Skip to main content

Home/ Internetni praktikum/ Group items tagged personalization

Rss Feed Group items tagged

Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
Katja Jerman

Letters: Big data and big problems for personal information | Technology | The Guardian - 0 views

  • describes a new product to collect and mine user data online
  • PII is a predetermined list of attributes that could identify an individual
  • personally identifiable information?
  • ...5 more annotations...
  • Identifiably personal information (IPI, if you must) is any set of data which by inspection could lead to the identification of an individual from a group, with a given level of confidence in a given time
  • is based on solid academic work on differential privacy and security threat modelling.
  • could turn data science into data surveillance.
  • Data mining by many businesses seeks to predict trends in purchasing behaviour, monitor customer response to service delivery and assess their marketing strategy against those of their rivals.
  • The real power of social media mining is establishing a "pattern of life" from which anomalies might stand out
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
mancamikulic

Why We All Have 'Internet-Addiction Genes' - Robert Wright - The Atlantic - 0 views

  • : A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • internet addiction is not a figment of our imagination
  • ...16 more annotations...
  • Whether heavy internet use deserves to be called an addiction or just a hard-to-break habit is a question about a behavior pattern and its attendant psychological states.
  • To answer it we ask such things as how strong the cravings for the internet are, what lengths a person will go to in order to satisfy them, and so on.
  • Human beings are biochemical machines "designed" by natural selection to, among other things, form habits.
  • The habit-forming machinery involves the release of reward chemicals, such as dopamine, that make us feel good upon attaining these goals
  • In the modern world, there are shortcuts to getting these rewards
  • And there's some evidence (though here I'm approaching the limits of my comprehension of the science) that people with a particular variant of a gene involved in building acetylcholine receptors are more susceptible to nicotine addiction than other people
  • the main point is this: the biochemical mechanisms (including genes) involved in chemical addictions will naturally be the mechanisms involved in habit formation more generally since habit formation is what they were originally designed for.
  • whether it's a habit or an addiction, it is going to involve pleasure-dispensing biochemical mechanisms of the sort that can get us addicted to such chemicals as nicotine and cocaine
  • After all, the internet, like these chemicals, allows us to trigger our neuronal reward mechanisms with much less work,
  • it wasn't possible, in a very small and technologically primitive social universe, to at any time of day launch an observation or joke
  • the internet, like a pack of cigarettes or lots of cocaine, lets you just sit in a room and repeatedly trigger reward chemicals that
  • And all of us have lots and lots of these genes--genes that make us susceptible to internet addiction.
  • some of these genes may vary from person to person in ways that make some people particularly susceptible to internet addiction
  • In fact, there will turn out to be so many genes which are so modestly correlated with internet addiction
  • that if journalists write stories every time such a gene is found, or is thought to have been found, they will find that they're not shedding much actual light on the situation.
  • These genes are really just genes for being human.
petra funtek

Social networks: after privacy, beyond friendship | openDemocracy - 0 views

  • irst, research shows that social-networking sites are a serious risk when accessed at work.
  • Facebook at work". It may sound ridiculous, but the purpose is to ensure that employees are not putting their personal and corporate data out to tender.
  • The second reason is that once uploaded, personal details can become public possession - and not just for now but, effectively, forever. News Corp bought MySpace to exploit what previously had been unthinkable to advertisers: customers telling you what they want without you even asking.
  • ...2 more annotations...
  • he irony in all this is that Facebook - which in September 2007 overtook MySpace in Britain as the preferred site for individual users - was originally set up to mirror rather than overturn the "intimacy" and exclusiveness of real-world, face-to-face networks. Andrew McCollum, one of the founders of Facebook, explained to me that they based the project on a pretty closed community, namely university colleges.
  • Social networks: after privacy, beyond friendship
inesmag

For sale: Your personal info - Feb. 26, 2013 - 1 views

  • Only about 5% of retailers currently have the interest or the ability to market to specific customers based on their location, according to Ingle. Most of what brands are interested in is more generalized information about their customers. But in a rapidly evolving and increasingly mobile marketplace, the brands that arrive late to the location-based targeted advertising game may be left out in the cold.
  • Your smartphone holds a treasure trove of information about you, and cell phone companies are looking for ways to turn that into profit.
  • "An interesting transformation is happening in wireless, in which consumers are no longer customers -- they're the product," said Dan Hays, principal in PricewaterhouseCooper's communications and technology practice. "The trick is for operators to find out how to make money without violating their relationships and trust with their users."
  • ...1 more annotation...
  • "Network operators sit on a goldmine of data," said Kelly Ahuja, general manager of Cisco's service provider mobility group. "We're going to help them capture and apply it."
Meta Arcon

Figuring out the future of online privacy - CNN.com - 1 views

  • They may not be paying for the services directly, but customers still have a lot of power -- and companies know that they need to listen.
  • "We can't just sit back and allow the industry to just continue to ignore a core component of the user experience online," said Alex Fowler, Mozilla's global privacy and public policy leader.
  • The more devices that connect to the Internet, from smart cars to home thermostats, the more data there are about a person to collect.
  • ...6 more annotations...
  • Free versions come with ads, but for a price, people can upgrade to the ad-free experience.
  • It's also possible that over the next five to 10 years, people's attitudes toward privacy and their data will change, and they'll be willing to share more personal information
  • Not everyone will want the same level of privacy,
  • "Do not track" seems like a clear, smart option to give consumers
  • Companies that provide free services, such as search engines or social networks, have to strike the right balance between respecting their customers' privacy concerns and serving advertisers.
  • It's also possible that over the next five to 10 years, people's attitudes toward privacy and their data will change, and they'll be willing to share more personal information, attached to their real-world identity, in exchange for more heavily customized computing experiences.
Jernej Prodnik

Aaron Swartz files reveal how FBI tracked internet activist | Technology | guardian.co.uk - 0 views

  • Aaron Swartz files reveal how FBI tracked internet activist Firedoglake blogger Daniel Wright publishes once-classified FBI documents that show extent of agency's investigation into Swartz
  • Amanda Holpuch guardian.co.uk, Tuesday 19 February 2013 22.42 GMT
  • A blogger has published once-classified FBI files that show how the agency tracked and collected information on internet activist Aaron Swartz. Swartz, who killed himself in January aged 26, had previously requested his files and posted them on his blog, but some new documents and redactions are included in the files published by Firedoglake blogger Daniel Wright.Wright was given 21 of 23 declassified documents, thanks to a rule that declassifies FBI files on the deceased. Wright said that he was told the other two pages of documents were not provided because of freedom of information subsections concerning privacy, "sources and methods," and that can "put someone's life in danger."
  • ...3 more annotations...
  • The FBI's files concern Swartz's involvement in accessing the Public Access to Court Electronic Records (Pacer) documents. In pursuit of their investigation, the FBI had collected his personal information and was surveilling an Illinois address where he had his IP address registered. Aaron H. Swartz FBI File by Daniel Wright
  • One page reads: "Washington Field Office requests that the North RA attempt to locate Aaron Swartz, his vehicles, drivers license information and picture, and others. Since Swartz is the potential subject of an ongoing investigation, it is requested that Swartz not be approached by agents." The FBI also collected information from his social networking profiles, including Facebook and Linkedin. The latter proved to be a catalog of his many notable accomplishments, which include being a co-founder of Reddit, a founder of a website to improve the government, watchdog.net and as metadata adviser at Creative Commons.
  • Information from a New York Times article about his Pacer hack was also included in the files, though strangely, since the article can still be read online, the name of the article's other subject, Carl Malamud, was blocked out.Hacking collective Anonymous released a State Department database Monday in memory of Swartz. The files included employees' personal information such as addresses, phone number and emails.
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
mancamikulic

Google Glass: is it a threat to our privacy? | Technology | The Guardian - 1 views

  • glasses that can shoot video, take pictures, and broadcast what you're seeing to the world
  • They weren't due to get them until last Friday
  • Google Glass is the most hotly anticipated new arrival in "wearable computing"
  • ...46 more annotations...
  • from "mainframe" computers
  • Google's idea is that you need only speak to operate it
  • "OK, Glass, take video!"
  • The only other way to get that point of view is to strap a camera to your head.
  • And yet people are already beginning to fret about the social implications of Glass
  • the question of privacy
  • how will we behave in groups
  • David Yee, the chief technology officer at a company called Editorially
  • Yee's worry was that the young person might be filming everything
  • Joshua Topolsky
  • have tried out Google Glass
  • This is the company that has repeatedly breached the boundaries of what we think is "private".
  • forgetting that sometimes deadly enemies have mutual friends
  • use of personal data without an individual's clear consent.
  • So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
  • Oliver Stokes
  • ou could inadvertently become part of somebody else's data collection – that could be quite alarming
  • Now it's going to be able to compute what it is you're looking at.
  • Song Chaoming
  • nalysing mobile phone records
  • how your smartphone is able to show where you are on an onscreen map
  • Social media
  • Where the five million are the wearers of Glass – and the one monitor is Google
  • Google probably knows what you're going to do before you do.
  • Twitter
  • we're more used to the snatched photo or video that tells a story
  • Google doesn't want to discuss these issues.
  • this is a live issue,
  • One of the reasons they're doing Explorers is to get feedback on these things
  • how will we behave with each other?
  • hows data such as your speed, altitude, and even ski-resort maps
  • Concentrating on what was in front of me wasn't hard
  • they do it without letting others realise you are doing anything
  • we get too deeply involved with our technology
  • she pointed out how smartphones change us:
  • Topolsky
  • It brought something new into view
  • the more I used Glass the more it made sense to me; the more I wanted it."
  • how text messages or phone calls would just appear as alerts
  • Glass makes you feel more powerful
  • Hurst
  • is likely to be annoying
  • here's where the problems really start – you don't know if they're taking a video of you.
  • body language change
  • model seems to require voice control
  • how much are we going to share with others
Blaž Gobec

SXSW 2011: The internet is over | Technology | The Guardian - 0 views

  • After three days he found it: the boundary between 'real life' and 'online' has disappeared
  • If my grandchildren ever ask me where I was when I realised the internet was over – they won't, of course, because they'll be too busy playing with the teleportation console
  • If Web 2.0 was the moment when the collaborative promise of the internet seemed finally to be realised – with ordinary users creating instead of just consuming, on sites from Flickr to Facebook to Wikipedia – Web 3.0 is the moment they forget they're doing it. When the GPS system in your phone or iPad can relay your location to any site or device you like
  • ...9 more annotations...
  • when Facebook uses facial recognition on photographs posted there, when your financial transactions are tracked, and when the location of your car can influence a constantly changing, sensor-driven congestion-charging scheme, all in real time, something has qualitatively changed. You're still creating the web, but without the conscious need to do so. "Our phones and cameras are being turned into eyes and ears for applications,"
  • Videogame designers, the logic goes, have become the modern world's leading experts on how to keep users excited, engaged and committed: the success of the games industry proves that, whatever your personal opinion of Grand Theft Auto or World of Warcraft.
  • Three billion person-hours a week are spent gaming. Couldn't some of that energy be productively harnessed?
  • His take on the education system, for example, is that it is a badly designed game: students compete for good grades, but lose motivation when they fail.
  • A good game, by contrast, never makes you feel like you've failed: you just progress more slowly. Instead of giving bad students an F, why not start all pupils with zero points and have them strive for the high score?
  • "is an interactive technology inspired by snakes."
  • the internet is distracting if it stops you from doing what you really want to be doing; if it doesn't, it isn't. Similarly, warnings about "internet addiction" used to sound like grandparental cautions against the evils of rock music; scoffing at the very notion was a point of pride for those who identified themselves with the future. But you can develop a problematic addiction to anything: there's no reason to exclude the internet,
  • we come to treat ourselves, in subtle ways, like computers. We drive ourselves to cope with ever-increasing workloads by working longer hours, sucking down coffee and spurning recuperation. But "we were not meant to operate as computers do," Schwartz says. "We are meant to pulse." When it comes to managin
  • g our own energy, he insists, we must replace a linear perspective with a cyclical one: "We live by the myth that the best way to get more work done is to work longer hours."
Neža Zidanič

Why doesn't everyone 'social media stalk' a potential date? - Telegraph - 0 views

  • A new study has found that two thirds of single people ‘social media stalk’ before agreeing to go a date.
  • There have also been countless accounts in recent years of people not being able to even get a job because of a negative online identity prejudicing the interviewer.
  • as digital communication can be easily misconstrued
  • ...7 more annotations...
  • Brilliantly the study also broke down what specific things during a good old social media stalk could break a date: an ugly mug shot, lack of humour, aggressive online behaviour, excessive flirting with others online and, my favourite one, oversharing
  • However, this light-hearted poll provides further proof of how we are increasingly judged every single day by our online personas.
  • Of those honest souls, 77 per cent claimed they had turned down a date as a result of something they found out about the said babe or hunk through social media.
  • However, while it’s important for both professional and increasingly personal reasons to be conscientious about what you post online, we do also need to remember that societal attitudes are still playing catch-up with the web.
  • All it takes is for one negative comment, or silly photo to be shared by someone else, and then a digital identity can be marred – giving a falsely negative impression of somebody.
  • The web can be unforgiving and is often out of our control.
  • he internet can do many things – but it simply cannot tell you whether you will get those unexplainable stomach butterflies when you meet your date in person.
alja polajžer

BBC News - Clarity call for mobile and internet privacy - 0 views

  • Clarity call for mobile and internet privacy
  • The Communications Consumer Panel said that people should have control over which information is shared.
  • Data doubts
  • ...5 more annotations...
  • The panel, which was set up to advise communications regulator Ofcom about consumers' interests, wants more control for shoppers over their data.
  • Consumers using their mobile phones can allow businesses to collect data about their location and the products and services they are interested in.
  • the Information Commissioner raised concerns over people's awareness of data privacy.
  • "It has never been more important to protect your personal information. Whether you are surfing the net, shopping online or signing up to social networking sites, it is crucial that people are thinking about how their information might be used," said Christopher Graham, the Information Commissioner.
  • From employers looking up potential employees on Facebook to cyber-criminals hacking into unsecured wi-fi networks, not protecting your personal information can cause serious harm and distress."
Katja Jerman

Why the entertainment industry's release strategy creates piracy | Technology | guardia... - 0 views

  • If you want people to buy media, you have to offer it for sale. If it's not for sale, they won't buy it, but many of them will still want to watch or hear or play it, and will turn to the darknet to get – for free – the media that no one will sell to them.
  • Today it's hard to find any knowledgeable person who thinks that making more money by delaying a release to an optimal date is possible, except to the extent that the knowledgeable person is selling something.
donnamariee

Better Policy Through Better Information | John O. McGinnis | Cato Unbound - 0 views

  • Can Internet activism work?
  • is importantly correct that the Internet can help redress the balance between special and more encompassing interests by reducing the cost of accessing information. Such reduction redounds to the advantage of diffuse groups more than concentrated groups because reduced costs can temper the former groups’ larger problems of coordination.
  • earing that more information may enable citizens to better organize to attack their privileges, they have tried to restrict emerging technologies of free communication as long as these technologies have been around.
  • ...4 more annotations...
  • In a democratic state like ours, the primary interest groups are not authoritarian cliques, but private actors, like public sector unions and trade associations, which have the leverage to pressure politicians to use public power on their behalf. And, like authoritarian leaders, such groups are desperate to avoid transparency to retain their benefits. A case in point is the opposition of teachers' unions to publishing evaluations of schools and teachers on the Internet. And many interest groups have tried to prevent laws requiring Internet disclosure of campaign contributions.
  • Yet the results of policies are contestable. And it is often hard for citizens who are distracted by many enterprises more interesting than politics to find good information about policies' likely outcomes. Most people also have a better intuitive sense of how policies will affect their short-term interests than the long-term interests of society, even if the long-term effects may be of great personal as well as social benefit.
  • The Internet provides an important mechanism of such social discovery. Because of the greater space and interconnections that the Internet makes available, web-based media, like blogs, can be dispersed and specialized and yet connected with the wider world. As a result of this more decentralized and competitive media, the web generates both more innovative policy ideas and better explanations of policy than were available when mainstream media dominated the flow of political discussion.
  • In short, over time the Internet and allied aspects of the computational revolution can create more focused and more accurate knowledge about the consequences of social policies. This knowledge in turn can help more citizens focus more on what they have in common—their shared goals and policies that may achieve them—rather than on the unsupported intuitions or personal circumstances that may divide them. Of course, some citizens will remain ideologues, impervious to updating on the facts. But democracy moves by changing the middle, not the extremes. Like other mechanisms that increase common knowledge, the Internet can give wing to the better angels of our nature.
  •  
    essaytheme 
Katja Kotnik

Me and my data: how much do the internet giants really know? | Technology | The Guardian - 0 views

  • Google is not only the world's largest search engine, it's one of the top three email providers, a social network, and owner of the Blogger platform and the world's largest video site, YouTube. Facebook has the social contacts, messages, wallposts and photos of more than 750 million people.
  • The site also lists my most recent sent and received emails (in both cases a "no subject" conversation thread with a colleague).
  • The big relief comes when I note Google isn't tracking the internet searches I've made on my work account
  • ...12 more annotations...
  • only around 29% of the information Facebook possesses on any given user is accessible through the site's tools.
  • The Facebook extended archive is a little creepier, including "poke info", each instance of tracking cookies they possess, previous names, and full login and logout info
  • Looking through anyone's list of searches gives a distressing degree of insight into odder parts of their personality.
  • how much do the internet giants really know?
  • sell us stuff
  • picked up by hackers
  • how much the internet giants know about us.
  • Google isn't totally unhelpfu
  • Every event to which I've ever been invited is neatly listed, alongside its location, time, and whether I said I would attend .
  • One piece of information – a supposed engagement to a schoolfriend, Amy Holmes – stands out. A Facebook "joke" that seemed faintly funny for about a week several years ago was undone by hiding it from any and all Facebook users, friends or otherwise (to avoid an "… is now single!" status update). The forgotten relationship helpfully explains why Facebook has served me up with badly targeted bridalwear adverts for several years, and reassures me that Facebook doesn't know quite everything.
  • This is the core of the main comfort
  • despite their mountain of data, Google and Facebook seem largely clueless, too – they've had no more luck making any sense out of it than I have. And that, for now, is a relief.
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
1 - 20 of 44 Next › Last »
Showing 20 items per page