Privacy design in Online Social Networks: Learning from Privacy breaches and community - 0 views
-
Abstract: The objective of this paper is to systematically develop privacy heuristics for Online Social Network Services (SNS). In order to achieve this, we provide an analytical framework in which we characterize privacy breaches that have occurred in SNS and distinguish different stakeholders' perspectives. Although SNS have been criticized for numerous grave privacy breaches, they have also proven to be an interesting space in which privacy design is implemented and critically taken up by users. Community involvement in the discovery of privacy breaches as well as in articulating privacy demands points to possibilities in user-driven privacy design. In our analysis we take a multilateral security analysis approach and identify conflicts in privacy interests and list points of intervention and negotiation. In our future research, we plan to validate the usefulness as well as the usability of these heuristics and to develop a framework for privacy design in SNS"
Engineering Privacy by Design - 0 views
-
Seda Gurses, Carmela Troncoso, and Claudia Diaz Abstract: The design and implementation of privacy requirements in systems is a dicult problem and requires the translation of complex social, legal and ethical concerns into systems requirements. The concept of \privacy by design" has been proposed to serve as a guideline on how to address these concerns. \Privacy by design" consists of a number of principles that can be applied from the onset of systems development to mitigate privacy concerns and achieve data protection compliance. However, these principles remain vague and leave many open questions about their application when engineering systems. In this paper we show how starting from data minimization is a necessary and foundational rst step to engineer systems in line with the principles of privacy by design. We rst discuss what data minimization can mean from a security engineering perspective. We then present a summary of two case studies in which privacy is achieved by minimizing dierent types of data, according to the purpose of each application. First, we present a privacy-preserving ePetition system, in which user's privacy is guaranteed by hiding their identity from the provider while revealing their votes. Secondly, we study a road tolling system, in which users have to be identied for billing reasons and data minimization is applied to protect further sensitive information (in this case location information). The case studies make evident that the application of data minimization does not necessarily imply anonymity, but may also be achieved by means of concealing information related to identiable individuals. In fact, dierent kinds of data minimization are possible, and each system requires careful crafting of data minimization best suited for its purpose. Most importantly, the two case studies underline that the interpretation of privacy by design principles requires specic engineering expertise [...]
"Ubiquitous social networks - opportunities and challenges for privacy-aware user model... - 0 views
-
S ̈oren Preibusch / Bettina Hoser Seda G ̈urses Bettina Berendt Abstract: Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites, it has become more evident that the problem of privacy is not bounded by the perimeters of individuals but also by the privacy needs of their social networks. The objective of this paper is to contribute to the discussion about privacy in social network sites, a topic which we consider to be severely under-researched. We propose a framework for analyzing privacy requirements and for analyzing privacy-related data. We outline a combination of requirements analysis, conflict-resolution techniques, and a P3P extension that can contribute to privacy within such sites. Keywords: World Wide Web, Privacy, Social Network Analysis, Require- ments Analysis, Privacy Negotiation, Ubiquity, P3P"
La Internet - Discovery Channel - 0 views
How to manage your online reputation / Sarah Perez - 0 views
Online reputation management / wikipedia - 0 views
Artículo: Social Network Sites / boyd y Ellison - 0 views
-
Artículo: Social Network Sites / boyd y Ellison Artículo "Social Network Sites: Definition, History, and Scholarship" de boyd y Ellison. Un documento que marcó la definición de "sitio de red social" más popular en el campo de la investigación. Provee también una historia del desarrollo de sitios de red social a la fecha. danna boyd (así en minúsculas) es famosa por sus estudios en torno a los jóvenes y los sitios de red social, en muchas de sus dimensiones. Tiene amplias publicaciones y también puede seguírsele, por ejemplo, en su blog.
Sitios/servicios de red social (Social Networking Sites/Services) / wikipedia - 0 views
Red social (Social Network) / wikipedia - 0 views
Libro: The Virtual Community / Rheingold - 0 views
-
Libro: The Virtual Community / Rheingold Versión electrónica del libro "The Virtual Community" de Rheingold. Un libro que fue pionero en su época por introducir el concepto de "comunidad virtual". Rheingold ha seguido produciendo documentos de vanguardia. A los interesados en el mundo de lo virtual y del enredarse puede interesare seguirlo (está en google+ y otros sitios de red social)
El Universal - Computación - Instan a cerrar brecha tecnológica en el país - 0 views
Security In A Box | Tools and tactics for your digital security - 0 views
-
Bienvenido a la Caja de Herramientas de Seguridad La Caja de Herramientas de Seguridad es un esfuerzo colaborativo entre Tactical Technology Collective y Front Line. Fue creado para satisfacer las necesidades de seguridad digital y de privacidad de activistas y defensores de derechos humanos. La Caja de Herramientas de Seguridad incluye una Guía Paso a Paso, la cual se ocupa de varios temas de seguridad digital. También proporciona una colección de Guías Prácticas, cada una de las cuales incluye una herramienta específica de software gratuito o de código abierto, así como las instrucciones necesarias sobre cómo utilizar dicha herramienta para asegurar tu computadora, proteger tu información o mantener la privacidad de tus comunicaciones por Internet.
Video - Derrick de Kerckhove at TEDx Transmedia 2012 - 'Digital Mindshifting' - 0 views
-
"Derrick de Kerckhove is a controversial and exciting thinker. As an expert on the future of technology, culture and the mass media, de Kerckhove's interpretation of the new electronic reality has a reputation for creating opportunities for change within corporate and personal environments. He worked with Marshall McLuhan for more than ten years as translator, assistant and co-author and is widely hailed as the heir to McLuhan's intellectual legacy. At TEDx Transmedia he talked about 'digital mindshifting' and its consequences."
Derrick De Kerckhove. U Toronto - 0 views
Martin Carnoy. Standford - 0 views
Our own devices. Does technology drive history? / Jill Lepore (2008) - 1 views
-
Artículo periodístico "Our own devices. Does technology drive history?" de Jill Lepore en The New Yorker, mayo 12, 2008. 8pp Partiendo de la reseña de un libro sobre el poder -en la historia y en lo que hoy somos- de la venta de fuentes energéticas (vapor, electricidad), y luego de otros libros de tónica similar Jill Lepore aborda en este artículo un tema importante: el determinismo tecnológico. Ella encuentra repetidamente textos y citas del tipo "we have become what hour technolgies made us", en donde la visión es que las personas y la sociedad, están determinadas por la tecnología. En las dos últimas páginas (que será clave leer) aborda lo reductiva que es esta visión, y nos recuerda que el rol de la historia, en donde "algo" no fue en un inicio lo que es ahora, que todo se va co-construyendo a lo largo del tiempo, a partir de un tejido de significados que se van otorgando por las necesidades concretas de los sujetos-sociedad y que no pueden preverse. El texto es interesante porque en sus reseñas de libros aborda muchas historias tecnológicas. Pero fundamentalmente se recomienda por su reflexión en torno a la relación entre tecnología y sociedad (¿alguna determina a la otra?) vista desde la comprensión de la historia y sus procesos de significación. Esta discusión es central para nuestro curso.
« First
‹ Previous
181 - 200 of 212
Next ›
Showing 20▼ items per page