Skip to main content

Home/ IB ITGS/ Group items tagged privacy and anonymity

Rss Feed Group items tagged

dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Bassel Kanj

Monitoring web use at school - 19 views

I disagree, The teacher only has the right to view his history, or view the page he is currently on. Not continue viewing his Facebook, because they are taking advantage of him/her being logged i...

SOCIAL privacy anonymity

Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
1 - 6 of 6
Showing 20 items per page