Keynote, Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills Gap
by Bobbi Newman • 014
Plan for today, Mon, Nov 17 class session:
Parent involvement in their children’s social emotional and academic development.
danah boyd, a professor at Harvard University’s Berkman Center for the Internet and Society, argues that teenagers closely scrutinize what they share online because it is a way for them to negotiate their changing identities. In her book, It’s Complicated: The Social Lives of Networked Teens, she describes how teenagers carefully curate their feeds based on the audience they are trying to reach.
Adolescents have been migrating away from Facebook and Twitter over the last few years, showing preference for sites like Snapchat, Whisper, Kik, and Secret that provide more anonymity and privacy. Part of this transition can be explained by the fact that the older social media sites stopped being cool when parents joined them, but perhaps another reason could be that teenagers growing up in the post-Snowden era implicitly understand the value of anonymity. For teens, it’s not a matter of which platform to use, but rather which works best in a particular context.
Right now in the U.S. it’s essentially the case that when you post information online, you give up control of it.
Some companies may give you that right, but you don’t have a natural, legal right to control your personal data. So if a company decides they want to sell it or market it or release it or change your privacy settings, they can do that.
The point is, we really don’t know how this information will be used. For instance, say I’m a merchant — once I get information about you, I can use this information to try to extract more economic surplus from the transaction. I can price-discriminate you, so that I can get more out of the transaction than you will.
I’m interested in working in this area, not because disclosure is bad — human beings disclose all the time, it’s an innate need as much as privacy is — but because we really don’t know how this information will be used in the long run.
‘Anti-Facebook’ platform Ello attracts thousands
Ello’s manifesto says it won’t track your info and send it to advertisers. If you don’t say you agree, it sends you to Facebook.
Verizon’s 2014 Data Breach Investigations Report,
Fragmentation of online identity means that we as online users are forced to struggle with proliferating accounts and passwords. And we are regularly required to reveal sensitive information about ourselves and repeatedly enter the same information to create accounts that establish new, disparate online identities.
Establishing a system for trust management requires a common infrastructure for specifying policies that can protect yet enable access to data and systems, representing identities and credentials, and evaluating and enforcing an organization’s policies — all while maintaining privacy.
Instead of a no-spy deal, the US has begun a Cyber Dialogue with Germany. In a SPIEGEL interview, John Podesta, a special adviser to President Barack Obama, speaks of the balance between alliances and security and says that changes are being made to NSA espionage practices.
Pls consider the following additional resources on the topic:
Merkel calls for separate EU internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
Big data has been generating big hype for a while. In January, the White House jumped into the fray, launching a big data and privacy review. CDT participated in all three public workshops convened in connection with the review and submitted written comments.
In our comments, we focused on three main areas: applying the Fair Information Practice Principles (FIPPs) to both private sector and government big data programs; exploring technical measures such as de-identification to safeguard privacy; and reforming existing privacy laws, most notably the Electronic Communications Privacy Act, to account for rapid changes in the ways that digital data is collected, stored, and used.
CDT stressed that, as entities collect more data to offer innovative products and more efficient services, they must still be guided by purpose specification, consent, security, and the other elements of the FIPPs framework.
|“Strong consensus is forming that the bulk collection of phone records should end.”
|The Administration says that it will end its bulk collection of telephony metadata, although the details of what will replace it remain unsettled. Meanwhile, CDT is pointing out that the laws the government has used to justify bulk collection are not limited just to phone records. Instead, they could be used to justify collection of location data, Internet browsing history, financial records, and more. CDT has been vocal in advocating the end of all forms of bulk collection, and we endorse the USA FREEDOM Act as the best legislation to do just that.
A report from the White House review is due before the end of April, but it is expected to present more questions than answers. In this complex and unsettled space, CDT will continue to work with companies and other stakeholders to develop workable approaches that will protect privacy while pursuing the benefits promised by advanced data analytics.
CDT has launched a totally revamped website: http://www.cdt.org. It has a fresh new look and tools that should make our content more easily accessible. Thanks to our partners at iStrategy Labs for their creative and technical efforts on the new site.
Twitter, Rape and Privacy on Social Media – The Cut
Three thoughtful and thought-provoking essays about teaching social media use:
“Why students should not be required to publicly participate online” online at http://prpost.wordpress.com/2010/04/25/why-students-should-not-be-required-to-publicly-participate-online/
“Notes on Student Privacy and Online Pedagogy” online at http://joshhonn.com/?p=65
“Why the Loon does not assign public social-media use” online at http://gavialib.com/2014/02/why-the-loon-does-not-assign-public-social-media-use/
I don’t necessarily advocate the point of view expressed in these posts, but I do think they merit both attention and discussion in a course focused on social media.
Professor, Library Systems & Digital Projects
for the entire list of books, EBooks, and DVDs acquired in November 2013, please use this Google Doc list:
Stryker, Cole. Hacking the Future: Privacy, Identity, and Anonymity On the Web. New York: Overlook Duckworth, 2012.
|Stryker, Cole||Hacking The Future||TK5105.875.I57 S7793 2012||Main|
Previous 1 … 3 4 5 6 Next