Archive

Posts Tagged ‘Security’

2010-05-04 We Are The Network: How Should We Deal with Cyber-Bullying?

May 1st, 2010 No comments

How Should We Deal with Cyber-Bullying?

Please join our global discussion group
every Tuesday at 12PM noon U.S. Pacific / 3pm Eastern time

This Tuesday, May 4, at the Epoch Institute in Second Life

Click here to teleport to the Epoch Institute in Second Life
http://maps.secondlife.com/secondlife/Wells/97/56/27

This Week’s Topic

How Should We Deal with Cyber-Bullying?

Bullying has become a consistent concern of school administrators, teachers and parents. What is the best preventive approach and response to cyber-bullying? This week, we’ll discuss how we should handle and respond to cyber-bullying.

On one end of the spectrum, a middle school principal recently sent a strongly worded email to parents directing them (not asking – directing) to remove their childrens’ social media accounts, to install monitoring tools, and to monitor their txt messages.

At the other extreme, some take the position that the genie is out of the bottle, and we should educate kids while not using direct control to manage their use of communications tools.

I wrote a post about a related topic in January “The Mobile Invisibility Cloak of Today’s Internet-Enabled Kids,” and when I heard about the principal’s email mentioned above I thought it might be  time for us to talk about this issue head-on.

Does technology create cyber-bullying? Will controlling technology stop it? What approach should we use to prevent cyber-bullying, and what should we do when it is discovered? Which strategies will instill the most useful skills and beliefs in our children for their future?

Join us Tuesday at 12PM noon U.S. Pacific / 3pm U.S. Eastern time for an interactive discussion, and thanks for being part of “We Are The Network”!

If you do not have a Second Life account and would like a quick start to attend the session, please contact me for more information.

Best regards,

Joel

Reading links below – have fun and Read more…

10 Must-Do Security Checks To Prevent Virtual World Event Disruption

November 13th, 2009 2 comments

LockVirtual world event management is, in the large, similar to real life event management. You’ve got to make sure that guests and performers are lined up, that marketing and advertising is effective, and if it is a broadcast event, that the technical and support staff logistics have been completed. Security is a bit different in virtual world settings, and requires special handling in order to avoid enabling disruptions at your event. This post focuses on some specifics for Second Life™ security management; however, the principles are similar for other virtual world platforms.

Event Disruption Categories

  • Purposeful region crashes (exploiting a bug to cause the region to crash “on demand”)
  • Littering (leaving objects in inconvenient places, placing them out during an event, or moving them around in the way of the event)
  • Pollution (planting a particle generator that creates a spray of smoke, fog or distasteful imagery)
  • Disruptive chat or voice participation

Must-Do Security Checks

Read more…

Categories: Misc Tags: , ,