Skip to main content

Home/ SISummer11/ Group items tagged privacy

Rss Feed Group items tagged

Elisa Varon

Digital Privacy - 2 views

  •  
    I'm interested in the idea of digital privacy (or lack thereof). It seems nobody is particularly worried about their privacy online, and I'd like to learn a little more about this
  • ...5 more comments...
  •  
    After reading your article and thinking about my own opinions on digital privacy, I think that people aren't too concerned with their privacy because the virtual world seems so gigantic. I feel like a very tiny part of this world so I am more apathetic and unconcerned when it comes to my personal privacy than I should be. Sounds horrible, right? We, as a society, also tend to be very open about ourselves - even posting where we are at that second to everyone on our facebook!
  •  
    wow...scary stuff!! i think that's a great topic with a lot to explore. a lot of content and some interesting psychological implications...funny how a lot of people ignore the issue since the evidence is pretty terrifying. but good to be aware since it affects us all.
  •  
    Interesting to also consider the ways in which teens view privacy - particularly in comparison to the ways in which their parents view it: http://www.pbs.org/wgbh/pages/frontline/digitalnation/relationships/identity/famous-for-15-minutes.html?play. Glad I could bring danah boyd into the conversation here!
  •  
    Elisa, I actually just got an email from Ravelry.com (an online knitting community) saying that their account database had been hacked and that I should change my password anywhere where I used the same email address and password to log in. I just went through this a few months ago when the Gawker Media servers were hacked! It's hard to rack my brain to remember every single website where I've signed up using my primary email address and go-to password. There are probably hundreds! God forbid I have accounts with that information that also have my credit card associated with it. It's scary to think about how much of me is spread all over the internet, and I can't even remember where in order to protect myself.
  •  
    I think I fall into that category of people who care about privacy but then contradict themselves with their behavior. From the personal to more organizational, this report on cyber hackers was on NPR today. http://www.npr.org/2011/06/06/137000302/latest-hacks-could-set-the-stage-for-cyberwar
  •  
    Um, I can't think of a more bone-chilling phrase than "cyberwar."
  •  
    Steig Larsson made hacking look pretty cool. But it's interesting to think about how much is possible in the hacking world that we tend to forget about since our everyday use of technology has been so woven into our routines. Just saw this article and I found interesting to see the many sides of hacking: http://www.guardian.co.uk/technology/2011/jun/06/hackers-how-and-why-they-hack I always make fun of my dad for being a computer hypochondriac -- he always thinks that someone is hacking into his computer, so he has a million anti-virus and security programs (a combination which I think is actually destroying his computer). But it is a valid concern, though I think you have to just find a balance for your privacy since in extreme cases, your privacy can be a bit restricting.
Nadine Palfy

Communications privacy complaints: - 0 views

  •  
    Privacy issues in the communications sector are increasingly prevalent as new technology and new applications enter the market, such as social networking and the use of location based information. These new technology privacy issues add to the existing privacy issues in the sector, such as spam, telemarketing and the misuse of silent telephone numbers. Complaints are a vital element in privacy protection - indeed, the entire system of privacy protection in the communications sector is built on the receipt and management of complaints. There are few proactive requirements to protect privacy in the sector, and the volume and scale of business in the sector is so large that no regulator could hope to monitor compliance without relying heavily on complaints. Proactive steps are necessary and crucial, but this report focuses on complaint paths. The aim of this study is to analyse and compare common communications privacy complaint paths in order to obtain optimum outcomes for consumers through the development.
Jerry Emanuel

Google Plus - Read the Fine Print BEFORE You Sign Up « Photofocus - 0 views

  •  
    Privacy & Licensing issues with google+, fwiw, compare the posted Google+ terms of service with facebooks terms;  "For content that is covered by intellectual property rights, like photos and videos ("IP content"), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook ("IP License"). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it."
Nadine Palfy

ATIS Privacy Policy - 0 views

  •  
    The Alliance for Telecommunications Industry Solutions, Inc. (ATIS) is committed to protecting privacy and security of the personal information of our web site visitors. By accessing an ATIS web site, visitors agree to the use of their information as stated in this Privacy Policy. This Privacy Policy describes the personal information we may collect and how it may be used.
Rebecca Martin

ObscuraCam: Enhance Your Visual Privacy! - 0 views

  •  
    I came across this new Droid app that enables users to obscure the faces of individuals in photos or videos they've taken on their mobile devices. The app creators are involved more generally in developing technologies and technology policies for human rights defenders, especially ones that document abuses, protests and other demonstrations and share the videos/pictures through various media channels and see a need to hide identities from repressive governments. I think it ties our discussion last week of Evgeny Morozov's research into the Internet and government oppression into the issue of privacy.
Nadine Palfy

Washington University Law Quarterly: CALLER INTELLIDATA: PRIVACY IN THE DEVELOPING TELE... - 0 views

  •  
    Quarterly Home Page | Quarterly Issues | © 1998 by Washington University CALLER INTELLIDATA: PRIVACY IN THE DEVELOPING TELECOMMUNICATIONS INDUSTRY Cite as 76 Wash. U. L.Q. 351 George Orwell's 1984 discusses the implications that technology and information gathering can have on privacy.[1] It describes a world where Big Brother monitors the everyday conduct of its citizens through technologically advanced equipment.[2] In 1984, Big Brother is the government.
Nadine Palfy

Data Privacy in Telecommunications - 0 views

  •  
    Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company Business need: A leading international telecommunications organization needed a cost effective means to protect the privacy of its customer data and comply with regulatory requirements. Solution: The customer's systems are managed by a well-known global systems integrator. After inquiring with Gartner and Forrester Research, the systems integrator evaluated multiple database auditing vendors (including Oracle) and chose the InfoSphere Guardium solution. InfoSphere Guardium's appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Benefits: InfoSphere Guardium provided a fine grained audit trail of all sensitive data access, along with automated reporting and compliance workflow, satisfying the needs of auditors. Real-time blocking and alerts ensured privacy policies were strictly enforced. .
Nadine Palfy

Untitled Document - 0 views

  •  
    The Telecommunications Industry Association (TIA) has created this privacy statement to demonstrate our firm commitment to privacy. The following discloses our information-gathering and dissemination practices for this site, http://www.tiaonline.org. IP and Usage Tracking. We use your computer's IP (Internet Protocol) address 10.130.179.249 to help diagnose problems with our server, track down spammers and to administer our Web site.
Rebecca Martin

Pulling plug on privacy - 2 views

  •  
    Opinion-editorial from Alex Kozinski, chief judge of the U.S. Court of Appeals for the Ninth Circui, and his law clerk Stephanie Grace on the changing nature of the Fourth Amendment, reasonable expectations of privacy and technology.
Rebecca Martin

"Hyper-Public: A Symposium on Designing Privacy and Public Space" - 1 views

  •  
    A really interesting series of videos, audio, visualizations, and other outputs from "Hyper-Public: A Symposium on Designing Privacy and Public Space," at Harvard's Berkman Center
  •  
    Interesting to think about the fact that the concept of privacy is really shifting. Danna boyd's illustrates this point well with her statement that that "even though we're in the public, doesn't mean we desire publicity." She also mentioned "youth" hiding in broad day light through their use of online code.
Rebecca Martin

Resolution to Protect Library User Confidentiality in Self-Service Hold Practices - 0 views

  •  
    The ALA Intellectual Freedom Committee and the IFC Privacy Subcommittee developed the "Resolution to Protect Library User Confidentiality in Self-Service Hold Practices" after receiving requests from librarians and library users to examine the issue of reader privacy and self-service holds (June 28, 2011).
Lilia p

Harvard's Privacy Meltdown - Technology - The Chronicle of Higher Education - 0 views

  •  
    In 2006, Harvard sociologists struck a mother lode of social-science data, offering a new way to answer big questions about how race and cultural tastes affect relationships. The source: some 1,700 Facebook profiles, downloaded from an entire class of students at an "anonymous" university, that could reveal how friendships and interests evolve over time.
  •  
    And now the fun begins.... very timely topic
Nadine Palfy

23 Comparative Labor Law & Policy Journal 2001-2002 Information Technology and Workers'... - 0 views

  •  
    INFORMATION TECHNOLOGY AND WORKERS' PRIVACY: ENFORCEMENT Hans-Joachim Reinhardt The use of information technology at work has emphasized a tension between two distinct principles that appear at first sight to be opposed to one other: On the one hand, there is the principle of the inviolability of the employees' private lives and private communications and, on the other, the principle of the employers' rights to enjoy their private property and their managerial powers of command.
Qraig de Groot

Privacy: Big Brother catches Brits stumbling home drunk - 0 views

  •  
    This article seems to fit in with what we are discussing this week. A closed-circuit television (CCTV) video that shows an extremely drunk man staggering home through the streets of London has taken the web by storm this week (you can watch it below). Although it's primarily entertaining because of its sheer shock value, it also serves to illustrate the surprising -- and, to many, alarming -- extent of video surveillance in the U.K.
Maggie Murphy

Artist Gets Visit From Secret Service After Secretly Photographing Apple Store Customer... - 1 views

  •  
    This happened a few days ago now, but I forgot to post it until I went to talk about it in my journal this week! From the article: "Over the course of three days in June, artist Kyle McDonald captured the faces of Apple patrons in two of the company's Manhattan stores. He did this by installing a program on computers in the stores, which automatically took an image every minute." His idea was that the photos constituted an art project about what people look like when they engage with technology. The Secret Service confiscated his computers after an Apple Store employee traced where the photos were being transferred to. I thought this was interesting because it's an example of visual surveillance of people's physical presence/actions in public spaces like Greenfield talks about, rather than surveillance of their digital actions, which so much of the literature focuses on. I definitely think the artist's project constitutes a violation of the privacy of the people whose photographs he took, but I can't help thinking it's also a really fascinating project that wouldn't work if people knew their photo was being taken in that moment.
michelleamills

Social Media and Privacy: Best Practices for Managing Your Personal and Professional I... - 0 views

  •  
    Interesting tips for social media users that go well with the NPR recording on how employers really have more power to fire people than I originally thought. This may be a must read for teens/college students in regards to new jobs and social media.
Rebecca Martin

PrivacyVille: Zynga's New Game Teaches Users How to Play Secure - 0 views

  •  
    Interesting way to educate users about privacy settings
michelleamills

iCloud Info - 0 views

shared by michelleamills on 07 Jun 11 - No Cached
  •  
    This is an interesting concept about storing not just your music but all your personal information as well. I think it will probably catch on quickly, but privacy is still a main concern.
Mary Beth Davis

Digital Anthropolgist - 0 views

  •  
    Just came across these fairly recent article on Danna boyd. (yes, that's lower case 'b.') She's been involved with some pretty interesting online studies that focus on teen and young adults. Some of her research has included topics such as, "Online White Flight," "Digital Self-Harm," and Privacy Techniques." I found it particularly interesting that on the topic of Digital Self-Harm, she discovered that vicious anonymous questions on a teen's profile weren't examples of cyberbullying but were posted by the teen herself!
  •  
    Thanks for bringing her into the conversation, Mary Beth! danah boyd is definitely one of my favorite researchers. I read large portions of her dissertation as part of HIB my first semester in the program here at Rutgers, and a lot of what she's said has stuck with me since. You can read it here: http://www.danah.org/papers/TakenOutOfContext.pdf. I also recently attended a webinar from the Berkman Center, where she's a fellow, in which she summarizes nicely a lot of her work under the broader theme of "Embracing the Culture of Connectivity." You can watch it here: http://cyber.law.harvard.edu/events/2011/05/academicSM.
Rebecca Martin

I'm OK, They're Not: Trying to unravel what internet users want when it comes to govern... - 0 views

  •  
    Presentation at the Internet Governance Forum from a Pew Internet staffer on user attitudes and wants when it comes to Internet governance.
1 - 20 of 30 Next ›
Showing 20 items per page