The Impacts on the Educational Landscape ahead the Free Internet Offers, Traps and Surveillance that Threatens the Safety and Privacy on the Web.

Rogerio Roth

Abstract


The current educational landscape – pedagogically and technologically sound – has been undergoing several changes, mostly on what concerns the common sense in personal and institutional exposure, content and file sharing. The lack of knowledge about security and privacy besides the different ways of virtual learning environments does not guarantee a new approach or innovation. On the other hand, the adoption and effective use of fads without a previous context of experimentation, testing, protection and logic of use can bring different results of the expected negatively impacting the use of technologies to support the education.


Keywords


e-resources, oversharing, privacy, redesign, rereading, security.

Full Text:

PDF

References


Ahmed, K., Doucet, L., Gracie, C., Kendall, B. & Mardell, M. (2015, Jan 2). What will the big stories be in 2015? BBC News. Retrieved Jan 3, 2015, from http://www.bbc.com/news/world-30648444

Assange, J. (2014, Dec 4). Who Should Own the Internet? Julian Assange on Living in a Surveillance Society. The New York Times. Retrieved Dec 16, 2014, from http://www.nytimes.com/2014/12/04/opinion/julian-assange-on-living-in-a-surveillance-society.html?_r=0

Aymone, D. (2014). Internet publication [personal communication]. Message received from in October 17.

Bandeira, L. (2004). 1964: A CIA e a técnica do golpe de Estado. Revista Espaço Acadêmico, 64, ISSN 1519.6168. Retrieved Jan 22, 2015, from http://www.espacoacademico.com.br/034/34ebandeira.htm#_ftn4

Barros, A. (2008). Heresias entre os séculos XI e XV: uma revisitação das fontes e da discussão historiográfica – notas de leitura. In Arquipélago, 2 (11-12), 125-162. ISSN 0871-7664. Retrieved Dec 20, 2014, from http://hdl.handle.net/10400.3/626

Beschloss, M. (1997). Taking Charge: the Johnson White House Tapes, 1963-1964. New York: Simon & Schuster, p. 306.

Blum, R. (2014, Oct 19). Proibir anonimato não impede publicação de conteúdo impróprio na Internet. Universo Online. Retrieved Dec 29, 2014, from http://noticias.uol.com.br/opiniao/coluna/2014/10/19/proibir-anonimato-nao-impede-publicacao-de-conteudo-improprio-na-Internet.htm

Cameron, J. & Landau, J. (Producers), Cameron, J. (Director). (2009). Avatar [Motion Picture]. Santa Monica, CA, United States: Lightstorm Entertainment

Ca' Foscari (2008). Inaugurazione 141° Anno Accademico 2008/09 Università Ca' Foscari Venezia. Retrieved Dec 10, 2014, from http://www.unive.it/nqcontent.cfm?a_id=61185

Ca' Foscari (2012, May 18). Rapporti dei Delegati del Rettore 2011. Retrieved Dec 10, 2014, from http://blogs.unive.it/users/blogrettore/weblog/09d3a/Il_lavoro_dei_delegati.html

Chedin, R. (2014, Dec 26). Eu vi “A Entrevista†para que você não precise. Retrieved Dec 30, 2014, from http://www.manualdousuario.net/a-entrevista-critica/

European Commission (2010, November 30). Antitrust: Commission probes allegations of antitrust violations by Google. Press release IP/10/1624. Retrieved Dec 10, 2014, from http://europa.eu/rapid/press-release_IP-10-1624_en.htm

European Commission (2014, July 3). Factsheet on the “Right to be Forgotten†rulling (C-131/12). Retrieved Dec 10, 2014, from http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_data_protection_en.pdf

Fance, C. (2013, Aug 31). 10 Google Gmail Alternatives. Retrieved Dec 23, 2014, from http://www.hongkiat.com/blog/gmail-alternatives/

Feige, K. (Producer), & Black, S. (Director). (2013). Iron Man 3 [Motion Picture]. Burbank, CA, United States: Marvel Studios & DMG Entertainment

Fioretti, J. (2014, July 24). Google under fire from regulators on EU privacy ruling. Reuters. Retrieved Dec 10, 2014, from http://www.reuters.com/article/2014/07/24/us-google-eu-privacy-idUSKBN0FT1AZ20140724

Gellman, B. & Poitra, L. (2013, Jun 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved Dec 21, 2014, from http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-Internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

Greenwald, G. (2013, Jun 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian. Retrieved Dec 21, 2014, from http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

Hoffman, C. (2012, May 9). 5 Alternative Search Engines That Respect Your Privacy. How-To Geek. Retrieved Jan 4, 2015, from http://www.howtogeek.com/113513/5-alternative-search-engines-that-respect-your-privacy/

Marshall, B. (Writer), & Gaviola, K. (Director). (2011, December 12). Within [Television series episode]. In Spielberg, S., Braga, B., & Ovitz, M. (Producers), Terra Nova. Los Angeles, CA: 20th Century Fox Television. Retrieved Oct 20, 2014, from http://www.springfieldspringfield.co.uk/view_episode_scripts.php?tv-show=terra-nova&episode=s01e11

McCarthy, K. (2014, Apr 23). Brazilian president signs Internet civil rights law. The Register. Retrieved Dec 30, 2014, from http://www.theregister.co.uk/2014/04/23/new_bill_signed_in_brazil_guaranteeing_civil_rights_on_internet/

McDougall, P. (2010). Exclusive: Gmail Ditched By Major University. Dark Reading: Connecting the Information Security Community, May 5. Retrieved Oct 17, 2014, from http://www.darkreading.com/risk-management/exclusive-gmail-ditched-by-major-university/d/d-id/1088833?

Moody, G. (2011, Oct 4). Brazil Drafts An 'Anti-ACTA': A Civil Rights-Based Framework For The Internet. Techdirt. Retrieved Dec 30, 2014, from https://www.techdirt.com/articles/20111004/04402516196/brazil-drafts-anti-acta-civil-rights-based-framework-Internet.shtml

Neves, F. S. (2003, Nov 29). Propinas, ensino superior público, a razão dos estudantes e a falta dela. Retrieved Nov 30, 2011, from http://a_verdade_da_mentira.weblog.com.pt/arquivo/040197.html

Nietzsche, F. (1908). Human, all too human; a book for free spirits. Chicago: C. H. Kerr. Retrieved Dec 20, 2014, from http://hdl.handle.net/2027/mdp.39015003747733

Piotto, A. (2014). Internet publication [personal communication]. Message received from in April 23.

Rajagopalan, M. & Holland, S. (2014, Dec. 22). China condemns cyberattacks, but says no proof North Korea hacked Sony. Reuters. Retrieved Dec 30, 2014, from http://www.reuters.com/article/2014/12/22/us-sony-cybersecurity-idUSKBN0K006U20141222

Remoaldo, L. (1998). O anonimato na Internet: um direito ou uma ameaça? UP. Retrieved Dec 23, 2014, from http://paginas.fe.up.pt/~mgi97018/is/anoni.html

Ribble, J. (2014, Mar 31). Happy 10th Birthday, Gmail! Marketing Cloud. Retrieved Dec 20, 2014, from http://www.exacttarget.com/blog/happy-10th-birthday-gmail/

Roth, R. (2014). Technology Integration at a Crossroads: Dead End Street or New Horizons? TOJDEL, 2 (4), 112-140. ISSN 2147-6454. Retrieved Oct 17, 2014, from http://www.tojdel.net/volume.php?volume=2&issue=4

Rushe, D. (2013, Aug 15). Google: don't expect privacy when sending to Gmail. The Guardian. Retrieved Dec 19, 2014, from http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit

Spargo, C. (2014, Dec 25). North Korea was NOT behind the Sony hack according to multiple security experts who discredit FBI findings and reveal that a studio insider named 'Lena' may be responsible. Daily Mail. Retrieved Dec 30, 2014, from http://www.dailymail.co.uk/news/article-2887081/North-Korea-NOT-Sony-hack-according-multiple-security-experts-discredit-FBI-findings-reveal-insider-named-Lena-responsible.html

Snowden, E. (2014, Jan 26). Interview by H. Seipel. Edward Snowden exklusiv – Das Interview [Television broadcast]. Moscow: Norddeutscher Rundfunk. Retrieved Dec 21, 2014, from http://www.liveleak.com/view?i=f1d_1390839693

Warhol, A. (1967, Oct 13). Sculpture: Master of the Monumentalists. Time, 90, 80-86. Retrieved Dec 24, 2014, from http://content.time.com/time/magazine/article/0,9171,837402,00.html

Whittaker, Z. (2010, May 7). UC Davis scraps Gmail pilot: Privacy levels “unacceptableâ€. ZDNet, iGeneration. ZDNet. Retrieved Dec 23, 2014, from http://www.zdnet.com/article/uc-davis-scraps-gmail-pilot-privacy-levels-unacceptable/

Wilde, O. (1891). The Decay of Lying: An Observation. London: Oneworld Classics. Retrieved Dec 20, 2014, from http://www.online-literature.com/wilde/1307/

Wong W. (2013). Van Gogh on Demand: China and the Readymade. Chicago: University of Chicago Press. 320 p. ISBN: 0-226-02489-X


Refbacks

  • There are currently no refbacks.


e-ISSN: 1694-2116

p-ISSN: 1694-2493