Matters relating to cyber ethics and cyber or social media legalities.

Watch out for fake news
, , , ,

How to identify fake news online

A shortcoming of the Internet is the abundance of misinformation that coexists alongside helpful and accurate information. What makes matters worse is that in a matter of seconds, misinformation can spread exponentially through social…
, , , ,

We Don’t Cover Stupid! How to protect sensitive data.

“We don’t cover stupid” is a reminder that ignorance and lack of expertise have become unacceptable excuses for technological negligence. This entertaining but reasonable statement was made by an insurance company who is suing for reimbursement…
, ,

Drones amongst us – what can we do about them?

A few weeks ago, a friend observed a drone in front of her house when she went to investigate an unusual sound. For about 15 minutes she watched it hover above trees, moving back and forth 15 to 20 feet in both directions. She felt violated…
Facebook apps
, , , ,

How apps sneakily steal your privacy

This is a very quick article (with lots of easy illustrations) to remind you that free apps often come with a tradeoff of privacy. Today I clicked on the video below because I figured it must be very good if over 15 million people had viewed…
Wearable Tech privacy problems
, ,

The Etiquette of Wearable Technology

After Sarah Slocum claimed she was attacked because she wore Google Glass (wearable computer in the form of an optical head-mounted display that looks like glasses) in a bar, volumes of people weighed in with their differing opinions. Many…
,

How to Legally Use Images from a Google Search

There are many reasons to search for images on the Internet and multiple sites to find images where image creators and providers allow reuse of their images. Using images without verifying associated licenses is risky. This is a step-by-step…
, , ,

How to Deal with Negative Reviews

Business review sites such as Yelp can be a source of major frustration for business owners. Issues include exaggerated negative reviews from disgruntled employees, negative reviews by competitors, paid or unpaid fake reviews from people that…
, ,

24 Sites for Royalty-Free Images (Free and Paid)

In my last article, How to Legally Use Images and Graphics Created by Others, I discussed the dangers of using the work of others without permission or attribution. In this article you will find an extensive list of resources for Creative Commons,…
,

How To Legally Use Images and Graphics Created By Others

After locating Google images to illustrate a presentation on appropriate use and attribution of images belonging to others, I ran a malware scan on my computer.  The scan identified 469 malicious items that weren't there before the search.…
, , , ,

What Parents Must Know about Sexting

As a teenager, I drove a silver, convertible Camaro. I loved the wind in my hair as I drove during the day, and the night air was exhilarating when I cruised with the top down, the heater blasting and with no sense of danger or vulnerability…
, , , , ,

Guidelines to Protect Children from Online Sexual Predators

While there are obvious virtues to using cell phones and the internet, technology is simultaneously making children vulnerable and exposing them to exploitation and danger. Cyber bullying, gaming, webcams, social networking, sexting, inappropriate…