Digital Discourse Database

Number of Posts: 10
Posts 1 - 10

Facebook Faces a New World as Officials Rein In a Wild Web

Hyperlink

Newspaper | The New York Times
Date | 17.9.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, marketing, privacy, social media, threat
Summary | Facebook’s head of global policy management recently agreed to remove anything that violates the Vietnamese law from the social network. Governments around the world (even in the US) are increasingly trying to keep control of what's happening online. As a result, governments and big tech companies such as Google, Apple, Facebook or Amazon don't always agree with each other. On the one hand, big tech companies want to have more control and power, and on the other hand, nations want to gain more control over people's online behvior. Facebook's desire to expand everywhere (e.g. in China) is one of the reasons for today's struggle between tech companies and nations. Facebook also faced some issues in Europe and Africa.
Image Description | Photograph of people using computers in a computer room, map of Facebook's users, two women laughing in front of a board displaying social media icons, Mark Zuckerberg and other people running in China, Mark Zuckerberg, his wife and daughters, glass building, people in front of a thumb-up sign, woman, crowd (some of them are using their phones), and people on their computers.
Image Tags | computer/laptop, Facebook, female(s), male(s), smartphone, social media

To Survive in Tough Times, Restaurants Turn to Data-Mining

Hyperlink

Newspaper | The New York Times
Date | 25.8.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, research/study
Summary | Restaurants are facing tough times as people seem to visit restaurants less ofter rises. Now analytic firms have come up with software designs that collect data about customers and waiting staff to find inefficiencies and smooth them out. This way all waiters would recognize guests by name and know their order and payment preferences. It could revolutionize customer service in the hospitality industry.
Image Description | People looking at a chart.
Image Tags | chart, female(s), male(s)

The Rise and Fall of Yik Yak, the Anonymous Messaging App

Hyperlink

Newspaper | The New York Times
Date | 27.5.2017
Language | English
Country | U.S.
Topic Tags | childhood, cyberbullying, law, privacy, social media, threat, youth
Summary | The anonymous messaging app Yik Yak became very popular in colleges and schools because it lets people broadcast anonymously to other users near them. The activity on the app has however started to become thretening with college students and children bullying each other and people making bomb threats that have led to multiple evacuations. A feminist group from University of Mary Washington have filed complaint to the University to block Yik Yak on campus because it has been used to harrass and threaten members.
Image Description | An illustration with a face and a smartphone and an image of the creators of Yik Yak.
Image Tags | male(s), smartphone

He Tweeted About Chinese Government Corruption. Twitter Suspended His Account.

Hyperlink

Newspaper | The New York Times
Date | 26.4.2017
Language | English
Country | U.S.
Topic Tags | censorship, law, privacy, Twitter
Summary | A Chinese billionaire has publically denuciated Chinese government officials on Twitter by posting images of documents that evidence corruption. His account was suspended by Twitter for a few hours because the shared documents contained personal information which Twitter usually flags.
Image Description | Portrait of Guo Wengui.
Image Tags | male(s)

The Smartphone’s Future: It’s All About the Camera

Hyperlink

Newspaper | The New York Times
Date | 30.8.2017
Language | English
Country | U.S.
Topic Tags | privacy, smartphone, translation, virtual reality
Summary | Now that smartphones are as thin and as fast as possible, they need to develop into another realm. The camera will be used in new ways to, for instance, improve privacy by unlocking your phone by showing your face. Another innovation is the possiblity of taking a picture of a restaurant menu and having it instantly translated. Augmented reality also relies on the camera enabling users to, for instance, project a 3D model of a piece of furniture they want into a picture of their living room to see what it would look like.
Image Description | Illustration showing a smartphone scanning a woman's face.
Image Tags | female(s), smartphone

How to Protect Your Privacy as More Apps Harvest Your Data

Hyperlink

Newspaper | The New York Times
Date | 2.5.2017
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Many smartphone apps can be used for free, or rather one does not have to pay money to use it. However, if the app is not from a non-profit organization, users pay in some other way that may be obscure to them. Usually free for-profit apps collect data abou their users that they can sell to advertisers. The only way to protect oneself from this is to carefully read the terms and conditions, even if they are in legalese. If one does not like the level of privacy provided by an app, the only certain way to avoid data exploitation is not to download the app.
Image Description | Illustration of a hand holding a smartphone where eyes are hidden behind the app icons.
Image Tags | hand(s), smartphone

An App for Our Inner Cheapskate

Hyperlink

Newspaper | The New York Times
Date | 23.7.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, social media
Summary | The app Venmo is a payment service app that allows money transfers between people who have their bank accounts connected to their phone. Margaret Pennoyer is an elementary school teacher who had to pay the organizers of a bachelorette party $31.98 and $20.62. The fact that the amount was calculated to the penny surprised Pennoyer. She said that this app ''changes friendships and makes them more transactional''. The app also promotes the "everyone for themselves" idea. People seem to be less generous now; everyone has to pay exactly to the cent. Venmo is also like any other social networks; you can see what other people's transactions are. For instance, Margaret Pennoyer saw through the app that her cousins socialized recently and didn't invite her.
Image Description | N/A

China Disrupts WhatsApp Service in Online Clampdown

Hyperlink

Newspaper | The New York Times
Date | 18.7.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, Google, Instagram, privacy, threat, Twitter, WhatsApp
Summary | The Chinese government has partly shut down the use of WhatsApp within their borders. The app is widely used around the globe and was used by some in China do communicate with people outside of Chine with end-to-end encryption. Other popular social media platforms and internet sites like Google, Twitter, Facebook, and Instagram are blocked under the "Great Firewall" in China.
Image Description | Woman using a smartphone and women standing in front of Facebook and Instagram logos as well as emojis.
Image Tags | emojis, Facebook, female(s), Instagram, logo, smartphone

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency

Hyperlink

Newspaper | The New York Times
Date | 6.7.2017
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat, WhatsApp
Summary | The powerful elites are using the end-to-end-encrypted WhatsApp to communicate sensitive information. Such strategies are adopted by politicians, high-profile representatives of major companies, and Wallstreet banker. The latter are lawfully obligated to save all communications for possible inspection but WhatsApp enables them to escape that law.
Image Description | Image of a man talking on the phone and another man reading some paperwork.
Image Tags | male(s), smartphone

None of Us Are Safe From Getting ‘Owned’

Hyperlink

Newspaper | The New York Times
Date | 28.3.2017
Language | English
Country | U.S.
Topic Tags | privacy, social media, Twitter, word/writing
Summary | Much communication on social media and especially Twitter revolves around criticizing. One frequently used term is 'owning' - one can 'own' a hater or troll when exposing some compromising information about them or something that they did not realize. The word hails from hacker culture of the early internet days when 'owning' meant to hack into someone else's virtual space and snoop around.
Image Description | Illustration of a lock made out of an ethernet cable.

Page 1 of 1