Skip to main content

Home/ WomensLearningStudio/ Group items tagged privacy

Rss Feed Group items tagged

Doris Reeves-Lipscomb

The FTC's Privacy Cop Cracks Down | MIT Technology Review - 0 views

  • You’ve brought major cases against Facebook and Google, and you’re requiring them to undergo audits every two years until 2032. What is the significance of those cases? These are examples of enforcement actions we brought to ensure that companies adhere to the promises they make to consumers about privacy.
  • n the meantime, your agency recommended that Internet companies voluntarily adopt a “Do Not Track” policy. What if they don’t?
  • That technology is coming to the U.S., and coming very quickly. It’s obviously a great convenience for consumers, but there are serious privacy and security issues.
  •  
    short interview with David Vladeck, former head of FTC Consumer Affairs on privacy issues online and how Google and Facebook failed to live up to protecting privacy of their users. by Jessica Leber, June 26, 2012.
Doris Reeves-Lipscomb

Privacy, please: New technologies could hide your identity online - NBC News - 0 views

  • Data crunching has grown so sophisticated and powerful, privacy researchers now warn that tracing identities from a pool of supposedly "anonymized" data is not just a possibility, it's a certainty.
  • "It is depressingly hard to try to anonymize data in a way that resists identification by a committed adversary," Arvind Narayanan, a privacy researcher at Princeton University, told NBC News.
  • such as the DuckDuckGo search engine, whose motto is "We don't track you" — gain popularity, an incentive would arise.
  • ...1 more annotation...
  • Microsoft, Apple, Google, Facebook and Yahoo aren't likely to make changes to the way they collect or share data overnight. Some online tools politely request third-party trackers to stop, but such requests are like a "gentleman's anonymity based on a handshake," Ford said. Of course, if you're signed into a service like Facebook that asks for your real name up front, you've already checked anonymity at the door.
  •  
    article by Nidhi Subbaraman, June 14, 2013 on lack of privacy online, NBC News
Doris Reeves-Lipscomb

F.T.C. Fines Google $22.5 Million for Safari Privacy Violations - The New York Times - 0 views

  • On the call with reporters, Mr. Vladeck said he had little patience with Google’s explanation, and referred to other privacy violations about which Google has also said it was unaware, like collecting personal data with its Street View cars. “As a regulator, it is hard to know which answer is worse — I didn’t know or I did it deliberately,”
  • Google and other advertising companies use cookies, which are small files that contain information about Web users, to show personalized ads as Internet users travel around the Web. If an Internet user visits fashion Web sites, for instance, Google might show the person ads for clothing companies on other Web sites that person visits.
  •  
    Article from NYT Blogs by Claire Cain Miller, 2012, on $22.5m fine levied by Consumer Protection, FTC, against Google for collecting data on where Safari browser users visit online to construct ads to market to them.
Doris Reeves-Lipscomb

Big Data vs. Big Brother - InFocusInFocus - 0 views

  • This may be oversimplifying, but the nuance with privacy is that it’s not just about securing personally identifiable information (PII), it’s also about considering what other related pieces of information could be used together to infer PII. Therefore, you need to be very careful about the information you share, and the intentions of the people who collect it.
  • but the nuance with privacy is that it’s not just about securing personally identifiable information (PII), it’s also about considering what other related pieces of information could be used together to infer PII. Therefore, you need to be very careful about the information you share, and the intentions of the people who collect it.
  • As we train people to become Data Scientists and design sophisticated algorithms, I encourage practitioners and leaders to consider the trade offs between utility and privacy. This is a new, emerging and complex area, and I’ll explore it further in future posts.
  •  
    blog post by David Dietrich, June 25, 2013, director of technical marketing for the big data solutions group at EMC, founder of an initiatve at MIT, big data@CSAIL on how privacy is sacrificed online because of big data collection and algorithms that can figure out profiles based on seemingly unrelated information.
Doris Reeves-Lipscomb

A Q&A with Professor Felix Wu: Privacy in the Digital Age | Cardozo Law - 0 views

  •  
    great interview in 2013 with Felix Wu in Cardozo Law School publication on privacy in the digital age.
Doris Reeves-Lipscomb

Has Privacy Become a Luxury Good? - The New York Times - 0 views

  •  
    article by Julia Angwin, March 3, 2014, on purchases she has made to protect her privacy online
Doris Reeves-Lipscomb

5 reasons to take care with Facebook friends at work - KansasCity.com - 0 views

  •  
    article by Diane Stafford at Kansas City Star, 9/20/13 on whether to use Facebook for work connections. It is not a clear progression of tips. Nor does it start from the very first thing one should do: find out about the workplace policy on using social media. 1. Let your boss ask first (?? meaning don't initiate?) 2. Check out how co-workers link (makes sense) 3. Ask first (makes sense to ask workers f2f about connecting) 4. Review your profile (looking for professionally harmful information on pages--makes sense to do regardless of Facebook friends at work) 5. Set privacy settings (yes, good practice to set privacy settings)
Doris Reeves-Lipscomb

Privacy Versus The 'Tyranny Of The Algorithm' - 0 views

  • A recent study looked at more than 500,000 tweets about depression, took 4,000 tweets that mentioned a diagnosis or medication, and followed those Twitter users in order to create an app that predicts suicide. This use of tweets crosses a line, Peel said. "This is far more intrusive" than standard data-gathering from social media.
  • Medical data is also valuable to criminals
  • Criminals are after electronic medical records, as well as prescriptions and insurance information to pay for their own medical expenses or to acquire prescription drugs illegally.
  • ...2 more annotations...
  • David Vladeck, former director of the Federal Trade Commission's Consumer Protection Bureau
  • It's what I call the tyranny of the algorithm," Vladeck said. "What happens on the Internet is driven by algorithms. There are ethical constraints that need to be debated."
  •  
    article by Kelly Jackson Higgins at Dark Reading.com on what's happening with the sale of online data collected legally, but not necessarily analyzed accurately or sold ethically. November 5, 2014
Doris Reeves-Lipscomb

Online Privacy: A Reference Handbook - Robert Gellman, Pam Dixon - Google Books - 0 views

  •  
    book by Robert Gellman and Pam Dixon on privacy issues. When data are used to construct "behaviorally based advertising," does that not violate our ability to participate online w/o interference and with freedom of movement?
Lisa Levinson

The Micro and the Macro of the EdTech World | Jenny Connected - 0 views

  •  
    Interesting blog by Jenny Mackness on attending two keynotes at the Association for Learning Technology Conference in Manchester, UK: Jonathan Worth and Laura Czerniewicz. She attended virtually. She found some common themes in the keynotes about privacy, vulnerability, and trust in open learning environments on the learner level. From Jonathan she says: he talked about the difference between the image and the photograph and how there is a paradigm shift because the image is breaking away from the photograph. Photographs are about evidence, images about experience. Laura's talk was about the inequality on a global scale and is a life or death issue and it is a challenge to address inequality in new online landscapes. Jenny ends the blog with: Jonathan's focus on vulnerability and trying to see the image clearly will inform issues of inequality and Laura's focus on inequality will inform Jonathan's concerns about privacy, trust, and vulnerability.
Doris Reeves-Lipscomb

How the Republicans Sold Your Privacy to Internet Providers - The New York Times - 0 views

  • The bill not only gives cable companies and wireless providers free rein to do what they like with your browsing history, shopping habits, your location and other information gleaned from your online activity, but it would also prevent the Federal Communications Commission from ever again establishing similar consumer privacy protections.
  • When you make a voice call on your smartphone, the information is protected: Your phone company can’t sell the fact that you are calling car dealerships to others who want to sell you a car. But if the same device and the same network are used to contact car dealers through the internet, that information — the same information, in fact — can be captured and sold by the network. To add insult to injury, you pay the network a monthly fee for the privilege of having your information sold to the highest bidder.
  •  
    article by Tom Wheeler, March 29, 2017, on federal legislation to allow the sale of information about consumers' internet inquiries internet providers.
Doris Reeves-Lipscomb

Prepare Your Resume for Email and Online Posting: The Riley Guide - 0 views

  • Some people recommend creating an HTML version of your resume, which includes links to work samples and a photo of yourself - and this is certainly how you'll want to present your resume or CV on your own website (if you have one) and on career networking sites like LinkedIn. Sending out a resume in this format is also becoming more common practice in creative fields like graphic design and advertising, where candidates want to impress potential employers with their ability to make a dramatic first impression.
  •  
    interesting tips on publicity, privacy and letting your resume stay in data bases online and potentially being misused.
  •  
    interesting tips on publicity, privacy and letting your resume stay in data bases online and potentially being misused.
Doris Reeves-Lipscomb

OfficeMax executive apologizes over 'daughter killed' mailer - LA Times - 0 views

  • In a world where bits of personal data are mined from customers and silently sold off and shuffled among corporations, Seay, 46, appears to be the victim of marketing gone horribly wrong.
  • World Privacy Forum, a nonprofit public interest research group based in San Diego, noting that this is just one example of the information such companies probably hold.
  • "This is the tip of the iceberg. This happens all the time," said Pam Dixon, executive director of World Privacy Forum, a nonprofit public interest research group based in San Diego, noting that this is just one example of the information such companies probably hold.
  • ...2 more annotations...
  • "Why do they have that?" Seay said of the information about his daughter's death. "What do they need that for? How she died, when she died? It's not really personal, but looking at them, it is. That's not something they would ever need."
  • Dixon's group has found companies selling data on rape victims, seniors suffering from dementia and people diagnosed with HIV and AIDS. She said companies created powerful data sets by combining personal information available from public records, census information and social media."All of us are on these lists, and right now we don't even have the right to find out what list we're on or what they say about us," Dixon said. "And I think it's becoming increasingly important for us to see this information and have some rights so we can get off these lists. For this father and mother, I can't think of a worse thing."
  •  
    LA Times article by Matt Pearce, January 20, 2013 on infrequent Office MAx customer who received a solicitation from Office Max with his name on it followed, by "Daughter Killed in Car Crash." How did the company get the information and why did it appear on the envelope because the recipient had lost his daughter in a car crash a year before?
Doris Reeves-Lipscomb

6 things you can do now to be stealthier on the Internet - NBC News - 0 views

  •  
    article by devin Coldewey, June 14, 2013, on how you can thwart tracking and and gain more privacy online.
Doris Reeves-Lipscomb

If You're Not Paying For It, You Become The Product - Forbes - 0 views

  •  
    "in this digital age we have sacrificed our privacy in order to access all manner of free stuff on the web. It's a movement that most of us have come to accept. Or have we? I'll borrow a quote I read on MetaFilter recently: 'If you're not paying for it; you are the product'. I'm not sure how many people are fully aware of this sentiment yet or whether they even care. But the next time you're browsing the web or enjoying a video on YouTube, remember that Google is watching your every move; because that's the price you pay."
Lisa Levinson

The Tech Trends You Can't Ignore in 2015 - HBR - 0 views

  •  
    Harvard Business Review's top trends identified by using 5 questions that determine if these are indeed a trend or not. Top trends for 2015 are: Deep learning (machine learning); Smart virtual personal assistants; Uber's monetization of downtime and the offer for those needing employment to work. Uber-like businesses such as grocery delivery, massage services, dry cleaning and laundry, etc. will take off; Oversight for Algorithms - ethics of how algorithms can be used especially when programmers add subjective judgments to algorithms causing false answers; Data privacy - dealing with ongoing breaches. The public does not blame hackers but blames business for not taking measures to combat hackers; Block chain technology is a transactional database that is shared by everyone participating in bitcoin's digital system. Block chain systems may become a universal platform for anything needing a signature or authentication.
  •  
    Harvard Business Review's top trends identified by using 5 questions that determine if these are indeed a trend or not. Top trends for 2015 are: Deep learning (machine learning); Smart virtual personal assistants; Uber's monetization of downtime and the offer for those needing employment to work. Uber-like businesses such as grocery delivery, massage services, dry cleaning and laundry, etc. will take off; Oversight for Algorithms - ethics of how algorithms can be used especially when programmers add subjective judgments to algorithms causing false answers; Data privacy - dealing with ongoing breaches. The public does not blame hackers but blames business for not taking measures to combat hackers; Block chain technology is a transactional database that is shared by everyone participating in bitcoin's digital system. Block chain systems may become a universal platform for anything needing a signature or authentication. 
Doris Reeves-Lipscomb

The FCC Seems Unlikely to Stop Internet Providers from Selling Your Data | WIRED - 0 views

  •  
    explains how FCC and FTC are disagreeing on privacy protection on internet with ISPs and Facebook, Google. Upshot is less protection for all of us.
Doris Reeves-Lipscomb

Theorizing the Web 2017 - Redstone Theater on Livestream - 0 views

  •  
    41 minutes into the panel--they talk about Facebook algorithm and lack of privacy
Doris Reeves-Lipscomb

wounded by school | www.kirstenolson.org | Kirsten Olson is an author, teacher, consult... - 0 views

  •  
    A blog by Kirsten Olson on her new book, Wounded by School. Really like the Learner's Bill of Rights she has here: A Learner's Bill of Rights Every learner has the right to know why they are learning something, why it is important now, or may be important to them someday. Every learner has the right to engage in questioning or interrogating the idea of "importance" above. Every learner has the right to be confused and to express this confusion openly, honestly, and without shame. Every learner has the right to multiple paths to understanding a concept, an idea, a set of facts, or a series of constructs. Every learner has the right to understand his or her own mind, brain wiring, and intellectual inclinations as completely as possible. Every learner has the right to interrogate and question the means through which his or her learning is assessed. Every learner is entitled to some privacy in their imagination and thoughts. Every learner has the right to take their own imagination and thinking seriously. -From Wounded By School
Doris Reeves-Lipscomb

Parent-Managed Learner Profiles Will Power Personalization | Getting Smart - 0 views

  • What is a learner profile?  A learner profile includes three elements: Learning transcript: grades, courses (and/or learning levels), state and district achievement data Personalized learning information: supplemental achievement data, record of services received, feedback on work habits, record of extracurricular activities and work/service experiences. Portfolio of student work: collection of personal best work products.
  • What about children with disconnected parents? As the number of learning options expands many students and families would benefit from a chosen guide. The Donnell Kay Foundation imagines a new system of education where learners create customized paths with advocates who work with them to connect their present learning to their desired future. This role of mentor/advocate/coach could benefit all students but particularly students without the benefit of engaged parents. In some cases, parents/guardians will choose to allow designees (e.g., mentors, relatives) to manage learner profile privacy settings. Young people in the foster care and juvenile justice system may have a court (or state) appointed guide that would manage privacy settings.
  • Data Quality Campaign recently noted, “With access to current education data child welfare staff can help the highly mobile students in foster care achieve school success by providing support such as the following: helping with timely enrollment and transfer of credits if a school change is needed, identifying the need for educational supports, working with school staff to address attendance and discipline issues, and assisting with transition planning to post-school activities such as higher education.”
  • ...3 more annotations...
  • How would postsecondary profiles work? LinkedIn founder Reid Hoffman said a 21st century diploma, “Would accommodate a completely unbundled approach to education, allowing students to easily apply credits obtained from a wide range of sources, including internships, peer to peer learning, online classes, and more, to the same certification.” This “dynamic and upgradable” machine readable profile, “Should allow a person to convey the full scope of his or her skills and expertise with greater comprehensiveness and nuance, in part to enable better matching with jobs.” Hoffman obviously has interest in LinkedIn serving as the preferred market signaling platform.
  • “Own the student record.” The Lone Star pilot was a good start. With foundation support a small state or group of school districts could pilot a parent controlled learner profile.
  • Online profile management is becoming important in every aspect of life, it’s a new digital literacy competency that every young person must learn to exercise. That starts with empowering parents to take charge of education data with a portable learning profile.
  •  
    excellent explanation by Tom Vander Ark on why parent-managed learner profiles are becoming more important all the time for young people.  Is the corollary true for adults owning their learning in portable, digital carry-alongs for sharing with potential employers, etc.  
1 - 20 of 35 Next ›
Showing 20 items per page