Digital Discourse Database

Number of Posts: 141
Posts 21 - 30

Let's not let artificial intelligence become another bubble

Hyperlink

Newspaper | Telegraph
Date | 15.1.2017
Language | English
Country | UK
Topic Tags | artificial intelligence, privacy, threat
Summary | At the World Economic Forum in Davos, everyone will be talking about artifical intelligence (AI). There have been major progress in the field thanks to natural language processing and machine learning. Future products will be using AI to improve our lifestyle; for instance, an electric toothbrush using deep learning algorithms can improve your dental hygiene. What is happening with AI today is not new, but what is different now is the speed; change is happening at a faster rate. However, to improve AI we will need more personal data, which will lead us to cross a creepy line in the future.
Image Description | N/A

Should I befriend my children and their pals online?

Hyperlink

Newspaper | Telegraph
Date | 10.6.2017
Language | English
Country | UK
Topic Tags | childhood, privacy, social media, threat, youth
Summary | 80% of children between 11 and 15 years old have a smartphone. They spend a lot of time on social media platforms. Social media have a lot of advantages but they can also lead to social exclusion and embarrassment. According to a study, Instagram and Snapchat are the worst platforms for teenagers and young adults. As a result, some parents want to join the same social media sites and befriend their children so they can keep an eye on them. However, this might not be the right solution. Children and parents have a right to privacy.
Image Description | Photograph of a woman (foreground) and two children on their phone (background), a kid using and looking at a screen,
Image Tags | female(s), male(s), smartphone, tablet

Are Facebook and Twitter doing enough to protect users?

Hyperlink

Newspaper | The Guardian
Date | 26.8.2016
Language | English
Country | UK
Topic Tags | privacy, social media
Summary | Social networks have introduced new privacy measures to combat online abuse. For instance, Twitter has a new 'quality filter'. However, according to Alex Holmes, big social network companies should do more. For example, Twitter does not have a real name policy, which can create problems. Although everyone is coming up with new measures, it's impossible to filter everything.
Image Description | Photograph of the last Ghostbusters female stars.
Image Tags | female(s)

Taking Baby Steps Toward Software That Reasons Like Humans

Hyperlink

Newspaper | The New York Times
Date | 6.3.2016
Language | English
Country | U.S.
Topic Tags | artificial intelligence, brain, research/study
Summary | Computers are being programmed to mimick thought processes of the human brain. This technology is called "deep neuronal net". It enables softwares to interpret the content of images like for instance whether the tennis player in the image is wearing a hat. Many research teams are workin on this technology world-wide and it will likely be used for computerized customer support in the future.
Image Description | Portrait of a "deep neuronal net" researcher.
Image Tags | male(s)

Apple faces 11 other orders for suspects' electronic data

Hyperlink

Newspaper | USA Today
Date | 24.2.2016
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat
Summary | After Apple had refused to cooperate with the FBI in unlocking a terrorist's iPhone for investigation, the FBI are requesting their assistance again in elevn other criminal cases. Apple had refused the initial request in order not to sell out their users' privacy and were supported by other major tech firms.
Image Description | Text document showing the criminal cases in question in a table.
Image Tags | chart, text

Iranian hackers attack Telegram to find 15 million accounts

Hyperlink

Newspaper | Telegraph
Date | 3.8.2016
Language | English
Country | UK
Topic Tags | privacy, texting
Summary | Iranian hackers got access to Telegram accounts and got the details of 15 million Iranian users.
Image Description | Telegram logo, photograph of military men running, photograph of two Muslim women taking a selfie, screenshot of a series of tweets
Image Tags | female(s), logo, male(s), selfie, smartphone, Twitter

The rise and rise of international diplomacy by WhatsApp

Hyperlink

Newspaper | The Guardian
Date | 4.11.2016
Language | English
Country | UK
Topic Tags | politics, privacy, texting, WhatsApp
Summary | WhatsApp diplomacy is a thing: when leaders gather to talk in the same room, they can exchange emojis and other documents to other people without the whole room knowing. WhatsApp is more secure than other government information systems and has been used at the UN and EU headquarters.
Image Description | Photograph of a group of diplomats looking at their phone, screenshot of a WhatsApp chat, photograph of a man holding a phone and a woman standing next to him (both are looking at the phone)
Image Tags | female(s), male(s), smartphone, text, WhatsApp

5 easy and simple ways to protect your privacy online - how to prepare for the next big threat

Hyperlink

Newspaper | Mirror
Date | 18.8.2016
Language | English
Country | UK
Topic Tags | privacy, threat
Summary | Privacy expert Mark Weinstein shares some tips to protect your privacy online: use safe internet browsers, be careful where you search (for instance, Google saves all of your searches), WhatsApp is not as private as what you might think, use a cloud storage that can't see your information, etc. We should be worried about our privacy in the future as governments are trying to get backdoor access to apps and digital devices. Millennials seem to be the ones that are most concerned about their online privacy.
Image Description | Photographs of a woman in front of social media icons, two hands using computer mice and a keyboard, fingers touching a screen displaying the Google search bar, WhatsApp icon, cloud storage icons, hand holding a smartphone in front of the Facebook logo, portrait of Tim Cook, and Facebook "laughing" reaction button
Image Tags | emojis, Facebook, female(s), Google, hand(s), keyboard, male(s), smartphone, social media, WhatsApp

The Smartphone’s Future: It’s All About the Camera

Hyperlink

Newspaper | The New York Times
Date | 30.8.2017
Language | English
Country | U.S.
Topic Tags | privacy, smartphone, translation, virtual reality
Summary | Now that smartphones are as thin and as fast as possible, they need to develop into another realm. The camera will be used in new ways to, for instance, improve privacy by unlocking your phone by showing your face. Another innovation is the possiblity of taking a picture of a restaurant menu and having it instantly translated. Augmented reality also relies on the camera enabling users to, for instance, project a 3D model of a piece of furniture they want into a picture of their living room to see what it would look like.
Image Description | Illustration showing a smartphone scanning a woman's face.
Image Tags | female(s), smartphone

Practice safe Internet on the road

Hyperlink

Newspaper | USA Today
Date | 31.7.2017
Language | English
Country | U.S.
Topic Tags | email, privacy, smartphone, social media, threat
Summary | Traveling can be dangerous, especiallyin the digital age. Many travelers make themselves vulnerable to criminals by sharing their location on social media or by connecting to a password-free wifi which is often provided by scammers to hack into email accounts. In these cases virtual kidnapping becomes possible when travelers spend a few days somewhere off the grid and a local group claims to have kidnapped the traveler and blackmails their family for ransom.
Image Description | Getty image of a woman sitting in a train.
Image Tags | female(s)

Page 3 of 15
Back | Next