Number of Posts: 8
Posts 1 - 8
In the Apple Case, a Debate Over Data Hits Home
Newspaper | The New York Times
Date | 13.3.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, politics, privacy, research/study, smartphone, threat
Summary | Apple's refusal to aide the FBI with breaking into the phone of the San Bernardino attacker has unleashed a political debate among Americans. IT experts as well as lay people report that they have had discussions about the topic with other people, some say they have had fights over Facebook with family members about the issue. Polls show that the American people are hugely divided on the topic: 42% think Apple should cooperate with the FBI while 47% support Apple's stance to protect user privacy.
Image Description | Getty image of a protest crowd showing a man holding up his smartphone with the text: "Don't turn our phones into FBI drones".
Image Tags | female(s), male(s), smartphone, text
Free Tools to Keep Those Creepy Online Ads From Watching You
Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)
Obama Shifting Online Strategy on ISIS
Newspaper | The New York Times
Date | 8.1.2016
Language | English
Country | U.S.
Topic Tags | censorship, law, politics, privacy, threat
Summary | President Obama wants to use surveillance techniques of new media to find IS terrorists. Tech companies, however, increasingly offer their users encrypted messaging services and refuse to hand over the keys to the government. Companies are protecting their users' privacy but also giving terrorists safe channels of communication.
Image Description | Portrait of Apple’s chief executive.
Image Tags | male(s)
WhatsApp Introduces End-to-End Encryption
Newspaper | The New York Times
Date | 5.4.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, privacy, threat, WhatsApp
Summary | Facebook has introduced end-to-end encryption for all WhatsApp communication including one-on-one and group chats and multimedia data sent in chats. This is a step to protect user privacy because breaches have happened in the past. The federal government however opposes this step because it denies the police access to communications which may be crucial to crack criminal cases.
Image Description | WhatsApp and Facebook logos.
Image Tags | Facebook, logo, WhatsApp
Texts Live On, but That's Often Forgotten in Politics
Newspaper | The New York Times
Date | 12.8.2016
Language | English
Country | U.S.
Topic Tags | email, politics, privacy, texting
Summary | Politicians seem to forget an important rule: do not write a text message that could bring serious consequences if it appeared on the front page of a newspaper. In the George Washington Bridge scandal, it was said that Christina Genovese Renna (one of Chris Christie's aides) had texted a colleague that if his boss's emails were found, they would reveal that he was plotting to block traffic to the bridge. If you are a public servant, you should know that you can't send any confidential text messages. Text messages are often perceived as a "thoughtless" form of communication, which can have serious consequences.
Image Description | N/A
The Latest Celebrity Diet? Cyberbullying
Newspaper | The New York Times
Date | 12.10.2016
Language | English
Country | U.S.
Topic Tags | cyberbullying, privacy, social media
Summary | Celebrities are using social media to discuss personal issues with their friends/lovers/family. They behave like online harassers since they use social media to publicly humiliate other people they know. Some of celebrities' cyberbullying characteristics are: secret recordings, sexual humilitation, revenge porn, and mob deployment.
Image Description | Photograph of Justin Bieber and Selena Gomez, and screenshot of one of Kim Kardashian's tweets.
Image Tags | female(s), male(s), Twitter
Should You Spy on Your Kids?
Newspaper | The New York Times
Date | 9.11.2016
Language | English
Country | U.S.
Topic Tags | childhood, privacy, research/study, threat
Summary | Many parents now monitor their children's online and social media activity, regulate their internet access (or even texting abilities) through the night and school hours using sophisticated technology, a few even observe the movements of their children or partners by tracking their devices. While tracking each other's devices in a relationship can be useful to avoid texting while driving, such technology can also be exploited and result in an emotionally abusive relationship. This is especially risky when the monitoring is not mutual like when parents 'stalk' their children, danah boys says. It is impossible for children to learn media competency when they are constantly under surveillance, they become less reluctant to share social media passwords with their peers and can otherwise remain naïve when it comes to online safety because they have been shielded from everything growing up.
Image Description | A series of minimalistic illustrations of a woman with a smartphone leaving a trail (dotted line).
Image Tags | female(s), smartphone
For Millions of Immigrants, a Common Language: WhatsApp
Newspaper | The New York Times
Date | 21.12.2016
Language | English
Country | U.S.
Topic Tags | privacy, WhatsApp
Summary | WhatsApp is hugely popular in South America, Europe, India, Africa, and among the masses of refugees fleeing from the Middle East at the moment. It has transformed the refugee and immigrant experience, enabling people who are in a lonely, desperate situation in their lives to stay connected with their loved ones. Refugees use WhatsApp for strategic communication as well, to call for help or let their families know that they are safe, they can send photographs and make free calls provided they have access to WiFi. Their WhatsApp communication is also encrypted, making it safe for those moving through different countries without legal permission. Expats and immigrants can now partake in the daily lives of their friends and family back home by easily sending pictures back and forth and simply communicating more - something that was very expensive even a few years ago.
Image Description | GIF of a WhatsApp icon globe spinning around.
Image Tags | logo, WhatsApp
Page 1 of 1