SlideShare a Scribd company logo
1 of 2
Gathered information (Social Media)
One of the biggest criticisms of social media sites and applications is their inherent potential
to feed the growing problem of cyber-bullying. Due to the widespread bullying and
harassment committed through Yik Yak, many schools and school districts have taken action
to ban the app. These include several Chicago school districts, Norwich University in
Vermont,Eanes Independent School District in Texas, Lincoln High School district in Rhode
Island, New Richmond School District in Ohio, and Pueblo County School District in
Colorado. Tatum High School in New Mexico banned cell phone use from the school due to
Yik Yak, and the Student Government Association at Emory University in Georgia attempted
to ban the app across campus, but failed to do so after immense backlash from students.
On October 3, 2014, The Huffington Post published an editorial by Ryan Chapin Mach titled
"Why Your College Campus Should Ban Yik Yak," which asserted that Yik Yak's anonymous
messaging boards "are like bathroom stalls without toilets. They're useless, they're sources
of unhelpful or harmful conversations, and they're a complete eyesore."
To remedy the cases of bullying in middle and high schools around the country, Droll and
Buffington amended the application to include geofences that work in the background.
These unseen fences disable the application within their defined borders. At first these
boundaries were installed manually by the developers, but it quickly became clear they
would need outside assistance. They found this assistance in a Vermont based company
known as Maponics. Maponics “builds and defines geographic boundaries.” They happened
to already have nearly 85% of the country’s high schools mapped, making it easy to block
access to Yik Yak in those areas. The fences are currently in effect mainly to disable the app
on all middle and high school grounds throughout the country. If the app is opened within
one of these areas the user is displayed a message along the lines of: “it looks like you’re
trying to use Yik Yak on a middle school or high school grounds. Yik Yak is intended for
people college-aged and above. The app is disabled in this area.”
In December 2014, security researchers discovered and demonstrated a potential attack on
the service, where a Yik Yak user could have their account compromised and be
deanonymised (having their identity revealed) if an attacker was using the same WiFi
network.
In February 2015, Yik Yak was exposed for systematically downvoting and deleting posts
that mention competitors. The automatic system downvotes and deletes any posts that
contain words that are associated with the names for other apps used by university students,
including "fade," "unseen," "erodr," and "sneek." The downvoting algorithm, which assigns
downvotes on regular intervals until the posts are deleted, appears designed to mislead
users to thinking their posts are unpopular with their peers, rather than censored by Yik Yak
itself.
Yik Yak works by combining the technologies of GPS and instant messaging, allowing users
to anonymously microblog to other nearby users. Before loading messages, the Yik Yak app
determines the user's location and groups them into pockets of 5 mile radius zones. Within
these zones, anyone inside the radius can post and read other people's “yaks”. Yik Yak is
effectively an anonymous bulletin board. The developers use a technology called geofencing
to avoid as much cyber-bullying as possible. Geofencing allows certain areas, such as
middle schools and high schools to be ‘fenced’ off using GPS technology. The app will then
be no longer accessible in the fenced off area.
Yik Yak was launched in 2013 after CEO Tyler and COO Brooks graduated from Furman
University. Yik Yak was originally funded by Atlanta Ventures and offices based in the
Atlanta Tech Village, the city's premier start up incubator.[citation needed] As of April 22,
2014, the company announced that it had secured $1.5 million in funding from various
companies such as Vaizra Investments, DCM, Kevin Colleran, and Azure Capital Partners.
This funding came five months after Yik Yak was founded. This funding was intended to
enhance the app, and to increase the amount of users both in the United States and
overseas. On June 30, 2014, a little over two months after the initial $1.5 million, Yik Yak
secured $10 million from its previous investors, along with Renren Lianhe Holdings, and Tim
Draper.
Last March, an app called Yik Yak took over Elizabeth Long's high school, Woodward
Academy, in Atlanta. Students learned about it during first period. By lunchtime, the school
made an announcement: Anyone caught with Yik Yak on their phones would receive
automatic detention.
By the end of the day, Long estimates her fellow students had written thousands of yaks,
short messages posted publicly to other users within a 1.5-mile radius.
A few months before that, Long was hospitalized after she attempted suicide. The 17-year-
old junior was distraught to read yaks that not only mentioned her depression but
encouraged it.
"The app has turned into a haven for bullying, threats, and hate speech, mostly focused on
kids in middle school and high school. I know this, because it happened to me," Long wrote
in her March 2014 petition
The signatures rolled in slowly at first; the campaign gathered only about 100 supporters in
its first month.
"I remember I checked [the petition] before school the first day the emails went out and I had
1,500 signatures," says Long. "By 4th period three or four hours later I had 24,000
signatures." Now the petition has more than 78,000 signatures.

More Related Content

What's hot

Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
There’s An App For That
There’s An App For ThatThere’s An App For That
There’s An App For That8anr
 
Online privacy and the librarian
Online privacy and the librarianOnline privacy and the librarian
Online privacy and the librarianabeldridge
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Youth Groups 2.0
Youth Groups 2.0Youth Groups 2.0
Youth Groups 2.0guestbf8afe
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internetCiaran Moran
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...ijcsit
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldKelly Lambert
 
Education Technology Startup TRAIL Files Open Internet Comment with the FCC
Education Technology Startup TRAIL Files Open Internet Comment with the FCCEducation Technology Startup TRAIL Files Open Internet Comment with the FCC
Education Technology Startup TRAIL Files Open Internet Comment with the FCCTRAIL
 
LIASA Pre-conference Workshop 3: Mobile Literacy
LIASA Pre-conference Workshop 3: Mobile LiteracyLIASA Pre-conference Workshop 3: Mobile Literacy
LIASA Pre-conference Workshop 3: Mobile LiteracyKidsintheCloud
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 

What's hot (18)

Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
There’s An App For That
There’s An App For ThatThere’s An App For That
There’s An App For That
 
Online privacy and the librarian
Online privacy and the librarianOnline privacy and the librarian
Online privacy and the librarian
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Youth Groups 2.0
Youth Groups 2.0Youth Groups 2.0
Youth Groups 2.0
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internet
 
An Administrator's Introduction to Social Networking
An Administrator's Introduction to Social NetworkingAn Administrator's Introduction to Social Networking
An Administrator's Introduction to Social Networking
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
 
Resisting technology
Resisting technologyResisting technology
Resisting technology
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
 
Education Technology Startup TRAIL Files Open Internet Comment with the FCC
Education Technology Startup TRAIL Files Open Internet Comment with the FCCEducation Technology Startup TRAIL Files Open Internet Comment with the FCC
Education Technology Startup TRAIL Files Open Internet Comment with the FCC
 
LIASA Pre-conference Workshop 3: Mobile Literacy
LIASA Pre-conference Workshop 3: Mobile LiteracyLIASA Pre-conference Workshop 3: Mobile Literacy
LIASA Pre-conference Workshop 3: Mobile Literacy
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
4
44
4
 

Viewers also liked

Harry Brignull - Dark patterns - Conversion Hotel 2015
Harry Brignull - Dark patterns - Conversion Hotel 2015Harry Brignull - Dark patterns - Conversion Hotel 2015
Harry Brignull - Dark patterns - Conversion Hotel 2015Webanalisten .nl
 
Come realizzare una distribuzione Linux per innovare e trovare lavoro
Come realizzare una distribuzione Linux per innovare e trovare lavoroCome realizzare una distribuzione Linux per innovare e trovare lavoro
Come realizzare una distribuzione Linux per innovare e trovare lavoroAlessio Fattorini
 
ブロック崩しを作ろう!
ブロック崩しを作ろう!ブロック崩しを作ろう!
ブロック崩しを作ろう!Tomohiro Shibuya
 
Muestra de cine y video indígena en colombia
Muestra de cine y video indígena en colombiaMuestra de cine y video indígena en colombia
Muestra de cine y video indígena en colombiaCrónicas del despojo
 
Pedro romero de terreros
Pedro romero de terrerosPedro romero de terreros
Pedro romero de terreroscolimota
 
Shopelect.com customers
Shopelect.com customersShopelect.com customers
Shopelect.com customersRohit Anand
 
Brochure Startersgids voor Geneesheren
Brochure Startersgids voor GeneesherenBrochure Startersgids voor Geneesheren
Brochure Startersgids voor Geneesherendeloittefidu
 
English insights
English insightsEnglish insights
English insightskursanova
 
KKPI
KKPI KKPI
KKPI niasj
 
Pitfalls of Noninvasive Hemodynamic Monitoring
Pitfalls of Noninvasive Hemodynamic MonitoringPitfalls of Noninvasive Hemodynamic Monitoring
Pitfalls of Noninvasive Hemodynamic MonitoringApollo Hospitals
 
Site A Analysis
Site A AnalysisSite A Analysis
Site A AnalysisYung Kai
 
Auto evaluacion daniel
Auto evaluacion danielAuto evaluacion daniel
Auto evaluacion danieldanielsulbaran
 
зовнішність
зовнішністьзовнішність
зовнішністьoksanaenglish
 

Viewers also liked (17)

Centro de práctica
Centro de prácticaCentro de práctica
Centro de práctica
 
Harry Brignull - Dark patterns - Conversion Hotel 2015
Harry Brignull - Dark patterns - Conversion Hotel 2015Harry Brignull - Dark patterns - Conversion Hotel 2015
Harry Brignull - Dark patterns - Conversion Hotel 2015
 
Come realizzare una distribuzione Linux per innovare e trovare lavoro
Come realizzare una distribuzione Linux per innovare e trovare lavoroCome realizzare una distribuzione Linux per innovare e trovare lavoro
Come realizzare una distribuzione Linux per innovare e trovare lavoro
 
ブロック崩しを作ろう!
ブロック崩しを作ろう!ブロック崩しを作ろう!
ブロック崩しを作ろう!
 
Muestra de cine y video indígena en colombia
Muestra de cine y video indígena en colombiaMuestra de cine y video indígena en colombia
Muestra de cine y video indígena en colombia
 
Guidlines for animals users
Guidlines for animals usersGuidlines for animals users
Guidlines for animals users
 
Pedro romero de terreros
Pedro romero de terrerosPedro romero de terreros
Pedro romero de terreros
 
Shopelect.com customers
Shopelect.com customersShopelect.com customers
Shopelect.com customers
 
Certi NIH SEC Awa
Certi NIH SEC AwaCerti NIH SEC Awa
Certi NIH SEC Awa
 
Brochure Startersgids voor Geneesheren
Brochure Startersgids voor GeneesherenBrochure Startersgids voor Geneesheren
Brochure Startersgids voor Geneesheren
 
English insights
English insightsEnglish insights
English insights
 
KKPI
KKPI KKPI
KKPI
 
Pitfalls of Noninvasive Hemodynamic Monitoring
Pitfalls of Noninvasive Hemodynamic MonitoringPitfalls of Noninvasive Hemodynamic Monitoring
Pitfalls of Noninvasive Hemodynamic Monitoring
 
Impact factor, altmetrics etc.
Impact factor, altmetrics etc.Impact factor, altmetrics etc.
Impact factor, altmetrics etc.
 
Site A Analysis
Site A AnalysisSite A Analysis
Site A Analysis
 
Auto evaluacion daniel
Auto evaluacion danielAuto evaluacion daniel
Auto evaluacion daniel
 
зовнішність
зовнішністьзовнішність
зовнішність
 

Similar to Gathered information second news story (yikyak)

Social@Ogilvy Briefing: Yik Yak
Social@Ogilvy Briefing: Yik YakSocial@Ogilvy Briefing: Yik Yak
Social@Ogilvy Briefing: Yik YakOgilvy Consulting
 
customer satisfaction towards whatsapp bba project
customer satisfaction towards whatsapp bba projectcustomer satisfaction towards whatsapp bba project
customer satisfaction towards whatsapp bba projectsjsuriya
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...musadoto
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsTrost, Micki
 
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...IJSRP Journal
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
 
Social media for parents
Social media for parentsSocial media for parents
Social media for parentsScottPC99
 
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY” Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY” Prakash Bambhaniya
 
Kraus Presentation To VCCS Recruiters 08.04.09
Kraus Presentation To VCCS Recruiters 08.04.09Kraus Presentation To VCCS Recruiters 08.04.09
Kraus Presentation To VCCS Recruiters 08.04.09jkraus67
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications1crore projects
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsJames Embleton-Forrest, BA, MCGI
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...William Kritsonis
 
Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...William Kritsonis
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
76 s201907
76 s20190776 s201907
76 s201907IJRAT
 

Similar to Gathered information second news story (yikyak) (20)

Social@Ogilvy Briefing: Yik Yak
Social@Ogilvy Briefing: Yik YakSocial@Ogilvy Briefing: Yik Yak
Social@Ogilvy Briefing: Yik Yak
 
customer satisfaction towards whatsapp bba project
customer satisfaction towards whatsapp bba projectcustomer satisfaction towards whatsapp bba project
customer satisfaction towards whatsapp bba project
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...
The Use Of Social Networking Sites among the Undergraduate Students of Sokoin...
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous Apps
 
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
Social media for parents
Social media for parentsSocial media for parents
Social media for parents
 
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY” Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
 
Kraus Presentation To VCCS Recruiters 08.04.09
Kraus Presentation To VCCS Recruiters 08.04.09Kraus Presentation To VCCS Recruiters 08.04.09
Kraus Presentation To VCCS Recruiters 08.04.09
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...
 
Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...Foss, nate the experiences of early service teachers using facebook nftej v23...
Foss, nate the experiences of early service teachers using facebook nftej v23...
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
76 s201907
76 s20190776 s201907
76 s201907
 

More from shaunaeleacy

Pr11 production commentary
Pr11 production commentaryPr11 production commentary
Pr11 production commentaryshaunaeleacy
 
Secondary Research References
Secondary Research References Secondary Research References
Secondary Research References shaunaeleacy
 
Final major project production diary
Final major project production diaryFinal major project production diary
Final major project production diaryshaunaeleacy
 
Evaluation and feedback
Evaluation and feedbackEvaluation and feedback
Evaluation and feedbackshaunaeleacy
 
Image manipulation
Image manipulationImage manipulation
Image manipulationshaunaeleacy
 
Evaluation you me e6
Evaluation you me e6Evaluation you me e6
Evaluation you me e6shaunaeleacy
 
My article (with improvents made)
My article (with improvents made)My article (with improvents made)
My article (with improvents made)shaunaeleacy
 
Product research article (with improvents made)
Product research article (with improvents made)Product research article (with improvents made)
Product research article (with improvents made)shaunaeleacy
 
Analysing text (emilys article)
Analysing text (emilys article)Analysing text (emilys article)
Analysing text (emilys article)shaunaeleacy
 
Emilys article with my comments
Emilys article with my commentsEmilys article with my comments
Emilys article with my commentsshaunaeleacy
 
Layout presentation
Layout presentationLayout presentation
Layout presentationshaunaeleacy
 
Interview prep sheet
Interview prep sheetInterview prep sheet
Interview prep sheetshaunaeleacy
 
University story research
University story researchUniversity story research
University story researchshaunaeleacy
 
Interview prep sheet
Interview prep sheetInterview prep sheet
Interview prep sheetshaunaeleacy
 
Questions for second interview
Questions for second interviewQuestions for second interview
Questions for second interviewshaunaeleacy
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research shaunaeleacy
 
Response analysed
Response analysed Response analysed
Response analysed shaunaeleacy
 

More from shaunaeleacy (20)

Pr11 production commentary
Pr11 production commentaryPr11 production commentary
Pr11 production commentary
 
Secondary Research References
Secondary Research References Secondary Research References
Secondary Research References
 
Final major project production diary
Final major project production diaryFinal major project production diary
Final major project production diary
 
Evaluation and feedback
Evaluation and feedbackEvaluation and feedback
Evaluation and feedback
 
Image manipulation
Image manipulationImage manipulation
Image manipulation
 
Survey analysis
Survey analysisSurvey analysis
Survey analysis
 
Shooting location
Shooting locationShooting location
Shooting location
 
Evaluation you me e6
Evaluation you me e6Evaluation you me e6
Evaluation you me e6
 
My article (with improvents made)
My article (with improvents made)My article (with improvents made)
My article (with improvents made)
 
Product research article (with improvents made)
Product research article (with improvents made)Product research article (with improvents made)
Product research article (with improvents made)
 
Analysing text (emilys article)
Analysing text (emilys article)Analysing text (emilys article)
Analysing text (emilys article)
 
Emilys article with my comments
Emilys article with my commentsEmilys article with my comments
Emilys article with my comments
 
Product research
Product researchProduct research
Product research
 
Layout presentation
Layout presentationLayout presentation
Layout presentation
 
Interview prep sheet
Interview prep sheetInterview prep sheet
Interview prep sheet
 
University story research
University story researchUniversity story research
University story research
 
Interview prep sheet
Interview prep sheetInterview prep sheet
Interview prep sheet
 
Questions for second interview
Questions for second interviewQuestions for second interview
Questions for second interview
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research
 
Response analysed
Response analysed Response analysed
Response analysed
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Gathered information second news story (yikyak)

  • 1. Gathered information (Social Media) One of the biggest criticisms of social media sites and applications is their inherent potential to feed the growing problem of cyber-bullying. Due to the widespread bullying and harassment committed through Yik Yak, many schools and school districts have taken action to ban the app. These include several Chicago school districts, Norwich University in Vermont,Eanes Independent School District in Texas, Lincoln High School district in Rhode Island, New Richmond School District in Ohio, and Pueblo County School District in Colorado. Tatum High School in New Mexico banned cell phone use from the school due to Yik Yak, and the Student Government Association at Emory University in Georgia attempted to ban the app across campus, but failed to do so after immense backlash from students. On October 3, 2014, The Huffington Post published an editorial by Ryan Chapin Mach titled "Why Your College Campus Should Ban Yik Yak," which asserted that Yik Yak's anonymous messaging boards "are like bathroom stalls without toilets. They're useless, they're sources of unhelpful or harmful conversations, and they're a complete eyesore." To remedy the cases of bullying in middle and high schools around the country, Droll and Buffington amended the application to include geofences that work in the background. These unseen fences disable the application within their defined borders. At first these boundaries were installed manually by the developers, but it quickly became clear they would need outside assistance. They found this assistance in a Vermont based company known as Maponics. Maponics “builds and defines geographic boundaries.” They happened to already have nearly 85% of the country’s high schools mapped, making it easy to block access to Yik Yak in those areas. The fences are currently in effect mainly to disable the app on all middle and high school grounds throughout the country. If the app is opened within one of these areas the user is displayed a message along the lines of: “it looks like you’re trying to use Yik Yak on a middle school or high school grounds. Yik Yak is intended for people college-aged and above. The app is disabled in this area.” In December 2014, security researchers discovered and demonstrated a potential attack on the service, where a Yik Yak user could have their account compromised and be deanonymised (having their identity revealed) if an attacker was using the same WiFi network. In February 2015, Yik Yak was exposed for systematically downvoting and deleting posts that mention competitors. The automatic system downvotes and deletes any posts that contain words that are associated with the names for other apps used by university students, including "fade," "unseen," "erodr," and "sneek." The downvoting algorithm, which assigns downvotes on regular intervals until the posts are deleted, appears designed to mislead users to thinking their posts are unpopular with their peers, rather than censored by Yik Yak itself. Yik Yak works by combining the technologies of GPS and instant messaging, allowing users to anonymously microblog to other nearby users. Before loading messages, the Yik Yak app determines the user's location and groups them into pockets of 5 mile radius zones. Within these zones, anyone inside the radius can post and read other people's “yaks”. Yik Yak is effectively an anonymous bulletin board. The developers use a technology called geofencing to avoid as much cyber-bullying as possible. Geofencing allows certain areas, such as
  • 2. middle schools and high schools to be ‘fenced’ off using GPS technology. The app will then be no longer accessible in the fenced off area. Yik Yak was launched in 2013 after CEO Tyler and COO Brooks graduated from Furman University. Yik Yak was originally funded by Atlanta Ventures and offices based in the Atlanta Tech Village, the city's premier start up incubator.[citation needed] As of April 22, 2014, the company announced that it had secured $1.5 million in funding from various companies such as Vaizra Investments, DCM, Kevin Colleran, and Azure Capital Partners. This funding came five months after Yik Yak was founded. This funding was intended to enhance the app, and to increase the amount of users both in the United States and overseas. On June 30, 2014, a little over two months after the initial $1.5 million, Yik Yak secured $10 million from its previous investors, along with Renren Lianhe Holdings, and Tim Draper. Last March, an app called Yik Yak took over Elizabeth Long's high school, Woodward Academy, in Atlanta. Students learned about it during first period. By lunchtime, the school made an announcement: Anyone caught with Yik Yak on their phones would receive automatic detention. By the end of the day, Long estimates her fellow students had written thousands of yaks, short messages posted publicly to other users within a 1.5-mile radius. A few months before that, Long was hospitalized after she attempted suicide. The 17-year- old junior was distraught to read yaks that not only mentioned her depression but encouraged it. "The app has turned into a haven for bullying, threats, and hate speech, mostly focused on kids in middle school and high school. I know this, because it happened to me," Long wrote in her March 2014 petition The signatures rolled in slowly at first; the campaign gathered only about 100 supporters in its first month. "I remember I checked [the petition] before school the first day the emails went out and I had 1,500 signatures," says Long. "By 4th period three or four hours later I had 24,000 signatures." Now the petition has more than 78,000 signatures.