These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
This document discusses social networks and provides information about common networks like Facebook and Twitter. It outlines some of the key concerns parents may have regarding their children's use of social media, such as privacy settings, sharing personal information, and interacting with unknown users. The document also provides tips for parents on how to educate themselves about the sites their children use and how to help them stay safe online through open communication and using privacy and security features.
Twitter is a social media platform that allows users to post tweets of 140 characters or less. Users must agree to Twitter's terms of service and privacy policy before creating an account. However, most people do not read these documents fully before agreeing. The terms of service and privacy policy outline what information Twitter can access from users and how it may use this data. They also specify behaviors that could get a user's account suspended, such as posting harmful, offensive, misleading or copyrighted content. Users are responsible for any legal consequences of their tweets.
The document provides information about various social media platforms and online gaming services that are popular among middle school students. It discusses the main features and risks of platforms like Instagram, YouTube, Skype, Xbox Live, and Ask.fm. The key risks include exposure to bullying, inappropriate content, and privacy/identity issues. The document advises parents to utilize available privacy and parental control settings, and to monitor their children's online activities and conversations.
Using Instagram to Promote Your Business and Increase Site Trafficshawnatthunder
Shawn Massie, Director of Search and Social Media at Thunder SEO, helps explain how businesses should be using Instagram to promote themselves and gain qualified web traffic to their site. This presentation was part of SEOmoz's Mozinar web series.
This document outlines the terms and conditions for using a presentation from NetSmartz. It states that by using the presentation, the user agrees to be bound by NetSmartz's terms of use on their website. The user also acknowledges that the presentation is copyrighted material owned by NetSmartz and agrees not to alter, edit, or use it for commercial purposes without permission. The presentation is provided "as is" without warranty, and all risks in using it are borne by the user.
Social networking sites allow teens and young adults to share information, stories, photos and videos with friends online. Some common social networking sites are Myspace, Facebook and Friendster. While social networking allows people to connect, it also poses some risks if personal information is shared publicly or with strangers. The document provides tips for socializing safely online such as only posting information you're comfortable sharing publicly and being wary of talking to strangers.
Community Building via Social Media and Google+Max Thomas
The document discusses building communities on social media platforms like Facebook and Google+. It provides tips for brands to engage fans and increase engagement rates on Facebook, such as posting daily, encouraging user conversations and responses, and celebrating fans. It also summarizes Google+'s growth in users and presents the platform as an opportunity for brands to build communities long-term through search impact.
These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
This document discusses social networks and provides information about common networks like Facebook and Twitter. It outlines some of the key concerns parents may have regarding their children's use of social media, such as privacy settings, sharing personal information, and interacting with unknown users. The document also provides tips for parents on how to educate themselves about the sites their children use and how to help them stay safe online through open communication and using privacy and security features.
Twitter is a social media platform that allows users to post tweets of 140 characters or less. Users must agree to Twitter's terms of service and privacy policy before creating an account. However, most people do not read these documents fully before agreeing. The terms of service and privacy policy outline what information Twitter can access from users and how it may use this data. They also specify behaviors that could get a user's account suspended, such as posting harmful, offensive, misleading or copyrighted content. Users are responsible for any legal consequences of their tweets.
The document provides information about various social media platforms and online gaming services that are popular among middle school students. It discusses the main features and risks of platforms like Instagram, YouTube, Skype, Xbox Live, and Ask.fm. The key risks include exposure to bullying, inappropriate content, and privacy/identity issues. The document advises parents to utilize available privacy and parental control settings, and to monitor their children's online activities and conversations.
Using Instagram to Promote Your Business and Increase Site Trafficshawnatthunder
Shawn Massie, Director of Search and Social Media at Thunder SEO, helps explain how businesses should be using Instagram to promote themselves and gain qualified web traffic to their site. This presentation was part of SEOmoz's Mozinar web series.
This document outlines the terms and conditions for using a presentation from NetSmartz. It states that by using the presentation, the user agrees to be bound by NetSmartz's terms of use on their website. The user also acknowledges that the presentation is copyrighted material owned by NetSmartz and agrees not to alter, edit, or use it for commercial purposes without permission. The presentation is provided "as is" without warranty, and all risks in using it are borne by the user.
Social networking sites allow teens and young adults to share information, stories, photos and videos with friends online. Some common social networking sites are Myspace, Facebook and Friendster. While social networking allows people to connect, it also poses some risks if personal information is shared publicly or with strangers. The document provides tips for socializing safely online such as only posting information you're comfortable sharing publicly and being wary of talking to strangers.
Community Building via Social Media and Google+Max Thomas
The document discusses building communities on social media platforms like Facebook and Google+. It provides tips for brands to engage fans and increase engagement rates on Facebook, such as posting daily, encouraging user conversations and responses, and celebrating fans. It also summarizes Google+'s growth in users and presents the platform as an opportunity for brands to build communities long-term through search impact.
The document discusses how to determine if a website is secure and the effects of security on SEO. It provides tips for identifying security on different browsers like checking for the lock icon or noticing the URL starts with "https." An insecure site can negatively impact rankings, customer experience, and trust. While good SEO is important, ignoring security issues means all SEO efforts could be lost if the site is compromised.
This document outlines the privacy policy of a website. It discusses how user information is collected and used, including through Google Adsense cookies. The policy commits to protecting children's privacy and not collecting information from those under 18. Personal information collected is limited to IP addresses for analytics and is not linked to individual users. The policy may be changed at the website's discretion.
The document provides privacy recommendations and guidelines for securing a Google+ profile. It advises users to:
1. Limit who can view their profile and posts to only approved friends or custom circles.
2. Refrain from posting identifying information about themselves or family members such as photos showing faces or location data.
3. Disconnect any third-party services from their Google+ account and regularly review login history and account connections to ensure no unauthorized access.
Adam Dince will present on technical SEO tips for e-commerce sites, including tips for semantic search, navigation and canonicals, CMS configuration, and web servers. The presentation will cover several important best practices in 15 minutes, though not an exhaustive list. Technical SEO is important for websites to be found by search engines.
Google collects extensive data on users' online activities through services like Gmail, Google Search, YouTube, and more. This data includes email content, search histories, videos watched, and other online behaviors. Google uses this data to personalize services for users and enable targeted advertising. While users retain ownership of their content, by agreeing to Google's terms of service users give Google broad rights to use their data. Google collects data through technologies like cookies, IP addresses, and server logs that allow tracking of users' activities and interests over time.
Spooky Good Technical SEO for E-Commerce SitesAdam Dince, MBA
Presented at MnSearch.org's Search Snippets #10 event. This presentation covers key strategic and tactical technical SEO tips and tricks. Hope you enjoy and share with your friends.
Topics covered:
- Semantic search
- Navigation and canonical
- Content management systems (CMS)
- Web servers
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
The document discusses how to determine if a website is secure and the effects of security on SEO. It provides tips for identifying security on different browsers like checking for the lock icon or noticing the URL starts with "https." An insecure site can negatively impact rankings, customer experience, and trust. While good SEO is important, ignoring security issues means all SEO efforts could be lost if the site is compromised.
This document outlines the privacy policy of a website. It discusses how user information is collected and used, including through Google Adsense cookies. The policy commits to protecting children's privacy and not collecting information from those under 18. Personal information collected is limited to IP addresses for analytics and is not linked to individual users. The policy may be changed at the website's discretion.
The document provides privacy recommendations and guidelines for securing a Google+ profile. It advises users to:
1. Limit who can view their profile and posts to only approved friends or custom circles.
2. Refrain from posting identifying information about themselves or family members such as photos showing faces or location data.
3. Disconnect any third-party services from their Google+ account and regularly review login history and account connections to ensure no unauthorized access.
Adam Dince will present on technical SEO tips for e-commerce sites, including tips for semantic search, navigation and canonicals, CMS configuration, and web servers. The presentation will cover several important best practices in 15 minutes, though not an exhaustive list. Technical SEO is important for websites to be found by search engines.
Google collects extensive data on users' online activities through services like Gmail, Google Search, YouTube, and more. This data includes email content, search histories, videos watched, and other online behaviors. Google uses this data to personalize services for users and enable targeted advertising. While users retain ownership of their content, by agreeing to Google's terms of service users give Google broad rights to use their data. Google collects data through technologies like cookies, IP addresses, and server logs that allow tracking of users' activities and interests over time.
Spooky Good Technical SEO for E-Commerce SitesAdam Dince, MBA
Presented at MnSearch.org's Search Snippets #10 event. This presentation covers key strategic and tactical technical SEO tips and tricks. Hope you enjoy and share with your friends.
Topics covered:
- Semantic search
- Navigation and canonical
- Content management systems (CMS)
- Web servers
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
1. TM*
Online Policy Primer
By T. G.
NET23 SP4 2009
Sources for this page
* BloggerTM is a Registered Trademark of GoogleINC.
http://www.google.com/permissions/brand_terms.html
http://www.blogger.com
2. Things to know
before you accept
the
Image by Anne Marie Helmenstine
Terms of Service
at TM*
Sources for this page
* BloggerTM is a Registered Trademark of GoogleINC.
http://www.google.com/permissions/brand_terms.html
http://www.blogger.com
Helmenstine, A. (nd) http://chemistry.about.com/od/healthsafety/ig/Laboratory-Safety-Signs/Do-Not-Enter-Sign.htm
3. How secure is your
information?
Image from www.freefoto.com
4. Blogger requires your
TM
personal information
before you can register
Image from www.freefoto.com
5. What happens after that?
Where does it go?
Image from www.freefoto.com
When you create work on Blogger ...
TM
Who owns it?
Who can see it?
Who can use it?
6. Are you bound by laws?
Do you
have
rights?
Image from www.freefoto.com
7. Part 1: History
What is ?
TM
Who can join TM ?
What is a blog?
Image by PixelMixer
Image by PixelMixer
Sources for this page
*BloggerTM is a Registered Trademark of GoogleINC
Images by PixelMixer from http://www.freeiconsdownload.com/Free_Downloads.asp?id=597
Blogger image http://www.iconspedia.com/icon/blogger-logo-4346.html
Blogger image http://www.blogger.com
8. What is TM ?
Free tool for creating blogs
Voted “Best Blogging Host 2008”
Company based in California USA
Sources for this page
* BloggerTM is a Registered Trademark of GoogleINC
http://blogger.com/terms.g
http://www.merriam-webster.com/dictionary/blog
http://bloggerschoiceawards.com
9. Who can join TM ?
Anyone 13 years +
No parental consent
required
Users must
agree to Terms
of Service
Sources for this page
* BloggerTM is a Registered Trademark of GoogleINC
http://blogger.com/terms.g
http://chemistry.about.com/od/healthsafety/ig/Laboratory-Safety-Signs/Danger-Sign.htm
10. 13 yrs =
Yet Australian Federal Law =
MA15+ movies = 15 years old
TM
?
Buy alcohol = 18 years old
R18+ movies = 18 years old
NSW Full Drivers Licence =
Minimum age 19 years old
Sources for this page
Australian Federal Law. http://www.oflc.gov.au
* BloggerTM is a Registered Trademark of GoogleINC.
http://www.blogger.com
NSW Driver Licence. http://www.rta.nsw.gov.au
11. Blogger
community
content may
be unsuitable
for minors Image by Anne Marie Helmenstine
However,
- the content of blogs content that
is not monitored by exploits child
safety is not
Google
tolerated
TM
Sources for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
Helmenstine, A. (nd) http://chemistry.about.com/od/healthsafety/ig/Laboratory-Safety-Signs/Do-Not-Enter-Sign.htm
12. What is a blog?
short for “web-log”
informal public online journal
Image by PixelMixer
used for business, education, personal and other
purposes
blogs express personal views; contains links;
Image by PixelMixer
allow reader comments
see Bloggers Choice Awards for examples
Sources for this page
Definition: http://www.merriam-webster.com/dictionary/blog
Mercado-Kierkegaard, S (2006) “Blogs, lies, and the doocing: The next hotbed of litigation?”
Computer Law & Security Report Volume 22, Issue 2, 2006, Pages 127-136
Images by: PixelMixer from http://www.freeiconsdownload.com/Free_Downloads.asp?id=597
http://bloggerschoiceawards.com
Telk, J., (nd) “The Popularity of Blogs”. Retrieved October 11, 2009 from
http://ezinearticles.com/?The-Popularity-of-Blogs&id=1069430
13. 2. Conditions & Use
Where are the TM Terms of Service?
Freedom of expression & Censorship
Privacy, Copyright & Ownership
Surveillance & Legal implications
Sources for this page
* BloggerTM is a Registered Trademark of GoogleINC.
http://www.blogger.com
14. Terms of Service
TM is owned by TM
...so you need to agree to 4 documents:
1. Blogger Terms of Service
2. Blogger Content Policy
3. Google Terms of Service
4. Google Privacy Policy
Sources for this page:
*BloggerTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://www.google.com/accounts/TOS
http://www.google.com/privacypolicy.html
15. TM
Terms of Service
Be 13 years +
Accept all 4 Terms of Service PLUS any future
amendments
Responsible for all content in your own name
Abide by all laws, rules, regulations in your
local, state, national area PLUS applicable
international and USA laws
Legal proceedings = held solely in Santa Clara
County, California, USA
Google can refuse service anytime without
TM
providing a reason Sources for this page
*BloggerTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
16. TM Content Policy
Freedom of speech, communication and self-expression
are encouraged
Personal and sensitive information about another person
is not allowed
Impersonating another person is not allowed
Boundaries: blogs displaying adult nudity or that threaten
child safety are not permitted in compliance to applicable
laws
Blogs can be labelled “Adult Content”
“Hate speech”, “crude content”, “illegal activities”, “spam”
and “violence” are not tolerated Sources for this page
*BloggerTM is a Registered Trademark of GoogleINC
http://www.blogger.com/content.g
17. TM Terms of Service
The personal identification and contact
information you use for registration must be
accurate
Google can cancel your account at any time
TM
without prior consent
Google can change their Terms of Service at
TM
any time without notification
Google is not responsible for your content or
content provided by 3rd party applications
Sources for this page
*GoogleTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://google.com/accounts/TOS
http://google.com/privacy
18. TM Privacy Policy
Google collects and stores your personal information
TM
when you register to use a Google product TM
Google can access or reveal your personal information
TM
and communications if required by law or for any other
reason...
Brown and Muchira (2004) found that although internet
users were concerned about privacy issues, the chance to
win a prize often led to personal information being
submitted for marketing purposes
Sources for this page
*GoogleTM is a Registered Trademark of GoogleINC
Google Privacy Policy. http://www.google.com/privacypolicy.html
Brown, M., & Muchira, R. (2004). Investigating the relationship between Internet Privacy Concern and Online
Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70.
Retrieved October 24, 2009 from: http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf
Image from www.freefoto.com
19. Privacy Policy
Image from www.freefoto.com
“Internet privacy policies describe an
organisation’s practices on data collection,
use, and disclosure.” (Earp et al, 2005)
The responsibility for privacy ultimately rests
with the individual. (Goettke & Christiana, 2007)
Sources for this page
* Earp, J., Anton, A., Aiman-Smith, L., & Stufflebeam, W. (2005). Examining Internet Privacy Policies Within the Context of User
Privacy Values. IEEE Transactions on Engineering Management, Vol. 52. NO. 2, MAY 2005.
Retrieved October 24, 2009 from: http://citeseerx.ist.psu.edu
*Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in
Computer Science Computation and Society: Privacy and Technology.
Retrieved October 24, 2009 from: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
20. TM
Privacy and Surveillance
Google collects “Cookies” - small data files
TM
which collect where you go on the internet;
how long you are there;
and what you do, “for research and marketing
purposes” (McCullagh et al, 2007)
Google keeps this information
TM
for 30 years
Sources for this page
*GoogleTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://google.com/accounts/TOS
http://google.com/privacy
21. can TM
change their Policies
at any time in the
future
Image by Anne Marie Helmenstine
without informing Image by Joe Paduda
Sources for this page users
*GoogleTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
http://chemistry.about.com/od/healthsafety/ig/Laboratory-Safety-Signs/Generic-Warning-Symbol.htm
http://www.joepaduda.com/scrambled-toast-crystal-ball.jpg
22. Freedom of Expression
You are responsible for the content
posted under your username
Blogger and Google are not
TM TM
responsible for and do not monitor
blog content
Content may be “...offensive,
harmful, inaccurate or otherwise
inappropriate...”
“...caution, common sense and
Image from www.freefoto.com
proper judgment...” need to be
exercised when using Blogger.com Sources for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
23. Censorship
There are no restrictions to
your original content
uploaded to Blogger.com
Google is not responsible
TM
for user content
Blogs cannot contravene
any laws...so violence,
crude or sexually explicit
images, hate speech, and
content which threatens Image from www.freefoto.com
child safety are not allowed Sources for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
24. Copyright
Any use of Google and Blogger
TM TM
trademarks need to verify the
ownership of Google to those products
TM
with no misrepresentation
Users “represent and warrant that [they] Image by Fastfission
have all rights, power and authority...”
to upload all the content posted under
their username
If a user feels that their own copyright
has been “infringed on the Service”
Sources for this page
they can file an infringement notice http://www.blogger.com/terms.g
http://www.google.com/permissions/guidelines.html
http://www.google.com/blogger_dmca.html
Image by Fastfission http://commons.wikimedia.org/
wiki/File:Examine_copyright_icon.png
25. Copyright
You retain copyright...but
Google is free to use,
TM
“...reproduce, adapt, modify,
translate, publish, publicly
perform and distribute any Image by Fastfission
Content which you submit,
post or display on or
through, the Services.”
Sources for this page
*GoogleTM is a Registered Trademark of GoogleINC
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://google.com/accounts/TOS
http://google.com/privacy
26. Ownership
All original information generated by a user is
owned by that user
Users agree that they will not use Google and TM
Blogger files and data for misrepresentation
TM
or illegal activity
Users agree that they will not contravene any
copyright laws
Google is not responsible for any user
TM
content published on their service sites
Sources used for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://www.google.com/accounts/TOS
27. Surveillance
Google has the right to collect your
TM
information and distribute it for their purposes
Google claims that it uses the information to
TM
improve their services
Publishing information on a site like Blogger TM
leaves your content open to the public...be
wary of what you share online
Sources used for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://google.com/accounts/TOS
http://google.com/privacy
28. Legal Implications
BloggerTM users agree to abide by all
applicable local, state, national, international,
Californian and USA laws on the site and
related services
A user’s account can be terminated at any
time for no reason
It is important to make sure you do not reveal
sensitive information about a person or
business/organisation (Mercado-Kierkegaard, 2006)
Sources used for this page
http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://google.com/accounts/TOS
http://google.com/privacyMercado-Kierkegaard, S. (2006). Blogs, lies and the doocing: The next hotbed of litigation?. Journal of Computer, Law &
Security Report, Volume 22, Issue 2, 2006, 127-136. Retrieved October 24, 2009 from: http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/
29. References
Image from http://www.freefoto.com
(2006). Six Tips to Protect Your Search Privacy.
Retrieved October 24, 2009 from: http://www.eff.org/wp/six-tips-protect-your-search-privacy
Blogger and Google Terms of Service Agreements: http://www.blogger.com/terms.g
http://www.blogger.com/content.g
http://www.google.com/accounts/TOS
http://www.google.com/privacypolicy.html
Barbaro, M., & Zeller, T. (2006, August 9th). A Face Is Exposed for AOL Searcher No. 4417749. New York Times.
Retrieved October 24, 2009 from: http://www.nytimes.com/2006/08/09/technology/09aol.html
Brown, M., & Muchira, R. (2004). Investigating the relationship between Internet Privacy Concern and Online Purchase Behavior. Journal of
Electronic Commerce Research, 591, 62-70.
Retrieved October 24, 2009 from: http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf
Earp, J., Anton, A., Aiman-Smith, L., & Stufflebeam, W. (2005). Examining Internet Privacy Policies Within the Context of User Privacy Values. IEEE
Transactions on Engineering Management, Vol. 52. NO. 2, MAY 2005.
Retrieved October 24, 2009 from: http://citeseerx.ist.psu.edu
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science
Computation and Society: Privacy and Technology. Retrieved October 24, 2009 from: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
McCullagh, D., Pasquale, F., & Wong, N. (2007). Privacy Advocates Wary of Google Tactics.
Retrieved October 24, 2009 from http://www.npr.org/templates/story/story.php?storyId=11159716
Mercado-Kierkegaard, S. (2006). Blogs, lies and the doocing: The next hotbed of litigation?. Journal of Computer, Law & Security Report,
Volume 22, Issue 2, 2006, 127-136. Retrieved October 24, 2009 from: http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/
Mercado-Kierkegaard, S. (2005). How the cookies (almost) crumbled: Privacy & lobbyism. Journal of Computer Law & Security Report,
Volume 21, Issue 4, 2005, Pages 310-322
30. You still want to Blog?
Be wary of the amount and type of information
you make publicly available on a blog
Searching for information on a data base is
recorded and saved by search engines
(Barbaro & Zeller, 2006)
Check your privacy settings regularly
Do not share blog content which you wouldn’t
readily discuss in daily conversations Image from www.freefoto.com
Good Luck :)
(2006). Six Tips to Protect Your Search Privacy.
Retrieved October 24, 2009 from: http://www.eff.org/wp/six-tips-protect-your-search-privacy
Barbaro, M., & Zeller, T. (2006, August 9th). A Face Is Exposed for AOL Searcher No. 4417749. New York Times.
Retrieved October 24, 2009 from: http://www.nytimes.com/2006/08/09/technology/09aol.html