A common online conspiracy theory is the illuminati.
Conspiracy theories have always existed but the internet fuels them in new ways.
There are a number of reasons why you can’t get away from your screen.
There is a reason why you can't put your phone down: digital addiction. And technology is designed to keep you hooked.
Smile, everyone’s sick of us.
How parents who post about their kids do so out of pride, but can spark family conflict too.
The amount of time teens have spent working and participating in extracurricular activities has held steady in recent years. There has, however, been one big change in their lives: smartphones.
Social media and the internet has helped create a new type of sexual predator, forcing us to reassess our understanding of the terms "friend" and "stranger".
Social media can play a role in countering the terror messages from extremists.
Politicians want social media giants to crack down on those publishing extremist material. A focus on disruption, encryption, recruitment and creating counter-narratives is recommended.
Growing up digital.
They have some big ideas.
Australians need more innovative media owned in Australia, not from the US.
Although few pay for news in Australia, The New York Times' is pushing into the country's fracturing newspaper market.
Just a click away once you tick this too-long-to-read privacy agreement.
Companies and institutions shouldn't make it so hard for people to enjoy their right to privacy.
Consumers won’t be able to use PEXA anytime soon but it might streamline the buying and selling of property.
The paperless property market is now a reality and it could provide a faster more efficient sales. But its unlikely any consumers will be using the system themselves.
Shouting past each other online doesn’t help.
Megaphones image via www.shutterstock.com.
Social media is a great way to spread science information, fast. But the online echo chamber isn't always good at separating what's valid from what's not, and being prolific doesn't make you right.
Schematic diagram of an aggregate made up of linked users, with the mathematical equation that describes this online pro-ISIS ecology.
A new mathematical model of ISIS supporters' online behavior provides insights into how cyberactivity relates to real-world attacks.
Viewed through human activities, the Internet is becoming ever more heterogeneous as more non-Western populations get online.
Mapping Web usage shows a new picture of the Internet, one without its core in the West, but rather a mosaic of online regional cultures that mirror offline regional cultural identities.
Nine’s new online streaming service means it can reach beyond its metro boundaries, and regional broadcasters are not happy.
The rise on live streaming of television programs is breaking down the protected geographical barriers on what you can watch, and the regional broadcasters are not happy.
Phones out, but today’s students are less likely to have Facebook or Twitter open.
Phones image via www.shutterstock.com.
Young people are starting to skip the very public postings of some of social media's original platforms. Why? And where will that leave the companies that rely on our willingness to divulge everything?
See what you need.
Ryan Jorgensen - Jorgo
The television industry is gathering massive amounts of information about us to tailor ads to our individual needs.
Computer memory goes up; ours comes down.
The modern world's effect on our ability to remember has got an ugly name. But digital amnesia is not a one-way street. Technology may be helping us to remember more than it has caused us to forget.
In a world that is already filled with clutter, simplicity is a strong message.
Google has unveiled its new logo, adopting a sans-serif typeface and retaining the same colours as before. But is it better or more practical than the logo it replaces?
Does this represent the degeneration of language? Not quite.
Don't listen to the naysayers. New ways of communicating have created a wealth of new opportunities to harness – and study – language.
Security experts discovered that the iVote practice server was vulnerable to tampering; after checking that the same weakness affected the real voting server, they alerted the authorities.
Vanessa Teague and Alex Halderman
UPDATED 3PM: The NSW Electoral Commission has now publicly commented on the security flaw we uncovered. But we're concerned that it does not seem to understand the serious implications of this attack.