Skip to main content

Home/ SISummer11/ Group items tagged security

Rss Feed Group items tagged

Qraig de Groot

Which Social Networks are Secure - 3 views

  •  
    This is something I am interested in...especially since last year when I had a online identity "breach"!
  •  
    I was surprise to see Facebook received all the stars. I guess I always assumed it has issues because people are always warning me about privacy on there.
Elisa Varon

Digital Privacy - 2 views

  •  
    I'm interested in the idea of digital privacy (or lack thereof). It seems nobody is particularly worried about their privacy online, and I'd like to learn a little more about this
  • ...5 more comments...
  •  
    After reading your article and thinking about my own opinions on digital privacy, I think that people aren't too concerned with their privacy because the virtual world seems so gigantic. I feel like a very tiny part of this world so I am more apathetic and unconcerned when it comes to my personal privacy than I should be. Sounds horrible, right? We, as a society, also tend to be very open about ourselves - even posting where we are at that second to everyone on our facebook!
  •  
    wow...scary stuff!! i think that's a great topic with a lot to explore. a lot of content and some interesting psychological implications...funny how a lot of people ignore the issue since the evidence is pretty terrifying. but good to be aware since it affects us all.
  •  
    Interesting to also consider the ways in which teens view privacy - particularly in comparison to the ways in which their parents view it: http://www.pbs.org/wgbh/pages/frontline/digitalnation/relationships/identity/famous-for-15-minutes.html?play. Glad I could bring danah boyd into the conversation here!
  •  
    Elisa, I actually just got an email from Ravelry.com (an online knitting community) saying that their account database had been hacked and that I should change my password anywhere where I used the same email address and password to log in. I just went through this a few months ago when the Gawker Media servers were hacked! It's hard to rack my brain to remember every single website where I've signed up using my primary email address and go-to password. There are probably hundreds! God forbid I have accounts with that information that also have my credit card associated with it. It's scary to think about how much of me is spread all over the internet, and I can't even remember where in order to protect myself.
  •  
    I think I fall into that category of people who care about privacy but then contradict themselves with their behavior. From the personal to more organizational, this report on cyber hackers was on NPR today. http://www.npr.org/2011/06/06/137000302/latest-hacks-could-set-the-stage-for-cyberwar
  •  
    Um, I can't think of a more bone-chilling phrase than "cyberwar."
  •  
    Steig Larsson made hacking look pretty cool. But it's interesting to think about how much is possible in the hacking world that we tend to forget about since our everyday use of technology has been so woven into our routines. Just saw this article and I found interesting to see the many sides of hacking: http://www.guardian.co.uk/technology/2011/jun/06/hackers-how-and-why-they-hack I always make fun of my dad for being a computer hypochondriac -- he always thinks that someone is hacking into his computer, so he has a million anti-virus and security programs (a combination which I think is actually destroying his computer). But it is a valid concern, though I think you have to just find a balance for your privacy since in extreme cases, your privacy can be a bit restricting.
Nadine Palfy

Data Privacy in Telecommunications - 0 views

  •  
    Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company Business need: A leading international telecommunications organization needed a cost effective means to protect the privacy of its customer data and comply with regulatory requirements. Solution: The customer's systems are managed by a well-known global systems integrator. After inquiring with Gartner and Forrester Research, the systems integrator evaluated multiple database auditing vendors (including Oracle) and chose the InfoSphere Guardium solution. InfoSphere Guardium's appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Benefits: InfoSphere Guardium provided a fine grained audit trail of all sensitive data access, along with automated reporting and compliance workflow, satisfying the needs of auditors. Real-time blocking and alerts ensured privacy policies were strictly enforced. .
Nadine Palfy

ATIS Privacy Policy - 0 views

  •  
    The Alliance for Telecommunications Industry Solutions, Inc. (ATIS) is committed to protecting privacy and security of the personal information of our web site visitors. By accessing an ATIS web site, visitors agree to the use of their information as stated in this Privacy Policy. This Privacy Policy describes the personal information we may collect and how it may be used.
Rebecca Martin

Women And Children First: Technology And Moral Panic - 0 views

  •  
    Post about Genevieve Bell, the director of Intel Corporation's Interaction and Experience Research, and her views on moral panic - especially when it comes to women and children - over new technology.
Rebecca Martin

PrivacyVille: Zynga's New Game Teaches Users How to Play Secure - 0 views

  •  
    Interesting way to educate users about privacy settings
1 - 6 of 6
Showing 20 items per page