Number of Posts: 16
Posts 1 - 10
Taking Baby Steps Toward Software That Reasons Like Humans
Newspaper | The New York Times
Date | 6.3.2016
Language | English
Country | U.S.
Topic Tags | artificial intelligence, brain, research/study
Summary | Computers are being programmed to mimick thought processes of the human brain. This technology is called "deep neuronal net". It enables softwares to interpret the content of images like for instance whether the tennis player in the image is wearing a hat. Many research teams are workin on this technology world-wide and it will likely be used for computerized customer support in the future.
Image Description | Portrait of a "deep neuronal net" researcher.
Image Tags | male(s)
Apple faces 11 other orders for suspects' electronic data
Newspaper | USA Today
Date | 24.2.2016
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat
Summary | After Apple had refused to cooperate with the FBI in unlocking a terrorist's iPhone for investigation, the FBI are requesting their assistance again in elevn other criminal cases. Apple had refused the initial request in order not to sell out their users' privacy and were supported by other major tech firms.
Image Description | Text document showing the criminal cases in question in a table.
Image Tags | chart, text
In the Apple Case, a Debate Over Data Hits Home
Newspaper | The New York Times
Date | 13.3.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, politics, privacy, research/study, smartphone, threat
Summary | Apple's refusal to aide the FBI with breaking into the phone of the San Bernardino attacker has unleashed a political debate among Americans. IT experts as well as lay people report that they have had discussions about the topic with other people, some say they have had fights over Facebook with family members about the issue. Polls show that the American people are hugely divided on the topic: 42% think Apple should cooperate with the FBI while 47% support Apple's stance to protect user privacy.
Image Description | Getty image of a protest crowd showing a man holding up his smartphone with the text: "Don't turn our phones into FBI drones".
Image Tags | female(s), male(s), smartphone, text
Justice Dept. calls Apple's encryption fight 'a diversion'
Newspaper | Washington Post
Date | 10.3.2016
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Ever since the FBI asked Apple to unlock a terrorist's iPhone, a huge debate around user privacy has ensued. Other tech companies side with Apple with the position that aiding the FBI at the expense of user privacy would open the gate for masses of future cases. The Justice Department however accuses Apple of purposefully making unbreachable smartphones, which may be good for user privacy (and thus for profit) but a huge problem for the police to be able to investigate criminal cases.
Image Description | Hand holding an iPhone.
Image Tags | hand(s), smartphone
Tech industry slowly rallies behind Apple in iPhone fight
Newspaper | USA Today
Date | 19.2.2016
Language | English
Country | U.S.
Topic Tags | Facebook, Google, law, privacy, smartphone, threat
Summary | The FBI had issues a court order to Apple to hack into the iPhone of one of the San Bernardino terrorists. When Apple declined, other tech magnates like Google and Facebook sided with them saying that tech companies cannot be ordered to compromise their customers' privacy by the governement. Allowing this to happen now would set a problematic precedent for the future.
Image Description | Portrait of Mark Zuckerberg.
Image Tags | Facebook, male(s)
Free Tools to Keep Those Creepy Online Ads From Watching You
Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)
Obama Shifting Online Strategy on ISIS
Newspaper | The New York Times
Date | 8.1.2016
Language | English
Country | U.S.
Topic Tags | censorship, law, politics, privacy, threat
Summary | President Obama wants to use surveillance techniques of new media to find IS terrorists. Tech companies, however, increasingly offer their users encrypted messaging services and refuse to hand over the keys to the government. Companies are protecting their users' privacy but also giving terrorists safe channels of communication.
Image Description | Portrait of Apple’s chief executive.
Image Tags | male(s)
WhatsApp Introduces End-to-End Encryption
Newspaper | The New York Times
Date | 5.4.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, privacy, threat, WhatsApp
Summary | Facebook has introduced end-to-end encryption for all WhatsApp communication including one-on-one and group chats and multimedia data sent in chats. This is a step to protect user privacy because breaches have happened in the past. The federal government however opposes this step because it denies the police access to communications which may be crucial to crack criminal cases.
Image Description | WhatsApp and Facebook logos.
Image Tags | Facebook, logo, WhatsApp
Texts Live On, but That's Often Forgotten in Politics
Newspaper | The New York Times
Date | 12.8.2016
Language | English
Country | U.S.
Topic Tags | email, politics, privacy, texting
Summary | Politicians seem to forget an important rule: do not write a text message that could bring serious consequences if it appeared on the front page of a newspaper. In the George Washington Bridge scandal, it was said that Christina Genovese Renna (one of Chris Christie's aides) had texted a colleague that if his boss's emails were found, they would reveal that he was plotting to block traffic to the bridge. If you are a public servant, you should know that you can't send any confidential text messages. Text messages are often perceived as a "thoughtless" form of communication, which can have serious consequences.
Image Description | N/A
The Latest Celebrity Diet? Cyberbullying
Newspaper | The New York Times
Date | 12.10.2016
Language | English
Country | U.S.
Topic Tags | cyberbullying, privacy, social media
Summary | Celebrities are using social media to discuss personal issues with their friends/lovers/family. They behave like online harassers since they use social media to publicly humiliate other people they know. Some of celebrities' cyberbullying characteristics are: secret recordings, sexual humilitation, revenge porn, and mob deployment.
Image Description | Photograph of Justin Bieber and Selena Gomez, and screenshot of one of Kim Kardashian's tweets.
Image Tags | female(s), male(s), Twitter
Page 1 of 2
Back |
Next