Page 1 of 7

Jamie Saathoff

ENGL 1302.207

November 28, 2013

Ensuring Literacy and Communication Advancementin the Digital World

Today’s society is amidst a Literary Revolution in a Digital World. A New Literacy, one that broadens the horizons of emergent youth on a continually evolving platform has emerged. As a result, an influx of communication progression in reading, writing and social interactive qualities is evident among electronic technology users. An underlying question, however, now surfaces. What steps have become necessary to ensure this continued upward literary trend with minimal degradation to the user, specifically youth? The answer; a two part solution. First and foremost, global access and accessibility inherently requires internet safety and security awareness and legal advocacy for user protection. Additionally, scholastic education integration, parental regulation, communication at home, and continued policy reform are simple solutions for positive influences on modern literacy lifestyles.

The rise of internet usage and technology enables society the ability to exchange information and ideas on a regular, often constant basis. In an environment where the audience often becomes the author, young people and adults alike are reading and writing now more than ever (Paikin). Such interactive rhetorical communication has undeniably experienced evolutionary transitions. Despite all of this change and transition, society is significantly more literate and able to adapt prose appropriately as a result of the current Digital Age. However, accompanying the growth of the Internet and the literary benefits is adarker side. The emergence of threats or actions that have the potential to erode users’ confidencein the safety of their online activities. Rest assured, once these hazards are identified, education on topic of combatants is certain to minimize insecurities and foster continued academic growth.

Although the upward trend of literacy in the Digital Era spans generations, it is rapidly becoming common knowledge that if, or more appropriately, when a “mistake” is broadcast free to travel the global gateway of information, it will never go away. Take, for example,a 22-year-old from Michigan, who Tweeted and Instagrammed a photo of herself at work dressed as a Boston Marathon bombing victim for Halloween (Watts). She was promptly fired from her job and received several death threats in response to a single poor judgment call that went viral. While this young woman inactivated/deleted her information and apologized profusely, the story continues to haunt her as she almost immediately lost control over the media coverage and its’ internet distribution. In order to minimize this type of backlash, the Federal Trade Commission suggests actively practicing the STOP, THINK, CLICK method("OnGuard"). So before posting personal information of any for to anEmail, social media site, text message or any other form internet communication, users are encouraged to STOP and THINK about not only the intended recipient, but also all possible global audiences and repercussions. The use of a pseudonym may seem like an adequate enough process, however, Helen Nissenbaum is quick to dispel this theory in her publication, The Meaning of Anonymity in an Information Age. This short publication is revolutionary in itself. She verbalizes the fear of every ill-informed parent responsible for the safety and security of adolescents in this modern world. The systems of identity safeguarding by namelessness alone, Nissenbaum proclaims, either for personal preference or security necessity, is insufficient in the Information Age (142). Countless little tidbits of information of digital media users consume the virtual world. In contrast to the written pen to paper product, digital information infinitely drifts between electronic devices in the form of digital fingerprinting (Nissenbaum 141). Digital fingerprints are then used to reveal information about very real people. Such information can be used to enhance our digital experience or conversely damage many more aspects of the virtual and real worlds. It is critical for users of all ages to be incorporate Digital Literacy education and practice into a routine so as to secure electronic media as well as user’s personal information. Awareness of discussions to safeguard personal information both online and offline regularly is key. The widespread information from trusted websites can aid in the quick education and implementation of suitable safety measures. Subscription to the Federal Trade Commission’s blog, OnGuardOnline.gov, is prime example of such resources that will assist in the continued security educational process. Here, technology users can surf a variety of applicable topics and learn how to use the information to become a more productive member of the digital society without falling victim to predatory elements.

Nissenbaum embraces the positive of electronic progression, while advocating the controversial concept that there must be an increase in anonymity regulation to safeguard personal identity on a national level. Laws governing data security are far from consistentdomestically and internationally. Given the serious costs of insecurity, there is an evident need to increase both civil and criminalsanctions against damaging security breaches. To be effective, thesesanctions will need to be enforced both nationally and internationally. Protection of one’s identity must intrinsically extend to all elements of personal information. Helen Nissenbaum’s influence has changed the way the Federal Trade Commission dictates online privacy regulation and continued revolution as she herself dictates; “This [concept of true online anonymity] is a moving target” (Nissenbaum 143).

An especially elusive concept for digital users to adopt is that once again, anything on the internet, is infinitely available for anyone to discover, infer and use for privacy invasion without knowledge or acceptance of intended subject. Cyberbullies are one such predator who capitalize on and often hide behind the online privacy regulations established to protect young people from online victimization. Child Behavioral and Advocacy experts Snakenborg, Van Acker and Gable collaborate efforts to delve into the realm of online experiences and initiatives necessary to combat bullies. Interactive technology has made its way into the everyday life of children worldwide. “According to a recent survey conducted by the Pew Research Center, an estimated 90% of youth aged 12 to 17 years are active on the internet on a daily basis and more than 50% of youth aged 12 to 17 years have personal cell phones” (Snakenborg, Van Acker and Gable 89). Unfortunately, increased electronic social access to others provides an opportunity for the misuse of the technology. Cyberbullying is an increasingly serious problem among youth with sometimes fatal consequence. Many bullies retain anonymity with pseudonym in an email, chat room or blog allowing for their freedom of expression without judgment or fear. Elapsed time on this concept now opens the door of uncertainty to who is on the other end of the conversation by the same criteria. Because adult supervision is usually not applicable or present in these arenas, parents are all too often unaware of adolescent online activities. However, parents are ultimately responsible for the safety and security of adolescents in this modern world. As a result, parental involvement and regulation of their child’s online activity is the most crucial suggested avenue for the prevention and intervention process in protecting children from online predators. Should a parent become aware of cyberbullying, documentation of the incident without acknowledging or engaging the bully is critical, followed by the reassurance of support to the victim. Parents and young people alike are encouraged to block or delete bullies from all devices and report continued harassment to law enforcement and/or school officials.

Snakenborg, Van Acker and Gable agree with Nissenbaum on the concept that education integration in both the school and legal systems is vital to reduce or stop cyberbullying altogether by holding perpetrators accountable for their actions. The effectiveness of sanctions will depend to a considerable degreeon the perception among perpetrators of the probability that they willactually be caughtand held accountable in both the legal and scholastic environment. Fortunately, lawmakers and academic policymakers agree that protection of youth is omnipresent among the digital world.

The Children’s Online Privacy Protection Act has had many revisions since origination in 1998. However, because of the rapid rate at which the Internet has evolved, penalties for unauthorized breaches of security have not kept up with the growing magnitude of the problem. Encourage learning and promote creativity through the responsible use of electronic medium and social networking sites. Be aware of and look for the signs of a cyberbully and a cyberbully and don’t hesitate to contact the authorities in case of a cyber-breach. Continued reports of online issues will ensure attention to the gaps in the penalty process against these cyber predators and encourage lawmakers to create and seek implementation of necessary combatants.

Constituents and advocates have been working tirelessly to educate themselves on the digital revolution so that national policy may parallel the transformation advances of the New Literacy. In the meantime, it is imperative digital media technology users:

●Get Informed!●Be Secure!

●Be OnGuard!●And Have a Voice to Protect the Future of the New Literacy!

Continued digital literacy education and appropriate predatory infraction will ensure user cyber safety, security and confidence thereby promoting the New Literacy legacy.

Works Cited

Bruck, Jan. "Writing In The Electronic Age." Media Information Australia 61 (1991): 50.

Informit Literature & Culture Collection. Web. 8 Oct. 2013.

Clark, Lynn Schofield. "Parental Mediation Theory For The Digital Age." Communication

Theory (10503293) 21.4 (2011): 323-343. Communication & Mass Media Complete. Web. 8 Oct. 2013.

Haas, Christina, and Linda Flower. "Rhetorical Reading Strategies and the Construction of

Meaning." Trans. Array Writing about Writing A College Reader. 1st. Boston:

Bedford/St. Martin's, 2011. 120-138. Print.

Lunsford, Andrea, and John J Ruszkiewicz. Everything's an Argument. 6th. Boston: Bedford/St.

Martin, 2013. Print.

Nissenbaum, Helen. "The Meaning Of Anonymity In An Information Age." Information Society

15.2 (1999): 141-144. Business Source Complete. Web. 8 Oct. 2013.

Paikin, Steve. The Agenda with Steve Paiken: The Myth of Digital Literacy. 2009. Video. TVO, Toronto. Web. 01 Nov 2013.

Project Information Literacy Smart Talk, no. 2, Andrea A. Lunsford, "Writing and the Profound

Revolution in Access," July 12, 2010.

Snakenborg, Robert A., John Van Acker, Richard Gable. "Cyberbullying: Prevention And

Intervention To Protect Our Children And Youth. Preventing School Failure 55.2 (2011): 88. MasterFILE Premier. Web. 8 Oct. 2013.

Thompson, Clive. "Clive Thompson on How More Info Leads to Less Knowledge." WIRED

MAGAZINE: 17.02. 19 Jan 2009: n. page. Web. 01 Nov. 2013.

United States. Federal Trade Commission. OnGuard. Print.

Watts, Erika. “Woman Fired for Boston Marathon Costume.” Life Channel. 04 Nov 2013: n.

page. Web. 01 Dec. 2013

Wardle, Elizabeth, and Doug Downs. Writing About Writing A College Reader. 1st. Boston:

Bedford/St. Martin's, 2011. 727. Print.