Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 162 by Ho John Lee tagged trends

Future of Privacy Forum is pleased to share the third annual “Privacy Papers for Policy Makers,” showcasing leading analytical thinking about current and emerging privacy issues.

Leading Privacy Papers:

Bringing the Gap Between Privacy and Design
Deirdre Mulligan and Jennifer King

‘Going Dark’ Versus a ‘Golden Age for Surveillance’
Peter Swire and Kenesa Ahmad

“How Come I’m Allowing Strangers to Go Through My Phone”?: Smart Phones and Privacy Expectations
Jennifer King

Mobile Payments: Consumer Benefits & New Privacy Concerns
Chris Jay Hoofnagle, Jennifer M. Urban, and Su Li

Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising
Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay and Yang Wang

The ‘Re-Identification’ of Governor William Weld’s Medical Information: A Critical
Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now
Daniel Barth-Jones

Privacy by Design: A Counterfactual Analysis of Google and Facebook Pri

Share It With Others!

The Federal Trade Commission today released a staff report "Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies" for the increasing number of companies using facial recognition technologies, to help them protect consumers’ privacy as they use the technologies to create innovative new commercial products and services.

Facial recognition technologies have been adopted in a variety of contexts, ranging from online social networks and mobile apps to digital signs, the FTC staff report states. They have a number of potential uses, such as determining an individual’s age range and gender in order to deliver targeted advertising; assessing viewers’ emotions to see if they are engaged in a video game or a movie; or matching faces and identifying anonymous individuals in images.

Facial recognition also has raised a variety of privacy concerns because – for example – it holds the prospect of identifying anonymous individuals in public, and because the data collect

Share It With Others!

There are two cases where the FTC believes that companies need to get a consumer’s “affirmative express consent,” that is, an “opt-in,” before using information captured via facial recognition: When identifying anonymous individuals to third parties that wouldn’t otherwise know who they were, and when using any data or imagery captured via facial recognition for purposes outside of what was initially stated by the company.

In case companies weren’t already aware, the FTC also points out that what’s okay under U.S. law concerning facial recognition technologies might be illegal in other countries.

Share It With Others!

With the help of a company called Picocomputing, Marlinspike has developed a processing server which is able to test 18 billion keys per second – a feat which would normally require 80,000 CPUs. The server is equipped with 48 programmable processing units known as field programmable gate arrays (FPGA). Each FPGA is programmed to provide 40 parallel processing units, each with a clock speed of 450 MHz, for cracking DES. Users who want to take advantage of the service will first have to extract the client-server handshake from a record of the network traffic. Marlinspike has developed an open source tool called chapcrack for this purpose.

Share It With Others!

“Transparency is not about restoring trust in institutions. Transparency is the politics of managing mistrust,” says Krastev. He suggests that when officials are watched with an eagle eye, fewer talented people will want to enter the field of governance. And transparency is relative: “Any unveiling is also veiling. No matter how transparent our governments want to be, governments will be selectively transparent.”

Share It With Others!

Google’s Knowledge Graph derives from Freebase, a proprietary graph database acquired by Google in 2010 when it bought Metaweb. Google's Thakur, who is technical lead on Knowledge Graph, says that significant additional development has been done to get the database up to Google’s required capacity. Based on some of the architecture discussed by Google, Knowledge Graph may also rely on some batch processes powered by Google’s Pregel graph engine, the high-performance graph processing tool that Google developed to handle many of its Web indexing tasks—though Thakur declined to discuss those sorts of details.

Microsoft’s Satori (named after a Zen Buddhist term for enlightenment) is a graph-based repository that comes out of Microsoft Research’s Trinity graph database and computing platform. It uses the Resource Description Framework and the SPARQL query language, and it was designed to handle billions of RDF “triples” (or entities). For a sense of scale, the 2010 US Census in RDF form ha

Share It With Others!

How does society get better at preserving privacy online? As Lawrence Lessig pointed out in his book Code and Other Laws of Cyberspace, there are four possible mechanisms: norms, law, code, and markets.

So far, we've been pretty terrible on all counts. Take norms: our primary normative mechanism for improving privacy decisions is a kind of pious finger-wagging, especially directed at kids. "You spend too much time on those Interwebs!" And yet schools and libraries and parents use network spyware to trap every click, status update, and IM from kids, in the name of protecting them from other adults. In other words: your privacy is infinitely valuable, unless I'm violating it. (Oh, and if you do anything to get around our network surveillance, you're in deep trouble.)

What about laws? In the United States, there's a legal vogue for something called "Do Not Track": users can instruct their browsers to transmit a tag that says, "Don't collect information on my user." But there's no built-

Share It With Others!

Using an inexpensive phone and open source software, the researchers were able to track the location of cell phone users without their knowledge on the Global System for Mobile Communications (GSM) network, the predominant worldwide network.

In a field test, the research group was able to track the location of a test subject within a 10-block area as the subject traveled across an area of Minneapolis at a walking pace. The researchers used readily available equipment and no direct help from the service provider.

Share It With Others!

Report of Data Protection Audit of Facebook Ireland Published

The Office of the Data Protection Commissioner, Ireland today 21 December 2011 published the outcome of its audit of Facebook Ireland(FB-I) which was conducted over the last three months including on-site in Facebook Irelandě°˝€™s Headquarters in Dublin. The Report is a comprehensive assessment of Facebook Irelandě°˝€™s compliance with Irish Data Protection law and by extension EU law in this area.

The report is available in 2 parts: the main body of the report, including recommendations and the appendices.

Share It With Others!

Overview of EU personal data request response from Facebook.

01. About Me
02. Account End Date
03. Account Status History
04. Address
05. Alternate Name
06. Applications
07. Chat
08. Checkins
09. Connections
10. Credit Cards
11. Currency
12. Current City

13. Date of Birth
14. Education
15. E-Mails
16. Events
17. Family
18. Favourite Quotes
19. Friend Requests
20. Friends
21. Gender
22. Groups
23. Hometown
24. Last Location
25. Linked Accounts
26. Locale
27. Logins

28. Machines
29. Messages
30. Minifeed
31. Name
32. Name Changes
33. Networks
34. Notes
35. Notification Settings
36. Notifications
37. Password
38. Phone Numbers
39. Photos
40. Physical Tokens
41. Pokes
42. Political Views
43. Privacy Settings
44. Profile Blurb
45. Realtime Activities
46. Recent Activities
47. Registration Date
48. Relationship
49. Religious Views
50. Removed Friends
51. Screen Names
52. Shares
53. Status Updates
54. Vanity
55. Wallposts
56. Website
57. Work

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT