Archive of ‘privacy’ category

AT&T allows NSA surveillance

New Documents and Reports Confirm AT&T and NSA’s Longstanding Surveillance Partnership

https://www.reddit.com/r/technology/comments/3h64l2/new_documents_and_reports_confirm_att_and_nsas/

Please consider previous IMS blog entries on this topic:

https://blog.stcloudstate.edu/ims/2014/09/25/online-privacy-its-time-for-a-new-security-paradigm/

https://blog.stcloudstate.edu/ims/2014/07/01/privacy-and-surveillance-obama-advisor-john-podesta-every-country-has-a-history-of-going-over-the-line/

password manager

How and why to set up and use a password manager

Commit to a password manager to make your online life easier and more secure.

http://www.cnet.com/how-to/how-and-why-to-set-up-and-use-a-password-manager/

A password manager stores the passwords for your various online accounts and profiles and saves you from having to remember and enter each one each time you visit a password-protected site. Instead, your passwords are encrypted and held by your password manager, which you then protect with a master password. Since you are saved from having to remember all of your passwords, you will be less tempted by the dangerously poor idea of using the same password for all of your accounts. With a password manager, you can create strong passwords for all of your accounts and keep all of those passwords saved behind a stronger master password, leaving you to remember but a single password.

With PasswordBox, you can sign up for an account via its mobile app or the PasswordBox website on a computer. I chose the latter and downloaded PasswordBox from its website, which turned out to be a browser extension.

Teenagers, The Internet, And Privacy

The Truth About Teenagers, The Internet, And Privacy

http://www.fastcompany.com/3037962/then-and-now/the-truth-about-teenagers-the-internet-and-privacy

danah boyd, a professor at Harvard University’s Berkman Center for the Internet and Society, argues that teenagers closely scrutinize what they share online because it is a way for them to negotiate their changing identities. In her book, It’s Complicated: The Social Lives of Networked Teens, she describes how teenagers carefully curate their feeds based on the audience they are trying to reach.

Adolescents have been migrating away from Facebook and Twitter over the last few years, showing preference for sites like Snapchat, Whisper, Kik, and Secret that provide more anonymity and privacy. Part of this transition can be explained by the fact that the older social media sites stopped being cool when parents joined them, but perhaps another reason could be that teenagers growing up in the post-Snowden era implicitly understand the value of anonymity. For teens, it’s not a matter of which platform to use, but rather which works best in a particular context.

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

http://www.nybooks.com/articles/archives/2013/nov/07/are-we-puppets-wired-world/

Are We Puppets in a Wired World?

But while we were having fun, we happily and willingly helped to create the greatest surveillance system ever imagined, a web whose strings give governments and businesses countless threads to pull, which makes us…puppets. The free flow of information over the Internet (except in places where that flow is blocked), which serves us well, may serve others better. Whether this distinction turns out to matter may be the one piece of information the Internet cannot deliver.

 

ECAR STUDY OF UNDERGRADUATE STUDENTS AND INFORMATION TECHNOLOGY, 2013

Key Findings

See the 2013 report for a full list of key messages, findings, and supporting data.

  • Students recognize the value of technology but still need guidance when it comes to better using it for academics.
  • Students prefer blended learning environments while beginning to experiment with MOOCs.
  • Students are ready to use their mobile devices more for academics, and they look to institutions and instructors for opportunities and encouragement to do so.
  • Students value their privacy, and using technology to connect with them has its limits.
p. 10 students are generally confident in their prepraredness to use technology for course work, but those who are interested in more tech training favor “in calss” guidance over separate training options.

Educause’s ECAR Study, 2013

http://www.educause.edu/library/resources/ecar-study-undergraduate-students-and-information-technology-2013

Infographic:

http://net.educause.edu/ir/library/pdf/ERS1302/Eig1302.pdf

1 3 4 5