Digital Discourse Database

Number of Posts: 10
Posts 1 - 10

Facebook Faces a New World as Officials Rein In a Wild Web

Hyperlink

Newspaper | The New York Times
Date | 17.9.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, marketing, privacy, social media, threat
Summary | Facebook’s head of global policy management recently agreed to remove anything that violates the Vietnamese law from the social network. Governments around the world (even in the US) are increasingly trying to keep control of what's happening online. As a result, governments and big tech companies such as Google, Apple, Facebook or Amazon don't always agree with each other. On the one hand, big tech companies want to have more control and power, and on the other hand, nations want to gain more control over people's online behvior. Facebook's desire to expand everywhere (e.g. in China) is one of the reasons for today's struggle between tech companies and nations. Facebook also faced some issues in Europe and Africa.
Image Description | Photograph of people using computers in a computer room, map of Facebook's users, two women laughing in front of a board displaying social media icons, Mark Zuckerberg and other people running in China, Mark Zuckerberg, his wife and daughters, glass building, people in front of a thumb-up sign, woman, crowd (some of them are using their phones), and people on their computers.
Image Tags | computer/laptop, Facebook, female(s), male(s), smartphone, social media

The Rise and Fall of Yik Yak, the Anonymous Messaging App

Hyperlink

Newspaper | The New York Times
Date | 27.5.2017
Language | English
Country | U.S.
Topic Tags | childhood, cyberbullying, law, privacy, social media, threat, youth
Summary | The anonymous messaging app Yik Yak became very popular in colleges and schools because it lets people broadcast anonymously to other users near them. The activity on the app has however started to become thretening with college students and children bullying each other and people making bomb threats that have led to multiple evacuations. A feminist group from University of Mary Washington have filed complaint to the University to block Yik Yak on campus because it has been used to harrass and threaten members.
Image Description | An illustration with a face and a smartphone and an image of the creators of Yik Yak.
Image Tags | male(s), smartphone

How to Protect Your Privacy as More Apps Harvest Your Data

Hyperlink

Newspaper | The New York Times
Date | 2.5.2017
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Many smartphone apps can be used for free, or rather one does not have to pay money to use it. However, if the app is not from a non-profit organization, users pay in some other way that may be obscure to them. Usually free for-profit apps collect data abou their users that they can sell to advertisers. The only way to protect oneself from this is to carefully read the terms and conditions, even if they are in legalese. If one does not like the level of privacy provided by an app, the only certain way to avoid data exploitation is not to download the app.
Image Description | Illustration of a hand holding a smartphone where eyes are hidden behind the app icons.
Image Tags | hand(s), smartphone

In the Apple Case, a Debate Over Data Hits Home

Hyperlink

Newspaper | The New York Times
Date | 13.3.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, politics, privacy, research/study, smartphone, threat
Summary | Apple's refusal to aide the FBI with breaking into the phone of the San Bernardino attacker has unleashed a political debate among Americans. IT experts as well as lay people report that they have had discussions about the topic with other people, some say they have had fights over Facebook with family members about the issue. Polls show that the American people are hugely divided on the topic: 42% think Apple should cooperate with the FBI while 47% support Apple's stance to protect user privacy.
Image Description | Getty image of a protest crowd showing a man holding up his smartphone with the text: "Don't turn our phones into FBI drones".
Image Tags | female(s), male(s), smartphone, text

Free Tools to Keep Those Creepy Online Ads From Watching You

Hyperlink

Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)

Obama Shifting Online Strategy on ISIS

Hyperlink

Newspaper | The New York Times
Date | 8.1.2016
Language | English
Country | U.S.
Topic Tags | censorship, law, politics, privacy, threat
Summary | President Obama wants to use surveillance techniques of new media to find IS terrorists. Tech companies, however, increasingly offer their users encrypted messaging services and refuse to hand over the keys to the government. Companies are protecting their users' privacy but also giving terrorists safe channels of communication.
Image Description | Portrait of Apple’s chief executive.
Image Tags | male(s)

China Disrupts WhatsApp Service in Online Clampdown

Hyperlink

Newspaper | The New York Times
Date | 18.7.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, Google, Instagram, privacy, threat, Twitter, WhatsApp
Summary | The Chinese government has partly shut down the use of WhatsApp within their borders. The app is widely used around the globe and was used by some in China do communicate with people outside of Chine with end-to-end encryption. Other popular social media platforms and internet sites like Google, Twitter, Facebook, and Instagram are blocked under the "Great Firewall" in China.
Image Description | Woman using a smartphone and women standing in front of Facebook and Instagram logos as well as emojis.
Image Tags | emojis, Facebook, female(s), Instagram, logo, smartphone

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency

Hyperlink

Newspaper | The New York Times
Date | 6.7.2017
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat, WhatsApp
Summary | The powerful elites are using the end-to-end-encrypted WhatsApp to communicate sensitive information. Such strategies are adopted by politicians, high-profile representatives of major companies, and Wallstreet banker. The latter are lawfully obligated to save all communications for possible inspection but WhatsApp enables them to escape that law.
Image Description | Image of a man talking on the phone and another man reading some paperwork.
Image Tags | male(s), smartphone

WhatsApp Introduces End-to-End Encryption

Hyperlink

Newspaper | The New York Times
Date | 5.4.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, privacy, threat, WhatsApp
Summary | Facebook has introduced end-to-end encryption for all WhatsApp communication including one-on-one and group chats and multimedia data sent in chats. This is a step to protect user privacy because breaches have happened in the past. The federal government however opposes this step because it denies the police access to communications which may be crucial to crack criminal cases.
Image Description | WhatsApp and Facebook logos.
Image Tags | Facebook, logo, WhatsApp

Should You Spy on Your Kids?

Hyperlink

Newspaper | The New York Times
Date | 9.11.2016
Language | English
Country | U.S.
Topic Tags | childhood, privacy, research/study, threat
Summary | Many parents now monitor their children's online and social media activity, regulate their internet access (or even texting abilities) through the night and school hours using sophisticated technology, a few even observe the movements of their children or partners by tracking their devices. While tracking each other's devices in a relationship can be useful to avoid texting while driving, such technology can also be exploited and result in an emotionally abusive relationship. This is especially risky when the monitoring is not mutual like when parents 'stalk' their children, danah boys says. It is impossible for children to learn media competency when they are constantly under surveillance, they become less reluctant to share social media passwords with their peers and can otherwise remain naïve when it comes to online safety because they have been shielded from everything growing up.
Image Description | A series of minimalistic illustrations of a woman with a smartphone leaving a trail (dotted line).
Image Tags | female(s), smartphone

Page 1 of 1