Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged identity;

Rss Feed Group items tagged

yunju wang

Identity theft crisis worsens for ID security CEO | Technically Incorrect - CNET News - 0 views

  •  
    Almost everyone has an online identity in several different sites, in ordering to make our life "easier" we can now do lots of things from the internet. but how safe is this realm? Our online identity may be easily stolen than what we expected.
César Albarrán Torres

Google and PayPal to Support New Government Login System - 0 views

  • Open Identity Exchange (OIX) is a newly founded non-profit organization
  • The aim of this new organization is exchange of online identity credentials across public and private sectors
  • ; in other words, it can certify online identity providers to U.S. federal standards
  • ...4 more annotations...
  • “OIX grew out of a public/private industry partnership initiated by the U.S. government at this conference last year.
  • OIX is a solution to this problem not just for the U.S. government, but for many different governments, industry alliances, non-profit associations, telcos, academic networks, and others all over the world who need to establish trust across a wide online population
  • will be accepted for registration and login at U.S. government websites.
  • Read more about OIX at the official site.
  •  
    OIX is a new organization that will try to provide identity credentials that can be accepted by both the private and public sectors. But, like some of this initiatives, government-wise it will only work, initially, in the U.S. Questions on privacy can also be raised? Wouldn't OIX allow for easier access to the whereabouts of an individual's online persona? 
Tamsin Lloyd

What are your Facebook fans also fans of? - 1 views

  •  
    Whilst not strictly about reputation, this post discusses tracking what your (your being a person or entity) fans are also fans of. This tells us alot about identity and reputation within different communities, and helps to track coalitions of interest and identity.
Tamsin Lloyd

Calling In Pros to Refine Your Google Image - washingtonpost.com - 0 views

  •  
    This article discusses the potential problems managing your reputation and identity online when a person (known or unknown) decides to attack you. As the article reads: "The proliferation of blogs and Web sites can allow angry clients, jealous lovers or ruthless competitors to define a person's identity. Whether true or not, their words can have far-reaching effects" The question to ask is - how do we stop this from happening, and manage it when it does?
César Albarrán Torres

Pennsylvania Attorney General Tries to Unmask Twitter Critics | Threat Level | Wired.com - 0 views

  • An anonymous blogger critical of Pennsylvania Attorney General Tom Corbett plans to challenge a grand jury subpoena ordering Twitter to reveal the blogger’s identity.
  • The bloggers received an e-mail from Twitter on Tuesday evening saying the micro-blogging service would respond to the subpoena (.pdf) in a week “unless we receive notice from you that a motion to quash the subpoena has been filed or that this matter has been otherwise resolved.”
  • In August, however, Google unmasked the operator of the “Skanks in NYC” blog after being subpoenaed by an Australian model who claimed the site defamed her. And on Monday, a federal judge prevented Yahoo from revealing the identity of a message-board poster critical of USA Technologies.
  •  
    Twitter users have been issued subpoenas from Pennsylvania Attorney General Tom Corbett due to the critical comments they've made about the politician. It's interesting how much anonymous comments can make an impact on a public figure's reputation that it forces him to take legal action.  
  •  
    Twitter receives a grand jury subpoena forcing the company to reveal a user's identity. Interesting how this can be done when the stakes are high, when there is a a political subtext under it. Could this set a precedent for defamation cases?
Andra Keay

Norrie's 'ungendered' status withdrawn - 0 views

  •  
    "They all said they didn't know how to put it (gender unspecified) into their computers, but they all agreed to do it and to have a word to their computer programmers," Norrie said. "It is the job of the system to fit the people it serves, not the job of the people to fit the system. Our identity is increasingly database driven and default settings are not very changeable.
Sarah Manson

Cyber mafia out to steal your identity - dnaindia.com - 1 views

  •  
    The cybersecurity threat in India is demonstrated in Symantec's Internet Security Threat Report that outlined the latest threat for computers which involves the Trojan viruses sending confidential data to a host server. This information is then used by cyber mafia to carry out financial transactions in various countries resulting in identity theft.
Tiana Stefanic

T.M.I? Not for Sites Focused on Sharing - NYTimes.com - 0 views

  •  
    This looks at the new atmosphere of sharing all the mundane details about our lives, facilitated by sites such as Blippy, which broadcasts details about shopping habits, and Foursquare, that uses GPS to alert contacts to your location. A fellow at the American Civil Liberties Union said, "People are not necessarily thinking about how long this information will stick around, or how it could be used and exploited by marketers." Concerns are also raised about potential identity theft and whether accessing every scrap of data left behind by users is actually valuable.
Andra Keay

Privacy is Dead - BIL Conference - 1 views

  •  
    This is like PJFenwick in 3D. Eric Gradman has great art work "The Cloud Mirror" which demonstrates many interesting social features about privacy, identity and people. Like we queue up to make idiots of ourselves and hand over our password on public computers without question. All done using Facebook Connect and Python.
Tamsin Lloyd

You Are What Google Says You Are | Epicenter | Wired.com - 0 views

  •  
    This discusses companies such as 'Reputation Hawk' which focus on improving your online reputation - particularly pertaining to your personal identity. It highlights how important your reputation is online - in many ways it is the only social currency that you have.
M M

University to Provide Online Reputation Management to Graduates - 0 views

  •  
    A university in the U.S. has provided an online reputation management program for all its graduating seniors. Since majority of companies are performing background checks on job applicants, this will allow students to clean up their Facebook and Twitter profiles. This step made by the university seems very beneficial, since for majority of the younger generation who don't know how it is not to have the Internet, the separation between online and real-life identities is a fine line. 
Andra Keay

Craigslist: An ideal model for Internet Governance - 1 views

  •  
    I wasn't previously a plan of Craigslist per se, however, as I'm so excited about the possibilities of peer to peer open source social networking (JoinDiaspora.com) it seems the time to reflect on the addition of a social layer of governance to the internet (Lessig in Code2.0 re identity layer), or the reverse, adding internet architectures to governance, which is Alice Goldmann is describing here.
Jaeun Yun

Google Defies Korean Censorship Law - 0 views

  •  
    South Korean government still thinks that the benefits of censorship are worth the opprobrium. They block dusscusion sites, arrest bloggers for rediculous reasons; for instance, they publish controversial opinions or propagating falsehood online. Since many popular foreign websites such as Google and Youtube decided to require its users to undergo identity verification, Korean internet users have nowhere to have the freedom of speech on the web planet.
anonymous

China-Based Hackers may Have used Twitter, Google to Attack Dalai Lama - 0 views

  •  
    This article (posted yesterday) is about the announcement of a huge China-based cyber espionage which stole thousands of documents - including classified information, visa applications, and personal identities - from "politically sensitive targets" around the world using platforms such as Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo Mail to maintain persistent control of infected computers. Among the targets: the offices of the Dalai Lama, the United Nations as well as Indian and Pakistani government officials. Also available in this article, a report document of 58 pages about "Investigating Cyber Espionnage" (scribd application)
anonymous

New post on my blog : Byron Report - UK - Safer Childre in a Digital World - 2 views

  •  
    First topic: « Early Adolescents' Use of Social Networking Sites to Maintain Friendship and Explore Identity: Implications for Policy »
Tom Champion

Nigeria's CBN chides banks for paying lip service to corporate governance - 0 views

  •  
    "The invisible shareholders, who are either money launderers, drug dealers or some people using government money, pick the directors of the banks because of their holdings, but have refused to disclose their identities," he said.
Elizabeth Gan

Teachers live in fear of cyberbully pupils - 0 views

  •  
    This article discusses how cyberbullying is not limited to strictly school children, or students rather teachers are also victims of cyberbullying. As students create social network hate groups, secretly film or photograph their teachers, and post embarassing moments online. identities of the victims are stolen, and then are used for either harassment, or illegal activity online. Though Facebook has mentioned that they will remove any content regarding teachers if reported, it brings to light a new issue. If laws need to address how we conduct ourselves online, should we compromise our freedom of speech (any jurisdiction that has constituted it) because the content is online?
lacey walker

Google releases add-on to block its own analytics - 0 views

  •  
    Collecting web data, who is it helping and who is it hurting. Google Analytics is a prominent free to use service that allows everyone from micro bloggers to corporations to record the statistics for visitors to their sites. Analytics can tell you where visitors are from, what they searched for, and what time they visited. They receive this information from your IP address, and ultimately your visit could potentially be traced directly back to your comptuer. Google has created an add-on to help hid your IP address identity, in a likely effort to protect the company from privacy concerns.
Andra Keay

MetaFilter Saved My Pals From Sex Traffickers-Exclusive Interview | Mother Jones - 0 views

  •  
    When it works the world of instant connectivity and social convergence is a wonderful place. Although I personally find the comments illustrative in a more depressing fashion. Derogatory comments, hotness debate and sudden normalising of "Welcome to the internet" where women are sex things and men are whatever they want to be.
1 - 19 of 19
Showing 20 items per page