Young people’s unique understandings and perspectives are often not considered in debates and discussions around privacy and security. This article outlines a youth-centric notion of digital privacy and guiding principles around privacy developed by young people from Antigua and Barbuda, Australia, Ghana, and Slovenia.
The Special Session “Digital and Societal Transformations” took place during IEEE International Symposium on Technology and Society (ISTAS) 2021 on 31 October 2021…. Read More
Ron Deibert presented “Investigating Targeted Espionage: Methods, Findings, Implications” as a Keynote during IEEE International Symposium on Technology and Society… Read More
This SSIT Guest Lecture was presented by Prof. Andrew McStay, Bangor University, UK at a Joint Chapter Meeting organised by… Read More
Portal says that privacy is “built into every layer.” Despite the company’s reassurances about privacy, users are backing away.
How does your culture view the potential for AI?
One result of increased AI integration will be increased empathy for robots. This transformation has potential upsides and risks.
Australian Aboriginal sovereignty is no longer just about Aboriginal communities retaining rights to their own land. The most brutal types of dispossession are the latest forms of data retention, decreased privacy, and unwarranted use of this personal data as a result of activities being collected, analyzed, and intelligently manipulated by geographically remote entities, all thanks to the Internet.
Using biometric technology to identify and monitor people raises human rights concerns. In particular, biometrics are often associated with intrusions into privacy.
Once or twice a year, I receive a call or email from someone claiming to be under intensive targeted surveillance… Read More
IEEE Technology and Society Magazine contributor Alexander Hayes interviewed Glass Explorer Cecilia Abadie on January 21, 2013. The complete Google… Read More
Figure 1. Privacy concerns arise for individuals when there is a high expectation of control over information pertaining to them… Read More
At the top of some children’s Christmas present wish list in 2015 would have been the new Hello Barbie doll… Read More
Can we trust for-profit corporations to protect our privacy? Are these compatible concepts and institutions? These are difficult questions to… Read More
Members of the “Internet Governance, Security, Privacy and the Ethical Dimension of ICTs in 2030” Panel at the 2016 WSIS… Read More
A secure crib and a baby monitor are on the “must-have” safety checklist for many new parents. But when you… Read More
Anecdotally, most people know that the video technology they use in everyday life is changing at an alarmingly fast pace…. Read More
In June 2013, Edward Snowden burst onto the world media scene. He had worked as a contractor for the U.S…. Read More
VIZIO is reportedly paying fines for using TVs to track user’s viewing patterns in significant detail as well as associating… Read More
Should children have toys that can combine speech recognition with a Wi-Fi connection to capture and respond to them, and that potentially are able to record their conversations as well as feed them “messages”? Welcome to the world of Hello Barbie.