Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged anonymity

Rss Feed Group items tagged

Lucas Pergler

Online, Anonymity Breeds Contempt - NYTimes.com - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for the New York Times publication. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under title for copyright. 5)Citation through use of hyperlinks when used. 6)Parent site continually updated, but specific article is not. 7)Google search lead me here so I do not believe my results were filtered. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    One major effect of anonymity in online collaboration. Risk of anger and inappropriate dialogue when members believe there will be no repercussions due to their somewhat anonymous ID
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Lucas Pergler

EBSCOhost: Unlocking the Power of Internet Collaboration: Adjusting Concepts So More P... - 1 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by a professor in an Australian university. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed under the title of the article for copyright. 5)Citations used throughout the article when needed. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project
  •  
    Most relevant information begins on page 7 with the "trust" issue. Collaborating with others online instead of face to face can breed mistrust because of the inherent anonymity of online interactions.
Jose Nieves

Networking Rebellion: Digital Policing and Revolt in the Arab Uprisings | The Abolitionist - 0 views

  • Because Egyptian television and radio were state-controlled, the internet became a means to publicize the demonstrations and evade state censorship. As a result, the Egyptian and other Arab uprisings have largely been described as a series of “Twitter” or “Facebook” revolutions.
  • global democracy, allowing repressed peoples to find each other and network in ways which were previously impossible or too dangerous under authoritarian regimes.
  • nternet and cellphone services were cut in a desperate attempt to stop the escalating protests.
  • ...9 more annotations...
  • consequences of this action actually increased mobilizations.
  • The disruption of cellphone [sic] coverage and Internet on the 28th exacerbated the unrest in at least three major ways. It implicated many apolitical citizens unaware of or uninterested in the unrest; it forced more face-to-face communication, i.e., more physical presence in streets; and finally it effectively decentralized the rebellion on the 28th through new hybrid communication tactics, producing a quagmire much harder to control and repress than one massive gathering in Tahrir
  • While the Egyptian government attempted to use digital technologies as a way to repress the uprisings, networks of activists from around the world quickly mobilized in solidarity with the pro-democracy movement.
  • Telecomix, a decentralized organization of Internet activists, quickly organized to provide free fax numbers and dial-up internet access to activists in Egypt so they could publicize the events and demonstrations occurring across the country.
  • echnologies still remain an important tool in transmitting information and spreading news of repression.
  • The Tor Project, a free piece of software that allows users to anonymously connect to the internet and evade state surveillance, has been critically important in allowing activists to avoid identification and repression.
  • digital-information technologies both provide activists with opportunities to communicate and network while also enabling new modes of repression, censorship, and surveillance.
    • Jose Nieves
       
      gave me good insight on how technology helped them
  • Navid Hassanpour wrote in his study, “Media Disruption Exacerbates Revolutionary Unrest”:
  •  
    helps with how the used tec to fight back
Cameron Browne

What is privacy? - Definition from WhatIs.com - 0 views

  • On the Internet, privacy, a major concern of users, can be divided into these concerns: What personal information can be shared with whom Whether messages can be exchanged without anyone else seeing them Whether and how one can send messages anonymously
  • An annual survey conducted by the Graphics, Visualization and Usability Center of the Georgia Institute of Technology showed that 70% of the Web users surveyed cited concerns about privacy as the main reason for not registering information with Web sites.
P Yim

Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views

  • By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
    • P Yim
       
      3 hours for information to spread
  • The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
    • P Yim
       
      Facebook- Digital Tool
  • At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
    • P Yim
       
      Twitter - Digital Tool
  • ...7 more annotations...
  • At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
  • Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
  • Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
  • @YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
  • Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
  • Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
  • @YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
  •  
    NY Times article - Negative
1 - 6 of 6
Showing 20 items per page