One Man's Year of Digital Detox | Media | OutsideOnline.com
A star political blogger for Grist.org, David Roberts spent so much time posting and Tweeting and staring at screens that he almost went nuts. So he pulled the plug for a year, restarting his relationship with technology and actively seeking health, balance, and adventure in the real world. What he learned just might save you from meltdown.
offline 
4 hours ago
The End of Absence | Spark with Nora Young | CBC Radio
Have we lost the value of absence by being constantly connected? In his new book The End of Absence, Michael Harris explores the downside of constant connectivity - the ability to embrace solitude, to daydream, and just enjoy the reverie.
offline  absence  non-connectivity 
4 hours ago
Global Internet Censorship Map: Map shows censorship around the world | BGR
Imagine a world where the book burners had won. A world where information is filtered and must be approved by governments before it can be accessed by their citizens. A world where people are held down and kept in line by oppressive regimes that restrict the free flow of information and bombard citizens with government-approved messages. Now stop imagining, because this horrifying world already exists.
censorship 
22 days ago
The Social Laboratory
Singapore is testing whether mass surveillance and big data can not only protect national security, but actually engineer a more harmonious society.
surveillance  privacy 
6 weeks ago
Evgeny Morozov: Like clueless guinea pigs - The Digital Debate - FAZ
IT bosses tell us that all our problems can be solved by collecting information. The more you give, the more you get. But then there is only „social physics“ instead of politics left.
EM  surveillance  governance  BigData 
7 weeks ago
Evgeny Morozov: The rise of data and the death of politics
Tech pioneers in the US are advocating a new data-based approach to governance – 'algorithmic regulation'. But if technology provides the answers to society's problems, what happens to governments?
PoliticsOfAlgorithms  politics_of_algorithms  governance  BigData 
7 weeks ago
Easier Ways to Protect Email From Unwanted Prying Eyes - NYTimes.com
Decent overview of new user-friendly email encryption tools.
security  en 
9 weeks ago
Obama administration says the world’s servers are ours | Ars Technica
Global governments, the tech sector, and scholars are closely following a legal flap in which the US Justice Department claims that Microsoft must hand over e-mail stored in Dublin, Ireland. In essence, President Barack Obama's administration claims that any company with operations in the United States must comply with valid warrants for data, even if the content is stored overseas. It's a position Microsoft and companies like Apple say is wrong, arguing that the enforcement of US law stops at the border.
surveillance  privacy 
9 weeks ago
Forensic DNA databases: Ethical and legal standards: A global review
This article was written by one of our grantees, Gene Watch UK and the Council for Responsible Genetics

Here is some background:

The Forensic Genetics Policy Initiative (www.dnapolicyinitiative.org) is a civil society-led project which aims to set human rights standards for DNA databases around the world, by establishing best practice and involving experts, policy makers and members of the public in open debate. The authors have collected a comprehensive data set of information on the state of forensic DNA profiling and the development of DNA databases for policing purposes in more than 100 countries. The information is available in wiki which can be expanded, updated or corrected by interested persons (http://wiki.dnapolicyinitiative.org).
DNA  Genetics  profiling  human_rights  data_protection  hjd 
june 2014
Cyber Failures Spark Search for New Security Approach | SecurityWeek.Com
The old notion of using anti-virus software, which updates itself based on new malware "signatures," is rapidly losing credence.

A 2012 study by the security firm Imperva said most software only detected around five percent of malware. Another firm, FireEye, concluded last year that 82 percent of malware disappears after one hour and 70 percent exists just once.

"With the half-life of malware being so short, we can draw the conclusion that the function signature-based AV (anti-virus) serves has become more akin to ghost hunting than threat detection and prevention," said a blog post by FireEye's Zheng Bu and Rob Rachwald.

Ullrich said that over time, companies need to invest more in information security and develop strategies before the problems subside.

"Security will never prevent every single breach," he said. "You want to keep it at a manageable level, to stay in business. That's what security is all about."
security 
may 2014
BBC News - Trust your doctor, not Wikipedia, say scientists
OA term used improperly to refer to problem with Wikipedia. Need to guard against backlash to OA as a result of this article.
OA  Wikipedia 
may 2014
Eveny Morozov ‘The Naked Future’ and ‘Social Physics’ - NYTimes.com
NYTBR review of
THE NAKED FUTURE
What Happens in a World That Anticipates Your Every Move?
By Patrick Tucker
268 pp. Current. $27.95.
SOCIAL PHYSICS
How Good Ideas Spread — The Lessons From a New Science
By Alex Pentland
may 2014
podcast: The Future Of Work Looks Like A UPS Truck : Planet Money : NPR
Fascinating short podcast - a case study of how Big Data is reshaping labour.
FutureOfWork  podcast 
may 2014
Privacy Group Challenges Surveillance Practices in Britain - NYTimes.com
British privacy advocates [Privacy International] introduced a legal challenge on Tuesday against one of the country’s intelligence agencies, saying the agency illegally hacked personal computers. The case follows revelations that Britain’s Government Communications Headquarters, or G.C.H.Q., developed so-called malware that allowed the government to turn on computer microphones and cameras without the owners’ consent.

Privacy International said it filed the complaint with Britain’s investigatory powers tribunal, a court that handles legal cases against the country’s intelligence agencies. The group said that intelligence agencies did not have the right to conduct such surveillance and asked that it be stopped.
privac 
may 2014
Losey
the role of civil society in the EU ACTA debate
ACTA  mh 
may 2014
Defending the Open Internet - NYTimes.com
As the F.C.C. prepares to address "net neutrality," one of the most influential voices is Tim Wu, the professor who coined the phrase.
net_neutrality 
may 2014
« earlier      
a2k abstract_only academia accesstocommunications accesstomedicines acta activism advocacy africa agnotology algorithms analysis anonymous apple audio bh bigdata blocking blogging book book_review books brazil businessmodels canada censorship china circumvention citizenmedia climatechange collaboration competition conference copyright copyright_enforcement creativecommons crowdsourcing crypto cybercrime cybersecurity cyberwar darius data data-driven_journalism dataprotection dataretention datavisualisation david dc ddos democracy development digest digest1105 digitalgurus dna dns drm drones education eff egypt eifl elections em encryption enforcement eu europe europeancommission event events evgeny evoting exceptions export_controls facebook fairuse filetype:pdf filtering foi forensicdna france freeexpression freespeech fta funders funding futureofjournalism futureofthebook generics genetics genomics germany globalvoices google googlebooks governance grantee grantees hacking hacktivism hatespeech healthcare humanrights identity india innovation intellectualproperty interception intermediary_liability internet internet_governance internetfreedom internetfreedomtm interview ip ipr ipreform iran jc jerzy jh journalism kenya killswitch knight latinamerica law legal_cases legislation libel libraries limitations lobbying mapping media media:document metrics mexico mh microsoft mobile moocs mysociety netneutrality networked-public-sphere news nigeria nki nsa oa oer oers ogp okf oped open openacademia openaccess opendata opengov opengovernment openscience opensource p2p pakistan patent patents piracy podcast policy politics politicsofalgorithms pressfreedom prism privacy protest public_sphere publicdomain publishing regulation report research resources robots russia science search security skype socialmedia socialnetworks sopa southafrica spain spectrum surveillance swiftriver_review syria tech4transparency technology thailand threestrikes tools tpp trade transparency tunisia turkey tvi twitter uk un us usa ushahidi ustr video visualization whistleblowing wifi wikileaks wikipedia wipo wto youth youtube

Copy this bookmark:



description:


tags: