Skip to main content

Home/ Critical Issues in Literature/ Group items tagged privacy

Rss Feed Group items tagged

Tom McHale

Pew Survey: Snowden Leaks Are Affecting the Way Americans View Privacy | Mediashift | PBS - 1 views

  •  
    "The survey found that a vast majority of respondents - 87 percent - had heard of the leaks in some way. Among them about a third, 34 percent, had actually modified their behaviors to protect their privacy from the government more, with 25 percent reporting they had modified the way they use different technologies "a great deal" or "somewhat." Common reactions included changing their privacy settings on social media (17 percent), using social media less often (15 percent), avoiding certain apps (15 percent) and uninstalling apps (13 percent). Meanwhile, 14 percent of the 475 respondents said they now speak in person more often than communicating online or over the phone. About 13 percent said they now avoid the use of certain terminology online."
  •  
    "The survey found that a vast majority of respondents - 87 percent - had heard of the leaks in some way. Among them about a third, 34 percent, had actually modified their behaviors to protect their privacy from the government more, with 25 percent reporting they had modified the way they use different technologies "a great deal" or "somewhat." Common reactions included changing their privacy settings on social media (17 percent), using social media less often (15 percent), avoiding certain apps (15 percent) and uninstalling apps (13 percent). Meanwhile, 14 percent of the 475 respondents said they now speak in person more often than communicating online or over the phone. About 13 percent said they now avoid the use of certain terminology online."
Liz K

Technology and Privacy - 0 views

  •  
    Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging.
Liz K

Internet Privacy | American Civil Liberties Union - 0 views

  •  
    New technologies are making it easier for governments and corporations to learn the minutiae of our online activities. Corporations collect our information to sell to the highest bidder while an expanding surveillance apparatus and outdated privacy laws allow the government to monitor us like never before.
Liz K

Why does technology present so many privacy problems? | Technology, Society, Change - 0 views

  •  
    18% or Americans surveyed by report being "private" people, yet more than half of those people have revealed their location in a Facebook status update, and less than a third of these "private" people have changed their privacy settings
Tom McHale

Newark Police Camera System Relies On Residents, Stirring Privacy Concerns : NPR - 0 views

  •  
    "Newark, New Jersey's largest city, is taking the concept of a neighborhood watch to a whole new level. The city is installing hundreds of surveillance cameras to create a virtual block watch. Some residents are concerned about the technology's implications for people's privacy."
Tom McHale

Commit a crime? Your Fitbit, key fob or pacemaker could snitch on you. - The Washington... - 0 views

  •  
    "The ubiquitous devices can serve as a legion of witnesses, capturing our every move, biometrics and what we have ingested. They sometimes listen in or watch us in the privacy of our homes. And police are increasingly looking to the devices for clues. The prospect has alarmed privacy advocates, who say too many consumers are unaware of the revealing information these devices are harvesting. They also point out there are few laws specifically crafted to guide how law enforcement officials collect smart-device data."
Liz K

Privacy Lost: Does anybody care? - Technology & science - Privacy Lost | NBC News - 0 views

  •  
    Someday a stranger will read your e-mail, rummage through your instant messages without your permission or scan the Web sites you've visited - maybe even find out that you read this story. You might be spied in a lingerie store by a secret camera or traced using a computer chip in your car, your clothes or your skin.
Gehrig R

Privacy vs Security | | Debatewise - where great minds differ - 0 views

  •  
    The most important job of government is to "secure the general welfare" of its citizens. Security i... Surveillance is the secret watching of suspects' private activities. In the past this usually invol... Tighter security controls at airports and borders will help prevent attacks and loss of life. Such ... Tighter immigration laws and tougher entry measures can be used to reduce the chances of terrorists ... Most rights are not (absolute) unlimited but have to be balanced against other rights. For example,... We are at war at present and so different rules need to apply from times of peace. As Commander-in-...
Liz K

An everyman's guide for going invisible on the internet - 0 views

  •  
    Let's get this out of the way first: It's impossible to go 100 percent invisible online if you use the internet in any capacity. We still don't completely understand the scope and power of the NSA's surveillance capabilities, and it's highly unlikely that any single individual, no matter how resilient their encryption protocols, could withstand a rigorous investigation by the U.S. government. Still, there are ways ordinary users can better protect their privacy online. This isn't by any means an exhaustive guide; rather, it's a starting point to help educate beginners about the sheer amount of data we leave out there, and what we can do to keep it safe from prying eyes (the NSA's or otherwise).
Gehrig R

Giving Up Liberty for Security - Reason.com - 0 views

  •  
    Roman emperors and tribal chieftains, King George III and French revolutionaries, 20th-century dictators and 21st-century American presidents all have asserted that their first job is to keep us safe, and in doing so, they are somehow entitled to take away our liberties, whether it be the speech they hate or fear, the privacy they capriciously love to invade or the private property and wealth they salaciously covet. This argument is antithetical to the principal value upon which America was founded. That value is simply that individuals -- created in the image and likeness of God and thus possessed of the freedoms that He enjoys and has shared with us -- are the creators of the government. A sovereign is the source of his own powers. The government is not sovereign. All the freedom that individuals possess, we have received as a gift from God, who is the only true sovereign. All of the powers the government possesses it has received from us, from our personal repositories of freedom. Thomas Jefferson recognized this when he wrote in the Declaration of Independence that our rights are inalienable -- they cannot be separated from us -- because we have been endowed with them by our Creator. James Madison, who wrote the Constitution, observed that in the history of the world, when freedom has been won, it happened because those in power begrudgingly permitted freedom as a condition of staying in power or even staying alive. But not in America.
Liz K

How to Muddy Your Tracks on the Internet - NYTimes.com - 0 views

  •  
    Legal and technology researchers estimate that it would take about a month for Internet users to read the privacy policies of all the Web sites they visit in a year. So in the interest of time, here is the deal: You know that dream where you suddenly realize you're stark naked? You're living it whenever you open your browser.
Gehrig R

Dilemmas of the Internet age: privacy vs. security - CNNPolitics.com - 0 views

  •  
    In a world of smart phones and smart cars, the Internet is no longer limited to your desktop; it follows you wherever you go. And as long as you are online, you could potentially be tracked at all times.
  •  
    In a world of smart phones and smart cars, the Internet is no longer limited to your desktop; it follows you wherever you go. And as long as you are online, you could potentially be tracked at all times.
Tom McHale

In the Privacy of Your Own Home - Consumer Reports - 0 views

  •  
    "Last spring, as 41,000 runners made their way through the streets of Dublin in the city's Women's Mini Marathon, an unassuming redheaded man by the name of Candid Wueest stood on the sidelines with a scanner. He had built it in a couple of hours with $75 worth of parts, and he was using it to surreptitiously pick up data from activity trackers worn on the runners' wrists. During the race, Wueest managed to collect personal info from 563 racers, including their names, addresses, and passwords, as well as the unique IDs of the devices they were carrying. Fortunately, Wueest is not a data criminal. He's one of the good guys-a security researcher at Symantec, the company behind Norton antivirus software. His experiment was done to expose some of the risks associated with the growing constellation of "smart" devices known collectively as the Internet of Things."
Jeff I

Government Technology to Read Your Thoughts and Implant New Ones - JeffPolachek.com - 0 views

  •  
    The agencies of human rights around the world have criticised RNM as a violation of basic human rights because it violates privacy and the dignity of thoughts and activities of life. Several countries have protested against it and refer to it as an attack on their human and civil rights.
Tom McHale

S.C. Mom Says Baby Monitor Was Hacked; Experts Say Many Devices Are Vulnerable : The Tw... - 0 views

  •  
    "Security experts warn that many Wi-Fi baby monitors - and other devices in the Internet of things - are vulnerable to hacking. In 2015, the security analytics company Rapid7 published a case study of baby monitors that found a number of security vulnerabilities. The risk is not just to privacy and peace of mind: A hacker could use a baby monitor to gain access to a home's network to get information off computers, possibly for financial gain."
Tom McHale

Resist the Internet - The New York Times - 1 views

  •  
    It's time to turn to the real threat to the human future: the one in your pocket or on your desk, the one you might be reading this column on right now. Search your feelings, you know it to be true: You are enslaved to the internet. Definitely if you're young, increasingly if you're old, your day-to-day, minute-to-minute existence is dominated by a compulsion to check email and Twitter and Facebook and Instagram with a frequency that bears no relationship to any communicative need. Compulsions are rarely harmless. The internet is not the opioid crisis; it is not likely to kill you (unless you're hit by a distracted driver) or leave you ravaged and destitute. But it requires you to focus intensely, furiously, and constantly on the ephemera that fills a tiny little screen, and experience the traditional graces of existence - your spouse and friends and children, the natural world, good food and great art - in a state of perpetual distraction. Used within reasonable limits, of course, these devices also offer us new graces. But we are not using them within reasonable limits. They are the masters; we are not. They are built to addict us, as the social psychologist Adam Alter's new book "Irresistible" points out - and to madden us, distract us, arouse us and deceive us. We primp and perform for them as for a lover; we surrender our privacy to their demands; we wait on tenterhooks for every "like." The smartphone is in the saddle, and it rides mankind. Which is why we need a social and political movement - digital temperance, if you will - to take back some control.
Tom McHale

Is Snooping on Teenagers Ever O.K.? - The New York Times - 0 views

  •  
    Adolescence comes with a thorny problem: Teenagers suddenly yearn for privacy just when their lives are expanding to include a range of risky new opportunities. Whether or not they have something worrisome to hide, normally developing tweens often start to shut their bedroom doors and become cagey about their time online. And when teenagers act aloof, their parents often feel tempted, if not duty bound, to secretly search bedrooms and surreptitiously scan online activity to ensure that their child isn't engaged with drugs, drinking or digital misdeeds."
Gehrig R

Privacy vs. Security | Scholastic.com - 0 views

  •  
    lot of school administrators are looking into installing security cameras in their districts. They want to keep their students safe. They want to keep tabs on people entering and leaving their schools. They want to cut down on vandalism and theft, and they want to do it now.
Liz K

Advances in technology mean less privacy :: WRAL.com - 0 views

shared by Liz K on 13 Apr 15 - No Cached
  •  
    Advances in technology are allowing people to more easily capture moments, such as the Etheridge confrontation, on photo and video with their cell phones and then easily post it on social networking websites such as YouTube, Facebook and Twitter.
1 - 20 of 21 Next ›
Showing 20 items per page