Don't Be a Loser: Think Before You Post - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Next Don't Be a Loser: Think Before You Post-2 Next

Over half the respondents under 25 years old said they regret posting something online.

If you think Anthony Weiner's problems are just isolated online difficulties that don't happen to regular folks, you should think again. In a recent Retrevo Gadgetology study that looked at how people use the gadgets in their lives, over half the respondents under 25 years old said they regret posting something online. When Retrevo looked back at a similar Gadgetology study from a year ago it doesn't look like online users have learned much, as the number of those with "poster's remorse" has actually revealed a subtle increase.

More Slideshows:


The Top Nine Challenges of Growing a Business and How to Tackle Them Once you've got your start-up off the ground, the daunting task of growing your business to the next level must begin.

Help Wanted: Competition for Tech Talent Heats Up In many states, there are more tech jobs than candidates to fill them.


Nine Best Practices for Efficient Database Archiving Archiving can be an effective approach to ILM if you follow these best practices.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.