Thursday, March 25, 2010
Youtube Launch The First Virtual Choral
PRODUCED AND MANAGED BY:
Scott Haines
COMPOSED AND CONDUCTED BY:
Eric Whitacre
Representing 12 Countries:
Austria
Argentina
Canada
Germany
Ireland
New Zealand
The Philippines
Singapore
Spain
Sweden
United Kingdom
United States of America
Monday, March 22, 2010
The Megawoosh: One of the web's great fakes!
Astonishing pictures of what may be the web's greatest stunt..
Or its cleverest trick!
Megawoosh kicks off a look at the Great Fake Debate on the net..
Tuesday, February 23, 2010
Network Neutrality In The US
Al Gore says that legislation ensuring "net neutrality" is "needed for the revitalization of American democracy."
Techno-vegan Moby says without it, the "egalitarian" Internet would disappear.
Even Mallory from Family Ties, Justine Bateman, thinks "the freedom to access the site of any organization from Planned Parenthood to the Christian Coalition is going to end."
But just what the hell is net neutrality—and is all that is good and holy about the Internet really imperiled if legislation guaranteeing it isn't passed?
Network neutrality is necessary, say its supporters, to make certain that all data on the Internet is treated equally and to protect users from information discrimination on the part of Internet service providers who will slow down or even block access to certain sites.
Reason.tv's Michael C. Moynihan takes a skeptical look at the growing push for net neutrality legislation and asks Peter Suderman, a Reason associate editor who is closely following proposals on the topic, why Moby and Mallory want the Federal Communication Commission, of all agencies, to regulate the Internet.
Sunday, September 20, 2009
Viral Marketing: Girl Starts Dance Party to Black Eyed Peas
A Single Girl Starts Dance Party to Black Eyed Peas "I Gotta Feeling" on Oprah Winfrey Festival Chicago 2009.
The Video has been posted on youtube few days ago. And there's big chance it becomes a big buzz.
The crowd at the Oprah taping in Chicago did a special dance to the Black Eyed Peas live performance of the song: "I Gotta Feeling".
The group dance on the Michigan Avenue in downtown Chicago was really cool to see from the Tribune Tower's 14th floor.
Videos like this one are called "Viral Videos" made for advertising purposes especially through the net..
Tuesday, August 25, 2009
Can We Trust Facebook?
Do you have a Facebook?
Do you use it regularly?
Do you think what happens in Facebook stays in Facebook?
And the most important question is..
Do you trust Facebook?
Monday, May 18, 2009
Stop Cyber-bullying
Cyber-bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.
(Vidéo made by: Kls Support Services in cooperation with Childnet International)
- Cyber-bullying defined
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation.
Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target.
Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators.
- Harmful effects
Research had demonstrated a number of serious consequences of cyber-bullying victimization. For example, victims have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, cyberbullying back, being scared, frustrated, angry, and depressed.
One of the most damaging effects is that a victim begins to avoid friends and activities, often the very intention of the cyber-bully.
Cyber-bullying campaigns are sometimes so damaging that victims have committed suicide. There are at least four examples in the United States where cyber-bullying has been linked to the suicide of a teenager. The suicide of Megan Meier is a recent example that led to the conviction of the adult perpetrator of the attacks.
-Intimidation, emotional damage, suicide
The reluctance youth have in telling an authority figure about instances of cyber-bullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due depression brought on by cyber-bullying, according to reports by USA Today and the Baltimore Examiner.
- Lost revenue, threatened earnings, defamation:
Studies are being conducted by large companies to gauge loss of revenue through malicious false postings. Cyberstalkers seek to damage their victim's earnings, employment, reputation, or safety. A 2008 High Court ruling determined that, generally speaking, slander is when a defamatory statement has been made orally without justification. Libelous statements are those that are recorded with some degree of permanence. This would include statements made by email or on online bulletin boards.
- Adults and the workplace:
Cyber-bullying is not limited to personal attacks or children. Cyberharassment, referred to as cyberstalking when involving adults, takes place in the workplace or on company web sites, blogs or product reviews.
A survey of 1,072 workers by the Dignity and Work Partnership found that one in five had been bullied at work by e-mail and research has revealed 1 in 10 UK employees believes cyber-bullying is a problem in their workplace.
Cyber-bullying also is rampant on Wikipedia entries, Amazon.com and iTunes, where product reviews along with other consumer-generated data are being more closely monitored and flagged for content that is deemed malicious and biased as these sites have become tools to cyberbully by way of malicious requests for deletion of articles, vandalism, abuse of administrative positions, and ganging up on products to post "false" reviews and vote products down.
Cyberstalkers use posts, forums, journals and other online means to present a victim in a false and unflattering light. The question of liability for harassment and character assassination is particularly salient to legislative protection since the original authors of the offending material are, more often than not, not only anonymous, but untraceable. Nevertheless, abuse should be consistently brought to company staffers' attention.
- Recognition of adult and workplace cyber-bullying tactics:
Common tactics used by cyberstalkers is to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. Various companies provide cases of cyber-stalking (involving adults) follow the pattern of repeated actions against a target. While motives vary, whether romantic, a business conflict of interest, or personal dislike, the target is commonly someone whose life the stalker sees or senses elements lacking in his or her own life. Web-based products or services leveraged against cyberstalkers in the harassment or defamation of their victims.
The source of the defamation seems to come from four types of online information purveyors: Weblogs, industry forums or boards, and commercial Web sites. Studies reveal that while some motives are personal dislike, there is often direct economic motivation by the cyberstalker, including conflict of interest, and investigations reveal the responsible party is an affiliate or supplier of a competitor, or the competitor itself.
StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as:
"a situation when a child, tween or teen is repeatedly “tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted” by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology."
The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety.
A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
(Source: Wikipédia)