Skip to main content

Home/ Internetni praktikum/ Group items tagged protection

Rss Feed Group items tagged

sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
Nuša Gregoršanec

BBC News - Child safety measures to protect against internet threats - 0 views

  • Child safety measures to protect against internet threats
  • In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.
  • Even more worryingly, 30% (39% worldwide) said they had suffered a "serious" negative experience. This included, among other things, invitations to meet online "friends" in real life and exposure to indecent pictures of someone they did not know.
  • ...7 more annotations...
  • The ever-growing adoption of social networks, instant messages and mobile communication leaves the door open to more subtle attacks - both of a technological and psychological nature.
  • "Parents must realise that technology alone can't keep children safe online," Deborah Preston, the company's internet security advocate.
  • "To be truly safe it requires not only technology, but also a combination of open and ongoing dialogue and education between parents and children."
  • On social networks, account hijacking - where a child's account is accessed for a practical joke or more sinister purposes - can cause considerable distress.
  • A poll by Virgin Media suggests that 38% of parents whose children have suffered from cyberbullying feel unable to protect them due to a lack of knowledge and understanding of how the online world works.
  • This, Mr Abdul argued, could only be solved through greater education and a more honest understanding from parents about how real and damaging the effects of online bullying could be.
  • Mr Abdul added, the correct software, education and parental supervision means children can also be protected both at home and away.
Nuša Gregoršanec

BBC News - Five times more internet crime in the West Midlands - 0 views

  • Five times more internet crime in the West Midlands
  • In 2012 West Midlands Police received almost 500 reports of online crime compared to 100 in 2008.
  • Sgt Gregory said: "One of the first big cases was around indecent images of young children a decade ago and in the UK every police force got involved in that and it was a matter of playing catch-up and realising what the internet was being used for.
  • ...3 more annotations...
  • "Each force has now got its own child protection team and organisations are working together to try to protect young people, not just on sexual offending matters and grooming but also bullying."
  • For Safer Internet Day, the BBC has launched a "Share Take Care" campaign to highlight the risks of sharing information online.
  • The BBC has published a number of guides online, advising social media users to provide minimum information online and use privacy settings.
Kaja Horvat

EU agencies to sanction Google over privacy violations - INTERNET - FRANCE 24 - 0 views

  • EU data-protection agencies will take action against internet giant Google after it failed to comply with EU privacy laws,
  • In October the data protection agencies warned Google that its new confidentiality policy did not comply with EU laws and gave it four months to make changes or face legal action.
  • Google rolled out the new privacy policy in March 2012, allowing it to track users across various services to develop targeted advertising, despite sharp criticism from US and European consumer advocacy groups.
  • ...4 more annotations...
  • It contends the move simplifies and unifies its policies across its various services such as Gmail, YouTube, Android mobile systems, social networks and Internet search.
  • But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users.
  • European data protection agencies had recommended to Google that it improve information provided to users, particularly on the categories of data being processed, and for what purposes and services.
  • changes are designed to improve the user experience across the various Google products, and give the firm a more integrated view of its users
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
anonymous

Google to be summoned over data grab 'excesses' | Technology | The Guardian - 0 views

  • Google representatives are to be summoned to appear before European data protection officials over concerns about the way it collects data on web users.
  • On Thursday, a coalition of 30 data protection officials, including Britain's information commissioner, demanded "significant progress" from Google before the summer
  • The authorities are concerned about changes Google introduced to its privacy policies in March last year. The changes were made to "unify" how information is collected across approximately 60 products, including YouTube GoogleMail, Google has said.
pina bitenc

BBC - Lancashire - Features - Protect yourself on the internet - 0 views

  • Bill Westhead - explains online dangers and gives valuable tips on Internet safety and improving your Internet security.
  • always ensure that the website connection you are using is secured
  • always be cautious about offers which seem to be too good.
  • ...5 more annotations...
  • Often the information on your computer can be more valuable to a criminal than the computer itself
  • Antivirus
  • Firewall
  • Anti-spyware
  • always be cautious; don't do anything you wouldn't do face-to-face; and be careful what information you give out about yourself.
alja polajžer

BBC News - Clarity call for mobile and internet privacy - 0 views

  • Clarity call for mobile and internet privacy
  • The Communications Consumer Panel said that people should have control over which information is shared.
  • Data doubts
  • ...5 more annotations...
  • The panel, which was set up to advise communications regulator Ofcom about consumers' interests, wants more control for shoppers over their data.
  • Consumers using their mobile phones can allow businesses to collect data about their location and the products and services they are interested in.
  • the Information Commissioner raised concerns over people's awareness of data privacy.
  • "It has never been more important to protect your personal information. Whether you are surfing the net, shopping online or signing up to social networking sites, it is crucial that people are thinking about how their information might be used," said Christopher Graham, the Information Commissioner.
  • From employers looking up potential employees on Facebook to cyber-criminals hacking into unsecured wi-fi networks, not protecting your personal information can cause serious harm and distress."
alja polajžer

BBC News - Google cookies 'bypassed Safari privacy protection' - 0 views

  • Google cookies 'bypassed Safari privacy protection'
  • The Wall Street Journal said Google and other companies had worked around privacy settings designed to restrict cookies
  • Cookies are small text files stored by browsers which can record information about online activity, and help some online services work
  • ...8 more annotations...
  • The Safari browser is produced by Apple, and is the browser used by the iPhone.
  • y default Safari only allows cookies to be stored by the web page a user is visiting, not from third parties such as advertisers
  • esearcher Jonathan Mayer found that advertisers were still able to store cookies on the computers of internet users browsing with Safari.
  • We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it”
  • The Wall Street Journal reported that Google "disabled the code after being contacted by the paper".
  • Online privacy advocates were highly critical of Google's actions.
  • The Electronic Frontier Foundation wrote: "It's time for Google to acknowledge that it can do a better job of respecting the privacy of web users."
  • An Apple spokesman said in a statement: "We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it."
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
manca_

Are web filters just a waste of everyone's time and money? | Technology | The Guardian - 0 views

  • people who make them
  • providing a safe online environment for all families, especially children"
  • unfortunately, no single measure can protect children from online harm and ... traditional parenting skills have never been more important"
  • ...1 more annotation...
  • no web filter can work perfectly because it demands software as smart as a human which can make the distinction between pornography and art - something even humans find tricksy.
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
Miha Naprudnik

ACTA error: Democracy not found - RT News - 1 views

  • As European parliaments reject the Anti-Counterfeiting trade Agreement on human rights grounds, some are asking why it was signed in the first place.
  • The question is&nbsp;– why was the agreement signed in the first place, if its chances of being ratified are dropping by the day?
  • The pretext was the protection of intellectual property, and to control Internet resources that could be used by terrorists or to incite riots and other criminal activity.
  • ...1 more annotation...
  • There's an argument to be made that freedom and security are usually in opposition; the most secured people are in prison, where they hardly have any freedom. Usually, security comes at the price of freedom&nbsp;– and that’s exactly the cost of ACTA.
Miha Naprudnik

Controlling the web - Fault Lines - Al Jazeera English - 0 views

  • SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels.&nbsp;
  • The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
  • Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And&nbsp;will this mean the end of a free and global internet?
Katja Saje

Who Owns the Future? by Jaron Lanier; Big Data by Victor Mayer-Schönberger an... - 1 views

  • Successful technologists are the new "ruling class". In this digital world order, money and power are concentrated in the hands of a few.
  • Each technological innovation produces the potential not just for cyber-crime, but for manipulating the way we lead our lives.
  • imagine you take a driverless taxi. Without explanation, it lingers in front of billboards during your journey or forces you to a particular convenience store if you need to pick up something. Is that very different to search engines reading your mind through your click-habits or Amazon telling you, often accurately, what you really want to read next?
  • ...2 more annotations...
  • The amount of raw data about all our lives continues to rise exponentially.
  • benefit and danger will depend on the use to which the information is put and the safeguards that protect us from technical malfunction and human&nbsp;malevolence.
inesmag

Google and competition: searching for a solution | Tom Watson | Comment is free | guard... - 1 views

  • Some time later this month we are expecting the European commission to decide how it will proceed with its investigation of the search giant Google, following the latter's submission of proposed remedies at the end of January over allegations that it has engaged in a range of anticompetitive practices.
  • Google is a global company and its activities will require a global solution.
  • Google's global revenues were £23.5bn in 2011. Those are its revenues before tax, although Google's approach to tax is another and equally interesting story. Those vast revenues do not come from those who search, but from those who bid to place advertisements alongside the search results. This means that Google has a clear interest to arrange the rankings in a way that maximises its profits and faces a stark conflict of interests when it does so. It has every incentive to demote other companies, who might actually be offering answers or services that are more relevant to the user queries, and to advance its own services.
  • ...3 more annotations...
  • There is no reason why an appropriate remedy that introduces fair rankings should in any way impair the user experience.
  • that Google, with more than 90% of the search market in Europe, is overwhelmingly dominant.
  • Effective remedies will aim to protect competition for the future but need also to acknowledge the past. Google has continued to expand and exploit its position during the period of the investigation and it will be necessary to find a solution that tackles that past misbehaviour and reintroduces something approaching a level playing field.
1 - 20 of 31 Next ›
Showing 20 items per page