By web evolution I’m not talking Internet 4.0, I’m talking Darwinian survival. In the Darwinian model, evolution requires three things:… Read More

By web evolution I’m not talking Internet 4.0, I’m talking Darwinian survival. In the Darwinian model, evolution requires three things:… Read More
Where did the privacy slippery slope begin? Or perhaps asking the question with more focus, when did we start trading… Read More
We may be passing a tipping point in the area of individualized marketing/advertising. This has surfaced as the U.S. Federal… Read More
Using biometric technology to identify and monitor people raises human rights concerns. In particular, biometrics are often associated with intrusions into privacy.
All web sites such as this, that permit feedback, comments, etc., get some amount of “SPAM” (with apologies to Hormel)… Read More
During the last century a variety of surveillance technologies have arrived, have been deployed, and have had impacts on society,… Read More
This piece briefly outlines the legal implications of surveillance, sousveillance, and “whistle-blowing” in a German human rights context. For the… Read More
Looxcie 2 Video Camera. Source: http://www.flickr.com/photos/54450095@N05/6345166957. The point of view (POV) camera is a compact portable device carried by police… Read More
Aerial drones are increasingly being repurposed for domestic use and legislated for public and commercial purposes around the world. Japan,… Read More
Cyberwar is insidious, invisible to most, and is fought out of sight. It takes place in cyberspace, a location that… Read More
The United States is now debating the wisdom of limits on monitoring by the National Security Agency (NSA). While the… Read More
Kannanshanmugam, Shanmugamstudio, Kollam/Creative Commons Attribution-Share Alike 3.0 Unported The Aadhaar (Unique Identity) project has become the bane of average Indians,… Read More
The Circle. By Dave Eggers. Knopf, 2013. Reviewed by Scott D. Eldridge. Have you taken the plunge and purchased one… Read More
By Gary T. Marx, University of Chicago Press, 2016. Reviewed by Donna L. Halper It goes without saying that we… Read More
I sat staring at the computer on February 6th, 2006, thinking about the press release I was about to send… Read More
IEEE Technology and Society Magazine contributor Alexander Hayes interviewed Glass Explorer Cecilia Abadie on January 21, 2013. The complete Google… Read More
Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our… Read More
The Australian trucking industry uses the Global Positioning System (GPS) as its main tracking system. A satellite dish connects the… Read More
Figure 1. Privacy concerns arise for individuals when there is a high expectation of control over information pertaining to them… Read More
Members of the “Internet Governance, Security, Privacy and the Ethical Dimension of ICTs in 2030” Panel at the 2016 WSIS… Read More