Number of Posts: 9
Posts 1 - 9
For this company, online surveillance leads to profit in Washington’s suburbs
Newspaper | Washington Post
Date | 10.9.2017
Language | English
Country | U.S.
Topic Tags | emojis, privacy, social media, threat
Summary | Babel Street is a startup that uses online surveillance; they try to get private information from online platforms in order to catch cybercriminals. For instance, police departments might use the service provided by the company in their investigations and scan posts online. Experts try to track dangerous criminals while analyzing posts in more than 200 languages, including the emoji language. Emoji has actually been a challenge for analysts. Another challenge the company faces is to make sure sure it doesn't violate people's privacy.
Image Description | Photograph of a man standing in a news room in front of several TVs, and two other people.
Image Tags | female(s), male(s)
Facebook Faces a New World as Officials Rein In a Wild Web
Newspaper | The New York Times
Date | 17.9.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, marketing, privacy, social media, threat
Summary | Facebook’s head of global policy management recently agreed to remove anything that violates the Vietnamese law from the social network. Governments around the world (even in the US) are increasingly trying to keep control of what's happening online. As a result, governments and big tech companies such as Google, Apple, Facebook or Amazon don't always agree with each other. On the one hand, big tech companies want to have more control and power, and on the other hand, nations want to gain more control over people's online behvior. Facebook's desire to expand everywhere (e.g. in China) is one of the reasons for today's struggle between tech companies and nations. Facebook also faced some issues in Europe and Africa.
Image Description | Photograph of people using computers in a computer room, map of Facebook's users, two women laughing in front of a board displaying social media icons, Mark Zuckerberg and other people running in China, Mark Zuckerberg, his wife and daughters, glass building, people in front of a thumb-up sign, woman, crowd (some of them are using their phones), and people on their computers.
Image Tags | computer/laptop, Facebook, female(s), male(s), smartphone, social media
The Rise and Fall of Yik Yak, the Anonymous Messaging App
Newspaper | The New York Times
Date | 27.5.2017
Language | English
Country | U.S.
Topic Tags | childhood, cyberbullying, law, privacy, social media, threat, youth
Summary | The anonymous messaging app Yik Yak became very popular in colleges and schools because it lets people broadcast anonymously to other users near them. The activity on the app has however started to become thretening with college students and children bullying each other and people making bomb threats that have led to multiple evacuations. A feminist group from University of Mary Washington have filed complaint to the University to block Yik Yak on campus because it has been used to harrass and threaten members.
Image Description | An illustration with a face and a smartphone and an image of the creators of Yik Yak.
Image Tags | male(s), smartphone
The 'empowered consumer' doesn't get much say
Newspaper | Washington Post
Date | 16.4.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, social media, threat
Summary | The perceived multiplication of choices in consumer culture, for example when buying a plane ticket (optional luggage fees, insurance fees, prioritized boarding fees, etc.), just looks like an advantage for the consumer on the surface. In the end, we end up paying more and giving away our data. The data will in turn be used to milk consumers even further by knowing to which advertisements they are particularly susceptible.
Image Description | Airport check-in area.
Image Tags | female(s), male(s)
Practice safe Internet on the road
Newspaper | USA Today
Date | 31.7.2017
Language | English
Country | U.S.
Topic Tags | email, privacy, smartphone, social media, threat
Summary | Traveling can be dangerous, especiallyin the digital age. Many travelers make themselves vulnerable to criminals by sharing their location on social media or by connecting to a password-free wifi which is often provided by scammers to hack into email accounts. In these cases virtual kidnapping becomes possible when travelers spend a few days somewhere off the grid and a local group claims to have kidnapped the traveler and blackmails their family for ransom.
Image Description | Getty image of a woman sitting in a train.
Image Tags | female(s)
An App for Our Inner Cheapskate
Newspaper | The New York Times
Date | 23.7.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, social media
Summary | The app Venmo is a payment service app that allows money transfers between people who have their bank accounts connected to their phone. Margaret Pennoyer is an elementary school teacher who had to pay the organizers of a bachelorette party $31.98 and $20.62. The fact that the amount was calculated to the penny surprised Pennoyer. She said that this app ''changes friendships and makes them more transactional''. The app also promotes the "everyone for themselves" idea. People seem to be less generous now; everyone has to pay exactly to the cent. Venmo is also like any other social networks; you can see what other people's transactions are. For instance, Margaret Pennoyer saw through the app that her cousins socialized recently and didn't invite her.
Image Description | N/A
The Latest Celebrity Diet? Cyberbullying
Newspaper | The New York Times
Date | 12.10.2016
Language | English
Country | U.S.
Topic Tags | cyberbullying, privacy, social media
Summary | Celebrities are using social media to discuss personal issues with their friends/lovers/family. They behave like online harassers since they use social media to publicly humiliate other people they know. Some of celebrities' cyberbullying characteristics are: secret recordings, sexual humilitation, revenge porn, and mob deployment.
Image Description | Photograph of Justin Bieber and Selena Gomez, and screenshot of one of Kim Kardashian's tweets.
Image Tags | female(s), male(s), Twitter
Creepy start-up asks would-be renters for the keys to their data
Newspaper | Washington Post
Date | 10.6.2016
Language | English
Country | U.S.
Topic Tags | law, privacy, social media, threat
Summary | A British start-up company wants to offer a service called "Tenant Assured" where landlords can check applicants' social media background. The individual's social media posts as well as private messages are analyzed and turned into a statistic of how much financial stress that person has based on their mentions of spending, loans, and pregnancies. This could be the future of all hiring processes, they say, because people are willing to give up their privacy for a service they want.
Image Description | N/A
None of Us Are Safe From Getting ‘Owned’
Newspaper | The New York Times
Date | 28.3.2017
Language | English
Country | U.S.
Topic Tags | privacy, social media, Twitter, word/writing
Summary | Much communication on social media and especially Twitter revolves around criticizing. One frequently used term is 'owning' - one can 'own' a hater or troll when exposing some compromising information about them or something that they did not realize. The word hails from hacker culture of the early internet days when 'owning' meant to hack into someone else's virtual space and snoop around.
Image Description | Illustration of a lock made out of an ethernet cable.
Page 1 of 1