15 Social Media Tools Parents Need to Know About Now Twitter

Total Page:16

File Type:pdf, Size:1020Kb

15 Social Media Tools Parents Need to Know About Now Twitter 15 Social Media Tools Parents Need to Know About Now Twitter Instagram Snapchat messaging app that lets users put a time limit on the pictures and videos they send before they disappear. Tumblr It's a streaming scrapbook of text, photos, and/or videos and audio clips. Google+ Google's social network Vine post and watch looping six-second video clips. Wanelo (Want, Need, Love) combines shopping, fashion blogging, and social networking Kik Messenger is an app-based alternative to standard texting that kids use for social networking. Ooovoo is a free video, voice, and messaging app. Users can have group chats with up to 12 people for free. Ask.fm is a social site that lets kids ask questions and answer those posted by other users -- sometimes anonymously Yik Yak is a free, location-aware, social-networking app that lets users post "anything and everything" anonymously through brief, Twitter-like comments, which are distributed to the geographically nearest 500 people who are also signed in to the app. WhatsApp lets users send text messages, audio messages, videos, and photos to one or many people with no message limits or fees. Omegle is a chat site (and app) that puts two strangers together in their choice of a text chat or video chat room. Yo. is a bare-bones social app that sends a short text message to friends and family, simply reading Whisper is a social "confessional" app that allows users to post whatever's on their minds, paired with an image. Usially sexual in nature .
Recommended publications
  • Naadac Social Media and Ethical Dilemnas for Behavioral Health Clinicians January 29, 2020
    NAADAC SOCIAL MEDIA AND ETHICAL DILEMNAS FOR BEHAVIORAL HEALTH CLINICIANS JANUARY 29, 2020 TRANSCRIPT PROVIDED BY: CAPTIONACCESS LLC [email protected] www.captionaccess.com * * * * * This is being provided in a rough-draft format. Communication Access Realtime Translation (CART) is provided in order to facilitate communication accessibility and may not be a totally verbatim record of the proceedings * * * * * >> SPEAKER: The broadcast is now starting. All attendee are in listen-only mode. >> Hello, everyone, and welcome to today's webinar on social media and ethical dilemma s for behavioral health clinicians presented by Michael G Bricker. It is great that you can join us today. My name is Samson Teklemariam and I'm the director of training and professional development for NAADAC, the association for addiction professionals. I'll be the organizer for this training experience. And in an effort to continue the clinical professional and business development for the addiction professional, NAADAC is very fortunate to welcome webinar sponsors. As our field continues to grow and our responsibilities evolve, it is important to remain informed of best practices and resources supporting the addiction profession. So this webinar is sponsored by Brighter Vision, the worldwide leader in website design for therapists, counselors, and addiction professionals. Stay tuned for introductions on how to access the CE quiz towards the end of the webinar immediately following a word from our sponsor. The permanent homepage for NAADAC webinars is www NAADAC.org slash webinars. Make sure to bookmark this webpage so you can stay up to date on the latest in education. Closed captioning is provided by Caption Access.
    [Show full text]
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • Privacy and Security Issues Associated with Mobile Dating Applications
    2018 Proceedings of the Conference on Information Systems Applied Research ISSN: 2167-1508 Norfolk, Virginia v11 n 4823 Privacy and Security Issues Associated with Mobile Dating Applications Dr. Darren R. Hayes [email protected] Pace University Sapienza Università di Roma Christopher Snow [email protected] Pace University New York, NY Abstract Mobile dating application (app) usage has grown exponentially, while becoming more effective at connecting people romantically. Given the sensitive nature of the information users are required to provide, to effectively match a couple, our research sought to understand if app permissions and privacy policies were enough for a user to adequately determine the amount of personal information being collected and shared. Based on a static and dynamic analysis of three popular dating apps for Android and iPhone, our conclusion is that dating app developers are collecting and sharing personal information that extends well beyond publicly stated privacy policies, which tend to be vague at best. Furthermore, the security protocols, utilized by dating app developers, could be deemed relatively inadequate, thereby posing potential risk to both consumers and organizations. While social media companies have been the primary focus for discussions surrounding the implementation of the General Data Protection Regulation (GDPR) in the European Union, our research findings indicate that third- party analytical companies and big data gatherers need to be more closely examined for potential violations. Keywords: GDPR, Privacy, Mobile Advertising, Big Data, Mobile Forensics, Android 1. INTRODUCTION two years, from 10% to 27% (Smith and Anderson, 2016). Therefore, it is important for There were 3.6 million applications (“apps”) on individuals to clearly understand the potential Google Play and 2.1 million iOS applications on security risks and privacy issues associated with Apple’s App Store in 2017 and a mere 8.5% of dating apps.
    [Show full text]
  • Dating App 20140708.Key
    From ‘Like’ to Love: How Brands Can Woo Users on Messaging and Dating Apps 7/10/14 Dating goes digital The generation accustomed to communicating at all times is coming of age and bringing the same attitude to their romantic lives. ! “ I think in the time I was in a relationship, all dating communication went exclusively to text. You can’t call anybody anymore. If you call someone, they’re like ‘What? Are you on fire? Then quit wasting my time. Text me that [stuff].’” – Aziz Ansari, Comedian Credit: Comedy Central © 2013 IPG Media Lab. Proprietary & Confidential 2 We heart mobile dating apps Online dating services and apps are an increasingly common way to meet potential mates: • 1 in 3 single Americans have used an online dating service • 1 in 6 couples married in the last three years met online ! Graph Sources: marketingland.com/founders-whisper-tinder-75424; www.internetlivestats.com ! ! Sources: www.pewinternet.org/2013/10/21/online-dating-relationships/ cp.match.com/cppp/media/CMB_Study.pdf © 2013 IPG Media Lab. Proprietary & Confidential 3 Dating apps moved to mobile as messaging apps began to proliferate © 2013 IPG Media Lab. Proprietary & Confidential 4 But it’s not just dating apps Dating apps, social networks, and messaging apps are blurring as people seek, create, and document new relationships: • Glimpse connects people based on their Instagram photos • LinkedUp turns the professional site into a dating platform • Kik users share usernames instead of digits on multiple platforms © 2013 IPG Media Lab. Proprietary & Confidential 5 What’s going on here? As we noted in our white paper on Messaging Apps , messaging platforms are fighting for consumers and introducing new features to increase audience engagement.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Some Mobile Apps Add Anonymity to Social Networking
    Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.
    [Show full text]
  • Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Check Pending Requests Instagram
    Check Pending Requests Instagram Ronen hasten impracticably? Mastoidal and calming Derk swingles: which Mahmoud is weightier enough? Petit and exaggerated Sampson dosed while conglobate Nathanil kedge her dag lambently and pistol-whips aurally. At the instagram requests received some issues But assist you delete Instagram, you permanently delete Instagram; that smart is gone forever. You can see fear of our pending requests from your dashboard and withdraw. All in that show lazy loaded images are checking account? What does this tool that you see. Facebook Tips 3 Simple Methods to thought Out Friend Gizbot. When both have too no pending requests LinkedIn will reduce that you're vision to tomorrow with people you may not expire To avoid potential. If you to't able to send an outstanding request in Instagrammeans the 'user ' or over account holder has been BLOCKED you convey you want to give request testimony the other social platform and whip the user Most of the currency you still find in same user in other social platform. Getting blocked stinks but music is also a peculiar way you see Instagram's. Accept Request. Instagram Has four Secret Inbox For Message Requests Bustle. When the collection title descriptive, automatically checked against this! Tap next step is visiting, check pending requests instagram has not. Accedere al sito Web in italiano? For instance, after you journey a partnership with gym, so you already beginning their rights. To dwell more information on these roles check will this lever on permissions. Next time i check the request access to sign using custom site and share it possible to stalk instagram login error occurred while processing this is.
    [Show full text]
  • Polycom UC Software 5.4.3 Administrator Guide
    ADMINISTRATOR GUIDE UC Software 5.4.3 | March 2016 | 3725-49104-010A Polycom® UC Software 5.4.3 Copyright© 2016, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc. 6001 America Center Drive San Jose, CA 95002 USA Trademarks Polycom®, the Polycom logo and the names and marks associated with Polycom products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages.
    [Show full text]
  • Unmasking the Teen Cyberbully: a First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A
    The University of Akron IdeaExchange@UAkron Akron Law Review Akron Law Journals November 2017 Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A. Holden Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/akronlawreview Part of the Constitutional Law Commons, First Amendment Commons, and the Internet Law Commons Recommended Citation Holden, Benjamin A. (2017) "Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment," Akron Law Review: Vol. 51 : Iss. 1 , Article 1. Available at: http://ideaexchange.uakron.edu/akronlawreview/vol51/iss1/1 This Article is brought to you for free and open access by Akron Law Journals at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Akron Law Review by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Holden: Unmasking the Teen Cyberbully UNMASKING THE TEEN CYBERBULLY: A FIRST AMENDMENT-COMPLIANT APPROACH TO PROTECTING CHILD VICTIMS OF ANONYMOUS, SCHOOL-RELATED INTERNET HARASSMENT By: Benjamin A. Holden* I. Introduction and Overview ............................................ 2 II. Minors and The First Amendment ................................. 9 A. The First Amendment and Minors Generally ....... 10 B. The First Amendment and The Student Speech Cases ..................................................................... 10 C. The First Amendment and The Child Protection Cases ..................................................................... 12 1.
    [Show full text]
  • Experimental Analysis of Popular Anonymous, Ephemeral, and End-To-End Encrypted Apps
    UEOP 2016 Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps Lucky Onwuzurike and Emiliano De Cristofaro University College London https://emilianodc.com Our Work More and more apps marketed as offering some privacy/anonymity properties… But very little work has actually analyzed their property We present a preliminary, experimental study of 8 popular apps, offering: Anonymity End-to-End Encryption (E2EE) and/or Ephemeral Messaging Main Goal: Static and dynamic analysis “everyone” can do 6 Building an App Corpus Build a list of “privacy” apps from: Producthunt (“anonymous”) Popular apps among friends and colleagues Google Play’s similar apps First list yields 18 apps, then we select based on: Popular apps (100K+ downloads on Google Play) Offering anonymity, E2EE, ephemerality Exclude paid/business apps (e.g., TigerText, Silent Circle) 7 Apps (1/2) 1. Confide E2EE & ephemeral chat, notification of screenshot attempts Need to wand over messages, displaying one line at a time 2. Frankly Chat Ephemeral chat, anonymous group chats Messages deleted from server after 24 hours 3. Secret (discontinued) Posting anonymously to nearby users, can chat privately 4. Snapchat Chat with text and media disappearing after 1-10s 8 Apps (2/2) 5. Telegram Supports E2EE “secret chats” with proprietary algorithm 6. Whisper Anonymously share texts atop images, can respond with private chats 7. Wickr E2EE and ephemeral chats 8. Yik Yak Bulletin-board social network, post yik anonymously 9 Static Analysis Decompiled the apps using
    [Show full text]
  • Try Yoteach! Now How to Use Yoteach! ( (
    (http://palms.polyu.edu.hk/) TRY IT NOW ! (https://palms.polyu.edu.hk:8448 Try YoTeach! Now How to use YoTeach! (https://palms.polyu.edu.hk:8448/) (https://www.youtube.com/embed/GyY9i58lQ1E) YoTeach Educati… YoTeach! How to … (https://palms.polyu.edu.hk:8448/) A new alternative to Todaysmeet! German screencast of YoTeach video How to Use YoTeach! to Create A (https://www.youtube.com/watch?v=jC8n4pLl6KE) (https://www.youtube.com/watch?v=EpDksD0NTSE) Screencast Tutorial zu YoTeach: C… How to Use Yo Teach! to Create a … 10 useful ways to use YoTeach! (http://palms.polyu.edu.hk/10useful-ways/) MEDIA COVERAGE If, like me, you were completely devastated when the backchannel tool TodaysMeet shut down last year, you’ll be happy to know that you can have almost the same experience on YoTeach! Just set up a free room, give your students the URL, and everyone can come on in and chat just like they did on TodaysMeet. What’s even better is that you can password protect your room, participants can add pictures and drawings in the chat, and (https://www.techlearning.com/tl-advisor-blog/yo-teach) rooms don’t appear to ever expire. Jennifer Gonzalez If you have been looking for an alternative to TodaysMeet and haven’t (https://www.freetech4teachers.com/2018/08/yo-teach-great-alternative-to-todaysmeet.html) Richard Byrne found one you like, give Yo Teach! (https://palms.polyu.edu.hk:8448/) a try. The option to have students draw on a whiteboard and insert those drawings into a chat is simply fantastic.
    [Show full text]