cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
DON’T: Save personal passwords in your work device keychain.
DON’T: Make off-color jokes on messaging software.
DON’T: Access free public wi-fi while working on sensitive material.
DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
DON’T: Store personal data.
DON’T: Work on your side hustle while at the office.
Section 702 — that authorizes them to monitor some Americans’ communications without a warrant.
The spy agencies are supposed to “minimize” details about people swept up in what they call such “incidental collection,” and they say their practices are regularly vetted by Congress and the Foreign Intelligence Surveillance Court.
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.
Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
The proposed legislation, said the lawmakers, would set up a cybersecurity grant program that would provide resources for states to develop and implement effective cyber resiliency plans, including efforts to identify, detect, protect, respond, and recover from cyber threats. It also would encourage development of a stronger cybersecurity workforce.
“Framework and Terminology for Understanding Cyber-Enabled Economic Warfare,” a new report by Samantha F. Ravich and Annie Fixler for the Foundation for Defense of Democracies.
Cyber-enabled economic warfare is a “hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power.”
For example, China’s economic theft of intellectual property from the U.S. is considered CEEW, along with Russia’s cyberattack on Estonia and Iran’s Saudi Aramco attack. The authors also contend that the U.S. sanctions on Iran using cyber means to cut off Society for Worldwide Interbank Financial Telecommunication access also falls under CEEW.
Only recently, the general view in the U.S. was that the less-free Chinese system created a poor environment for tech innovation. Put somewhat simply, the argument was that in a society without our kind of freedom of speech or unrestricted access to communication such as the Internet, people would miss out on information and ideas that come from a free system and feel more psychologically constrained from venturing off the beaten path with innovative ideas. The Chinese would be limited, in this view, to knock-offs of U.S. technologies.
The government has also cracked down on use of virtual private networks that Chinese, especially young people, have used to “climb the wall” (i.e. find sites outside the “Great Firewall of China”). And recently, there were media complaints that at the top elite universities such as Tsinghua the anti-VPN policy was not being enforced strictly enough.
Clearly, though, Chinese progress has taken place despite these restrictions.
we should not naively assume that all good (or bad) things go together. Maybe freedom of political and cultural expression is not as important as we have thought for advances, say, in information technology. But it still might be more important for development of less technical or scientific ideas such as public policy proposals or cultural expressions.
Mining social media has its potential to extract actionable patterns that can be beneficial for business, users, and consumers. Opinion mining from social media can be a faster and less expensive alternative to traditional survey and polling, on which many sustainability researches are based.
Crowd Capital Theory.
ex-post facto design
my opinion: format-wise – poorly written. No proofreading by the authors, but also by the peer-previewers.
Academic English does not recognize “get” and “put.” Sometimes, the ideas are not presented clearly. In-text citations need work: e.g. p. 946 “Andrews in 2012 said that may researchers indicate that the info…”; instead of “According to Andrews (2012), numerous researchers indicate the possibility of social network information to be used as a tool for spying.” Similarly, on page 947: ” (Saxton et al., 2012)” must be “Saxton et al., (2012)”
Verbs are missing: e.g. p. 946 “A case study on effect of social networking sites in emergency departments for patient care.”
p. 953 “in all these study” – adjective / subject disagreement.
content-wise, the article also presents ad-hod information, rather then clearly structured and delinted conclusions: e.g., on page p. 947, the authors announce as the goal of this study ” to investigate the role of “social networks” in creating a positive or negative impact on the social, behavioral and educational aspics of our community.”
None of the three links to the surveys are functional:e.g.,https://docs.google.com/forms/d/1yzVo2SL85iqr7CVRGDZ1bUGKzZPQOo4bBD42 CI9f9e8/viewform?c=0&w=1&usp=mail_form_link