Skip to main content

Home/ Internetni praktikum/ Group items tagged policy

Rss Feed Group items tagged

donnamariee

Better Policy Through Better Information | John O. McGinnis | Cato Unbound - 0 views

  • Can Internet activism work?
  • is importantly correct that the Internet can help redress the balance between special and more encompassing interests by reducing the cost of accessing information. Such reduction redounds to the advantage of diffuse groups more than concentrated groups because reduced costs can temper the former groups’ larger problems of coordination.
  • earing that more information may enable citizens to better organize to attack their privileges, they have tried to restrict emerging technologies of free communication as long as these technologies have been around.
  • ...4 more annotations...
  • In a democratic state like ours, the primary interest groups are not authoritarian cliques, but private actors, like public sector unions and trade associations, which have the leverage to pressure politicians to use public power on their behalf. And, like authoritarian leaders, such groups are desperate to avoid transparency to retain their benefits. A case in point is the opposition of teachers' unions to publishing evaluations of schools and teachers on the Internet. And many interest groups have tried to prevent laws requiring Internet disclosure of campaign contributions.
  • Yet the results of policies are contestable. And it is often hard for citizens who are distracted by many enterprises more interesting than politics to find good information about policies' likely outcomes. Most people also have a better intuitive sense of how policies will affect their short-term interests than the long-term interests of society, even if the long-term effects may be of great personal as well as social benefit.
  • The Internet provides an important mechanism of such social discovery. Because of the greater space and interconnections that the Internet makes available, web-based media, like blogs, can be dispersed and specialized and yet connected with the wider world. As a result of this more decentralized and competitive media, the web generates both more innovative policy ideas and better explanations of policy than were available when mainstream media dominated the flow of political discussion.
  • In short, over time the Internet and allied aspects of the computational revolution can create more focused and more accurate knowledge about the consequences of social policies. This knowledge in turn can help more citizens focus more on what they have in common—their shared goals and policies that may achieve them—rather than on the unsupported intuitions or personal circumstances that may divide them. Of course, some citizens will remain ideologues, impervious to updating on the facts. But democracy moves by changing the middle, not the extremes. Like other mechanisms that increase common knowledge, the Internet can give wing to the better angels of our nature.
  •  
    essaytheme 
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Kaja Horvat

EU agencies to sanction Google over privacy violations - INTERNET - FRANCE 24 - 0 views

  • EU data-protection agencies will take action against internet giant Google after it failed to comply with EU privacy laws,
  • In October the data protection agencies warned Google that its new confidentiality policy did not comply with EU laws and gave it four months to make changes or face legal action.
  • Google rolled out the new privacy policy in March 2012, allowing it to track users across various services to develop targeted advertising, despite sharp criticism from US and European consumer advocacy groups.
  • ...4 more annotations...
  • It contends the move simplifies and unifies its policies across its various services such as Gmail, YouTube, Android mobile systems, social networks and Internet search.
  • But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users.
  • European data protection agencies had recommended to Google that it improve information provided to users, particularly on the categories of data being processed, and for what purposes and services.
  • changes are designed to improve the user experience across the various Google products, and give the firm a more integrated view of its users
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
Meta Arcon

Figuring out the future of online privacy - CNN.com - 1 views

  • They may not be paying for the services directly, but customers still have a lot of power -- and companies know that they need to listen.
  • "We can't just sit back and allow the industry to just continue to ignore a core component of the user experience online," said Alex Fowler, Mozilla's global privacy and public policy leader.
  • The more devices that connect to the Internet, from smart cars to home thermostats, the more data there are about a person to collect.
  • ...6 more annotations...
  • Free versions come with ads, but for a price, people can upgrade to the ad-free experience.
  • It's also possible that over the next five to 10 years, people's attitudes toward privacy and their data will change, and they'll be willing to share more personal information
  • Not everyone will want the same level of privacy,
  • "Do not track" seems like a clear, smart option to give consumers
  • Companies that provide free services, such as search engines or social networks, have to strike the right balance between respecting their customers' privacy concerns and serving advertisers.
  • It's also possible that over the next five to 10 years, people's attitudes toward privacy and their data will change, and they'll be willing to share more personal information, attached to their real-world identity, in exchange for more heavily customized computing experiences.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
alja polajžer

BBC News - Internet privacy: Genuine concerns or paranoia? - 0 views

  • However unwittingly, you share personal information with complete strangers every single day - via the internet.
  • Mr Chester.
  • But Google is not the only internet service busy farming out data and this raises the question of the invasion of people's rights.
  • ...8 more annotations...
  • "Companies like Google, Facebook, Yahoo and Microsoft are expanding their data collection techniques and they are not telling consumers and citizens why,"
  • The issue is about how you pay for online services and whether you are happy to sacrifice privacy for getting a service for free.
  • Google has changed its rules to allow information to be shared across all its services.
  • e believes it is the Europeans who are driving the policy debate, while the US strategy is to lobby the Europeans to accept the idea that there can be self-regulation, to trust the Googles and Facebooks and let this market grow.
  • The users themselves are problems as well," he says "Because they post, blog, tweet and do everything else also."
  • A lot of times most people click 'Yes' without reading what the privacy policies are” End Quote Frank Ahern
  • Most newspapers in the world are posting every newspaper they have ever printed, so people are finding that things they did in the past are being made public.
  • Internet privacy: Genuine concerns or paranoia?
Jernej Prodnik

The New Westphalian Web - By Katherine Maher | Foreign Policy - 0 views

  • The New Westphalian Web The future of the Internet may lie in the past. And that's not a good thing. BY KATHERINE MAHER | FEBRUARY 25, 2013
  • But 30 years ago, humanity gave birth to one of the most disruptive forces of our time. On Jan. 1, 1983, the implementation of TCP/IP -- a standard protocol to allow computers to exchange data over a network -- turned discrete clusters of research computers into a distributed global phenomenon. It was essentially the work of three men: two engineers to write the protocol, and one to carry out the plan. It was a birth so quiet no one even has a photo of the day; a recent post by one of TCP/IP's authors, Vint Cerf, was able to turn up only a commemorative pin.
    • Jernej Prodnik
       
      To je blizu tehnološkemu determinizmu, za razvoj interneta je šlo ogromno raziskovalnega denarja (iz in za "vojaško-industrijski kompleks").
  • ...5 more annotations...
  • This Internet was wild and wooly, unknown and unregulated
    • Jernej Prodnik
       
      Huh.
  • Like all new frontiers, cyberspace's early settlers declared themselves independent -- most famously in 1996, in cyberlibertarian John Perry Barlow's "A Declaration of the Independence of Cyberspace." Barlow asserted a realm beyond borders or government, rejecting the systems we use to run the physical universe. "Governments of the Industrial World," he reproached, "You have no sovereignty where we gather.… Cyberspace does not lie within your borders."
  • With the flip of a switch, three engineers had undone the work of more than 100 princes and diplomats.
    • Jernej Prodnik
       
      !!!
Jernej Prodnik

The New Westphalian Web - By Katherine Maher | Foreign Policy - 0 views

    • Jernej Prodnik
       
      And yet it was set-up by the governmental agencies.
  • In the popular consciousness, the Internet was simultaneously a place of possibility and danger. In 1993, Time magazine warned, "People who use … the Net may be in for a shock.… Anybody can start a discussion on any topic and say anything." It was precisely this structural independence that transformed the Internet from a mere tool for information-sharing to the world's open forum.
  • The rise of self-publishing tools like Blogger transformed the "third space" of cyberspace into a modern speaker's corner, offering any motivated writer a platform for his or her political views. Initially, this online free expression was often marginalized or dismissed -- the term "blogosphere" was originally a joke. But bloggers kept plugging away. In liberal democracies their free expression was guaranteed, and in closed societies connectivity was often too limited to draw any real attention.
  • ...1 more annotation...
  • . And the Internet -- this global resource, this wild space independent of states -- has made its mark on our neatly ordered world of nations.
Blaž Ulaga

You Are What You Click: On Microtargeting | The Nation - 0 views

  • Google was recently slapped with two fines
  • They provide false assurances that, in the normal course of things, our privacy is not being invaded on the Internet, that our personal data is safe, and that we are anonymous in our online—and offline—activities.
  • not a single incident, but a slow, unstoppable process of profiling who we are and what we do, to be sold to advertisers and marketing companies
  • ...3 more annotations...
  • are making it their policy and business to profile us in detai
  • And so we are stalked in the pursuit of marketing optimization.
  • (96 percent of it from advertising
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
manca_

North Korea's 3G network won't be censored for foreigners | The Verge - 1 views

  • long maintained tight control over the flow of information within its borders
  • foreigners
  • unfettered mobile access to the web
  • ...7 more annotations...
  • thanks to new policies implemented by supreme leader Kim Jong Un
  • that required foreigners to hand over their devices to authorities.
  • country has finally begun opening its doors to the outside world,
  • some 3G services, including text messaging, video calls, and subscriptions to state-run newspapers, but their mobile internet will remain tightly filtered, since North Koreans are still "governed by a separate set of telecommunication rules,"
  • two parallel internets — one for foreigners, one for citizens
  • visitors
  • about $300 for the cheapest 2GB data package.
Jan Sekavčnik

Twitter in Pyongyang: how North Korea got the mobile internet | Technology | guardian.c... - 1 views

  • the secretive country begins allowing tourists to use the mobile internet
  • it was believed to be the first tweet sent from a mobile phone using the country's new 3G mobile data service.
  • photographer David Guttenfelder uploaded an image to Instagram of a tour guide at a mountain temple, geotagged to Pyongyang.
  • ...17 more annotations...
  • rists visiting
  • ere strict for to
  • th Kore
  • he past, rule
  • In 2009, I did not offer up my iPhone as we went through customs
  • We'd leave our mobile phones at the airport but use locally purchased phones with SIM cards
  • broadband internet that may be installed on request at our hotel, which is for international visitors.
  • 3G mobile internet would be available within a week only for foreigners.
  • sim cards are €50,
  • calls to Switzerland are an inexplicably cheap €0.38 a minute
  • Our North Korean colleagues watched with surprise as we showed them we could surf the internet from our phones.
  • Not all North Koreans have local mobile phones
  • The world wide web remains strictly off limits for most North Koreans
  • But they cannot surf the "international" internet
  • North Korean universities have their own fairly sophisticated Intranet system
  • Students say they can email one another, but they can't send emails outside the country.
  • Kim Jong Un has pushed science and technology as major policy directives, and we're starting to see more laptops in North Korean offices
  •  
    "Ads by Browse to Save Twitter in Pyongyang: how North Korea got the mobile internet"
inesmag

Technology News: Internet: Facebook's Relationship With Developers: It's Even More Comp... - 2 views

  • When it comes to developers working with Facebook, "share and share alike" is the new policy.
  • No one rides the Facebook express for free.
  • "If you use any Facebook APIs to build personalized or social experiences, you must also enable people to easily share their experiences back with people on Facebook," Facebook said in a blog post announcing the change.
  • ...2 more annotations...
  • On one hand it can be argued that Facebook is merely following industry trends; other social networks like Twitter have also banned apps that mimic their core functionality.
  • In short, Facebook is moving aggressively to block Twitter and other social media sites from establishing free-rider status on its site
Blaž Gobec

Why Facebook's new Open Graph makes us all part of the web underclass | Technology | gu... - 1 views

  • ou're not paying for your presence on the web, then you're
  • just a product being used by an organisation bigger than you
  • When you use a free web service you're the underclass. At best you're a guest. At worst you're a beggar, couchsurfing the web and scavenging for crumbs. It's a cliché but worth repeating: if you're not paying for it, you're aren't the customer, you're the product.
  • ...10 more annotations...
  • Your individual account is probably worth very little to the service provider, so they'll have no qualms whatsoever with tinkering with the service or even making radical changes in their interests rather than yours. If you don't like it you're welcome to leave. You may well not be able to take your content and data with you, and even if you can, all your URLs will be broken.
  • if you really care about your site you need to run it on your own domain. You need to own your URLs. You'll have total control and no-one can take it away from you. You don't need anyone else. If you put the effort in up front it'll pay off in the long run.But it's no longer that simple.
  • Anyone who's ever run a website knows that building the site is one thing, but getting people to use it is quite another. The smaller your real-world presence the harder it is. If you're a national newspaper or a Hollywood star you probably won't have much trouble getting people to visit your website. If you're a self-employed plumber or an unknown blogger writing in your spare time, it's considerably harder.
  • Social networks have changed all that. Facebook and Twitter now wield enormous power over the web by giving their members ways to find and share information using tools that work in a social context.
  • Either way, your social network presence is more important than your own website.
  • But increasingly that freedom is just the freedom to be ignored, the freedom to starve.
  • es, that's nearly 34,000 new Facebook apps created in one day by customers of just one hosting company.
  • What Facebook is doing is very different. When it records our activity away from the Facebook site it's a third party to the deal. It doesn't need this data to run its own services.
  • orst o
  • all, the way Facebook collects and uses our data is both unpredictable and opaque. Its technology and policies move so quickly you'd need to be a technical and legal specialist and spend an inordinate amount of time researching Facebook's activities on an ongoing basis to have any hope of understanding what they're doing with your data.
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • once a request has been deemed valid, Google will notify users when possible.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Janja Petek

Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views

  • The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
  • he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
  • highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet. 
  • ...6 more annotations...
  • xpanding the Internet into developing nations.
  • Many countries will come to reaffirm their desire to see freedom of expression embedded in this conference,
  • The gathering is also powerless to force nations to change their Internet policies, such as China's notorious "Great Firewall" and widespread blackouts of political opposition sites in places including Iran and the Gulf Arab states.
  • That opens the door ... to content censorship
  • t is clear that some governments have an interest in changing the rules and regulations of the Internet,"
  • Over the decades, it has expanded to include telephone, satellite and other advances in communications.
1 - 20 of 25 Next ›
Showing 20 items per page