Number of Posts: 28
Posts 1 - 10
Sick perverts ask schoolgirls to indecently expose themselves during lessons on live video app
Newspaper | Mirror
Date | 25.3.2016
Language | English
Country | UK
Topic Tags | childhood, pornography, privacy, school, smartphone, threat, video communication
Summary | Perverts have asked schoolgirls to expose themselves via live Periscope videos during lessons. While they were using the app, the girls received a lot of sexual comments. Periscope is an app that is also used by businesses and media organisations to stream events and conferences live. Viewers can then comment and ask questions live; those comments are displayed on screen and everyone can see them.
Image Description | Photograph of a student's hands holding a phone under a desk, photograph of an empty classroom,
Image Tags | cell phone, male(s), school
The Rise and Fall of Yik Yak, the Anonymous Messaging App
Newspaper | The New York Times
Date | 27.5.2017
Language | English
Country | U.S.
Topic Tags | childhood, cyberbullying, law, privacy, social media, threat, youth
Summary | The anonymous messaging app Yik Yak became very popular in colleges and schools because it lets people broadcast anonymously to other users near them. The activity on the app has however started to become thretening with college students and children bullying each other and people making bomb threats that have led to multiple evacuations. A feminist group from University of Mary Washington have filed complaint to the University to block Yik Yak on campus because it has been used to harrass and threaten members.
Image Description | An illustration with a face and a smartphone and an image of the creators of Yik Yak.
Image Tags | male(s), smartphone
He Tweeted About Chinese Government Corruption. Twitter Suspended His Account.
Newspaper | The New York Times
Date | 26.4.2017
Language | English
Country | U.S.
Topic Tags | censorship, law, privacy, Twitter
Summary | A Chinese billionaire has publically denuciated Chinese government officials on Twitter by posting images of documents that evidence corruption. His account was suspended by Twitter for a few hours because the shared documents contained personal information which Twitter usually flags.
Image Description | Portrait of Guo Wengui.
Image Tags | male(s)
Facebook lets streams of depravity flow freely
Newspaper | Washington Post
Date | 19.4.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, fake news, law, pornography, privacy, threat
Summary | Facebook is facing many criticisms about its poor enforcement of basic standards of content on the platform. Multiple violent live streams have been uploaded to Facebook in the past in it always took Facebook too long to take them down. Their algorithm to weed out pornography has backfired when they censored a historic photograph of a napalm victim from the Vietnam War because it registered as child pornography. After much denial, Facebook are finally taking steps against fake news spreading on their platform. All this may be called censorship but without moderation there can be no free speech because bullies dominate the discourse.
Image Description | N/A
Apple faces 11 other orders for suspects' electronic data
Newspaper | USA Today
Date | 24.2.2016
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat
Summary | After Apple had refused to cooperate with the FBI in unlocking a terrorist's iPhone for investigation, the FBI are requesting their assistance again in elevn other criminal cases. Apple had refused the initial request in order not to sell out their users' privacy and were supported by other major tech firms.
Image Description | Text document showing the criminal cases in question in a table.
Image Tags | chart, text
How can you protect your right to digital privacy at the border?
Newspaper | Washington Post
Date | 11.6.2017
Language | English
Country | U.S.
Topic Tags | law, privacy, smartphone, threat
Summary | American customs now ask some flight passengers to give airport officers access to their digital devices. While it is still a rare case, some passengers are asked to turn on their smartphone/tablet/laptop to demonstrate that it is not hooked up to an explosive. They also check whether illegal data is being transmitted over the border on the hardware storage. Passengers are advised to clean their storage and store all their personal files on a cloud.
Image Description | iStock image of a woman using a smartphone at an airport.
Image Tags | female(s), smartphone
How to Protect Your Privacy as More Apps Harvest Your Data
Newspaper | The New York Times
Date | 2.5.2017
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Many smartphone apps can be used for free, or rather one does not have to pay money to use it. However, if the app is not from a non-profit organization, users pay in some other way that may be obscure to them. Usually free for-profit apps collect data abou their users that they can sell to advertisers. The only way to protect oneself from this is to carefully read the terms and conditions, even if they are in legalese. If one does not like the level of privacy provided by an app, the only certain way to avoid data exploitation is not to download the app.
Image Description | Illustration of a hand holding a smartphone where eyes are hidden behind the app icons.
Image Tags | hand(s), smartphone
Listen up, coaches: Your players might be recording your every word -- to use against you
Newspaper | Los Angeles Times
Date | 28.4.2017
Language | English
Country | U.S.
Topic Tags | privacy, school, smartphone, threat, word/writing
Summary | A high school sports coach has recently been fired because he was secretly recorded while speaking to his team. The record alluded to physical violence - which he corrected in the recorded speech as a mere metaphor, not an actual recommendation - and inappropriate words. It is not entirely clear whether the student was allowed to record the conversation because a locker room speech is not technically in a classroom and was not explicitly classified as private. Coaches need to be aware that there is no privacy with smartphones everywhere.
Image Description | N/A
In the Apple Case, a Debate Over Data Hits Home
Newspaper | The New York Times
Date | 13.3.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, politics, privacy, research/study, smartphone, threat
Summary | Apple's refusal to aide the FBI with breaking into the phone of the San Bernardino attacker has unleashed a political debate among Americans. IT experts as well as lay people report that they have had discussions about the topic with other people, some say they have had fights over Facebook with family members about the issue. Polls show that the American people are hugely divided on the topic: 42% think Apple should cooperate with the FBI while 47% support Apple's stance to protect user privacy.
Image Description | Getty image of a protest crowd showing a man holding up his smartphone with the text: "Don't turn our phones into FBI drones".
Image Tags | female(s), male(s), smartphone, text
Justice Dept. calls Apple's encryption fight 'a diversion'
Newspaper | Washington Post
Date | 10.3.2016
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Ever since the FBI asked Apple to unlock a terrorist's iPhone, a huge debate around user privacy has ensued. Other tech companies side with Apple with the position that aiding the FBI at the expense of user privacy would open the gate for masses of future cases. The Justice Department however accuses Apple of purposefully making unbreachable smartphones, which may be good for user privacy (and thus for profit) but a huge problem for the police to be able to investigate criminal cases.
Image Description | Hand holding an iPhone.
Image Tags | hand(s), smartphone
Page 1 of 3
Back |
Next