Skip to main content

Home/ Tecnología y Sociedad/ Group items matching "WWW" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

thoughts on Pew's latest report: notable findings on race and privacy - 0 views

  •  
    Uso de adolescentes de las redes sociales, la cantidad de información que comparten y estudios al respecto
  •  
    Uso de adolescentes de las redes sociales, la cantidad de información que comparten y estudios al respecto
2More

GUÍA SOBRE LAS REDES SOCIALES - 0 views

  •  
    Concepto y tipos de redes sociales. Riesgos de las redes sociales, protección de la propia imagen, protección de los datos personales y recomendaciones a los usuarios
  •  
    Concepto y tipos de redes sociales. Riesgos de las redes sociales, protección de la propia imagen, protección de los datos personales y recomendaciones a los usuarios
2More

Ciberderechos del ciudadano - 0 views

  •  
    Actualmente, la privacidad y libertad de no ser vigilado no constituyen un derecho garantido en Internet.
  •  
    Actualmente, la privacidad y libertad de no ser vigilado no constituyen un derecho garantido en Internet.
1More

Software libre, sin uso - 0 views

  •  
    Breve información sobre el software libre en México
1More

Diferencias entre free software y open source - Miguel Angel Mata - 1 views

  •  
    Definiciones y diferencias entre free software y open source. Blog de Miguel Angel Mata abogado
1More

Privacy design in Online Social Networks: Learning from Privacy breaches and community - 0 views

  •  
    Abstract: The objective of this paper is to systematically develop privacy heuristics for Online Social Network Services (SNS). In order to achieve this, we provide an analytical framework in which we characterize privacy breaches that have occurred in SNS and distinguish different stakeholders' perspectives. Although SNS have been criticized for numerous grave privacy breaches, they have also proven to be an interesting space in which privacy design is implemented and critically taken up by users. Community involvement in the discovery of privacy breaches as well as in articulating privacy demands points to possibilities in user-driven privacy design. In our analysis we take a multilateral security analysis approach and identify conflicts in privacy interests and list points of intervention and negotiation. In our future research, we plan to validate the usefulness as well as the usability of these heuristics and to develop a framework for privacy design in SNS"
1More

Engineering Privacy by Design - 0 views

  •  
    Seda Gurses, Carmela Troncoso, and Claudia Diaz Abstract: The design and implementation of privacy requirements in systems is a dicult problem and requires the translation of complex social, legal and ethical concerns into systems requirements. The concept of \privacy by design" has been proposed to serve as a guideline on how to address these concerns. \Privacy by design" consists of a number of principles that can be applied from the onset of systems development to mitigate privacy concerns and achieve data protection compliance. However, these principles remain vague and leave many open questions about their application when engineering systems. In this paper we show how starting from data minimization is a necessary and foundational rst step to engineer systems in line with the principles of privacy by design. We rst discuss what data minimization can mean from a security engineering perspective. We then present a summary of two case studies in which privacy is achieved by minimizing dierent types of data, according to the purpose of each application. First, we present a privacy-preserving ePetition system, in which user's privacy is guaranteed by hiding their identity from the provider while revealing their votes. Secondly, we study a road tolling system, in which users have to be identi ed for billing reasons and data minimization is applied to protect further sensitive information (in this case location information). The case studies make evident that the application of data minimization does not necessarily imply anonymity, but may also be achieved by means of concealing information related to identi able individuals. In fact, di erent kinds of data minimization are possible, and each system requires careful crafting of data minimization best suited for its purpose. Most importantly, the two case studies underline that the interpretation of privacy by design principles requires speci c engineering expertise [...]
1More

"Ubiquitous social networks - opportunities and challenges for privacy-aware user model... - 0 views

  •  
    S ̈oren Preibusch / Bettina Hoser Seda G ̈urses Bettina Berendt Abstract: Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites, it has become more evident that the problem of privacy is not bounded by the perimeters of individuals but also by the privacy needs of their social networks. The objective of this paper is to contribute to the discussion about privacy in social network sites, a topic which we consider to be severely under-researched. We propose a framework for analyzing privacy requirements and for analyzing privacy-related data. We outline a combination of requirements analysis, conflict-resolution techniques, and a P3P extension that can contribute to privacy within such sites. Keywords: World Wide Web, Privacy, Social Network Analysis, Require- ments Analysis, Privacy Negotiation, Ubiquity, P3P"
1More

Manuel Castells - Encriptación - 0 views

  •  
    Esta es una lección inaugural del curso académico impartido por el Profesor Manuel Castells, acerca de la encriptación, tema que va ligado con la seguridad y la libertad de los usuarios de la red.
1More

The First Email, The First Tweet, And 13 Other Famous Internet Firsts - 0 views

  •  
    Un artículo muy interesante con una breve descripción y fechas de los "primeros" de muchas cosas interesantes que encontramos en el internet
1More

New 'Digital Divide' Seen in Wasting Time Online - 0 views

  •  
    In the 1990s, the term "digital divide" emerged to describe technology's haves and have-nots. It inspired many efforts to get the latest computing tools into the hands of all Americans, particularly low-income families. Those efforts have indeed shrunk the divide.
1More

La brecha digital (Buen articulo para overview del tema) - 0 views

  •  
    La brecha digital, un concepto social con cuatro dimensiones
1More

Today in history: The Internet is born - 0 views

  •  
    Un muy buen articulo del LA Times, que nos narra los aspectos más importantes del nacimiento del internet. Sirve mucho para complementar el análisis que nos presenta el texto de Castells.
1More

Historia Internet - ARPANET en sus inicios - 0 views

  •  
    Un poco de historia sobre el Internet. Muy completo.
1More

Internet Engineering Task Force (IETF) - 0 views

shared by azelox on 14 Sep 14 - No Cached
  •  
    The Internet Engineering Task Force (IETF). Esta es la página donde pueden ver todo lo relacionado con internet y tal vez aportar algo a la causa.
1More

Historia y evolución de Internet - 0 views

shared by odise0 on 14 Sep 14 - No Cached
  •  
    Nos muestra mas a fondo como el internet fue desarrollandose

Ley Federal - 0 views

started by fernandoloza on 13 Oct 14 no follow-up yet
1More

Ética en las redes sociales - 0 views

  •  
    "http://www.ces.edu.co/index.php/component/docman/doc_download/240-etices-volumen-2-no-4-etica-en-las-redes-sociales?Itemid=."
« First ‹ Previous 61 - 80 of 215 Next › Last »
Showing 20 items per page