• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Social   »   Life Played Out in Pictures and Videos Shared with Hundreds or Thousands of People Online

Life Played Out in Pictures and Videos Shared with Hundreds or Thousands of People Online

  • Posted on:May 31, 2013
  • Posted in:Social
  • Posted by:
    Richard Medugno
0

Greg Boyle photo

By Greg Boyle

There has been a lot of talk recently about future technology such as Google Glass and Apple iWatch, wearable tech is fast becoming a reality…it makes me wonder…is it all happening too fast?

I worry about what the world will look like in five years time when my son reaches high school. I was leaving school and starting college when phones started to include cameras. Luckily for me, we didn’t have them at high school and the cameras on phones in those days were too poor to shoot pictures at night or inside.

Much of the knowledge we have as adults centres on the mistakes and “fun” we had as young adults and luckily for most of us these adventures remain purely as legends that old friends bring out when you catch up every few years, and the memories fade and get embellished for good humour.

What we see now is life played out in pictures and videos shared with hundreds (or thousands) of people in a matter of seconds via social media.

Now mistakes can have drastic consequences

There is no forgiveness of time nor sunset, as the quality of cameras  in phones, in-built flashes, and the ubiquitous nature of them now means that children making mistakes can have drastic consequences to self-esteem, friendships, schooling, future careers and families.

The speed of learning that we used to get from making mistakes has been outpaced by the capability of smartphones and social media available to young people. Those capabilities are improving at lightning speed while the wisdom of years doesn’t come any faster (although my three-year-old thinks it does).

Will everything they see be streamed live?

What will kids be able to do with their phones, watches, and glasses in five years time? Will everything they see be streamed live to their Google+ YouTube channel and immediately be searchable based on things happening in their suburb on a Saturday night?

Kids today have it good – the technology is awesome. I would love to be able to look back every few years at the things I did with friends so that the memories don’t fade too quickly, but unfortunately, in our day the photos were to blurred and grainy. However, I’m not so sure that Saturday night streaming from the local pub is something I would have wanted my friends, family, and employer to have access to.

There is going to need to be a lot of sharing of the wisdom we learned from our mistakes very early on so that technology can be embraced, stories can be embellished, and the only embarrassments faced are played out amongst forgiving friends and not the Internet at large. We (adults and parents alike) have a big job ahead of us.

I work for Trend Micro and the opinions expressed here are my own.

For more tips and advice regarding Internet, mobile security and more, just “Like” Trend Micro Fearless Web Internet Security on Facebook at http://www.facebook.com/fearlessweb.

 

Related posts:

  1. Set the Rules for Kids Online But Don’t Stop There…
  2. Keeping your kids safe online
  3. Fearless Photos: Protecting your Pictures Online
  4. It’s Now Easy to Download and Access Your Online Social Life

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.