Databox project is a new £1.5M EPSRC project led by Dr. Hamed Haddadi (QMUL) in collaboration with Dr. Richard Mortier (University of Cambridge) and Professors Derek McAuley, Tom Rodden, and Andy Crabtree (University of Nottingham) who will explore the development of the Databox as means of enhancing accountability and giving individuals control over the use of their personal data.
"Through the design, development and implementation of the Living Room of the Future (LRoTF), we build upon existing work to progress two strands of research. The first explores how media broadcasters may utilise Object-Based Media (OBM) to provide more immersive experiences. Created in conjunction with the BBC R&D the LRofTF utilizes OBM to dynamically customise television content according to audiences' personal, contextual and derived data. OBM works by breaking media into smaller parts or 'objects', describing how they relate to each other semantically, and then reassembling them into personalized programmes. In addition to this media-delivery aspect, the LRoTF explores data protection issues that arise from OBM's use of data
by integrating with the privacy-enhancing Databox system. "
"Welcome to the Age of Privacy Nihilism
Google and Facebook are easy scapegoats, but companies have been collecting, selling, and reusing your personal data for decades, and now that the public has finally noticed, it's too late. The personal-data privacy war is long over, and you lost."
Open Humans is a platform that allows you to upload, connect, and privately store your personal data - such as genetic, activity, or social media data. Once you've added data, you can to donate it: you might choose to share some publicly , and you can join and contribute to diverse research projects. Thus, we turn the traditional research pipeline on its head: you are at the center and in control of when you share your data. We want to empower you to explore your data
Could "programmatic" technology used in online advertising also be used to automate and personalize the distribution of cultural and editorial content?
"After my phone got stolen, I quickly realized just how much of my personal information and data the thief had instantly obtained. So, I let another phone get stolen. This time my phone was pre-programmed with spyware so I could keep tabs on the thief in order to get to know him. However, to what extent is it possible to truly get to know someone by going through the content of their phone?"
"we're doing anything at all we want, with personal information, possibly discriminatory and destructive, but there are a few people who will benefit from this new system versus the old, so we're ignoring costs and only counting the benefits for those people, in an attempt to distract any critics."
This Working Paper considers the implications for cloud accountability of current proposals under the draft General Data Protection Regulation to modernise the EU Data Protection Directive. It makes recommendations aimed at improving the technology-neutrality of the proposals and their appropriateness for cloud computing, with a view to ensuring that the proposals will maintain or enhance protection of personal data for data subjects while not unduly deterring cloud computing.
"Last week, a gossip blog based in the Dominican Republic called Remolacha published a disturbing video of what it said was a "self-parking car accident." A group of people stand in a garage watching and filming a grey Volvo XC60 that backs up, stops, and then accelerates toward the group. It smashes into two people, and causes the person filming the video with his phone to drop it and run."
The hacking of the dating site Ashley Madison has raised complex questions about online privacy and the safety of personal data, but for the users of the site, which claims to have more than 33 million members in 46 countries, the questions are fairly straightforward: what are the chances my husband or wife will find my profile on the site, and what can I do to stop that happening?
Privacy is a hot-button issue in the tech world. How will it fare in the age of pervasive computing - a world of billions of connected devices, systems, and services exchanging personal data?
"A vulnerability in FitBit fitness trackers first reported to the vendor in March could still be exploited by the person you sit next to on a park bench while catching your breath."
"MorphCast is a new adaptive interactive format that engages audiences whilst protecting their privacy. MorphCast combines interactive video with emotional and demographic response to create a new type of adaptive video experience within the mobile device, powered by artificial intelligence and without the need for plug-ins, apps or the user's personal data. It runs on nearly every smartphone, tablet or PC through a URL."
Say you're scrolling through your Facebook Newsfeed and you encounter an ad so eerily well-suited, it seems someone has possibly read your brain.
Maybe your mother's birthday is coming up, and Facebook's showing ads for her local florist. Or maybe you just made a joke aloud about wanting a Jeep, and Instagram's promoting Chrysler dealerships.
Whatever the subject, you've seen ads like this. You've wondered - maybe worried - how they found their way to you.