Skip to main content

Home/ Internetni praktikum/ Group items tagged violation

Rss Feed Group items tagged

Kaja Horvat

EU agencies to sanction Google over privacy violations - INTERNET - FRANCE 24 - 0 views

  • EU data-protection agencies will take action against internet giant Google after it failed to comply with EU privacy laws,
  • In October the data protection agencies warned Google that its new confidentiality policy did not comply with EU laws and gave it four months to make changes or face legal action.
  • Google rolled out the new privacy policy in March 2012, allowing it to track users across various services to develop targeted advertising, despite sharp criticism from US and European consumer advocacy groups.
  • ...4 more annotations...
  • It contends the move simplifies and unifies its policies across its various services such as Gmail, YouTube, Android mobile systems, social networks and Internet search.
  • But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users.
  • European data protection agencies had recommended to Google that it improve information provided to users, particularly on the categories of data being processed, and for what purposes and services.
  • changes are designed to improve the user experience across the various Google products, and give the firm a more integrated view of its users
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
inesmag

For sale: Your personal info - Feb. 26, 2013 - 1 views

  • Only about 5% of retailers currently have the interest or the ability to market to specific customers based on their location, according to Ingle. Most of what brands are interested in is more generalized information about their customers. But in a rapidly evolving and increasingly mobile marketplace, the brands that arrive late to the location-based targeted advertising game may be left out in the cold.
  • Your smartphone holds a treasure trove of information about you, and cell phone companies are looking for ways to turn that into profit.
  • "An interesting transformation is happening in wireless, in which consumers are no longer customers -- they're the product," said Dan Hays, principal in PricewaterhouseCooper's communications and technology practice. "The trick is for operators to find out how to make money without violating their relationships and trust with their users."
  • ...1 more annotation...
  • "Network operators sit on a goldmine of data," said Kelly Ahuja, general manager of Cisco's service provider mobility group. "We're going to help them capture and apply it."
alja polajžer

BBC News - SpongeBob app pulled over children's privacy complaint - 0 views

  • pongeBob app became the latest game to be pulled following a complaint it had violated children's privacy rights.
  • The Center for Digital Democracy said children's email addresses had been collected without parental consent.
  • ickelodeon has denied the allegation that it breached children's online privacy rules.
  • ...4 more annotations...
  • The Washington DC-based group urged the FTC to investigate Nickelodeon and mobile game-maker PlayFirst's privacy practices.
  • The SpongeBob Diner Dash game asks children to provide a wide range of personal information
  • The FTC last week published a report on mobile apps for children that showed parents were not being provided with information about what data an app collected, who would have access to that data, and how it would be used.
  • All of the companies in the mobile app space, especially the gatekeepers of the app stores, need to do a better job. We'll do another survey in the future and we will expect to see improvement."
nensic

Does Facebook have a problem with women? | Life and style | The Guardian - 0 views

  • Facebook insists there's no place on its site for hate speech or content that is threatening or incites violence. So why do images that seem to glorify rape and domestic violence keep appearing?
  • users taking to Twitter in recent weeks to express their anger at Facebook's refusal to remove images that tried to make a joke of rape.
  • One showed a woman bound and gagged on a sofa and a caption that read: "It's not rape. If she really didn't want to, she'd have said something." The second showed a condom, beneath the words "Plan A"; an emergency contraceptive pill, "Plan B"; and then "Plan C", a man pushing a woman with a bloodied face down the stairs.
  • ...10 more annotations...
  • Over the past few years, women say they have been banned from the site and seen their pages removed for posting images of cupcakes iced like labia, pictures of breastfeeding mothers and photographs of women post-mastectomy.
  • Yet images currently appearing on the site include a joke about raping a disabled child, a joke about sex with an underage girl and image after image after image of women beaten, bloodied and black-eyed in graphic domestic violence "jokes".
  • There are countless groups with names such as "Sum sluts need their throats slit" and "Its Not 'rape' If They're Dead And If They're Alive Its Surprise Sex".
  • "Daddy f*cked me and I loved it"
  • A Facebook spokesperson insisted: "There is no place on Facebook for hate speech or content that is threatening or incites violence."
  • "We take reports of questionable and offensive content very seriously," said the Facebook spokesperson. "However, we also want Facebook to be a place where people can openly discuss issues and express their views, while respecting the rights and feelings of others. Groups or pages that express an opinion on a state, institution, or set of beliefs – even if that opinion is outrageous or offensive to some – do not by themselves violate our policies."
  • Each image normalises gender-based violence, sending the message to both victims and perpetrators that ours is a culture that doesn't take it seriously.
  • Facebook clearly accepts representations of some forms of violence, namely violence against women, as qualitatively different from others."
  • The Facebook spokesperson said: "It's not Facebook's job to define what is acceptable.
  • "You have a choice to have sex, I have the choice to rape you.""If you don't stop giving me shit I'll pay four of my friends to gang rape you.""Go ahead, call the cops – they can't un-rape you.""The only reason you have been put on this planet is so we can fuck you. Please die."
metapavlin

Kim Dotcom in his own words | Technology | guardian.co.uk - 0 views

  • On how Mega differs from MegauploadThere are quite a few innovations that Megaupload didn't have. For example, we have built in upload-download acceleration in the browser, which is technology that only became available nine months ago. We have on-the-fly encryption to protect our users' privacy – because of my own experience having been spied on, and also throughout the proceedings, the US government looking into the files of users, without a warrant …
  • I think privacy is a very important topic, and more important today for users than ever, because you read about all these privacy violations, and reaching out from companies like Facebook and Instagram, and expanding their rights on what should be yours. We want to create a service that gives you fully automated, real-time, one-click, on-the-fly privacy.
  • I see myself in a role now of someone who has been put in this impossible situation, and I'm not only fighting just for myself but for the rights of everybody.
petra funtek

ScienceDirect.com - International Journal of Human-Computer Studies - A new look at sof... - 1 views

  • Soft lifting refers to the process whereby a legally licensed software program is installed or copied in violation of its licensing agreement. Previous research on this pervasive kind of unethical computer use has mainly focused on the determinants of this unethical act, which are rooted in personal, economic, technological, cultural, socio-political, or legal domains. However, little is known about the symbolic power that soft lifting has on the sense of self. Based on recent advances in behavioral priming, we hypothesized that soft lifting can influence the signals one sends to oneself; more specifically, soft lifting may prime individuals to experience an inauthentic sense of self, which, in turn, prompts further unethical behavior. In Study 1, we showed that participants, primed with the memory of a recent soft lifting experience, cheated more than participants recalling a recent experience of purchasing authentic software or than control participants. Moreover, feelings of inauthenticity mediated the priming effect of soft lifting on dishonest behavior. In Study 2, participants primed with soft lifting showed a greater willingness to purchase a wide range of counterfeit products over authentic products. Besides those antecedents or correlates of soft lifting already identified in the literature, educators should pay more attention to the negative impact of soft lifting on the self-images of users, which may go beyond computer-related behaviors. Priming may provide a new direction for HCI researchers to examine the impact of computer-use-related factors on users' perceptions, motivations, and behaviors.
1 - 7 of 7
Showing 20 items per page