Skip to main content

Home/ VITTAlearning/ Group items tagged privacy

Rss Feed Group items tagged

John Pearce

Edudemic » The Ultimate Guide To Online Privacy - 0 views

  •  
    "If you've ever visited a website that handles even the smallest bit of your personal information, there's a good chance (hopefully) that it's asked you to read through a privacy policy or two. Rather than pour over the details, many of us simply click on 'I AGREE!' and proceed with using the application. Even the companies and websites involved understand this and make it as easy as possible to satisfy lawyers as well as users. What's the harm in essentially ignoring that privacy policy? While the majority of the time it's harmless, there are some ne'er-do-wells that may gather your personal information and sell it to marketers, advertisers, or spammers. While terrible, it's not unheard of."
Roland Gesthuizen

Facebook Photos Can Be Exposed Even If Profile Set To Private - 1 views

  •  
    The wife of an Australian security expert has been targeted by another security expert in a Facebook privacy vulnerability test demonstrated at a security conference in Queensland. The privacy vulnerability, which can affect all Facebook users if a hacker has enough time, allows for privacy-protected photos to be accessed without being the user's "friend".
Roland Gesthuizen

Facebook facial recognition technology sparks renewed privacy concerns - 0 views

  • photo-tagging suggestions are only made when new photos are added to Facebook, that only friends are suggested and that users can disable the feature in their privacy settings
  • "Tag Suggestions" feature uses facial recognition technology to speed up the process of labeling friends and acquaintances that appear in photos posted on Facebook
  •  
    "Facebook has quietly expanded the availability of technology to automatically identify people in photos, renewing concerns about the privacy practices of the world's top social networking service."
Roland Gesthuizen

Offshore cloud privacy may be "impossible," says commissioner | Delimiter - 1 views

  • cloud computing was being used “increasingly” by Victorian agencies, in order to reduce capital and operational costs.
  • Given that many cloud computing service providers are in jurisdictions which do not have similar privacy or data protection laws, if a security breach occurs, an individual in Victoria will be powerless to take action against the cloud service provider and will only be able to complain to the Victorian government organisation
  • large organisations need to look in a more granular fashion at what sort of data they are interested in storing in the cloud — arguing that some data could be harmlessly stored offshore — compared with sensitive data
  •  
    "Victoria's privacy commissioner has issued a stark warning to government agencies about the use of cloud computing, warning that it may be "impossible" to protect personal information held about Australians when it was located offshore - or even just outside Victoria."
John Pearce

End of Privacy - Special Coverage on CNN.com - 0 views

  •  
    "As people share more information about themselves online, the internet, in effect, has created a public transcript of consciousness -- storing our thoughts, locations, social lives and memories in data warehouses all over the world. This has enabled technological advances and shaped our social interactions. It's also really freaked some people out. "
John Pearce

WackWall - Social Network Builder | Create a Social Network Free - 1 views

  •  
    "WackWall is a free tool for creating custom social networks with easy setup and complete feature set. " It has # Photo, Video sharing; # Blogs, forums, friends; # Comment, tag, rate any kind of content; # Privacy and profile customization; # Groups; # Events, wiki; (coming soon) # Collaboration, file sharing, video-conference tools; (coming soon) # ... and much much more!
Roland Gesthuizen

What is Traitorware? | Electronic Frontier Foundation - 1 views

  • Traitorware is sometimes included in products with less obviously malicious intent.
  • Don’t let these good intentions fool you—software that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest.
  • traitorware: devices that act behind your back to betray your privacy.
  •  
    "Traitorware is not some science-fiction vision of the future. It is the present. .. We believe that your software and devices should not be a tool for gathering your personal data without your explicit consent. "
  •  
    Interesting IT issue related to the gathering and use of personal data.
Roland Gesthuizen

'Dating' Site Imports 250,000 Facebook Profiles, Without Permission | Epicent... - 0 views

  • “Facebook, an endlessly cool place for so many people, becomes at the same time a goldmine for identity theft and dating — unfortunately, without the user’s control. But that’s the very nature of Facebook and social media in general. If we start to play with the concepts of identity theft and dating, we should be able to unveil how fragile a virtual identity given to a proprietary platform can be.”
  • Mark Zuckerberg, the company’s founder, made his name at Harvard in 2003 by scraping the names and photos of fellow classmates off school servers to feed a system called FaceMash. With the photos, Zuckerberg created a controversial system that pitted one co-ed against another, by allowing others to vote on which one was better looking.
  •  
    "How does a unknown dating site, with the absurd intention of destroying Facebook, launch with 250,000 member profiles on the first day? Simple. .. an approach taken by two provocateurs who launched LovelyFaces.com this week, with profiles - names, locations and photos - scraped from publicly accessible Facebook pages."
  •  
    Is scraping data off Facebook art or does this raise privacy issues? Interesting.
Roland Gesthuizen

Welcome to Prineville, Oregon: Population, 800 Million | Wired Enterprise | Wired.com - 0 views

  •  
    Web giants like Google and Amazon are notoriously secretive about what goes on inside the worldwide network of data centers that serve up their sweeping collection of web services. They call it a security measure, but clearly, they also see these facilities as some sort of competitive advantage their online rivals mustn't lay eyes on.
Roland Gesthuizen

So you still think the internet is free... - 1 views

  •  
    An interesting data visualisation example about freedom and online censorship
  •  
    Can be used with ITA. Suggested to the ITA list by Claudia Graham.
Roland Gesthuizen

Me on the Web : Google Dashboard - Accounts Help - 1 views

  •  
    The Me on the Web section in your Google Dashboard can help you understand and manage what people see when they search for you on Google.
1 - 13 of 13
Showing 20 items per page