Skip to main content

Home/ Tecnología y Sociedad/ Group items tagged Privacidad

Rss Feed Group items tagged

alex_martinez

A Cyber Age Privacy Doctrine - 0 views

  •  
    Artículo interesante visto desde un punto de vista de un abogado, hablando sobre los derechos virtuales a los que todo ser humano tiene acceso a en esta nueva era tecnológica, con explicaciones y comparaciones con las leyes de privacidad para actividades en el mundo físico.
gabriela ortizmichel

Dragnet Nation: What do data brokers know about me? - 0 views

  •  
    Interesante ejercicio de la periodista sobre su privacidad en la red
Carlos Hernandez

Online Privacy: Using the Internet Safely - 0 views

  •  
    When you are online, you provide information about yourself almost every step of the way. Often this information is like a puzzle with pieces that need to be connected before the full picture is revealed. Information you provide to one person or company may be combined with information you have provided to another person or company to complete the puzzle.
olivebeto56

Explanation of the law SOPA - 0 views

  •  
    Explica con un video de forma interactiva la ley SOPA
David Velasco

NSA top lawyer says tech giants knew about data collection | Security & Privacy - CNET ... - 0 views

  •  
    La noticia habla como la información que las compañías decían estaban siendo guardadas y no divulgadas sin nuestro conocimiento, realmente lo estaban haciendo.
David Velasco

Despite assault on privacy, Page sees value in online openness | Security & Privacy - C... - 0 views

  •  
    Esta noticia va diciendo como el CEO de Google (Page) está en acuerdo de publicar toda información médica de los usuarios, con propósitos de investigación médica. Aunque nada asegura que ese sea realmente su finalidad.
Pablo Fraustro

políticas de privacidad en facebook - 1 views

  •  
    Aquí viene definido como facebook captura tu información, que información agarra directamente de ti y cual la va consiguiendo con tu movimiento. Al igual de como la utiliza y con que medios.
  •  
    Algo importante para todos los usuarios de Facebook : "So we can show you content that you may find interesting, we may use all of the information we receive about you to serve ads that are more relevant to you." ( en la parte de advertising )
Pablo Fraustro

Privacidad en internet - 0 views

  •  
    Define a fondo los derechos que uno cuenta en internet, habla sobre Big Data al igual de cómo usan las compañías para recolectar nuestra información.
Pablo Fraustro

Personally identifiable information / wikipedia - 0 views

  •  
    Nos define que son los PII y las leyes de privacidad donde son involucrados en distintas zonas del mundo.
Pablo Fraustro

Privacidad en Youtube - 0 views

  •  
    Aquí viene definido como Youtube captura tu información, que información agarra directamente de tí y cual la va consiguiendo con tu movimiento. Al igual de como la utiliza y con que medios.
Pablo Fraustro

Privacidad en 9gag - 0 views

  •  
    Aquí viene definido como 9gag captura tu información, que información agarra directamente de tí y cual la va consiguiendo con tu movimiento. Al igual de como la utiliza y con que medios.
gabriela ortizmichel

How to manage your online reputation / Sarah Perez - 0 views

  •  
    How to manage your online reputation / Sarah Perez Herramientas tecnológicas para el monitoreo de la reputación en línea. Como el texto es del 2008, algunas herramientas pudieran ya no estar funcionando, pero siempre se pueden buscar equivalentes.
gabriela ortizmichel

Online Reputation Management Guide / outspoken media - 0 views

  •  
    "The Online Reputation Management Guide". Una guía muy completa y sencilla para la gestión de la reputación, con tips, ideas, recursos. Es la que más me gusta.
gabriela ortizmichel

Online reputation management / wikipedia - 0 views

  •  
    Online reputation management / wikipedia Entrada de la wikipedia sobre el monitoreo de la reputación en línea, simplemente con los básicos.
Tania Gomez

Google Announces Plan to Post Names and Photos of Users for Advertising Without Consent... - 0 views

shared by Tania Gomez on 13 Oct 13 - Cached
  •  
    Google announced changes to its Terms of Service that will allow "your Profile name, Profile photo, and actions you take on Google or on third-party applications" to be used in advertisements.
  •  
    Google announced changes to its Terms of Service that will allow "your Profile name, Profile photo, and actions you take on Google or on third-party applications" to be used in advertisements.
gabriela ortizmichel

Privacy design in Online Social Networks: Learning from Privacy breaches and community - 0 views

  •  
    Abstract: The objective of this paper is to systematically develop privacy heuristics for Online Social Network Services (SNS). In order to achieve this, we provide an analytical framework in which we characterize privacy breaches that have occurred in SNS and distinguish different stakeholders' perspectives. Although SNS have been criticized for numerous grave privacy breaches, they have also proven to be an interesting space in which privacy design is implemented and critically taken up by users. Community involvement in the discovery of privacy breaches as well as in articulating privacy demands points to possibilities in user-driven privacy design. In our analysis we take a multilateral security analysis approach and identify conflicts in privacy interests and list points of intervention and negotiation. In our future research, we plan to validate the usefulness as well as the usability of these heuristics and to develop a framework for privacy design in SNS"
gabriela ortizmichel

Engineering Privacy by Design - 0 views

  •  
    Seda Gurses, Carmela Troncoso, and Claudia Diaz Abstract: The design and implementation of privacy requirements in systems is a dicult problem and requires the translation of complex social, legal and ethical concerns into systems requirements. The concept of \privacy by design" has been proposed to serve as a guideline on how to address these concerns. \Privacy by design" consists of a number of principles that can be applied from the onset of systems development to mitigate privacy concerns and achieve data protection compliance. However, these principles remain vague and leave many open questions about their application when engineering systems. In this paper we show how starting from data minimization is a necessary and foundational rst step to engineer systems in line with the principles of privacy by design. We rst discuss what data minimization can mean from a security engineering perspective. We then present a summary of two case studies in which privacy is achieved by minimizing dierent types of data, according to the purpose of each application. First, we present a privacy-preserving ePetition system, in which user's privacy is guaranteed by hiding their identity from the provider while revealing their votes. Secondly, we study a road tolling system, in which users have to be identi ed for billing reasons and data minimization is applied to protect further sensitive information (in this case location information). The case studies make evident that the application of data minimization does not necessarily imply anonymity, but may also be achieved by means of concealing information related to identi able individuals. In fact, di erent kinds of data minimization are possible, and each system requires careful crafting of data minimization best suited for its purpose. Most importantly, the two case studies underline that the interpretation of privacy by design principles requires speci c engineering expertise [...]
‹ Previous 21 - 40 of 62 Next › Last »
Showing 20 items per page