Digital Discourse Database

Number of Posts: 56
Posts 21 - 30

How to Protect Your Privacy as More Apps Harvest Your Data

Hyperlink

Newspaper | The New York Times
Date | 2.5.2017
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Many smartphone apps can be used for free, or rather one does not have to pay money to use it. However, if the app is not from a non-profit organization, users pay in some other way that may be obscure to them. Usually free for-profit apps collect data abou their users that they can sell to advertisers. The only way to protect oneself from this is to carefully read the terms and conditions, even if they are in legalese. If one does not like the level of privacy provided by an app, the only certain way to avoid data exploitation is not to download the app.
Image Description | Illustration of a hand holding a smartphone where eyes are hidden behind the app icons.
Image Tags | hand(s), smartphone

Listen up, coaches: Your players might be recording your every word -- to use against you

Hyperlink

Newspaper | Los Angeles Times
Date | 28.4.2017
Language | English
Country | U.S.
Topic Tags | privacy, school, smartphone, threat, word/writing
Summary | A high school sports coach has recently been fired because he was secretly recorded while speaking to his team. The record alluded to physical violence - which he corrected in the recorded speech as a mere metaphor, not an actual recommendation - and inappropriate words. It is not entirely clear whether the student was allowed to record the conversation because a locker room speech is not technically in a classroom and was not explicitly classified as private. Coaches need to be aware that there is no privacy with smartphones everywhere.
Image Description | N/A

Whatsapp users beware: Scam messages that appear to come from friends contain dodgy links to hijack your phone

Hyperlink

Newspaper | Mail Online
Date | 2.2.2016
Language | English
Country | UK
Topic Tags | privacy, threat, WhatsApp
Summary | WhatsApp has been a target of attack from scammers; users receive texts that appear to be coming from friends and that contain links to hijack your phone. People are then redirected to a fake website where they are offered a voucher and are asked to register. If users register personal details such as name, e-mail address, and phone number, they can end up with malware on their phone.
Image Description | N/A

'Snowden' filmmaker Oliver Stone warns Pokemon Go is creating a totalitarian world filled with robot-like people

Hyperlink

Newspaper | Mail Online
Date | 22.7.2016
Language | English
Country | UK
Topic Tags | game, privacy, smartphone, social media, threat, virtual reality
Summary | The game Pokemon Go has become so popular that it has overtaken major social media in number of active users. Oliver Stone spoke about the smartphone phenomenon as 'a new level of invasion' that could potentially lead to totalitarianism and a culture of surveillance. Internet giants are tracking everyone's online behavior, especially through the game Pokemon Go.
Image Description | Photograph of Oliver Stone, photograph of three male children looking at their smartphone, photograph of actor Joseph Gordon-Levitt, and photograph of Edward Snowden
Image Tags | male(s), smartphone

In the Apple Case, a Debate Over Data Hits Home

Hyperlink

Newspaper | The New York Times
Date | 13.3.2016
Language | English
Country | U.S.
Topic Tags | Facebook, law, politics, privacy, research/study, smartphone, threat
Summary | Apple's refusal to aide the FBI with breaking into the phone of the San Bernardino attacker has unleashed a political debate among Americans. IT experts as well as lay people report that they have had discussions about the topic with other people, some say they have had fights over Facebook with family members about the issue. Polls show that the American people are hugely divided on the topic: 42% think Apple should cooperate with the FBI while 47% support Apple's stance to protect user privacy.
Image Description | Getty image of a protest crowd showing a man holding up his smartphone with the text: "Don't turn our phones into FBI drones".
Image Tags | female(s), male(s), smartphone, text

Justice Dept. calls Apple's encryption fight 'a diversion'

Hyperlink

Newspaper | Washington Post
Date | 10.3.2016
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Ever since the FBI asked Apple to unlock a terrorist's iPhone, a huge debate around user privacy has ensued. Other tech companies side with Apple with the position that aiding the FBI at the expense of user privacy would open the gate for masses of future cases. The Justice Department however accuses Apple of purposefully making unbreachable smartphones, which may be good for user privacy (and thus for profit) but a huge problem for the police to be able to investigate criminal cases.
Image Description | Hand holding an iPhone.
Image Tags | hand(s), smartphone

Tech industry slowly rallies behind Apple in iPhone fight

Hyperlink

Newspaper | USA Today
Date | 19.2.2016
Language | English
Country | U.S.
Topic Tags | Facebook, Google, law, privacy, smartphone, threat
Summary | The FBI had issues a court order to Apple to hack into the iPhone of one of the San Bernardino terrorists. When Apple declined, other tech magnates like Google and Facebook sided with them saying that tech companies cannot be ordered to compromise their customers' privacy by the governement. Allowing this to happen now would set a problematic precedent for the future.
Image Description | Portrait of Mark Zuckerberg.
Image Tags | Facebook, male(s)

Free Tools to Keep Those Creepy Online Ads From Watching You

Hyperlink

Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)

Obama Shifting Online Strategy on ISIS

Hyperlink

Newspaper | The New York Times
Date | 8.1.2016
Language | English
Country | U.S.
Topic Tags | censorship, law, politics, privacy, threat
Summary | President Obama wants to use surveillance techniques of new media to find IS terrorists. Tech companies, however, increasingly offer their users encrypted messaging services and refuse to hand over the keys to the government. Companies are protecting their users' privacy but also giving terrorists safe channels of communication.
Image Description | Portrait of Apple’s chief executive.
Image Tags | male(s)

China Disrupts WhatsApp Service in Online Clampdown

Hyperlink

Newspaper | The New York Times
Date | 18.7.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, Google, Instagram, privacy, threat, Twitter, WhatsApp
Summary | The Chinese government has partly shut down the use of WhatsApp within their borders. The app is widely used around the globe and was used by some in China do communicate with people outside of Chine with end-to-end encryption. Other popular social media platforms and internet sites like Google, Twitter, Facebook, and Instagram are blocked under the "Great Firewall" in China.
Image Description | Woman using a smartphone and women standing in front of Facebook and Instagram logos as well as emojis.
Image Tags | emojis, Facebook, female(s), Instagram, logo, smartphone

Page 3 of 6
Back | Next