Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged privacy

Rss Feed Group items tagged

Weiye Loh

Welcome to the Deep Web - Pipl - People Search - 4 views

shared by Weiye Loh on 12 Oct 09 - Cached
  • There are various reasons why you might need to search for people, you may need to find a lost relative, an old flame, a classmate or a business contact - but if you are using a search engine such as Google or Yahoo to search for people, you have probably realized by now that it might work in some cases but in most cases it won't. How come the best search engines fail so miserably when it comes to people search? The answer lies in a little known but very important part of the web called "the deep web". Also known as "invisible web", the term "deep web" refers to a vast repository of underlying content, such as documents in online databases that general-purpose web crawlers cannot reach. The deep web content is estimated at 500 times that of the surface web, yet has remained mostly untapped due to the limitations of traditional search engines. Since most personal profiles, public records and other people-related documents are stored in databases and not on static web pages, most of the higher-quality information about people is simply "invisible" to a regular search engine.
  •  
    I tried this out - it's extremely accurate and scary!
  •  
    yeah Juliet. I found information abt myself that I don't even know existed. hahahah. Or I probably knew in the past but have forgotten about them. Digital traces of my history....
Weiye Loh

Pipl - People Search - 4 views

shared by Weiye Loh on 12 Oct 09 - Cached
  •  
    "The most comprehensive people search on the web" Just enter the name, country etc, to find the person. I must say it's quite interesting and scary at the same time.
Valerie Oon

Ethics discussion based on new movie, "Surrogates" - 8 views

This movie upset me. I don't think the director developed the premise and plot to the potential it could have reached. Quite a shallow interpretation. But it does raise some intrigue. I'm a bit stu...

technology future empowerment destruction

yongernn teo

Ethics and Values Case Study- Mercy Killing, Euthanasia - 8 views

  •  
    THE ETHICAL PROBLEM: Allowing someone to die, mercy death, and mercy killing, Euthanasia: A 24-year-old man named Robert who has a wife and child is paralyzed from the neck down in a motorcycle accident. He has always been very active and hates the idea of being paralyzed. He also is in a great deal of pain, an he has asked his doctors and other members of his family to "put him out of his misery." After several days of such pleading, his brother comes into Robert's hospital ward and asks him if he is sure he still wants to be put out of his misery. Robert says yes and pleads with his brother to kill him. The brother kisses and blesses Robert, then takes out a gun and shoots him, killing him instantly. The brother later is tried for murder and acquitted by reason of temporary insanity. Was what Robert's brother did moral? Do you think he should have been brought to trial at all? Do you think he should have been acquitted? Would you do the same for a loved one if you were asked? THE DISCUSSION: In my opinion, the most dubious part about the case would be the part on Robert pleading with his brother, asking his brother to kill him. This could be his brother's own account of the incident and could/could not have been a plea by Robert. 1) With assumption that Robert indeed pleaded with his brother to kill him, an ethical analysis as such could be derived: That Robert's brother was only respecting Robert's choice and killed him because he wanted to relieve him from his misery. This could be argued to be ethical using a teleoloigical framework where the focus is on the end-result and the consequences that entails the action. Here, although the act of killing per se may be wrong and illegal, Robert was able to relieved of his pain and suffering. 2) With an assumption that Robert did not plea with his brother to kill him and that it was his brother's own decision to relieve Robert of all-suffering: In this case, the b
  • ...2 more comments...
  •  
    I find euthanasia to be a very interesting ethical dilemma. Even I myself am caught in the middle. Euthanasia has been termed as 'mercy killing' and even 'happy death'. Others may simply just term it as being 'evil'. Is it right to end someone's life even when he or she pleads you to do so? In the first place, is it even right to commit suicide? Once someone pulls off the main support that's keeping the person alive, such as the feeding tube, there is no turning back. Hmm..Come to think of it, technology is kind of unethical by being made available, for in the past, when someone is dying, they had the right to die naturally. Now, scientific technology is 'forcing' us to stay alive and cling on to a life that may be deemed being worthless if we were standing outside our bodies looking at our comatose selves. Then again, this may just be MY personal standpoint. But I have to argue, who gave technology the right to make me a worthless vegetable!(and here I am, attaching a value/judgement onto an immobile human being..) Hence, being incompetent in making decisions for my unconscious self (or perhaps even brain dead), who should take responsibility for my life, for my existence? And on what basis are they allowed to help me out? Taking the other side of the argument, against euthanasia, we can say that the act of ending someone else's life is the act of destroying societal respect for life. Based on the utilitarian perspective, we are not thinking of the overall beneficence for society and disregarding the moral considerations encompassed within the state's interest to preserve the sanctity of all life. It has been said that life in itself takes priority over all other values. We should let the person live so as to give him/her a chance to wake up or hope for recovery (think comatose patients). But then again we can also argue that life is not the top of the hierarchy! A life without rights is as if not living a life at all? By removing the patient
  •  
    as a human being, you supposedly have a right to live, whether you are mobile or immobile. however, i think that, in the case of euthanasia, you 'give up' your rights when you "show" that you are no longer able to serve the pre-requisites of having the right. for example, if "living" rights are equate to you being able to talk, walk, etc etc, then, obviously the opposite means you no longer are able to perform up to the expectations of that right. then again, it is very subjective as to who gets to make that criteria!
  •  
    hmm interesting.. however, a question i have is who and when can this "right" be "given up"? when i am a victim in a car accident, and i lost the ability to breathe, walk and may need months to recover. i am unconscious and the doctor is unable to determine when am i gonna regain consciousness. when should my parents decide i can no longer be able to have any living rights? and taking elaine's point into consideration, is committing suicide even 'right'? if it is legally not right, when i ask someone to take my life and wrote a letter that it was cus i wanted to die, does that make it committing suicide only in the hands of others?
  •  
    Similarly, I question the 'rights' that you have to 'give up' when you no longer 'serve the pre-requisites of having the right'. If the living rights means being able to talk and walk, then where does it leave infants? Where does it leave people who may be handicapped? Have their lost their rights to living?
Weiye Loh

AP IMPACT: Framed for child porn - by a PC virus by AP: Yahoo! Tech - 0 views

  • Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.
  • Whatever the motivation, you get child porn on your computer — and might not realize it until police knock at your door.
  • In 2007, Fiola's bosses became suspicious after the Internet bill for his state-issued laptop showed that he used 4 1/2 times more data than his colleagues. A technician found child porn in the PC folder that stores images viewed online. Fiola was fired and charged with possession of child pornography, which carries up to five years in prison. He endured death threats, his car tires were slashed and he was shunned by friends. Fiola and his wife fought the case, spending $250,000 on legal fees. They liquidated their savings, took a second mortgage and sold their car. An inspection for his defense revealed the laptop was severely infected. It was programmed to visit as many as 40 child porn sites per minute — an inhuman feat. While Fiola and his wife were out to dinner one night, someone logged on to the computer and porn flowed in for an hour and a half. Prosecutors performed another test and confirmed the defense findings. The charge was dropped — 11 months after it was filed.
    • Weiye Loh
       
      The law is reason beyond passion. Yet, reasons may be flawed, bounded, or limited by our in irrationality. Who are we to blame if we are victims of such false accusation? Is it right then to carry on with these proceedings just so those who are truly guilty won't get away scot-free? 
  • ...1 more annotation...
  • The Fiolas say they have health problems from the stress of the case. They say they've talked to dozens of lawyers but can't get one to sue the state, because of a cap on the amount they can recover. "It ruined my life, my wife's life and my family's life," he says. The Massachusetts attorney general's office, which charged Fiola, declined interview requests.
Weiye Loh

Facebook groups hijacked - 1 views

  • ACTIVISTS claimed on Tuesday to have seized control of nearly 300 Facebook community groups in a self-proclaimed effort to expose how vulnerable online reputations are to tampering.
  • CYI claimed its motives were pure and that the move was more of a 'take-over' than a computer hack of Facebook groups.
    • Weiye Loh
       
      Sure, the end/ purpose is good... but the means? Questionable. Yet, it may be the only way to get people to formally recognize a flaw that everyone is well (sub)conscious about but refuses to do anything.  Freedom of expression perhaps? We're back to the issue of what is right and what is wrong. 
  • 'Facebook Groups suffer from a major flaw,' said a message on the CYI blog. 'If an administrator of a group leaves, anyone can register as a new admin. So, in order to take control of a Facebook group, all you really have to do is a quick search on Google.' Once CYI accessed groups as administrators it had authority to change anything, including pictures, descriptions and settings.
Weiye Loh

Designers Make Data Much Easier to Digest - NYTimes.com - 0 views

  • On the benefit side, people become more engaged when they can filter information that is presented visually and make discoveries on their own. On the risk side, Professor Shneiderman says, tools as powerful as visualizations have the potential to mislead or confuse consumers. And privacy implications arise, he says, as increasing amounts of personal, housing, medical and financial data become widely accessible, searchable and viewable.
  • In the 1990s, Professor Shneiderman developed tree mapping, which uses interlocking rectangles to represent complicated data sets. The rectangles are sized and colored to convey different kinds of information, like revenue or geographic region, says Jim Bartoo, the chief executive of the Hive Group, a software company that uses tree mapping to help companies and government agencies monitor operational data. When executives or plant managers see the nested rectangles grouped together, he adds, they should be able to immediately spot anomalies or trends. In one tree-map visualization of a sales department on the Hive Group site, red tiles represent underperforming sales representatives while green tiles represent people who exceeded their sales quotas. So it’s easy to identify the best sales rep in the company: the biggest green tile. But viewers can also reorganize the display — by region, say, or by sales manager — to see whether patterns exist that explain why some employees are falling behind. “It’s the ability of the human brain to pick out size and color” that makes tree mapping so intuitive, Mr. Bartoo says. Information visualization, he adds, “suddenly starts answering questions that you didn’t know you had.”
  • data visualization is no longer just a useful tool for researchers and corporations. It’s also an entertainment and marketing vehicle.
  • ...2 more annotations...
  • In 2009, for example, Stamen Design, a technology and design studio in San Francisco, created a live visualization of Twitter traffic during the MTV Video Music awards. In the animated graphic, floating bubbles, each displaying a photograph of a celebrity, expanded or contracted depending on the volume of Twitter activity about each star. The project provided a visceral way for viewers to understand which celebrities dominated Twitter talk in real time, says Eric Rodenbeck, the founder and creative director of Stamen Design.
  • Designers once created visual representations of data that would steer viewers to information that seemed the most important or newsworthy, he says; now they create visualizations that contain attractive overview images and then let users direct their own interactive experience — wherever it may take them. “It’s not about leading with a certain view anymore,” he says. “It’s about delivering the view that gets the most participation and engagement.”
Weiye Loh

For Activists, Tips in Safer Use of Social Media - Noticed - NYTimes.com - 0 views

  • people often lose sight of security concerns amid the collective euphoria that can accompany swift, large-scale democratization movements like the ones in Egypt and Tunisia. “The eye gets focused on the goal and not the process,” he said, “and during that time, they put their own personal security and their network security at risk.”
  • But it’s not just the fog of enthusiasm that renders people vulnerable; it’s lack of experience.
  • Those dangers have become increasingly apparent in recent months. Facebook accounts were hacked in Tunisia. In Egypt, authorities shut down the Internet and cellphones, and employed technology that turned mobile phones into furtive listening devices, according to the guide.
  • ...1 more annotation...
  • The Access guide provides tips for keeping communications safer in such a climate. It recommends Gmail, for example, because it uses a secure connection by default, known as HTTPS, like at banking Web sites; Hotmail provides HTTPS as an option, and Facebook began offering it in January. The guide also explains how to disguise browsing histories and how to gain access to banned sites.
Weiye Loh

Freakonomics » The U.K.'s 'Under-Aged' Socially Networked Children - 0 views

  • The study’s authors argue that removing age restrictions from sites like Facebook might actually be the best way of improving child safety online.
  • Elisabeth Staksrud, from the University of Oslo and one of the report’s authors comments that: “since children often lie about their age to join ‘forbidden’ sites it would be more practical to identify younger users and to target them with protective measures.”
  • This flies in the face of what many see as a critical security wall  protecting children from cyber-crime on social networking sites. A report released in January by Internet security firm PandaLabs identified Facebook and Twitter as the sites which are most prone to security breaches. The danger is particularly accute when young children enter their real personal information on their profile. Though, as the new research indicates, children are already lying about their age to sign up for a profile. So from a safety standpoint, the most important measure for children to take is to refrain from entering real information such as their address or where they go to school.
  •  
    The study's authors argue that removing age restrictions from sites like Facebook might actually be the best way of improving child safety online. Elisabeth Staksrud, from the University of Oslo and one of the report's authors comments that: "since children often lie about their age to join 'forbidden' sites it would be more practical to identify younger users and to target them with protective measures."
Weiye Loh

journalism.sg » Tin Pei Ling's baptism of fire: Should bloggers have lit the ... - 0 views

  • That is nothing, though, compared with the attack by Temasek Review, the anonymously-run website with lofty ambitions “to foster an informed, educated, thinking and proactive citizenry.” The website delved into her personal life – even questioning her motives for marrying her husband – to present her as a materialistic, social climbing monster. Such attacks have also been flying around social media.
  • Never mind that Tin (unlike most high-flying PAP candidates) has several years’ grassroots experience; sections of the online community have dismissed the possibility that someone so young – she is in her 20s – could serve in the highest forum in the land. (I recall feeling similarly skeptical when Eunice Olsen was put up as an NMP. She proved me wrong and I have learnt not to prejudge.)
  • Siew Kum Hong, hardly a PAP apologist, has had the intellectual honesty and moral courage to come out swiftly in his blog against this distasteful turn of events.
  • ...5 more annotations...
  • some others have argued that election candidates should expect such a baptism of fire. One blogger, while agreeing that the incident was “unfortunate”, said with Nietzsche-like logic, “If Ms. Tin is made of sterner stuff, she’ll live through this. If our future political leaders don’t have the tenacity to look past the Glee-like slushies and take the hit for the citizens of Singapore, then I don’t think they deserve my vote in the first place.”
  • how Tin and her party leaders respond to this episode will say a lot about their preparedness for the new terrain.
  • This, however, doesn’t really excuse those who have chosen to corrupt that terrain.
  • Some online posters have argued that the PAP is just reaping what it has sown: it has made life ugly for those who dare to enter Opposition politics, deterring many able individuals from joining other parties; now it’s payback time, time for the PAP can get a taste of its own medicine. Certainly, the online world should help to level what is undoubtedly a tilted offline playing field. This imperative is what motivates some of Singapore’s best online journalism.
  • Websites that say they want to help raise the level of Singapore’s political discourse shouldn’t go lower than the politicians themselves.
  •  
    Never mind that Tin (unlike most high-flying PAP candidates) has several years' grassroots experience; sections of the online community have dismissed the possibility that someone so young - she is in her 20s - could serve in the highest forum in the land. (I recall feeling similarly skeptical when Eunice Olsen was put up as an NMP. She proved me wrong and I have learnt not to prejudge.)
Weiye Loh

A handbag and a pack of wolves « onesingaporean - 0 views

  • Were we expecting that there would not be such behaviour – at this first truly Internet election? Are we who are in Singapore so deep within our own well that we are surprised by this sort of behaviour? In the words of one old man, grow up.
  • If you teach a people how to behave, and coerce them, frighten them and show them examples of what would happen if they do not behave as told, then you must accept that this people would learn your ways.
  • And this is what is happening with Tin Pei Ling – the people have learned from the PAP. And yes, it is distasteful. It is unwarranted. But to lay the blame on the people alone is just plain missing the point, isn’t it?
  • ...1 more annotation...
  • as for Tin Pei Ling, and those of you who feel sorry for her, perhaps you can take comfort in how all this will pan out – described so succintly by Martyn See: “I think it is okay to make fun of Tin Pei Ling. If we are a properly functioning democracy, she would’ve been torn asunder by comedians and caricaturists. But alas, we are not. In the end, she will stroll into her MP office, with make-up and handbags intact, and she’ll look back on this week as being the most trying period of her political career, and then she’ll have the last laugh, at your expense.”
Weiye Loh

Free Speech under Siege - Robert Skidelsky - Project Syndicate - 0 views

  • Breaking the cultural code damages a person’s reputation, and perhaps one’s career. Britain’s Home Secretary Kenneth Clarke recently had to apologize for saying that some rapes were less serious than others, implying the need for legal discrimination. The parade of gaffes and subsequent groveling apologies has become a regular feature of public life. In his classic essay On Liberty, John Stuart Mill defended free speech on the ground that free inquiry was necessary to advance knowledge. Restrictions on certain areas of historical inquiry are based on the opposite premise: the truth is known, and it is impious to question it. This is absurd; every historian knows that there is no such thing as final historical truth.
  • It is not the task of history to defend public order or morals, but to establish what happened. Legally protected history ensures that historians will play safe. To be sure, living by Mill’s principle often requires protecting the rights of unsavory characters. David Irving writes mendacious history, but his prosecution and imprisonment in Austria for “Holocaust denial” would have horrified Mill.
  • the pressure for “political correctness” rests on the argument that the truth is unknowable. Statements about the human condition are essentially matters of opinion.  Because a statement of opinion by some individuals is almost certain to offend others, and since such statements make no contribution to the discovery of truth, their degree of offensiveness becomes the sole criterion for judging their admissibility. Hence the taboo on certain words, phrases, and arguments that imply that certain individuals, groups, or practices are superior or inferior, normal or abnormal; hence the search for ever more neutral ways to label social phenomena, thereby draining language of its vigor and interest.
  • ...3 more annotations...
  • A classic example is the way that “family” has replaced “marriage” in public discourse, with the implication that all “lifestyles” are equally valuable, despite the fact that most people persist in wanting to get married. It has become taboo to describe homosexuality as a “perversion,” though this was precisely the word used in the 1960’s by the radical philosopher Herbert Marcuse (who was praising homosexuality as an expression of dissent). In today’s atmosphere of what Marcuse would call “repressive tolerance,” such language would be considered “stigmatizing.”
  • The sociological imperative behind the spread of “political correctness” is the fact that we no longer live in patriarchal, hierarchical, mono-cultural societies, which exhibit general, if unreflective, agreement on basic values. The pathetic efforts to inculcate a common sense of “Britishness” or “Dutchness” in multi-cultural societies, however well-intentioned, attest to the breakdown of a common identity.
  • The defense of free speech is made no easier by the abuses of the popular press. We need free media to expose abuses of power. But investigative journalism becomes discredited when it is suborned to “expose” the private lives of the famous when no issue of public interest is involved. Entertaining gossip has mutated into an assault on privacy, with newspapers claiming that any attempt to keep them out of people’s bedrooms is an assault on free speech. You know that a doctrine is in trouble when not even those claiming to defend it understand what it means. By that standard, the classic doctrine of free speech is in crisis. We had better sort it out quickly – legally, morally, and culturally – if we are to retain a proper sense of what it means to live in a free society.
  •  
    Yet freedom of speech in the West is under strain. Traditionally, British law imposed two main limitations on the "right to free speech." The first prohibited the use of words or expressions likely to disrupt public order; the second was the law against libel. There are good grounds for both - to preserve the peace, and to protect individuals' reputations from lies. Most free societies accept such limits as reasonable. But the law has recently become more restrictive. "Incitement to religious and racial hatred" and "incitement to hatred on the basis of sexual orientation" are now illegal in most European countries, independent of any threat to public order. The law has shifted from proscribing language likely to cause violence to prohibiting language intended to give offense. A blatant example of this is the law against Holocaust denial. To deny or minimize the Holocaust is a crime in 15 European countries and Israel. It may be argued that the Holocaust was a crime so uniquely abhorrent as to qualify as a special case. But special cases have a habit of multiplying.
Weiye Loh

Do You Know Who Has Access To Your Twitter Account? Check Your Application Settings - A... - 0 views

  •  
    Who Has Access To Your Twitter Account? Check Your Application Settings - http://t.co/WSLF3Kf
Weiye Loh

Too Much Information - Gareth Evans - Project Syndicate - 0 views

  • But some lines do have to be drawn if good government is to be possible, just as a zone of privacy in our personal and family lives is crucial to sustaining the relationships that matter most to us.
  • Some of WikiLeaks’ releases of sensitive material have been perfectly defensible on classic freedom-of-information grounds, exposing abuses that might otherwise have remained concealed. The helicopter gunship killings in Iraq, the corruption of former Tunisian President Zine el-Abidine Ben Ali’s family, and the paucity of progress in Afghanistan are, by this standard, fair game. None of this makes Julian Assange a Daniel Ellsberg (who 40 years ago leaked the Pentagon Papers, exposing US-government thinking on Vietnam). Nor does it put him in the same league with Anna Politkovskaya, the crusading journalist who was murdered after refusing to stop investigating Russian human rights abuses. His stated motives seem too anarchic for that. Sometimes, however, whistles do need to be blown.
  • But some leaks are indefensible, and at least the sources must expect some punitive reckoning. This category includes leaks that put intelligence sources or other individuals at physical risk (as did some of WikiLeaks’ early releases on Afghanistan and Zimbabwe). It also includes leaks that genuinely prejudice intelligence methods and military operational effectiveness; expose exploratory positions in peace negotiations (invariably helping only spoilers); or disclose bottom lines in trade talks. What is clear in all of these cases is that the stakes are so high that it simply cannot be left to the judgment of WikiLeaks and media outlets to make the necessary calls without consulting relevant officials. Sensibly, US officials facilitated such consultations, on a “without prejudice” basis, in some of the early WikiLeaks cases.
  • ...2 more annotations...
  • The trickiest cases are in a third category: private conversations whose disclosure is bound to cause offense, embarrassment, or tension, but has no obvious redeeming public-policy justification. The problem is not that negative things are said behind closed doors – as one leader famously responded to an apologizing Hillary Clinton, “You should hear what we say about you” – but that they become public knowledge. Particularly in Asia, loss of face means much more than most Westerners will ever understand.
  • these kinds of leaks should not be naively applauded as somehow contributing to better government. They don’t, and won’t, because they will strongly influence at least what is written down and circulated, thereby inhibiting the free exchange of information within government. Leaks of this kind will reinforce the bureaucratic barriers that must be removed if policymaking and implementation are to be effective in all areas that require input, coordination, and common information and analysis across departments and agencies.
  •  
    In government, any leak is, by definition, embarrassing to someone, somewhere in the system. Most leaks are likely to involve some breach of law by the original source, if not by the publisher. But that doesn't mean that all leaks should be condemned. One of the hardest lessons for senior government officials to learn -­ including for me, when I was Australian Attorney General and Foreign Minister - is the futility, in all but a tiny minority of cases, of trying to prosecute and punish those responsible for leaks. It doesn't undo the original damage, and usually compounds it with further publicity. The media are never more enthusiastic about free speech than when they see it reddening the faces, with rage or humiliation, of those in power. Prosecution usually boosts leakers' stature, making it useless as a deterrent.
Weiye Loh

New Service Adds Your Drunken Facebook Photos To Employer Background Checks, For Up To ... - 0 views

  •  
    The FTC has given thumbs up to a company, Social Intelligence Corp., selling a new kind of employee background check to employers. This one scours the internet for your posts and pictures to social media sites and creates a file of all the dumb stuff you ever uploaded online. For instance, this sample they provided was flagged for "Demonstrating potentially violent behavior" because of "flagrant display of weapons or bombs." The FTC said that the file, which will last for up to seven years, does not violate the Fair Credit Reporting Act. The company also says that info in your file will be updated when you remove pictures from the social media sites. Forbes reports, "new employers who run searches through Social Intelligence won't have access to the materials if they are completely removed from the Internet."
« First ‹ Previous 81 - 95 of 95
Showing 20 items per page