Archive for the ‘privacy and security’ Category

Making Sense of Mobile Technology: The Integration of Work and Private Life

July 8, 2015 Comments off

Making Sense of Mobile Technology: The Integration of Work and Private Life
Source: Sage Open

Mobile technologies have facilitated a radical shift in work and private life. In this article, we seek to better understand how individual mobile technology users have made sense of these changes and adapted to them. We have used narrative enquiry and sensemaking to collect and analyze the data. The findings show that mobile technology use blurs the boundaries between work and private life, making traditional time and place distinctions less relevant. Furthermore, work and private life can be integrated in ways that may be either competitive or complementary. We also observed an effect rarely discussed in the literature—the way personal and professional aspirations affect how work and private life are integrated. Implications include the need for researchers and organizations to understand the wider consequences that arise from the integration of work and private life roles.

Inverse Privacy

July 7, 2015 Comments off

Inverse Privacy
Source: Microsoft Research

An item of your personal information is inversely private if some party has access to it but you do not. We analyze the provenance of inversely private information and its rise to dominance over other kinds of personal information. In a nutshell, the inverse privacy problem is unjustified inaccessibility to you of your inversely private information. We believe that the inverse privacy problem has a market-based solution.

Ethical Issues in the Big Data Industry

July 2, 2015 Comments off

Ethical Issues in the Big Data Industry (PDF)
Source: MIS Quarterly Executive (forthcoming)

Big Data combines information from diverse sources to create knowledge, make better predictions and tailor services. This article analyzes Big Data as an industry, not a technology, and identifies the ethical issues it faces. These issues arise from reselling consumers’ data to the secondary market for Big Data. Remedies for the issues are proposed, with the goal of fostering a sustainable Big Data Industry.

Internet Freedom Software Tools Developed by the United States Do Not Facilitate Cybercrime

July 1, 2015 Comments off

Internet Freedom Software Tools Developed by the United States Do Not Facilitate Cybercrime
Source: RAND Corporation

Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities, according to a new RAND Corporation study.

While some technologies supported by the State Department’s efforts have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited for criminal activity, according to the report.

EFF Report Charts Companies on Next Frontier of User Privacy — Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More

June 24, 2015 Comments off

EFF Report Charts Companies on Next Frontier of User Privacy — Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Source: Electronic Frontier Foundation

Our digital lives are leaving data trails through social networking sites, email providers, Internet service providers, and mobile apps. But which companies fight the hardest to protect their customers from government data grabs of this sensitive information? Today, the Electronic Frontier Foundation (EFF) released its fifth annual “Who Has Your Back” report, charting tech companies’ commitment to the next frontier of user privacy.

“Who Has Your Back” evaluates 24 companies, awarding up to five stars in categories like “tell users about government data requests” and “publicly disclose the company’s data retention policies.” Nine companies earned stars in every category available to them: Adobe, Apple, CREDO, Dropbox, Sonic, Wickr, Wikimedia,, and Yahoo.

Foreign Intelligence Gathering Laws

June 19, 2015 Comments off

Foreign Intelligence Gathering Laws
Source: Law Library of Congress

This report contains information on laws regulating the collection of intelligence in the European Union, United Kingdom, France, Netherlands, Portugal, Romania, and Sweden. The report details how EU Members States control activities of their intelligence agencies and what restrictions are imposed on information collection. All EU Member States follow EU legislation on personal data protection, which is a part of the common European Union responsibility.

2015 Security Breach Legislation

June 16, 2015 Comments off

2015 Security Breach Legislation
Source: National Conference of State Legislatures

At least 32 states in 2015 introduced or are considering security breach notification bills or resolutions. Many of the bills would amend existing security breach laws to:

  • Require entities to report breaches to attorneys general or another central state agency
  • Expand the definition of “personal information” (e.g., to include medical, insurance or biometric data) in cases of a security breach
  • Require businesses or government entities to implement security plans or various security measures
  • Require educational institutions to notify parents or government entities if a breach occurs.

Only three states–Alabama, New Mexico and South Dakota–do not currently have a law requiring consumer notification of security breaches involving personal information.