned over children’s online safety

    Boy looking depress cyberbullyingProfessor says sexting is a problem in most schools, and calls for more communication between parents and children

    Parents are over-confident about keeping their children safe online but many are avoiding difficult conversations about sexting and cyberbullying, according to research.

    Andy Phippen, professor of social responsibility at Plymouth University, said sexting – where schoolchildren are encouraged to take explicit photographs of themselves and send to other pupils – was a problem in most schools, despite the study revealing that 89% of parents believe their child has not been touched by cyberbullying or sexting.

    “There is a disconnect between how safe parents think they can keep their children online and their actual ability to do that,” Phippen said. “Those conversations are not being had – we have a hell of a long way to go on internet safety. In schools we hear teachers unwilling to talk to teenagers about sexual images because they worry about their jobs, schools unwilling to record instances of cyberbulling because they are worried about their Ofsted reports.”

    But sexting was a real and present problem, he said, adding that on a recent school training day on internet safety boys at the school said sexting was common and cited an example of a video that had been shared of a 14-year-old girl at the school inserting a hairbrush into her vagina.

    Phippen said that some girls he had worked with around sexting said it was flattering if a “fit boy” asked for a explicit photograph of them, while others felt under pressure from older boys to send photographs of themselves in order to gain popularity. “It can be part of the mating ritual for teenagers,” said Phippen. “We know that schools are dealing with this on a regular basis, it is extremely rare to come into a school where it is not at all at problem.”

    More than half of parents with children in primary and secondary school and 42% of parents with teenagers who were questioned had not discussed porn with their children. And only 15% of parents with 15-18 year olds thought their children accessed pornography online. Parents are likely to be turning a blind eye to the real impact of online pornography, as evidence from the NSPCC shows that the majority of 14 year old boys and many teenagers have accessed this content.

    AVG security expert Tony Anscombe said half of the parents consider a school’s internet safety policy when making their selection, and 95% thought online safety should be mandatory in schools. “We know parents take responsibility of online safety seriously […] yet we’re not living up to the standards we’re setting by avoiding conversations about exposure to explicit adult content, privacy or other Internet-related threats,” he said. “It comes as no surprise then that nearly 90% of parents aren’t aware of whether their child has been exposed to cyberbullying or sexting – two of the most common internet risks facing children.”

    The survey of 2,000 parents carried out by AVG technologies and Plymouth University found 92% were confident about their ability to teach online safety. “People tend to think they are protected in some way, that there are parental fixes in place – but that is not always the case,” said Phippen.

    Some schools were making big efforts to ensure children stayed safe online, but without a lack of statutory guidance and compulsory sex and relationship education in schools, tackling of the issues facing children was patchy around the country, he said. The government was lagging behind internet service providers who were coming up with solutions to issues raised, such as “splash pages” due to be introduced that will warn users when they area about to view illegal online content and server setting that restrict access to content throughout a home, he added. The study showed that 79% of parents had not received an invite to discuss online safety at school, but 89% felt the government needed to do more to teach children about internet safety.

    “The industry is responding, but the government’s rhetoric is that ‘someone should do something’ instead of funding better education in this area, and making sex and relationship education compulsory,” he said.

    source: The Guardian newspaper

  • Online pornography: David Cameron’s war

    Eradicating child abuse images is tough; protecting children from seeing pornography is even more complex

    British Prime Minister David CameronThe Daily Mail’s preening claim to have “won” the battle against internet pornography had an appropriate sidebar beside it online, showing multiple celebrities wearing teeny bikinis and flaunting their curves. Such is the contradiction of David Cameron‘s “war” on porn on the web.

    Cameron’s crusade conflates two things. First are the child abuse images, which anyone sensible wants removed: they are records of exploitation of children who could not consent, who are being abused, and show criminal acts whose viewing criminalises others.

    Plenty of work goes into wiping out child abuse images, and making it impossible to access, through schemes such as BT’s Cleanfeed, Microsoft’s PhotoDNA, and Google’s own photo-hashing service. But eradicating child abuse images would really involve controlling peer-to-peer technology or password-protected forums.

    Second is the much more complex area of pornography that isn’t illegal, but to which the easy access afforded by the internet causes concern for any parent – and anyone interested in the sort of society children are growing up in.

    An article in the Times Educational Supplement by Chloe Combi provides a sober perspective, describing how easily accessible pornography is making secondary school pupils think pubic hair is ugly on women, sexting is normal and that porn film narratives and scenarios depict a version of real life to be aspired to.

    Move on from the Mail Online or Page 3 and you arrive at American websites, which see a sexual continuum between the ages of 13 (when you’re allowed to create profiles on Facebook, Twitter and so on, to meet US legislation – though in fact many children ignore that – and 18, when viewing “porn” suddenly becomes legal. Yet any parent knows that things change enormously between those ages.

    If Cameron really wanted to stop online pornography he could ask ISPs to ban YouTube, Blogger and Tumblr. The latter, recently acquired by Yahoo, is trying to tamp down the visibility of porn on its network – which is reckoned to extend to millions of blogs.

    Blogger was recently the target of a crackdown by Google, which didn’t want the “adult” “blogs” on there to be selling adverts for off-site adult services. Because it’s fine to be an adult blog (behind nothing more difficult to evade than a confirm-your-age button) and use Google adverts.

    It’s tempting to consider blocking YouTube at home, because it simply has no boundaries, and boundaries matter when you’re a parent. There is no easy way of preventing an eight-year-old, alone with a tablet and browsing YouTube for games videos from landing on some of the very adult-themed videos that are often linked to them – and it isn’t possible to supervise a child all the time.

    For the internet service providers, meanwhile, Cameron’s crusade is guaranteed bad news. You could start a sweepstake now for the first article saying “Internet Porn Filter FAILURE!” – pointing the finger at an ISP for failing to be filter comprehensively enough. And then after that there will be another child killer who has somehow managed to “evade” the filters, because the only way to stop someone really determined to access peer-to-peer systems or well-hidden sites is to cut off the internet.

    It’s been 18 months since Cameron last hassled the internet industry over this, and it’s sure to happen again, because new internet signups – who will now have to actively disable filters for pornography – happen slowly. In the meantime, we’re left with software filters, which are expensive, and hard to make work on newer devices such as tablets and smartphones. Or parental intervention, which is difficult and time-consuming. Monday marked an important day in the battle – but not a game-changing one.

    source: The Guardian, UK

  • Online Privacy Fears Are Real

    A 20-year-old woman stalked through the Internet and killed. Thousands of e-commerce customers watching as their credit card numbers are sold online for $1 apiece. Internet chat rooms where identities are bought, sold and traded like options on the Chicago Board of Trade. These are the horror stories dredged up by privacy advocates who say the Net’s threat to personal privacy can’t be dismissed as mere paranoia. And, they say, we’ve only seen the tip of the iceberg.

    Invasion of Privacy

    INTERNET PRIVACY is a murky, complicated issue full of conflicting interests, misinformation, innuendo and technology snafus. On the face of it, e-commerce companies and privacy advocates are locked in stalemate. Web sites want to know all they can about you; consumers generally want to share as little as possible.

    Complicating matters further are criminals who break into Web sites, steal the information and use it for personal gain.

    Advertising firms, who stand to gain as much as any from personal data collection, have absorbed the brunt of complaints from privacy critics. But Rick Jackson, once a marketer and now CEO of privacy technology firm Privada Inc., thinks ad firms like DoubleClick are serving as an unwitting smokescreen for the real privacy problems.

    “There are a lot more people tracking you than you think,” Jackson said. “The data world is a very powerful and lucrative marketplace with a lot of players involved.” For evidence, he points to a Washington Post story that revealed that 11 pharmaceutical companies – including Pfizer Inc., SmithKline Beecham PLC, Glaxo Wellcome PLC – had formed an alliance and were tracking every click consumers made across their sites, then comparing notes. Consumers were never told.

    “Everybody points to advertising. That’s just the tip of the iceberg,” Jackson said. “We as consumers don’t have any knowledge of what really goes on out there.”

    At its heart, the Internet privacy problem is a paradox.

    The Net was born as an open research tool, and thus was never designed to allow privacy or security. But at the same time, the Net seems to offer perfect anonymity, and most users behave as if they cannot be seen. Who hasn’t said or done something online which we wouldn’t do in the “real world?”
    Warnings about revealing personal information online may sound obvious, but they often go unheeded – warnings such as “Don’t post notes in newsgroups or chatrooms you wouldn’t want your future boss – or spouse – to read.” Still, spend two minutes and you’ll find notes from Internet users in health support groups who are shocked to discover their supposedly private discussions about prostate cancer are now full-text searchable from a Web site.

    In fact, according to the Pew Internet & American Life Project, 36 percent of Net users have sought online support for health, family and mental health issues, and 24 percent of those have signed in with their real name and e-mail address. Every question they’ve asked and every statement they’ve made is now stored on a hard drive somewhere.

    Even the experts don’t have control. Jackson was a victim of identity theft earlier this year. He recouped all his financial losses, but said it was “a big emotional issue for me. Somebody’s out there ruining my reputation.” Super cyber-sleuth Richard Smith, now chief technical officer at the non-profit Privacy Foundation, had someone run up credit card bills under his name recently, too.

    “They used my FAX number as the home phone number in the application and I started getting all these calls, ‘When are you going to pay your bills?’ ” Smith said.

    Most of the horror stories from the online privacy realm stem from criminals. The most dramatic involves a 20-year-old Nashua, N.H. woman named Amy Boyer who was stalked with help from the Internet and then murdered Oct. 15, 1999. The killer, who committed suicide immediately, had purchased Boyer’s social security number for $45 from an online information firm, according a Web site authored by Boyer’s step-father detailing the murder. Congressional lawmakers are now considering legislation which would make sale of social security numbers illegal, which has been dubbed “Amy Boyer law.”

    read the full article on NBC News website…

  • Paying by Phone – Conveniences and Cautions

    It seems like every time I get to the register of a chain store, they offer me a new way to pay with my phone. But these new modes of paying have serious pros and cons – and there may be compelling reasons not to dive into mobile payments just yet, despite their growth.


    Mobile Payments Predicted To Go Up 44% in 2013
    Research firm Gartner says over $235 million in payments will be made with mobile devices this year. In retail outlets, those pay-by-phone options break down into three main categories: brand specific apps (like the Starbucks app), payment apps (like PayPal or Square Wallet), and NFC – Near Field Communications (special phones linked to a Google Wallet or Isis account).

    NFC – Near Field Communication
    Let’s start with NFC since it’s gotten all the hot press. This technology is built into certain devices, predominantly Android and Blackberry phones. You link the phone either to a Google Wallet account (tied to your bank or credit card), to an NFC credit card account (like Mastercard PayPass), or to an Isis account (tied to your mobile phone billing), then tap a terminal at the checkout to pay. But these tap-and-go contact-less payments will account for only 2% of all mobile payments in 2013 according to Gartner. Stores with NFC terminals are limited, and only a handful of phones have NFC technology built in (and the iPhone is NOT one of those).

    Probably the biggest issue is that NFC is a solution in search of a problem: how difficult is it to swipe a credit card? More explicitly, what does NFC payment do for the consumer’s convenience that swiping a credit card can’t? If NFC terminals were everywhere, maybe it would facilitate leaving home without cash or a credit card, but until then, the technology faces significant inertia, and I wouldn’t buy one phone over another just because it has NFC baked in.

    Brand-Specific Apps
    Many chains have their own apps that let you input your credit card info and “load” money on the app for in-store payments. By combining the payment functionality with apps that track purchases and reward loyalty, “regulars” get a significant convenience and can even frequent their favorite joint without a wallet. Do you go for a run every morning and grab a coffee when you finish? Hello Starbucks app on your phone!

    uyl_WaysToPay_still_embed

    Pre-order/Pre-pay
    I particularly like the order ahead and pay by mobile functionality that chains like California Pizza Kitchen App have brought to market. This makes the take-out pizza experience incredibly easy. Order and pay by app, walk in, tell them your name, get your food and walk out in under three minutes. The app even remembers your previous orders so you can replicate them with one click – genius. Jamba Juice is said to be testing pre-order and pre-pay for their app, and when this is a feature is replicated by more chains, it will bring many loyal customers into the mobile payment world.

    Wallet Apps
    Paypal and Square wallet are the two biggest players in app-based mobile payments. Stores that offer payment by app either let you key in your mobile phone number and a pin or use location data captured by your phone, in which case the phone will generate a QR code to be scanned at the register. Again, stores need special equipment and merchant accounts. Plus, the major benefits of using Paypal or Square are still limited to people who don’t have a bank account or credit cards and prefer a mobile option.

    Money Transfers
    While in-store mobile purchases are growing, 71% of all mobile payments are money transfers – and most often, person-to-person transfers. The clear winner here is Paypal, which lets you email or even text money to anyone’s phone or email address. The recipient needs to have a Paypal account (or sign up for one) but so long as it’s not a business payment, just between individuals, there are no fees.

    These types of transfers are ideal for repaying a friend, or sending money to a family member who needs the cash immediately. Some services don’t even need a bank account to work – good news for the 8% of US households that don’t have bank accounts. Customers can use cash to purchase a PayPal card or Money Pak card in retail outlets, and then use the pin numbers on those cards to deposit money into the Paypal mobile account (but beware: prepaid card purchases can have fees associated).

    Text Money From your Online Banking App
    Banks like Wells Fargo and Chase now allow you to send money to individuals directly from their phone app. There’s also a brand new mobile phone-based bank called GoBank that, among many other innovative features, lets you send money directly to a friend from your GoBank account.

    Send Money via Gmail
    Google is also entering the mobile transfer space; they are trying out a product that lets you send money through Gmail, almost like an attachment. Google said in a statement this is only available to users over 18. It’s slowly being rolled out to users in the U.S., and we assume later, internationally.

    Person-to-Person Credit Card Payments
    PayPal and Square both offer credit card readers that plug into a smart phone and allow anyone to swipe a credit card and accept payment. If you have an account, the readers are free. They make great sense for small business owners, fundraising events, or even collecting money around the office for a baby gift. But the big gotcha here is the roughly 3% that the services charge you to accept money via credit card.

    Security
    The weakest link in the mobile payment security chain is not the wireless transmission of your data via NFC or the scanning of QR codes from a store’s app. The technology is not the problem; it’s what that technology enables: more corporations may have your credit card and billing info on their servers (hello hacking target). And an even bigger vulnerability: if your phone is stolen, thieves have access to a treasure trove of accounts and payment methods. If you plan to pay with your phone, you’d better have security software enabled, like Lookout for Android or Find My iPhone – both of which allow you to erase your phone remotely as soon as it’s stolen.

    Bottom Line: Mobile payments make sense if you don’t have a bank account or credit card, if you frequent a chain that offers mobile payments and reward features, or if you want to transfer money to friends and family in a secure and convenient way. But be sure you know the fees associated with these payments and can remotely erase your phone if it’s stolen.

    source: Yahoo! News

  • Facebook admits year-long data breach exposed six million users

    Mark Zuckerberg Facebook CEPBy Gerry Shih, Reuters

    Facebook Inc has inadvertently exposed 6 million users’ phone numbers and email addresses to unauthorized viewers over the past year, the world’s largest social networking company disclosed late Friday.

    Facebook blamed the data leaks, which began in 2012, on a technical glitch in its massive archive of contact information collected from its 1.1 billion users worldwide. As a result of the glitch, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have.

    Facebook’s security team was alerted to the bug last week and fixed it within 24 hours. But Facebook did not publicly acknowledge the bug until Friday afternoon, when it published an “important message” on its blog explaining the issue.

    A Facebook spokesman said the delay was due to company procedure stipulating that regulators and affected users be notified before making a public announcement.

    “We currently have no evidence that this bug has been exploited maliciously and we have not received complaints from users or seen anomalous behaviour on the tool or site to suggest wrongdoing,” Facebook said on its blog.

    While the privacy breach was limited, “it’s still something we’re upset and embarrassed by, and we’ll work doubly hard to make sure nothing like this happens again,” it added.

    The breach follows recent disclosures that several consumer Internet companies turned over troves of user data to a large-scale electronic surveillance program run by U.S. intelligence.

    The companies include Facebook, Google Inc, Microsoft Corp, Apple Inc and Yahoo Inc.

    The companies, led by Facebook, successfully negotiated with the U.S. government last week to reveal the approximate number of user information requests that each company had received, including secret national security orders.

    (Reporting by Gerry Shih; Editing by Richard Chang)

    source: Reuters

  • Privacy – The Online Generation Wants It

    CHICAGO (AP) — The generation that’s grown up posting their lives online wants a little privacy. That’s not what we might expect as we debate just how much access the government should have to our mobile and online lives.

    But as it turns out, young people are much more complex than some may think when determining what personal information they want to share.

    Sure, they’re as likely as ever to post photos of themselves online, as well as their location and even phone numbers — and assume that at least some of their information is shared among website providers — say those who track their high-tech habits. But as they approach adulthood, they’re also getting more adept at hiding and pruning their online lives.

    Despite their propensity for sharing, many young adults also are surprisingly big advocates for privacy — in some cases, more than their elders.

    That attitude showed up most recently in a poll done over the weekend for the Pew Research Center for the People & the Press and The Washington Post. The poll, tied to the disclosure of broad federal surveillance, found that young adults were much more divided than older generations when asked if the government should tread on their privacy to thwart terrorism.

    Fifty-one percent of young adults, ages 18 to 29, said it was “more important for the federal government to investigate possible terrorist threats, even if that intrudes on personal privacy.”

    But 45 percent said personal privacy was more important, even if it limited the ability to investigate possible terrorist threats.

    In contrast, less than a third of adults, age 30 and older, told pollsters that preserving personal privacy was more important, while about two-thirds placed higher value on permitting terror investigations, regardless of privacy infringement.

    The young adults were much more in line with their elders when asked about the government monitoring specific modes of communication. Pollsters found that a slight majority of adults — including 18- to 29-year-olds — said it was “acceptable” for the government to secretly obtain phone call records.

    But a similar slight majority also said it was “unacceptable” for the government to monitor everyone’s emails and online activity. In an AP-NORC Center survey conducted around the 10th anniversary of the Sept. 11, 2001, terrorist attacks, those younger than age 30 also were most likely to oppose several different means of government surveillance, from emails to phone calls.

    It should be noted that the details about surveillance techniques used by the National Security Agency were still emerging as the weekend Pew poll was being done.

    “The big insight here is that younger adults are not indifferent to privacy, as many seem to believe,” says Lee Rainie, the director of the Pew Internet & American Life Project, which is affiliated with Pew Research Center for the People & the Press.

    It also fits with a report that Rainie’s staff recently issued on social media, privacy and adolescents, ages 12 to 17.

    They found that 91 percent of youth in that age bracket said they post photos of themselves on social networking sites, up from 79 percent in 2006, the last time this survey was done. Just over 70 percent post where they live, up from 61 percent. And 20 percent post their cell numbers, up from 2 percent.

    This time, researchers also asked about security and found that 60 percent of youth said they set their social networking profiles to private and were confident about keeping control of those settings. A similar proportion of young respondents said they’d also deleted some of their previous posts, blocked people from their social networking accounts and cloaked their messages with inside jokes or obscure references that only their friends would understand.

    Danah Boyd, a senior researcher at Microsoft Research, and her colleagues call the latter habit “social steganography,” a term for the hidden messages that ancient Greeks used.

    But it’s not federal investigators young people have in mind when they write in code, she says.

    “While adults are often anxious about shared data that might be used by government agencies, advertisers, or evil older men, teens are much more attentive to those who hold immediate power over them — parents, teachers, college admissions officers, army recruiters, etc.,” Boyd wrote in an online blog about the Pew Internet & American Life findings.

    “Most teens aren’t worried about strangers,” she added, “They’re worried about getting in trouble (with those they know).”

    They’re also getting more serious about editing their online lives — and adding more privacy measures — as they enter the college and work worlds, says Mary Madden, a senior researcher at the Pew Internet & American Life Project.

    “They’ve had to learn to function in this world of constant monitoring,” says Madden, who co-wrote her organization’s report on young people and privacy.

    That includes parents who track their children’s mobile devices, computers and accounts. “So they crave the freedom to have a playful space where they can do that,” Madden says.

    It explains, in part, why teens are moving to more creative and visually driven sites, such as Instagram and Snapchat.

    Results from the most recent Allstate/National Journal Heartland Monitor Poll, released Thursday but collected before the NSA story broke, found that young people were still more likely to accept the privacy tradeoffs of online life. Fifty-seven percent of young adults, ages 18 to 29, said they had a “great deal” of control over the personal information online. Even if there are risks, 54 percent also said the positives of online life made potential privacy tradeoffs worth it. Older age groups were consistently less likely to feel control over their online information and were less confident about the benefits of the tradeoffs.

    But they still want more control.

    A study published in 2010 by researchers at the University of California, Berkeley, and the University of Pennsylvania found that a large majority of young adults they questioned in 2009 thought there should be a law that would require website providers to delete all stored information about an individual.

    Those young people also wanted a law that would give them the right to know all the information those website providers have about them. Some would include government investigators, too.

    “I would highly prefer not having a target on my back for saying something in what I believe is a private forum,” says Jayson Flores, who’ll be a senior this year at Arcadia University in Pennsylvania.

    His views are consistent with the group that falls on the side of privacy over surveillance.

    Mandi Grandjean, a recent graduate of Miami University in Ohio, says she’s fine with the federal government doing secret surveillance of phone call records and Internet exchanges to combat terrorism, but “with congressional oversight.”

    “I was in sixth grade when 9/11 happened — and the world changed,” she says. “I am personally not a fan of big government, but I understand there are needs for security.”

    But even she believes it’s different when it comes to an employer, or even a coach. She was an athlete at Miami and had to agree to have her social networking accounts — even private ones — monitored by her coaches.

    She recalls one time, when she tweeted something on her locked Twitter account at midnight. Shortly after, her coach texted her: “Go to bed.”

    “I think there’s a line,” Grandjean says. “It puts me on edge.. It’s a little too close for comfort.”

    The Pew Research Center for the People & the Press/Washington Post poll was conducted by telephone June 6-9 with a random sample of 1,004 adults, age 18 and older. The margin of error is plus-or-minus 3.7 percentage points.

    The Pew Internet & American Life Project privacy poll, completed last September, tallied responses from 802 young people, ages 12 to 17, and their parents. It has a margin of error of plus-or-minus 4.5 percentage points.

    The Allstate/National Journal Heartland Monitor Poll was conducted by phone from May 29 – June 2 with 1,000 American adults age 18 and older. The margin of error is plus-or-minus 3.1 percentage points.

    ____

    On the Internet: Pew Research Center

    ____

    Martha Irvine is an AP national writer. She can be reached at mirvine@ap.org or at

  • The Wisdom of Crowds: Reddit, Twitter, and the Hunt for the Wrong Man

    By  posted at 6:00 am on April 23, 2013

    Thursday night’s abhorrent online vigilantism — in which Reddit and Twitter users seized upon police radio chatter to accuse a missing (and completely innocent) Brown University student of bombing the Boston Marathon — reminded us of one of the most under-acknowledged facts of the internet: that beyond the sleek, profitable edifices of Web 2.0 there remains the humming, virtual presence of an online crowd that is restive, unpredictable, and hungry for a cause.

    One need only glance at a few of the threads from Thursday night to get a sense of the zeal, numbers, and unscrupulousness of the throngs that intercepted two misidentified names and promptly set about defaming one. As with any physical crowd, what began as isolated innuendo quickly became the rallying cry of thousands. At midnight, Anonymous tweeted the full names of two possible suspects mentioned by the police — one of them the missing student, Sunil Tripathi — but omitted the all-important modifier “possible.”  By morning, the post had been retweeted over 3,000 times, and it was not until the police confirmed the identities of the actual suspects, the brothers Tamerlan and Dzhokhar Tsarnaev, that the crowd’s furor over Tripathi subsided.

    I first learned of the night’s disturbing events the following morning, when a friend called to warn me that Sunil Tripathi had been the victim of an online smear campaign. A year and a half ago I had visited this friend in Providence, and on the way there I happened to share a ride with Sunil and another Brown student. I had not met him before or since, and I did not know he was missing. My thoughts immediately went out to his family and friends, though soon I was also checking Reddit and Twitter to see the damage for myself. What I found were the digital debris of an internet lynch mob — incendiary posts, hastily produced collages of Tripathi’s face next to Dzhokhar Tsarnaev’s, some comments that had since been deleted, some that had been redacted to note that he was not, in fact, their man.

    It’s a bit unfashionable to speak darkly of “the crowd” these days. One might think that the term itself betrays a certain elitism or establishmentarianism, and yet the odd state of affairs is that it is precisely the establishment — generally business and mainstream media — that has recently embraced the power and resourcefulness of the online multitudes. In the past decade, much has been made of the untapped energy of online crowds, of their wisdom, ingenuity, and potential for productivity. Search Amazon and you will find, apart from James Surowiecki’s inaugural 2004 discussion The Wisdom of Crowds, titles like Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business and We Are Smarter than Me: How to Unleash the Power of Crowds in Your Business.

    Click here to read the full article

    source: The Millions

  • Anyone Can Be Found on Social Media in 12 Hours

    The Physics arXiv Blog for MIT Technology Review

    In 1967, the American social psychologist Stanley Milgram sent out 160 packages to randomly chosen individuals in the U.S., asking them to forward them to a single individual living in Boston. The task included a simple rule: The recipients could only send each parcel on to somebody they knew on a first-name basis.

    To his surprise, Milgram found that the first package arrived at its destination via only two people. On average, he found that the parcels reached their destination via five pairs of hands, which amounts to 6 degrees of separation.

    Milgram’s work has since been repeated on various social networks. For example, Microsoft says people on its Messenger network are separated by 6.6 degrees of freedom and Facebook claims its members are separated by only 4 degrees of separation.

    But there is another element to this work that has been less closely studied, which is the time it takes to travel across a network. In Milgram’s experiment, the first package arrived in just four days. But the others took significantly longer.

    So an interesting question is how quickly is it possible to traverse a social network — to track down a random individual across the network.

    Today, we have an answer thanks to the work of Alex Rutherford at the Masdar Institute of Science and Technology in Abu Dhabi and a few pals who have measured how quickly it is possible to track down random individuals around the world using social networks.

    They concluded that, on average, any individual is just 12 hours of separation from another.

    Their data comes from a competition called the Tag Challenge, in which the goal was to find five individuals in five different cities in North America and Europe. The only clue was a mugshot of the individual, the name of the city he or she was in and the fact that they would be wearing a T-shirt with the logo of the event.

    Rutherford and his team won the competition by identifying three of the five individuals in just 12 hours.

    They say a key factor to achieving this feat was the ability of participants to target other individuals who may be to help. That’s in contrast to another strategy which is blindly gathering as many different people to help as possible.

    Click here to read the full article

    source: Mashable

  • Warning over child ‘addiction’ to smartphones and gaming devices

    BY NICOLA ANDERSON – 23 APRIL 2013

    More young children are showing signs of becoming “addicted” to gadgets such as smartphones and gaming devices, psychologists have warned.

    Children are having problems concentrating in school and have motor skills worryingly below their appropriate age because they are spending “hours” playing computer games each day.

    One professional recently treated a 10-year-old who had gashes on his knuckles after lashing out in his sleep as a result of becoming agitated and aggressive after hours of playing the violent 18-rated ‘Grand Theft Auto’.

    Educational psychologist Dr Catriona Martyn, who is based in Dunmore, Co Galway, said there were also concerns about concentration levels in school but parents are often surprised when it is linked with the use of gadgets.

    Educational psychologist Anne Staunton warned that research had to begin “sooner rather than later”, saying she had noticed evidence among schoolchildren that gaming and playing on devices “can become an addiction”.

    This comes as research in the Britain reveals how young technology addicts experience the same withdrawal symptoms as alcoholics or heroin addicts when the devices are taken away.

    A technology addiction programme was set up three years ago by Dr Richard Graham, of the Capio Nightingale clinic in London, who said the condition prevented young people from forming normal social relationships, leaving them drained by the constant interaction.

    source: Belfast Telegraph

  • Research finds that video games hold both risks and rewards for children with Autism

    By  — April 22, 2013

    One in 88 children in America have a disorder that falls somewhere on the Autism Spectrum according to the Centers for Disease Control and Prevention. These range from conditions like the high-functioning Asperger’s syndrome to pervasive developmental disorders. With autism diagnoses rising at an incredible rate in recent decades, it’s been more important than ever to identify effective methods for helping to educate and socialize those with Autism Spectrum Disorders. Based on new research conducted at the School of Health Professions at the University of Missouri’s Thompson Center, video games could be a powerful tool in reaching children diagnosed with an ASD – but the data so far compiled demonstrates that games also carry some risks.

    Assistant professor Micah Mazurek recently conducted a study of 202 children diagnosed with ASD alongside 179 of their respective siblings to determine which types of screen-based media (television, video games, other computer software, and web-based entertainment) they respond to. Mazurek observed a demonstrable link between children with ASD and games.

    “We found that children with ASD spent more time playing video games than typically developing children, and they are much more likely to develop problematic or addictive patterns of video game play,” said Dr. Mazurek.

    “Using screen-based technologies, communication, and social skills could be taught and reinforced right away. However, more research is needed to determine whether the skills children with ASD might learn in virtual reality environments would translate into actual social interactions.”

    The primary conclusion of Mazurek’s most recent study is that there is a need for more study into how those with ASD interact with video games, and what social skills they take away from gaming. As obsessive behavior is a common characteristic of ASD, children with disorders are also possibly more susceptible to game addiction. “Parents need to be aware that, although video games are especially reinforcing for children with ASD, children with ASD may also have problems disengaging from these games.”

    As detailed in a new report by National Public Radio’s Lauren Silverman though, video games can be an important outlet for those with ASD even after childhood. “[Those with ASD} may really flourish at engineering-type tasks or computer design, where their interaction with people is somewhat limited,” says Dr. Patricia Evans of Children’s Medical Center in Dallas. It’s because of that propensity that Gary Moore and Dan Sellic opened the nonParelli Institute, an educational institute and software company that exclusively works with ASD employees.

    source: DIGITAL TRENDS