- 3D Printing
- Artificial Intelligence
- Big Data
- Cloud Computing
- Cyber bully
- Cyber intelligence sharing and protection act (CISPA)
- Cyber Attacks/Threats/Security
- Data Theft
- Decline of retail stores due to e-commerce and online shopping
- Decline of traditional news media
- Digital divide
- Digital millennium copyright act (DMCA)
- Fake News
- Information overload
- Internet Censorship
- Internet Dating
- Internet Fraud
- Internet of Things
- Job displacement
- M banking and Microfinance
- Malware and Spyware
- Money Laundering
- Nanotechnology/the gray goo/
- Net Neutrality
- Sharing Economy
- Smart Grid
- Social Media/Social Networking
- Technology addiction and diseases
- Telecommuting Virtual Reality & Augmented Reality
- Internet for the poor
- Fiber Cable Rationing
- Live streaming
- Electric Cars/Self-driving Cars
- Revenge Porn
This is a collection of articles and videos about the dangers, concerns and problems with 3D printing.
- “3D printing hack: Researchers crash drone with sabotaged propeller”
Researchers from three universities recently completed an attack on a 3D additive manufacturing system, highlighting the impact of potential security vulnerabilities in such systems.
- “The dark side of 3D printing: 10 things to watch”
Here are 10 concerns we need pay attention to in 3D printing
- “Researchers report cybersecurity risks in 3D printing”
Researchers examined two aspects of 3D printing that have cybersecurity implications: printing orientation and insertion of fine defects.
- “3 dangers society faces from 3D printing”
There are 3 dangers that 3D printing implies: Undetectable 3D printed weapons, 3D printed drugs, The fall of intellectual property
- “The health effects of 3D printing”
This article talks about some health issues regarding the ultrafine particles that 3D printers produce and the filaments used in 3D printing: Acrylonitrile-butadiene-styrene (ABS) and polylactic-acid (PLA).
- “Could 3D printing trigger World War 3? Expert warns technology could allow rogue states to manufacture nuclear weapons”
3D printing techniques made home manufacturing simpler, which gives people the opportunities to make weapons. It’s becoming a real danger for the society and the world.
- Video “TSA Keys Leak: Government Backdoors and the Dangers of Security Theater”
Johnny Christmas, a penetration tester in Chicago, Night owl and darksome 905, a system admin during the day and the founder of Tool New Jersey talk about the TSA master keys leak, and how people could make 3D printed keys that create a security problem.
- Video “The challenges and potential in the 3D printing industry – ExplainTheMarket”
The 3D printing industry in the UK faces a grave challenging with a need of around 200k new engineers in the industry, says Guy Shone from ExplainTheMarket.com as he joins today’s Tip TV Finance show to share insights on the 3D Printing industry, along with Bill Hubard, Chief Economist at Lead Capital Markets (trade.com), and Zak Mir, Technical Analyst at Zak’s Traders Cafe.
AI is a growing concern due to its self-learning and self-improve qualities which create threats on human intelligence and safety.
- “The White House has significant concerns on artificial intelligence”
The Obama administration published a report that examines the problems associated with the shift to an increasingly automated world.
- “Concerns of an Artificial Intelligence Pioneer”
An artificial intelligence pioneer Stuart Russel who is a computer scientist at the University of California, wants to make sure that the increasingly intelligent machines remain aligned with human values.
- “Robotics: Ethics of artificial intelligence”
Four leading researchers share their concerns and solutions for reducing societal risks from intelligent machines.
- “Artificial intelligence is about to conquer poker, but not without human help”
Kim, the 28-year-old Korean-American who is a high-stakes poker player who specializes in no-limit Texas Hold ‘Em. He and his fellow humans have no real chance of winning the when playing this game against an artificially intelligent machine.
- “Long term and short-term challenges to ensuring the safety of AI systems”
This article talks about some long term as well as short term challenges to ensure the safety of AI.
- “What’s the deal with artificial intelligence killing humans”
Your 101 guide to whether or not computers are going to murder us.
- “Rise of the machines: How dangerous is artificial intelligence?”
This article examines the dangers of artificial intelligence, but as always, things aren’t exactly black and white.
- “Our fear of artificial intelligence”
MIT Technology Review examines the fears we have towards Artificial intelligence.
- Government report “Preparing for the future of artificial intelligence”
From the history of AI, to the current state of AI. From applications to the considerations of AI. This report detailed examines what we should do to be prepared and create a healthy future of AI.
- “What happens when our computers get smarter than we are?
This ted talk leads us to think deeper about what we will be considering when AI is growing as smart as human beings.
- Ted Talk “How AI can bring on a second industrial revolution”
Our penchant for making things smarter and smarter will have a profound impact on nearly everything we do. Kelly explores three trends in AI we need to understand in order to embrace it and steer its development.
- Ted Talk “Can we build AI without losing control over it?”
We’re going to build superhuman machines, but we haven’t yet grappled with the problems associated with creating something that may treat us the way we treat ants.
Algorithm is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer. However, is it always right to let algorithms make decisions?
- “The dangers of letting algorithms enforce policy”
The dangers of letting algorithms make decisions in law enforcement, welfare, and child protection.
- “Ethics of Algorithms at a glance”
Ethics of Algorithms and why we should care about it.
- “The dangers of big data: how society is being controlled by mathematical algorithms”
Activist warns that big data algorithms are skewing financial decisions and increasing inequality in society.
- “Why we should expect algorithms to be biased”
We seem to be idolizing algorithms, imagining they are more objective than their creators.
- “From Holocaust Denial to Hitler Admiration, Google’s algorithm is dangerous”
Extremists are gaming Google’s algorithm and others. We need more accountability from tech giants.
- Report “Code-Dependent: Pros and Cons of the algorithm age”
Algorithms are aimed at optimizing everything. They can save lives, make things easier and conquer chaos. Still, experts worry they can also put too much control in the hands of corporations and governments, perpetuate bias, create filter bubbles, cut choices, creativity and serendipity, and could result in greater unemployment
- Ted Talk “How I’m fighting bias in algorithms”
MIT grad student Joy Buolamwini was working with facial analysis software when she noticed a problem: the software didn’t detect her face — because the people who coded the algorithm hadn’t taught it to identify a broad range of skin tones and facial structures. Now she’s on a mission to fight bias in machine learning, a phenomenon she calls the “coded gaze.” It’s an eye-opening talk about the need for accountability in coding … as algorithms take over more and more aspects of our lives.
Big data is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them. Challenges include capture, storage, analysis, data curation, search, sharing, transfer, visualization, querying, updating and information privacy.
- “Big data algorithms are manipulating us all”
Big Data has opened opportunities for a whole new class of professional gamers and manipulators, who take advantage of people using the power of statistics.
- “Request for information: Big Data and the future of privacy”
The current Big Data environment and future privacy problems.
- “Privacy and security issues in the age of big data”
Emerging big data scenarios has caused privacy & security concerns. These recautions can help to keep big data risk at bay.
- “The big dangers of ‘big data’”
Many people and institutions are intoxicated by the potential of big data，Konstantin Kakaes a program fellow at New America’s International Security Program, warns data can mislead us and not every valid judgment can be summed up in a number.
- “Blind faith in big data may be dangerous”
What the Big Bang Data exhibition at Somerset House tells us about the state of modern marketing
- Video “Ted Myerson: Big data needs big privacy”
Ted Myerson is co-founder of Anonos. Anonos BigPrivacy technology de-risks data to maximize its value while complying with privacy and security requirements. Privacy laws greatly restrict the sharing of medical data, which prevents researchers around the world from collaborating to find cures for diseases. However, there is a way to change how the data is shared that maintains privacy, so that researchers can look beyond their own labs and breakthroughs can happen.
- Video “Big Data Ethics”
In this Big Data & Brews Perspective, Datameer CEO, Stefan Groschupf, emphasizes the importance of a larger conversation in the United States around data ethics.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Is it really safe and accurate?
- “Biometrics are coming, along with serious security concerns”
The flourish of biometric identification, for example fingerprints and ear identifications bring in some serious security concerns.
- “Addressing risk in the application of biometric technologies”
The Stack discusses the emergence of biometrics with Diogo Mónica, Security Lead at Docker, and Kevin Curran, a senior computer science lecturer at the University of Ulster. Both experts are members of the Institute of Electrical and Electronics Engineers (IEEE) – a professional association working to advance, promote and coordinate research in biometric technology and applications.
- “Biometrics are less secure than passwords — this is why”
Around 20 percent of firms have actually deployed biometrics technology due to the fact that it’s less secure, and here’s the reason why.
- “Biometrics will replace passwords, but it’s a bad idea”
It’s a bad idea to replace passwords with biometric identification, and here’s why.
- “Is biometrics security the future of identity verification?”
Some people are beginning to favour biometric technology for online banking. But is it really the future of identity verification? Read the debate below and get involved, share your views.
- Video “Banking biometrics: hacking risks”
Biometric security such as fingerprint recognition is being hailed as safer and smarter than online passwords. But should fake fingerprints, selfie masks and voice hacking worry the wealthiest? The FT’s banking editor Martin Arnold reports.
Bitcoin is a cryptocurrency and a digital payment system invented by an unknown programmer, or a group of programmers, under the name Satoshi Nakamoto. It was released as open-source software in 2009.
- “We must regulate bitcoin. Problem is, we don’t understand it”
Why do we need to regulate Bitcoin and what are the challenges?
- “Risk of bitcoin hacks and losses is very real”
New data disclosed to Reuters shows a third of bitcoin trading platforms have been hacked, and nearly half have closed in the half dozen years since they burst on the scene.
- “Bitcoin is the world’s most dangerous idea”
This research is courtesy of Sander Duivestein, professional speaker and trendwatcher at VINT, the International Research Institute of Sogeti. It tells you a story about history.
- “The secret, dangerous world of Venezuelan Bitcoin Mining”
How cryptocurrency is turning socialism against itself.
- “The Looming Problem That Could Kill Bitcoin”
The man who took over stewardship of Bitcoin from its mysterious inventor says the currency is in serious trouble.
- “Can bureaucrats really regulate bitcoin?”
Discussion about bitcoin regulation often resembles mixing oil and water. This becomes more apparent as governments and bureaucrats worldwide ponder how they can apply regulatory policy to bitcoin. As the cryptocurrency gains significant popularity, the question arises: ‘Can bitcoin be regulated?
- “Bank of Canada report says we should regulate bitcoin like 1800s money”
A new staff report from the Bank of Canada says just the opposite: to work in Canada, virtual currencies like bitcoin will require significant government intervention, it argues.
- “The United States is falling behind in bitcoin regulation”
Although the United States started out as the leader in Bitcoin regulation, it is now falling behind other jurisdictions, such as the United Kingdom, where innovation in fintech and digital currency is being embraced with open arms.
- Video series “Trust Disrupted: Bitcoin and the Blockchain”
The six-episode series, produced by Stateless Media, examines the rise of Bitcoin and the tech that allows it to operate.
S1:E1 “In the beginning”: https://techcrunch.com/video/truth-disrupted-bitcoin-and-the-blockchain-s1e1-in-the-beginning/57f581cb5095497719f427b2/
The first episode will answer all your questions about the Bitcoin platform and how it works. Why did futurists want to create a totally digital currency? How would it work?
S1:E2 “Mines and Miners”: https://techcrunch.com/video/mines-and-miners-truth-disrupted-bitcoin-and-the-blockchain-s1e2/57f5832a5095497719f427b5/
Even more fascinating than the idea of a digital currency are those who dedicate their lives to it. A network of miners all across the world, many of whom are in China, run the system. They not only process every Bitcoin transaction, but they also play a large role in governing the platform, for better or for worse. Episode two looks at where these Bitcoin mines are developing and who is behind them. It also explores the role of these miners, the decision power that they posses and the delicate balance of power required for the platform to operate in the way in which it was intended.
S1:E3 “In search of itself”: https://techcrunch.com/video/in-search-of-itself-trust-disrupted-bitcoin-and-the-blockchain-s1e3/57f584b95095497719f427b8/
As Bitcoin has grown, it’s been forced to contend with a flood of traffic on the network. Developers are divided about what to do. The scalers want more transactions running through the blockchain. The decentralizers say this threatens Bitcoin’s character. Now, Bitcoin must choose what it wants to be and that’s the core of the third episode in our series on Bitcoin and the Blockchain. Should the number of transaction be increased? Or should Bitcoin be smaller to ensure its security?
S1:E4 “Blockchain on the rise”: https://techcrunch.com/video/blockchain-on-the-rise-trust-disrupted-bitcoin-and-the-blockchain-s1e4/57f5859b5095497719f427bd/
With Bitcoin facing an uncertain future, the technology behind Bitcoin — the blockchain — is poised to overtake its original application. Startups, central banks and massive financial institutions in New York, London, Shanghai and elsewhere are starting to get in on the game.
S1:E5 “Ethereum’s blockchain”: https://techcrunch.com/video/ethereums-blockchain-truth-disrupted-bitcoin-and-the-blockchain-s1e5/57f586375095497719f427bf/
In this episode we catch up with the founder of Ethereum, Vitalik Buterin, and dive into its implications in the world of cryptocurrency. Ethereum is considered the most exciting innovation using blockchain technology, as its use cases go beyond that of bitcoin and could eventually have more overarching effects on how we run the world. However, after a recent hack of its Decentralized Autonomous Organization, its future is uncertain.
S1:E6 “Co-opt vs. Disrupt?”: https://techcrunch.com/video/co-opt-vs-disrupt-truth-disrupted-bitcoin-and-the-blockchain-s1e6/57f587195095497719f427c4/
The final episode of this six-part series explores the future implications of Bitcoin and blockchain technology. The episode describes the divide between Wall Street’s preferred closed use of the blockchain and Silicon Valley’s vision of an open system. Will the technology ever be integrated into our world’s mainstream economy? Whose vision will prevail, Wall Street or Silicon Valley?
- Video “Hidden dangers of Bitcoin”
Bitcoin is a revolutionary decentralized architecture which can be used for an untold number of incredibly valuable services – including the transfer of financial value. As Bitcoin adoption continues to expand, significant interests are threatened and early users could face an incredibly dangerous backlash. Please protect yourself, a fight is coming…
- Ted Talk “The future of money”
What happens when the way we buy, sell and pay for things changes, perhaps even removing the need for banks or currency exchange bureaus? That’s the radical promise of a world powered by cryptocurrencies like Bitcoin and Ethereum. We’re not there yet, but in this sparky talk, digital currency researcher Neha Narula describes the collective fiction of money — and paints a picture of a very different looking future.
A blog is a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style. However, blogs also bring some concerns and challenges to people in modern society.
- “How blogging puts you at risk (and how to safeguard your privacy)”
While marketers playing with big data might seem like not such a big deal, that data can also be used as a weapon against you. And your blog opens you up to more risk than the average internet user. Don’t wait until it’s too late: Here’s how to take action to safeguard your privacy today.
- “Dangers of online blogging”
There are more than 71 million blogs out on the Internet. These simple Web sites are often used for news or commentaries on a particular subject. They can also function as personal online diaries. That’s where serious trouble can erupt.
- “5 common blogging problems, and how to overcome them”
Blogging provides anyone with the opportunity to publish content and the potential to make money. Because of this, there are hundreds or thousands of new blogs launched every day. Unfortunately, there are some significant challenges that most new bloggers face, and in many cases the challenges are significant enough to lead the blogger to give up.
- “The stream-the dangers of blogging in Bangladesh”
Bloggers being killed again in Bangladesh. What is happening?
- “Rise of the Content Machines: How Blogs Became a Secret Weapon”
The best content marketers are leveraging insider expertise to make their blogs authoritative go-to pages and SEO stars.
- “Anorexia expert accuses ‘dangerous’ wellness bloggers like the Hemsley sisters of sparking a rise in eating disorders”
Blogger Grace Victory hosted BBC3’s Clean Eating’s Dirty Secret. Put plant-based diets to the test and interviewed experts. Director of an eating disorders clinic described the fad as ‘dangerous’.
A bot is an autonomous program on a network (especially the Internet) that can interact with computer systems or users, especially one designed to respond or behave like a player in an adventure game.
- “As a conservative Twitter user sleeps, his account is hard at work”
Daniel John Sobieski, a retiree in Chicago, is able to tweet more than 1,000 times a day using “schedulers” that work through stacks of his own pre-written posts in repetitive loops. (Alyssa Schukar for The Washington Post)
- “How twitter bots are shaping the election”
Between the first two presidential debates, a third of pro-Trump tweets and nearly a fifth of pro-Clinton tweets came from automated accounts.
- “Why the rise of bots is a concern for social networks”
A number of brands have experimented with social bots that can help them improve their customer process. A growing amount of social media content is generated by autonomous entities known as social bots.
- “How bad bots are destroying the internet”
Bots outnumbered people on the web. How is that bad?
- “How to tell if you’re being overrun with bot traffic”
Not all traffic is created equal, and you might be surprised to learn that a good portion of your site traffic — in some cases, well over half — isn’t even human, but bot traffic.
- Video “Understanding the hidden dangers of bots and scrapers”
In this video for website security, find out why blocking all web bots is a flawed strategy; how much of bot traffic is good vs. bad; what bad bots do on your site; and 3 ways to manage Internet bots.
- Video “Understanding the bot problem and identifying its impact on your business”
The impact that bots have on your organization goes beyond just having lots of traffic. Bots affect everybody differently, from your IT team to your web, marketing and security teams. Before you can look for a solution to address your bot problem, you have to first understand what that bot problem actually is. Learn how to identify your stakeholders and pull them into the conversation to get the full context of the problem that you’re trying to solve.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
- “Top 5 risks of cloud computing”
Here are the top 5 risks of cloud computing
- “Visibility, security top concerns for cloud computing adoption”
Enterprises are concerned about where their data is located and how it’s protected
- “The Risks Involved in Cloud Computing”
Problems Associated with Cloud Computing and How Companies can Tackle Them
- “Danger in the cloud”
Digital dangers abound in computing on the Cloud.
- “The dangers of trusting cloud computing over personal storage”
3 dangers associated with cloud computing: Security Accessibility and Longevity.
- “Can we trust cloud providers to keep our data safe?”
Cloud computing – storing data and applications remotely rather than on your own premises – can cut IT costs dramatically and speed up your operations. But is it safe?
- Video “CIO Network: Cloud Hype vs. Reality”
General Catalyst Managing Director Steve Herrod, Andeessen Horowitz General Peter Levine, and Accel Partner Rich Wong talk about hype versus reality in the future of cloud computing and business technologies. They speak with WSJ’s Rolfe Winkler at the CIO Network in San Francisco.
- Report “The Department of Defense and the Power of Cloud Computing. Weighing acceptable cost versus acceptable risk”
The Department of Defense (DOD), because of its size and mission, faces significant opportunities and security challenges when implementing a cloud computing environment. A cloud configuration introduces new potential security that DOD IT professionals must weigh when evaluating the potential cost savings associated with cloud computing.
The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.
- “The problems with crowdsourcing and how to fix them”
What are the challenges of using the crowd to find solutions to technical problems, and how can we overcome them?
- “Reddit’s hate problem”
Ellen Pao has left the room, but the firm still has to keep a volunteer staff happy while tempering its approach to free speech
- “Collecting data using crowdsourcing marketplaces raises ethical questions for academic researchers”
The ethical implications of using crowdsourcing marketplaces demand further attention. To safeguard academic progress and public trust in research it is imperative that we treat participants as stakeholders in research and not as passive objects or merely a human resource.
- “4 real challenges to crowdsourcing for social good”
Here are 4 challenges of crowdsourcing for social good.
- Report “Research in the crowdsourcing age, a case study”
How scholars, companies and workers are using Mechanical Turk, a ‘gig economy’ platform, for tasks computers can’t handle
- Video “Crowdsourcing: challenges facing the crowd”
Professor Karim Lakhani, James DeJulio (Tongal), and Greg Lipstein (DrivenData) discuss the challenges that crowdsourcing platforms face in teaching organizations how to use the crowd model and carefully calibrating the ideal amount of participation.
- Video “Crowdsourcing cybersecurity”
Entrepreneur Jay Kaplan, co-founder and CEO of Synack, describes how the idea of creating a cybersecurity service for enterprise businesses by crowdsourcing hackers went from sounding like a long shot to launching as a venture capital-backed startup. Kaplan, previously a senior analyst at the National Security Administration, talks about the virtues of government work and the nuances of “white hat” hacking.
Cyberbullying occurs through the use of electronic communication technologies, such as e-mail, instant messaging, social media, online gaming, or through digital messages or images sent to a cellular phone.
- “Technology gave rise to cyber bullying. Can it also stop it?
Twitter announced policy changes aimed at promoting safe discourse for users of the social network. The updates are the latest in efforts by social media companies, researchers, and others to end online abuse and harassment using innovation and technology.
- “Teen who shot herself in front of her parents is still being bullied”
Raul Vela, who watched his daughter die two weeks ago, doesn’t want peace or quiet. He wants action.
- “To fight cyberbullying, ban cellphones from school”
Two years ago, when Mayor de Blasio and Schools Chancellor Carmen Fariña lifted the ban on cellphones in New York City public schools, they also instituted what they called a “Misuse It, You Lose It” policy to prevent cyberbullying — which has increased 351 percent in that time.
- “Parents worry more about cyberbullying than drugs, alcohol”
PARENTS are far more concerned about cyberbullying and online safety than they are with drugs and alcohol, according to new research.
- “Why is cyber bullying a problem”
Cyber bullying is at an all-time high and it doesn’t seem to be slowing down. Bullies who used to be in the schoolyard threatening to beat up someone if they didn’t give them their lunch money, are now online posing as anyone they want to in order to avoid being caught. How can modern day law enforcement keep up with the challenges of cyber bullying as it continues to increase? Learn why is Cyber Bullying a problem?
- Ted Talk “How online abuse of women has spiraled out of control”
Enough with online hate speech, sexual harassment and threats of violence against women and marginalized groups. It’s time to take the global crisis of online abuse seriously. In this searching, powerful talk, Ashley Judd recounts her ongoing experience of being terrorized on social media for her unwavering activism and calls on citizens of the internet, the tech community, law enforcement and legislators to recognize the offline harm of online harassment.
- Video “Cyberpsychologist Aiken on catching online bullies”
With Wi-Fi-connected smart phones and other on-the-go devices, people are constantly plugged in online, but that has also given rise to a disturbing trend – cyberbullying. Twitter and Instagram have both announced steps to help users filter out abusive comments, but cyber psychologist Mary Aiken believes they aren’t doing enough.
- Ted Talk “How we talk about sexual assault online?”
We need a more considered approach to using social media for social justice, says writer and activist Ione Wells. After she was the victim of an assault in London, Wells published a letter to her attacker in a student newspaper that went viral and sparked the #NotGuilty campaign against sexual violence and victim-blaming. In this moving talk, she describes how sharing her personal story gave hope to others and delivers a powerful message against the culture of online shaming.
Cyber intelligence sharing and protection act (CISPA)
CISPA is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.
- What is CISPA?
Check out what is CISPA at the congress website.
- “CISPA: cyber security or a threat to privacy?”
The problem up to this point in mounting an effective defense against these threats has been the lack of a clear legal framework defining who is responsible for what.
- “Critical problems with CISPA”
The Cyber Intelligence Sharing and Protection Act (CISPA, or H.R. 624) has eight critical problems that threaten civil liberties and render the bill unacceptable.
- “Everything You Need To Know About The Cybersecurity Bill Privacy Advocates Are Warning You About”
By most assessments, privacy protections and regulatory definitions in CISPA have some gaping holes— even many security experts agree.
- Video “CISPA rises from the Grave”
CISPA (the Cyber Intelligence Sharing and Protection Act) is back after it has been killed in congress two times already. Senators including Dianne Feinstein are trying to launch a new version of the act and try and get it passed a third time in spite of widespread concern about the bill’s implications for civil liberties of Americans. We look at the real life horror story in Washington on this clip from the Buzzsaw news with Tyrel Ventura and Tabetha Wallace.
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.
- “Small business cyber attacks that stole thousands”
A cyber attack at a small business rarely makes headlines. This can lull your clients into a false sense of security.
- “2016 Predictions for small business cyber security (part 1 of 2)”
“2016 Predictions for small business cyber security (part 2 of 2)”
2016 is here and we have a full year of cyber security news and trends ahead of us. But what happened last year? And what does it mean for 2016? Read on to find out.
- “The next generation of cyber attacks — PDoS, TDoS, and others”
2016 was a landmark year in cyber security. The cyber landscape was rocked as Internet of Things (IoT) threats became a reality and unleashed the first 1TB DDoS attacks — the largest in history. Security experts had long warned of the potential of IoT attacks, and a number of other predictions also came true; Advanced Persistent Denial of Service (APDoS) attacks became standard, ransom attacks continued to grow and evolve and data protection agreements dominated privacy debates. So what’s coming in 2017?
- “Why America’s current approach to cybersecurity is so dangerous”
It treats users like they are the problem, when they should be part of the solution.
- National Telecommunications & information Administration blog article “Lack of trust in internet privacy security may deter economic and other online activities”
Every day, billions of people around the world use the Internet to share ideas, conduct financial transactions, and keep in touch with family, friends, and colleagues. Users send and store personal medical data, business communications, and even intimate conversations over this global network. But for the Internet to grow and thrive, users must continue to trust that their personal information will be secure and their privacy protected.
- Pew Research Center Report “Americans and cybersecurity”
Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives.
- Ted Talk “where is cybercrime really coming from”
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely information on who is infected and how the disease is spreading. If we’re not sharing, he says, then we’re part of the problem.
- Ted Talk “We can fight terror without sacrificing our rights”
Can we fight terror without destroying democracy? Internet freedom activist Rebecca MacKinnon thinks that we’ll lose the battle against extremism and demagoguery if we censor the internet and press. In this critical talk, she calls for a doubling-down on strong encryption and appeals to governments to better protect, not silence, the journalists and activists fighting against extremists.
Data theft is a term used to describe when information is illegally copied or taken from a business or other individual. Commonly, this information is user information such as passwords, social security numbers, credit card information, other personal information, or other confidential corporate information.
- “Lifelock once again failed at its one job: protecting data”
CUSTOMERS WHO HIREd the infamous ID theft-protection firm Lifelock to monitor their identities after their data was stolen in a breach were in for a surprise. It turns out Lifelock failed to properly secure their data.
- “Indian Android smartphone are at data theft risk: Experts”
Cybersecurity experts in India are concerned over backdoor spyware found in US Android phones by Kryptowire.
- “How companies can deal with insider data theft”
The recent arrest of a former NSA contractor is just the latest high-profile example.
- Video “Is your personal data ever really private?”
Americans can’t be blamed for questioning whether their digital data is ever entirely secure. online identities are always at risk, consumers should take steps to protect themselves, especially when it comes to sensitive data linked to financial accounts or email, cybersecurity experts say.
- Report “Privacy and information sharing”
Many Americans say they might provide personal information, depending on the deal being offered and how much risk they face.
Decline of retail stores due to e-commerce and online shopping
Online shopping is getting more convenient and popular. People can buy everything online. Retail store economy declines and stores close rapidly.
- “From mall madness to sadness: why shopping centers will soon be obsolete”
Retail shops need to act fast. Ecommerce is on the rise, while brick and mortar shops around the country are closing their doors.
- “There’s a ‘dirty open secret’ in retail, and it’s killing Macy’s and Gap”
It’s getting harder than ever to persuade people to visit physical stores with the rise of online shopping, Forbes contributor Barbara Thau writes, calling falling foot traffic a “dirty open secret” in the industry.
- “5 Things That Defined 2016’s Year In Retail”
For all the factors in their favor in 2016—falling unemployment, a recovering housing market, low gas prices and (slowly) rising wages—many large U.S. retailers had a pretty crummy year.
- “4 Reasons the Retail Industry Is Declining”
It’s no secret the retail industry has seen a decrease in in-store sales over the last few years. Here are the four biggest offenders that have contributed to the widespread decline of brick-and-mortar sales.
- “Why retail chain store locations are being closed”
Online Competition on Price, Choice and Convenience.
- “The ugly (retail) truth: which stores will close or survive”
More than a dozen retailers are shuttering hundreds of doors, while others kiss the American shopping landscape goodbye forever. While no means a definitive list, here’s a Cliff Note’s-style rundown of 10 chains closing stores and liquidating their fleet, and a look at the saving-grace strategies of the merchants sticking around—for now.
- “A giant wave of store closures is about to hit the US”
Retailers are bracing for a fresh wave of store closures at the start of the new year. The industry is heading into 2017 with a glut of store space as shopping continues to shift online and foot traffic to malls declines, according to analysts.
- Video “It’s not just Macy’s: Department stores are in a death spiral”
By most accounts, it was a strong holiday season for America’s retailers. Consumer confidence has surged, thanks to low unemployment and the “Trump Bump” pushing stocks skyward, and analysts projected holiday spending would be up as much as 10% compared to the 2015 season.
- Video “These 3 charts show why department stores are in danger”
Economic prognosticators have been predicting the death of department stores for generations, only to be proven wrong. These days, though, the doomsayers have numbers on their side.
- Report “Online shopping and E-commerce”
New technologies are impacting a wide range of Americans’ commercial behaviors, from the way they evaluate products and services to the way they pay for the things they buy
Decline of traditional news media
Mobile apps and internet portals are flourishing. People are able to get quick access to those resources. What’s the destiny of newspapers?
- “Study: Decline of traditional media feeds polarization”
NO ONE DENIES we now have access to immeasurably more information, and that everyone has become capable of publishing and having a public voice. But we must reflect about the possible harm the transformations we are living may bring to the quality of the whole news environment.
- “Who killed the newspaper?”
The most useful bit of the media is disappearing. A cause for concern, but not for panic.
- “The declining value of U.S. newspapers”
Over the past two decades, major newspapers across the country have seen a recurring cycle of ownership changes and steep declines in value.
- “The print apocalypse and how to survive it”
With paper ads in massive decline, legacy newspapers like The New York Times are slowly returning to the business models that dominated the ’30s—the 1830s.
- “Goodbye to the age of newspapers (hello to a new era of corruption)
Why American politics and society are about to be changed for the worse.
- Report: “State of the news media 2016”
Eight years after the Great Recession sent the U.S. newspaper industry into a tailspin, the pressures facing America’s newsrooms have intensified to nothing less than a reorganization of the industry itself, one that impacts the experiences of even those news consumers unaware of the tectonic shifts taking place.
A digital divide is an economic and social inequality with regard to access to, use of, or impact of information and communication technologies (ICT).
- “The digital divide is not binary”
ECONOMIC GROWTH AND social inclusion, critical issues for many countries, will be promoted by bringing the four-plus billion non-Internet users around the world online. The common view of this digital divide is that it separates the Internet “haves” from the “have-nots”; dividing those who are online from those who would like to get online, but are prevented based on the availability or affordability of access.
- “The Challenges of Closing the Digital Divide”
United States history is marked by modernization efforts aimed at leaving no one behind. In the 1930s, it was lighting up farmsteads with electricity. In the 1950s, it was paving highways to every town. Today, the federal government is trying to bring broadband, which it considers a utility, to an estimated 33 percent of residents who don’t have the service.
- “The Unacceptable Persistence of the Digital Divide”
Millions of Americans lack broadband access and computer skills. Can President Trump bring them into the digital economy?
- “Bridging a Digital Divide That Leaves Schoolchildren Behind”
Tony and Isabella Ruiz, with their younger brother, Leo, used a nearby school’s Wi-Fi to download homework assignments onto their smartphones. Their family, in McAllen, Tex., has no Internet access at home.
- “Closing the digital divide isn’t easy-but we have to try”
The poorest people, who might benefit most from Internet access, are often the least.
- “The homework gap: the cruelest part of the digital divide”
Educators have been talking about the “digital divide” for two decades, and while some progress has been made in closing the gap, inequities persist in communities across the country. Major efforts have been undertaken to improve access to new technologies in lower-income school districts, but as more teachers turn to digital learning, Keith Krueger, CEO of the Consortium for School Networking (CoSN) worries that “technology will be one more way to expand inequities rather than a bridge to narrow.”
- Report Digital Divides 2016”
Lee Rainie is giving a keynote address at the Internet Governance Forum, discussing the digital divide that exists in 2016.
- Report “Digital Readiness Gaps”
Americans fall along a spectrum of preparedness when it comes to using tech tools to pursue learning online, and many are not eager or ready to take the plunge. In this report, we use newly released Pew Research Center survey findings to address a related issue: digital readiness. The new analysis explores the attitudes and behaviors that underpin people’s preparedness and comfort in using digital tools for learning as we measured it in a survey about people’s activities for personal learning.
- Video “A tale of two fridges – the digital divide reaches the kitchen”
Samsung’s new super-smart fridge is coming to New Zealand, but will it live as long as a 1960 Fisher & Paykey?
- Ted Talk “Your smartphone is a civil rights issue”
The smartphone you use reflects more than just personal taste … it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on Apple and Android devices and urges us to pay attention to a growing digital security divide. “If the only people who can protect themselves from the gaze of the government are the rich and powerful, that’s a problem,” he says. “It’s not just a cybersecurity problem — it’s a civil rights problem.”
Digital millennium copyright act (DMCA)
The Digital Millennium Copyright Act is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO).
- “We Can’t Let John Deere Destroy the Very Idea of Ownership”
Over the last two decades, manufacturers have used the DMCA to argue that consumers do not own the software underpinning the products they buy—things like smartphones, computers, coffeemakers, cars, and, yes, even tractors.
- “A dozen bad ideas that were raised at the copyright office’s DMCA Roundtables”
The Copyright Office has been holding a series of “roundtable discussions” on copyright reform that it’s going to use to produce a paper supporting certain changes to copyright law. We already know that some sort of copyright reform bill is expected in the near future, and what comes out of this whole process is going to be fairly important. Unfortunately, the roundtables are not encouraging. There was one held in NY a few weeks ago, which Rebecca Tushnet blogged about in great detail, and I attended the ones last week in San Francisco and I’ve gathered up my tweeted commentary, if you feel like reading through it.
- “Internet archive: Proposed changes to DMCA would make us ‘censor the web’”
Copyright law — specifically, the 1998 addition known as the Digital Millennium Copyright Act — is everywhere. It’s applied to everything, because everything is software-driven, and it’s frankly starting to get more than a little awkward. That’s okay; laws age. So it’s time for an update, right? Except naturally, some of the changes being mulled over right now could be terrible for everyone who isn’t a giant corporation, because of course. Today’s warning comes from the Internet Archive, which is speaking out in no uncertain terms against proposed changes.
- “Three years later, DMCA still just as broken”
In 2013, CPIP published a policy brief by Professor Bruce Boyden exposing the DMCA notice and takedown system as outdated and in need of reform. The Failure of the DMCA Notice and Takedown System explained that while Section 512 of the DMCA was intended as a way for copyright owners and service providers to work together to fight infringement in the digital age, the notice and takedown system has been largely ineffective in managing the ever-increasing amount of piracy.
- “America’s broken digital copyright law is about to be challenged in court”
The Electronic Frontier Foundation is suing the US government over ‘unconstitutional’ use of the Digital Millennium Copyright Act
- Report explains DMCA
Part I of this Report describes the circumstances leading up to the enactment of the DMCA and the genesis of this study. Part I also examines the historical basis of sections 109 and 117 of the Act. Part II discusses the wide range of views expressed in the public comments and testimony. This input from the public, academia, libraries, copyright organizations and copyright owners formed the core information considered by the Office in its evaluation and recommendations. Part III evaluates the effect of title I of the DMCA and the development of electronic commerce and associated technology on the operations of sections 109 and 117 in light of the information received and states our conclusions and recommendations regarding the advisability of statutory change.
People nowadays don’t need to gamble at casinos. Online gambling is in the way to affect people’s lives. However, is online gambling safe?
- “The impacts of internet gambling and other forms of remote gambling on the EU gambling market”
Since the emergence of the internet in the 1990s, an increasing number of gambling services have come available on-line or through other new remote communications technologies. The rapid technological advancements, commercial initiatives, and market penetration of such commerce have made this sector of the gambling services industries extremely dynamic and potentially transformative in the years ahead.
- “Teens are gambling online at a significantly higher rate than previously reported”
Nearly 10 percent of teens in three Canadian provinces said they had gambled online in the past three months, according to a new study. It’s the first Canadian-based study to find such high levels of online gambling among youth. Of all adolescents surveyed, 42 percent had gambled money or something of value in offline or online gambling.
- “Counter-Strike has spawned a wild multibillion-dollar world of online casino gambling; it’s barely regulated and open to any kid who wants in.”
Counter-Strike has spawned a wild multibillion-dollar world of online casino gambling; it’s barely regulated and open to any kid who wants in.
- “Concerns that legalized online gambling may lead to more problem gambling and social ills”
Experts have voiced concerns that legally allowing punters to place bets online may lead to more problem gambling and social ills in Singapore.
- “Online gambling is more dangerous than going to a casino”
If you have friends or relatives in Singapore who are addicted to online gambling, keep them offline before they lose everything they have.
- “Dangers of online gambling”
With hundreds of gambling websites operating today, it is easier than ever to indulge in casino games, lottery and sports betting. Living has become fast and furious lately, making frequent visits to brick and mortar casinos a very hard feat to pull off for many of us.
- “Online gambling firms shut down”
MANILA, Philippines – President Duterte has ordered the closure of all online gambling firms, saying the government is not getting proper taxes from their operations.
- Video “Philippines seeks offshore inline gaming amid crackdown at home”
The Philippines’ state-owned gambling regulator is targeting the overseas online gaming market for more business after the agency’s crackdown at home threatens to shrink revenue. Gaming agency plans offshore betting restricted to foreigners. Regulator may issue casino licenses outside capital city.
Pornography is rampant. People get access to it freely, including children and teenagers. They can easily click “Yes, I am over 18 years old” even though they are not.
- “PORN: benefits of technology exacerbate a societal problem”
I write frequently about the ways that the computing revolution impacts the lives of individuals, businesses and societies. Many if not most of these impacts are positive. But one glaring ill has been amplified many-fold by technology: The widespread prevalence of pornography.
- “Is pornography a public health threat?”
Figuring out the risk-to-benefit ratio of watching pornography may just top the ranks of controversial topics scientists can’t seem to completely agree on. But one thing’s for sure: Americans like watching porn — and lots of it.
- “Utah bill raises questions about public health effects of porn”
Rachel Martin talks with sex therapist Ian Kerner about the new bill in Utah that declares porn a public health crisis. Kerner says that porn addiction doesn’t exist, and has never been diagnosed.
- “Utah will become the first state to declare porn a ‘public health hazard’ as governor signs resolution to combat ‘a sexually toxic environment’”
Utah Governor Gary R. Herbert will sign two pieces of legislation today. Resolution declares porn ‘health hazard’, other is bill on child pornography. There will be no ban on porn introduced, aim is to educate young people. Bill sponsor State Sen. Todd Weiler compared ‘addictive’ porn to tobacco.
- “Secular groups decry porn’s harmful effects”
The internet has helped pornography become a $97 billion industry. Activists say studies show frequent use affects the brain, causes problems forming healthy relationships
- Video “The dangers of pornography! Shocking”
This is a great video talks about some dangers of pornography.
Electronic voting (also known as e-voting) is voting using electronic means to either aid or take care of the chores of casting and counting votes. However, is online voting flawless and perfectly fair?
- “The dangers of internet voting”
According to computer experts, Internet voting is vulnerable to cyber-attack and fraud—vulnerabilities inherent in current hardware and software, as well as the basic manner in which the Internet is organized. It is unlikely that these vulnerabilities will be eliminated at any time in the near future.
- “No, voter fraud actually isn’t a persistent problem”
Politicians and voting rights advocates continue to clash over whether photo ID and other voting requirements are needed to prevent voter fraud, but a News21 analysis and recent court rulings show little evidence that such fraud is widespread.
- “E-Voting Refuses to Die Even Though It’s Neither Secure nor Secret”
More than two dozen states offer some form of internet voting, but it often means waiving the right to a secret ballot.
- “Utah’s Online Caucus Gives Security Experts Heart Attacks”
SECURITY RESEARCHERS PRETTY much uniformly agree that letting people vote online is a very bad idea, one that is fraught with risks and vulnerabilities that could have unknowable consequences for the future of democracy.
- “Online voting could be really convenient, but it’s still probably a terrible idea.”
Even as online voting is on the rise in the United States and elsewhere, experts warn its convenience isn’t worth its costs.
- “Online voting systems raise hacking concerns”
Voting can be as easy as a click of the mouse – but is it secure?
- Video “Hacker demonstrates how voting machines can be compromised”
Concerns are growing over the possibility of a rigged presidential election. Experts believe a cyberattack this year could be a reality, especially following last month’s hack of Democratic National Committee emails.
Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics which are destined for reuse, resale, salvage, recycling, or disposal are also considered e-waste.
- “E-waste dangers”
Problems can occur when devices break — intentionally or accidentally. Then they can leak and contaminate their immediate environment, whether that’s in a landfill or on the streets within a region full of struggling laborers. Over time, the toxic chemicals of a landfill’s e-waste can seep into the ground (possibly entering the water supply) or escape into the atmosphere, affecting the health of nearby communities. As we discussed on the previous page, the jury is still out on the danger level of this e-waste contamination, but it’s safe to assume that the results are probably not good.
- “Asia’s E-Waste Problem Is Getting Out of Hand”
The average Asian adult disposes of far less gadgetry than a Westerner, but many of the continent’s nations are ill-equipped to process the waste.
- “Why you should never throw away your old tech”
If you just got a brand new TV, gaming console or smartphone for the holidays, you’re probably trying to figure out what to do with your old model. It can be pretty temping to just toss your aging iPhone 4S or Xbox 360 in the trash like regular garbage, but that’s the absolute last thing you should do. Why? Let’s check it out.
- “Take responsibility for electronic-waste disposal”
International cooperation is needed to stop developed nations simply offloading defunct electronics on developing countries, argue Zhaohua Wang, Bin Zhang and Dabo Guan.
- “American’s toxic electronic waste trade”
Discarded computer and electronics parts wait to be recycled on Dec. 11, 2014, in Beijing, China. Many American companies ship their electronic waste to countries like China to avoid the costs of disposing of it.
- “The global cost of electronic waste”
Computers, phones, and other digital devices increasingly are made to be thrown away—which is bad for both consumers and the environment.
- Video “The circuit: Tracking America’s electronic waste”
You buy a new phone or computer and you take your old one to a local recycler. It’s the green thing to do, right? Well, it turns out a lot of those devices may not be getting recycled at all. The United States is the single largest producer of electronic waste, generating almost 8 million tons a year. Our EarthFix team follows the e-waste trail.
Fake news is a type of yellow journalism that consists of deliberate misinformation or hoaxes spread via the traditional print, broadcasting news media, or via Internet-based social media. Fake news is written and published with the intent to mislead in order to gain financially or politically, often with sensationalist, exaggerated, or patently false headlines that grab attention.
- “Fake news is about to get even scarier than you ever dreamed”
What we saw in the 2016 election is nothing compared to what we need to prepare for in 2020.
- “Why fake news is a tech problem”
With fake news wrecking everything, Silicon Valley is our last hope.
- “Should twitter delete Donald Trump’s account over fake news concerns?”
With concerns about fake news on social media sites heightening after the election, some of Clinton’s former aides — including former campaign spokesman Jesse Ferguson — and supporters argue that Trump’s tweet ran afoul of the company’s rules about online conduct.
- “How Fake News Goes Viral: A Case Study”
While some fake news is produced purposefully by teenagers in the Balkans or entrepreneurs in the United States seeking to make money from advertising, false information can also arise from misinformed social media posts by regular people that are seized on and spread through a hyperpartisan blogosphere.
- “2016 Lie of the Year: Fake news”
In 2016, the prevalence of political fact abuse – promulgated by the words of two polarizing presidential candidates and their passionate supporters – gave rise to a spreading of fake news with unprecedented impunity.
- “Inside the Macedonian fake news complex”
The first article about Donald Trump that Boris ever published described how, during a campaign rally in North Carolina, the candidate slapped a man in the audience for disagreeing with him. This never happened, of course. Boris had found the article somewhere online, and he needed to feed his website, Daily Interesting Things, so he appropriated the text, down to its last misbegotten comma. He posted the link on Facebook, seeding it within various groups devoted to American politics; to his astonishment, it was shared around 800 times. That month—February 2016—Boris made more than $150 off the Google ads on his website. Considering this to be the best possible use of his time, he stopped going to high school.
- “Revealed: How dangerous fake health news conquered Facebook”
Misinformation published by conspiracy sites about serious health conditions is often shared more widely than evidence-based reports from reputable news organizations.
- “’Pizzagate’ and the real danger of fake news”
The internet has always had its fair share of fake news and hoaxes, but it wasn’t until recently that it’s become an issue of national importance. One of the more vexing questions is whether or not fake news could have influenced the outcome of the election — would a false story about the Pope endorsing Trump be enough to sway voters, for example. While fake news leading to a misinformed voter is certainly of concern, it can also lead to dangerous and potentially violent situations.
- Video “What Facebook is doing to kill off fake news before another election”
Social media company Facebook launched an initiative to tackle fake news stories in France, with the media in the spotlight as the country’s presidential election approaches.
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.
- “The rise of hacktivism”
The blending of hacking with activism, known as “hacktivism,” has become increasingly prevalent and is now commonplace. Hacktivism is challenging international affairs, not only because it transcends borders, but also because it has become an instrument of national power.
- “Hacktivists launch more cyberattacks against local, state governments”
It’s called “hacktivism,” a blend of hacking and activism for a political or social cause, and state and local governments are increasingly finding themselves targets. Unlike cyber criminals who hack into computer networks to steal data for the cash, most hacktivists aren’t doing it for the dollars. They’re individuals or groups of hackers who band together and see themselves as fighting injustice.
- “Hacktivism: Fearmongering or Real Threat?”
With the recent relaunch of Operation Icarus, the hacktivism group Anonymous is back in the spotlight. This campaign is centered on committing distributed denial-of-service (DDoS) attacks targeting banks around the world. Its latest alleged victims? The Bank of Greece and the Central Bank of Cyprus, among others.
- “Anonymous hacker reveals inspiration behind latest operation and evolution hacktivism”
Hacktivist group Anonymous has made waves with its varied cyberattack campaigns, with targets ranging from militant outfits to banking institutions. The collective’s recent operation dubbed OpIcarus, which is aimed at taking down websites of international banks with DDoS attacks, has generated increased awareness among security professionals and the financial community about the threat of cyberattacks. But there is one thing that has left many puzzled: The reason and motive behind this sort of hacktivism.
- “Hacktivists’ increasingly target local and state government computers”
Hacktivists, who blend hacking and activism for political and social causes, can lock up government computer networks, deface websites, steal data — and cost taxpayers.
- Ted Talk “Where is cybercrime really coming from?”
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely information on who is infected and how the disease is spreading. If we’re not sharing, he says, then we’re part of the problem.
In this information age, information is everywhere. People get overwhelmed by it. Information varies and voice differs. Who is right? Which source of information is accurate?
- “How to think straight in the age of information overload”
We consume about 74 gigabytes — nine DVDs worth — of data every day. It’s amazing we’re able to process and make sense of it all. So how do you think straight in the age of information overload?
- “Information overload, why it matters and how to combat it”
Designers often need to convey information to the users of their designs. Specialists in information visualization design in particular find themselves presenting data over and over again to their users. However, it’s important when developing your designs that you don’t create “information overload” – that is presenting so much data that you leave the user confused and/or unable to make a decision.
- “How information overload is running your work life”
Information overload is when your brain exceeds its processing capacity and leaves you feeling tired (like when your computer runs out of RAM and your computer crashes). It can also weaken your concentration, leaving you more susceptible to making bad decisions, and as a result, more likely to overload yourself from other sources of information as a means of procrastinating on important tasks. Yep, that’s right, I’m talking about television, the internet, checking emails, watching videos, and anything else that feeds you with information.
- Pew Research Center report on Information Overload
Most Americans like their choices in today’s information-saturated world, but 20% feel overloaded. Tensions occur when institutions place high information demands on people.
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Why is that a concern?
- “How bad is internet censorship in your country?
When we think of the internet, it’s tempting to picture a world with no rules, and no limits. In reality, though, what is allowed in one country is very different to that allowed in another. According to a recent study by Freedom on the Net, two-thirds of all internet users – 67% – live in countries where criticism of the government, military, or ruling family is subject to censorship.
- “How internet filtering hurts kids”
Zealously blocking their access to certain websites can end up undermining learning.
- “Tackle internet censorship directly –not through antitrust law”
Sewlyn Duke’s recent op-ed for The Hill, “Antitrust should be used to break up partisan tech giants like Facebook, Google,” addresses the serious problem of how a few privately owned internet companies have unprecedented control over the distribution of information.
- “Qatari news website raises ‘censorship’ concerns”
Doha News says it has been blocked by the Gulf country’s two internet service providers – with no reason why.
- Video “Internet censorship intensifies as UN prepares to take control”
The globalists are doubling down in their efforts to suppress the truth as they move closer toward their goal of complete control of the internet.
In the modern society, technology has permeated to almost every aspect of people’s lives. The internet has brought more possibilities and opportunities for us to meet other people online. This could be dangerous due to the ambiguity and uncertainty of the internet.
- “Online dating made this woman a pawn in a global crime plot”
Once a romance scammer has identified a vulnerable target, the trajectory of the ensuing crime is easy to predict. Those who are hoodwinked by the Crisis often keep shelling out money until they have nothing left to give, at which point the scammer will either vanish or gleefully reveal their deceit.
- “5 facts about online dating”
Digital technology and smartphones in particular have transformed many aspects of our society, including how people seek out and establish romantic relationships. Few Americans had online dating experience when Pew Research Center first polled on the activity in 2005, but today 15% of U.S. adults report they have used online dating sites or mobile dating apps.
- “Men increasingly targetted by romance scammers on online dating websites”
The number of people falling victim to so-called romance scams has reached a record high in Britain with almost 40 per cent of those affected being men, new figures have revealed.
- “Psychologists highlight pitfalls of online dating”
The review stresses that websites are a valuable resource for daters — as long they don’t put too much stock in the profiles.
- “Take these ‘most dangerous states for online dating’ with a grain of salt”
Following a number of deaths linked to the use of anonymous online dating apps, the police have warned users to be aware of the risks involved, following the growth in the scale of violence and sexual assaults linked to their use.
- Ted Talk “How I hacked online dating”
Amy Webb was having no luck with online dating. The dates she liked didn’t write her back, and her own profile attracted crickets (and worse). So, as any fan of data would do: she started making a spreadsheet. Hear the story of how she went on to hack her online dating life — with frustrating, funny and life-changing results.
- Report “15% of American adults have used online dating sites or mobile dating apps”
Usage by 18- to 24-year-olds has increased nearly threefold since 2013, while usage by 55- to 64-year-olds has doubled.
An Internet fraud (online scam) is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft.
- “How Ad Fraud Ruins the Internet”
Billions will be lost to ad fraud this year, and anywhere from three percent to 37 percent of ad impressions will come from bots. In fact, ad fraud is on its way to possibly becoming the second largest organized crime enterprise.
- “Fraud and cyber crime are now the country’s most common offences”
Online fraud is now the most common crime in the country with almost one in ten people falling victim, the latest figures have revealed. More than five and a half million cyber offences are now thought to take place each year accounting for almost half of all crime in the country.
- “How online fraud is a growing trend”
For online merchants and their customers, the growing threat of online theft is a real concern. With every step retailers take to tighten security and prevent malicious activity, scam artists seem to up their game and outwit them. This is especially true as brick-and-mortar retailers prepare to switch to EMV later this year, at which point online merchants become easier targets than traditional POS systems.
- Video “Online credit card fraud is growing”
Online purchases are growing sharply, and so is the use of stolen credit card data on the Internet. The Wall Street Journal’s Robin Sidel talks about what the credit card industry is doing to combat fraud.
Internet of Things
Internet of things is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
- “The internet of things is everywhere, but it doesn’t rule yet”
Juniper research predicted that by 2020, there will be 38.5 billion connected devices. IDC says it’ll be 20.9 billion. Gartner’s guess? Twenty-five billion. The numbers don’t matter, except that they’re huge. They all agree that most of those gadgets will be industrial—the Internet of Things is less about you changing the color of your lightbulb and more about companies large and small finding new ways of making their businesses, and your life, easier and more efficient. But the market for connecting the devices you use all day, every day, is about to be huge.
- “How the internet of things got hacked”
Today, cheap, radio-connected computers have invaded meatspace. They’re now embedded in everything from our toys to our cars to our bodies. And this year has made clearer than ever before that this Internet of Things introduces all the vulnerabilities of the digital world into our real world.
- “The Impending Crisis of the Internet of Things”
Huge security flaws are being ignored by manufacturers—and are not easy to fix.
- “Bruce Schneier: It’s time for internet-of-things regulation”
Speaking at RSA Conference 2017, security expert Bruce Schneier called for the creation of a new government agency to oversee internet-of-things regulation.
- “Bad crypto key hygiene equals internet of things danger”
Internet of Things alert: Many embedded systems contain hardcoded cryptographic credentials that attackers can use to seize control of the devices or crack encrypted website traffic. And the problem is only getting worse.
- “The internet of things sucks so bad even ‘Amateurish’ malware is enough”
The malware that powered the “Botnet of Things” behind one of the largest cyberattacks ever isn’t even that great, and that’s exactly why we should be worried.
In certain industries, technology works perfectly at improving effectiveness and efficiency. Then what’s the comparative advantages of human beings at those workplaces? Would people lose jobs due to the development of modern technologies?
- “Yes, the robots will steal our jobs. And that’s fine.”
Those jobs will be replaced with new ones.
- Machine Automation is replacing human workers
For hundreds of years, economic observers have feared that machines were making human workers obsolete. In a sense, they’ve been right.
- “Robots expected to replace some five million jobs by 2020”
While previous industrial revolutions have catapulted the human workforce forward, this one may set us back — at least in the short term. According to the researchers at the WEF, “current trends could lead to a net employment impact of more than 5.1 million jobs lost to disruptive labor market changes over the period 2015–2020.”
- “Automation and anxiety”
Will smarter machines cause mass unemployment?
- “Robots will eliminate 6% of all US jobs by 2021, report says”
Employees in fields such as customer service and transportation face a ‘disruptive tidal wave’ of automation in the not-too-distant future.
- Video “Technology is replacing jobs. Are you ready?”
WorkingNation highlights the trend of technology and globalization replacing jobs in diverse industries across the United States.
- Ted Talk “Will automation take away all our jobs?”
Here’s a paradox you don’t hear much about: despite a century of creating machines to do our work for us, the proportion of adults in the US with a job has consistently gone up for the past 125 years. Why hasn’t human labor become redundant and our skills obsolete? In this talk about the future of work, economist David Autor addresses the question of why there are still so many jobs and comes up with a surprising, hopeful answer.
- Report “Public predictions for the future of workforce automation”
A majority of Americans predict that within 50 years, robots and computers will do much of the work currently done by humans – but few workers expect their own jobs or professions to experience substantial impacts.
M banking and Microfinance
Mobile banking is super convenient. People are able to manage their bank accounts easily on smart phones or tablets with simple clicks. However, it could be sometimes unsecure if we use it carelessly.
- “Mobile money: banking bliss, or cyber concern?”
Mobile-banking is a popular way to bank on the go, with 47% of global respondents saying they’ve checked an account balance or recent transaction on their mobile device in the past six months. While paying bills, checking account balances and transferring funds from a mobile device may be convenient and easy, security is an ever-increasing consideration—and a critical barrier to success.
- “Is mobile banking safe?”
The use of mobile devices is at an all-time high. According to a KPCB report, mobile digital media is now outpacing desktop usage. The report stated that adults with access to digital media use mobile 51 percent of the time compared to 42 percent for desktop usage and 7 percent for all other devices.
- “The microfinance business & risk”
The microfinance business has recently come under a lot of fire from both the regulator, customers and stakeholders in Ghana. It is worth mentioning that the regulator has heeded calls from concerned individuals, financial consultants and researchers/writers to act now on the MFIs business in the country.
- “87% of millennials use mobile banking; security still top barrier”
Consumer expectations have both an upside and a downside for the growth of mobile payments. We know from numerous studies that there are various barriers to masses of consumers jumping onto the mobile payments bandwagon.
- “Security concerns hinder mobile banking in Malaysia”
Three in four mobile users are worried about security.
Malware and Spyware
Malware is a software that is intended to damage or disable computers and computer systems. Spyware is a software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive. The possible consequences would be huge information errors or losses.
- “The truth about the dangers of malware”
What is malware? Much like adware or spyware, the term refers to a class of insidious computer applications. It is a particular type of virus which is used as a tool to gain access to a computer and force it to perform an unauthorized function.
- “This malware sold to governments could help them spy on iPhones, researchers say”
Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk.
- “Is malware all that bad, really?”
Media coverage of malware tends to fall into the ‘Shock! Horror!’ category. But what types of malware are actually doing the rounds, and what can they really do to your computer — or you?
- “Office Depot, OfficeMax claim new computers have malware to sell useless removal services”
One of the common problems the less computer-savvy face are inevitable malware infections. A number of companies like Best Buy, Office Depot, and OfficeMax all offer computer services that will scan and remove malware from an infected system, but often only at a steep price.
- “U.S. house bans Yahoo mail, Google app engine over malware concerns”
The bans are in response of cybercriminals abusing those services to spread ransomware and malware.
The concealment of the origins of illegally obtained money, typically by means of transfers involving foreign banks or legitimate businesses.
- “Bitcoin’s not money, judge rules as she tosses money-laundering charge”
The hotel room was wired with cameras and microphones, and in it sat $30,000 in fake $100 bills. Miami Beach Detective Ricardo Arias, working undercover as an identity thief, flipped them in front of Michell Abner Espinoza. A “flash-roll,” it’s called, the kind you see in the movies where bad guys flick through wads of cash before holding it up in the air.
- “Money laundering: Combating a global threat”
The vigilance of CPAs plays an important part in an international effort to deter financial crime.
- “Report: Online gaming currencies used for money laundering”
According to a new report by Trend Micro, cybercriminals are using online video game currencies for money laundering purposes. This kind of activity may seem unfitting, however, since gaming money is unregulated and it is legal to sell, this a convenient method for cybercriminals to launder money.
- Video “Bitcoin Scam: Online money laundering racket exposed in sting video”
India Today special investigation uncovers online black bazaar where operatives of bitcoins in India converts black money to white in the dark cyber world.
- Report “The cybercriminal roots of selling online gaming currency”
Cybercriminals found easy profit in the sale of online gaming currencies and have successfully channeled that profit back to their schemes. As gamers are now more than willing to spend real money to enjoy a game, cybercriminals will continue to tap that market and inevitably use the profits gained from there to launch bigger and more damaging attacks in the real world.
Nanotechnology/the gray goo/
Nanotechnology is the branch of technology that deals with dimensions and tolerances of less than 100 nanometers, especially the manipulation of individual atoms and molecules.
- “Nanotechnology is like the early days of radioactivity when it comes to knowing the risks – Dr. Vladimir Baulin”
When radioactive materials were first introduced into society, it took a while before scientists understood the risks. The same is true of nanotechnology today, according to Dr Vladimir Baulin, from University Rovira i Virgili, in Tarragona, Spain, who together with colleagues has shown for the first time how nanoparticles can cross biological – or lipid – membranes in a paper published in the journal Science Advances.
- “Nanotechnology is here. Let’s be careful with it”
Within a decade or two, every aspect of our lives will have been impacted by nanotechnology at deeper levels and in more amazing ways.
- “Nanoparticle exposure can awaken dormant viruses in the lungs”
Nanoparticles from combustion engines can activate viruses that are dormant in in lung tissue cells. This is the result of a study by researchers of Helmholtz Zentrum München, a partner in the German Center for Lung Research (DZL), which has now been published in the journal Particle and Fibre Toxicology.
- “Commentary: Is nanotechnology the new asbestos?”
The critical question is whether this new science harbors destructive powers which, if fully understood, would call for legal restrictions or a ban on the use of nanoparticles.
- “Managing health and safety concerns associated with nanotechnology”
Here are some health and safety risks associated with using nanotechnology.
- Video “How to destroy the world with nanotechnology”
There are no laws against nanotechnology weapons because they have to be written in blood that will be shed soon, hopefully we all survive what nanoscientists call the gray goo nightmare.
Net neutrality is the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites. However, this is not the case in the modern society.
- “Net neutrality is in more danger than ever”
Net neutrality advocates hailed the FCC’s decision as a victory for equal access and free speech, an Internet where money can’t buy privileged placement on the network. But the battle is far from over. In fact, the FCC’s decision has catalyzed the forces that oppose government-enforced net neutrality. Regulators may be pushing for a more open Internet, but its prospects are in greater danger than ever.
- “Net neutrality is a problem, not a solution”
Net Neutrality is a problem, not a solution, and it won’t take long before we’re told that even more extensive and intrusive government control of Internet service is necessary to address all the “unintended consequences” it produces. The big difference between the government takeovers of health care and the Internet is that the latter will happen much faster, because everything happens faster on the Internet.
- “Why net neutrality isn’t worth celebrating”
Net neutrality doesn’t seriously address anything cable companies are currently doing, nor will it help with the number one issue most people care about: the price and quality of their service.
- “Here’s how the FCC’s net neutrality rules might be throttled under Trump”
To spread his message and rise to power, Trump relied on an open internet. Will his administration now kill it?
- Video “Is there life after net neutrality? Republicans want to find out”
Republicans fighting to undo net-neutrality rules have a lot of options now that Donald Trump is in the White House and their party controls Congress. They can use the Federal Communications Commission, freshly under Republican control, to void the regulations on internet service providers and hope to be upheld by the courts.
Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- “Everyone is falling for this frighteningly effective Gmail scam”
Security researchers have identified a “highly effective” phishing scam that’s been fooling Google Gmail customers into divulging their login credentials. The scheme, which has been gaining popularity and has reportedly been hitting other email services, involves a clever trick that can be difficult to detect.
- “Phishing remains on the IRS “Dirty dozen list of tax scams for the 2016 filing season”
The Internal Revenue Service warned taxpayers to watch out for fake emails or websites looking to steal personal information. These “phishing” schemes continue to be on the annual IRS list of “Dirty Dozen” tax scams for the 2016 filing season.
- “There’s a Netflix phishing email scam stealing people’s personal info”
If you receive an email from Netflix, you’ll want to pause before you open it. That’s because it could be from hackers, who have been running a phishing email scam targeting the streaming service’s subscribers. The questionable email arrives in subscribers’ inboxes in the form of an email from Netflix, asking customers to update their information, FireEye points out.
- Video “IRS warns against phishing scam targeting companies’ HR, Payroll Depts”
The IRS said a new phishing email scam is targeting human resources and payroll departments at companies — specifically going after personal information on employees’ W-2 forms.
- Video “IRS warns of new email phishing tax scam”
The IRS is warning of another scam that targets businesses, school districts and non-profits. It involves a new twist on an old email phishing scam that targets anyone with employees.
Ransomware is a type of malicious software that blocks access to the victim’s data or threatens to publish or delete it until a ransom is paid. Any action is possible once a device or system is infected and there is no guarantee that paying the ransom will return access or not delete the data.
- “Ransomware turns to big target with even bigger fallout”
An Austrian hotel lost control of its door locks, keeping new guests stranded in the lobby. A police department in Cockrell Hill, Texas abandoned years of video evidence and digital documentation. In Washington, DC, the police couldn’t access its CCTV footage storage system days before Donald Trump’s inauguration. All of this news came out in the a week, stemming from a rapid escalation of how ransomware is deployed. And it’s only going to get worse.
- “The growing threat of ransomware”
Ransomware can hit anyone, but hackers are increasingly going after targets that are more willing to pay up.
- “How ransomware became a billion-dollar nightmare for businesses”
One cybersecurity firm estimates that extortive attacks now cost small and medium companies at least $75 billion in expenses and lost productivity each year.
- Report: How to protect your networks from RANSOMWARE”
Ransomware is the fastest growing malware threat, targeting users of all types—from the home user to the corporate network. On average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300-percent increase over the approximately 1,000 attacks per day seen in 2015. There are very effective prevention and response actions that can significantly mitigate the risk posed to your organization.
- Video “Hacker lexicon: a guide to ransomware, the scary hack that’s on the rise”
Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom—usually demanded in Bitcoin. A popular and more insidious variation of this is ransom cryptware, which encrypts your files using a private key that only the attacker possesses, instead of simply locking your keyboard or computer.
Robotics is the interdisciplinary branch of engineering and science that includes mechanical engineering, electrical engineering, computer science, and others. It’s different from Artificial Intelligence.
- “Robotics vs Artificial Intelligence: The difference explained”
Before talking about robotics, it’s important to know the difference between AI and robotics because when I used to think they are the same thing. So this is a piece of encyclopedia that explains the difference between the two.
- “Military robots: Armed, but how dangerous?”
The debate over using artificial intelligence to control lethal weapons in warfare is more complex than it seems.
- “The dangers of trusting robots”
As robots enter our home, they may steal secrets about your life that you don’t want to share, argue two experts in robotics law and the philosophy of technology.
- “Human-like robots may have a disturbing impact on actual humans”
One robotics expert is warning against the creation of humanoid robots — specifically, those that closely resemble humans.
- “Losing control: the dangers of killer robots”
As artificial intelligence advances, the possibility that machines could independently select and fire on targets is fast approaching. Fully autonomous weapons, also known as “killer robots,” are quickly moving from the realm of science fiction toward reality.
- Video “robots are learning to say ‘no’ to human orders”
It may seem an obvious idea that a robot should do precisely what a human orders it to do at all times. But researchers in Massachusetts are trying something that many a science fiction movie has already anticipated: They’re teaching robots to say “no” to some instructions.
Sharing economy is an umbrella term with a range of meanings, often used to describe economic and social activity involving online transactions. The emergence of this new form of economy brings concerns and challenges to current local and world economies.
- “Uber, Airbnb and consequences of the sharing economy: Research roundup”
As the economic power of these technology-driven firms grows, there continue to be regulatory and policy skirmishes on every possible front, across cities and towns spanning the United States, Europe and beyond.
- “The dark side of Uber: why the sharing economy needs tougher rules”
The last thing governments can afford to do is ignore the boom in peer-to-peer services and their impact on the economy.
- “The ‘sharing economy’ is the problem”
The Cooperative Economy is the Solution
- “Uber, Airbnb: Is the “Sharing Economy” Dangerous?”
Despite its newfound dominance in the modern world of commerce, the sharing economy is still young and as it continues to expand at such a rapid pace, it may face some growing pains.
- “The sharing economy’s dirty laundry”
Sharing economy companies like Uber and Airbnb aren’t helping local economies — they’re just helping themselves.
- Video “The sharing economy doesn’t share the wealth”
As Airbnb and Uber inch toward profits, tax authorities worry.
- Ted Talk “How the ‘sharing economy’ disrupts civilization”
How the ‘sharing economy’ disrupts civilization – Ed challenges the foundation of the so-called sharing economy.
- Video “should we regulate the sharing economy?”
The Federal Trade Commission has decided to look into the billion dollar “sharing” industry. Nellie Bowles talks with The Washington Post’s Andrea Peterson about what that means for customers of Uber and Airbnb.
- Report “Gig work, online selling and home sharing”
24% of Americans report earning money from the digital ‘platform economy’ in the past year. The extra income they make is a luxury for some, but a necessity for others.
- Report “Shared, collaborative and on demand: The new digital economy”
The sharing economy and on-demand services are weaving their way into the lives of (some) Americans, raising difficult issues around jobs, regulation and the potential emergence of a new digital divide.
An electricity supply network that uses digital communications technology to detect and react to local changes in usage.
- “Dangers of the smart grid”
Major power utilities continue to deploy “smart” electrical meters on businesses and private residences throughout the United States and Canada. Yet those in North America and elsewhere remain in the dark on the negative health effects of such devices that systematically blast their homes with radio-frequency (RF) radiation on a minute-by-minute, round-the-clock basis.
- “Smart grid powers up privacy worries”
The next Big Data threat to our privacy may come from the electricity we consume in our homes.
- “SGIP paper examines security concerns of smart grid broadcast comms”
The Smart Grid Interoperability Panel (SGIP) has released a new white paper that addresses cybersecurity for smart grid broadcast communications.
- Report “Smart grid system security with broadcast communications”
This paper addresses the issue of cybersecurity for smart grid broadcast communications. It proposes that broadcast messages sent to home-based devices be authenticated as originating from a valid source.
- “U.S. Grid in ‘Imminent danger’ From cyber-attack, study says
Threats to U.S. electrical grid are more sophisticated and the increase in smart grid technology increasing vulnerability.
Social Media/Social Networking
People are exposed to social media every day. How does that affect our lives? Some possible concerns include social media addictions, blind imitations, false information.
- “8 dangers of social media we’re not willing to admit”
Here are 8 dangers of social media.
- “Netizen report: Uganda and Nigeria seek stricter controls for social media”
Global Voices Advocacy’s Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world.
- “How social media is a toxic mirror”
For at least a decade, educators like Rechael Simmons, a leadership development specialist at Smith College and the author of Odd Girl Out and The Curse of the Good Girl have argued that social media’s biggest threat was its likeness to a bathroom wall, letting teens sling insults with the recklessness that comes only with anonymity.
- “The dangers of social networking”
Sometimes a good idea can turn into something very bad. Social Networking is a good example of this. When it was created it was so that people could share thoughts and ideas with like minded people and keep in touch with distant family. Then it evolved into the monster it is today. It is heavily involved in every aspect of your life now even if you choose not to use it.
- Police use of social media expanding & It’s raising new concerns
Social media has become a new tool for law enforcement as people like to brag about crimes that they are doing.
- “Nobody has real friends anymore”
Are all those tools for staying connected actually making you a worse friend?
- Video “Millennials and the dangers of social media addiction”
Social media addiction and its dangers for millennials.
- Video “Facebook documentary|The dangers of social media”
How is social media dangers? Check out what Facebook said?
- Report “The political Environment on Social Media
Some users enjoy the opportunities for political debate and engagement that social media facilitates, but many more express resignation, frustration over the tone and content of social platforms.
Technology addiction and diseases
Technology brings diseases to people if we don’t use it smart. Technology addiction is a true concern for some people in modern world.
- “Top 6 new diseases and syndromes caused by modern technology”
Unfortunately, as more and more time is spent on interacting with modern technology, some previously rare or even unknown disorders and syndromes have appeared. This article describes the top worst syndromes that many of us have but few of us know about as well as some tips and remedies.
- “Technology adduction is responsible for 5 new brain disorders”
Studies have found that our tech obsession has changed the way we read and comprehend, shortened our attention spans and our patience, and impaired our ability to remember things without Googling. And that’s not all. Cognitive neuroscientists have identified five brand new brain disorders that were born out of our technology addition.
- “Woman who snapped 200 selfies a day says tech addiction caused rare inflammatory disease”
The years of sitting hunched over computers, tablets and smartphones came to a head last January when Gore was diagnosed with Tietze disease – a rare, inflammatory disorder characterised by chest pain and swelling of the cartilage of one or more of the upper ribs.
- Technology Addiction 101
Technology addiction isn’t always easy to recognize, especially since many of us must now be “plugged in” so much of the time, whether for work, school or for other reasons. And if a tech addiction is tough to spot, it can be even harder to admit. In fact, denying how much time is spent on devices, social media and the Web is a common warning sign. That’s why it’s important to understand the basics about this disorder, including the causes, telltale symptoms and risk factors that may be involved.
- The real scars of Korean gaming
Repetitive strain had injured Mr Lee’s muscles, deforming them and making surgery the only option to save his illustrious career.
- Video “Three ways technology is making you dumber”
Technology is taking over our lives more than we realize. Here are three ways technology is making you dumber.
Telecommuting Virtual Reality & Augmented Reality
Virtual reality is the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors. Augmented reality is a technology that superimposes a computer-generated image on a user’s view of the real world, thus providing a composite view.
- “The dangers of virtual reality”
Virtual reality is amazing, but it isn’t safe. It isn’t easy. And with the complicated hardware being released now, it could end up being a nightmare in the wrong hands.
- “Virtual reality: the hype, the problems and the promise”
It’s the technology that is supposed to be 2016’s big thing, but what iteration of VR will actually catch on, and what’s just a fad? Tim Maughan takes an in-depth look.
- “Virtual reality: Real privacy and security risks”
As evolving virtual reality technologies are embraced by corporate environments, including healthcare entities, for training and other purposes, organizations need to carefully consider the privacy and security risks they pose, says technology attorney Steven Teppler.
- “The real-life dangers of augmented reality”
Augmented reality can impair our perception, but good design can minimize the hazards.
- “What does virtual reality do to your body and mind?”
As technology comes of age, headset makers, media companies grapple with potential side effects.
- Video “Virtual Reality (VR) DANGERS”| Escapism and how to escape it
This video is mainly about escapism in all forms, although I believe the new trend in Virtual Reality video games is one of the most harmful things that will come onto this planet. The reason I say that is because it puts you in this immersive virtual world that is separate from reality, and instead of focusing on your real life, it would be much easier to just be trapped inside of the game, go through the motions to get enough money to live, and then live a mediocre life with VR.
Twitter has been popular for so many years. How is that a growing concern to the modern society?
- “The end of Twitter”
Twitter might rebound in the wake of Jack Dorsey’s reappointment as C.E.O., but the service is still in trouble.
- “The dangers of tweeting in Dubai”
Britain’s Foreign Office has issued new guidance about using social media in the United Arab Emirates.
- “Twitter’s famous racist problem”
The social network risks losing the goodwill it built up during the Arab Spring.
- “Is Trump’s twitter account a national security threat?”
Intelligence and defense specialists fear the president-elect’s prolific tweeting could give foreign adversaries an advantage.
- “The biggest concern at Twitter: Where does the platform go next?”
Twitter’s been stuck in a rut for some time now.
- Ted Talk “I grew up in the Westboro Baptist Church. Here’s why I left”
What’s it like to grow up within a group of people who exult in demonizing … everyone else? Megan Phelps-Roper shares details of life inside America’s most controversial church and describes how conversations on Twitter were key to her decision to leave it. In this extraordinary talk, she shares her personal experience of extreme polarization, along with some sharp ways we can learn to successfully engage across ideological lines.
Internet for the poor
Do people in poverty get the same level of access to internet as everyone else? Why is this a problem?
- “Rich people have access to high speed internet, many poor people still don’t”
Broadband access expanded in recent years, but low-income Americans are disproportionately left out and isolated from the information economy. Left behind at school, at home and at work: ‘The Civil Rights issue of our time’
- “The FCC is stopping 9 companies from providing federally subsidized internet to the poor”
Regulators are telling nine companies they won’t be allowed to participate in a federal program meant to help them provide affordable Internet access to low-income consumers — weeks after those companies had been given the green light.
- “Digital redlining: how internet service providers promote poverty”
By harvesting and selling vast swaths of individual data to third parties, internet service providers (ISPs) push products and services that threaten the health, finances and quality of life of the poor, effectively corroding privacy while perpetuating the cycle of poverty.
- “Better internet access won’t pull people out of poverty”
It used to be that we worried about lower-income, less educated people having insufficient Internet access. Educators, politicians and policy makers were concerned that in our great technological revolution, these folks were being left behind. Well, it turns out now that the digital haves may turn out to be the economic have-nots.
- Report “AT&T’s Digital Redlining of Cleveland”
A mapping analysis of Federal Communications Commission broadband availability data, conducted by Connect Your Community and the National Digital Inclusion Alliance, strongly suggests that AT&T has systematically discriminated against lower-income Cleveland neighborhoods in its deployment of home Internet and video technologies over the past decade.
ICANN is the Internet Corporation for Assigned Names and Numbers. ICANN maintains the central repository for IP addresses and helps coordinate the supply of IP addresses. It also manages the domain name system and root servers.
- “What is ICANN and why does it matter?”
ICANN is the Internet Corporation for Assigned Names and Numbers. It is a nonprofit organization headquartered in Southern California that was formed in 1998 to help the U.S. government manage certain functions that maintain the Internet’s core infrastructure. ICANN maintains the central repository for IP addresses and helps coordinate the supply of IP addresses. It also manages the domain name system and root servers. ICANN currently manages over 180 million domain names and four billion network addresses across 240 countries. It is also important to note that which ICANN does not control, such as content on the Internet, malware or spam and Internet access.
- “Cruz’s claim that ICANN’s transition will empower foes to censor the internet”
You may have heard about the debate over the pending “transition” for “ICANN,” or at least seen the headlines. Yet another obscure acronym, with apparently weighty consequences for a central part of our lives today — the Internet. Many of the stories are confusingly he-said, she-said, with experts dug in on both sides.
- “ICANN and the future of the internet”
Hundreds of people from dozens of countries will gather in Singapore to discuss the future of the Internet Corporation for Assigned Names and Numbers (ICANN), a multinational organization that oversees the address book of the internet thanks to a contract issued by the U.S. government.
- “Government blesses ICANN transition: Remaining concerns and new questions”
The Obama administration first announced its intent to end the historical U.S. contractual relationship with the Internet Corporation for Assigned Names and Numbers (ICANN) in March 2014 and transition its stewardship of key Internet domain name functions to the global multi-stakeholder community.
- Report “ICANN transition is premature”
Is the internet ready for the U.S. government to give up its historic role as the ultimate guarantor of Internet governance? Yes, insists the Obama Administration. Global stakeholders – users, businesses, technical experts and civil and civil society groups – will remain firmly in control, they assure us.
Fiber Cable Rationing
Africa is getting more and more undersea fiber cables to help them connect the world? However, are cables able to connect all?
- ”Promoting Content In Africa”
The vision of the Internet Society is that the Internet is for everyone, everywhere, and to help achieve this aim we have conducted a number of studies of barriers to connectivity in emerging regions. This report continues in that vein, but represents a shift from examining the barriers to accessing content. As a starting point we note that, as a result of new investments in access infrastructure including notably mobile Internet networks, Internet availability now far outpaces adoption, and raises the question of why adoption is lagging behind.
- “How can Africa achieve ‘internet for all’?
Attention towards the importance of the internet as a key enabler for social and economic development is growing into a global movement, with a myriad of new initiatives emerging.
- “Is fibre optic cable key to Africa’s economic growth?”
The elite of Kenya’s much-heralded entrepreneurship revolution work in an ultra-modern. co-working space overlooking the bustle of Nairobi.
- “In Africa, a broadband boom”
Concern over the impact of technology on employment in the West is mounting, but broadband has brought significant benefits to Africa.
- “Can the internet reboot Africa?”
With smartphone use and web penetration soaring, Africa is set for a tech revolution – but only if its infrastructure can support it.
- Executive briefings “The Undersea Cable Boom in Sub-Saharan Africa”
During 2009–12, seven fiber-optic undersea cable systems were installed on the seabed around the east and west coasts of sub-Saharan Africa (SSA). Although many observers hope these cables’ telecommunications transmission capacity will stimulate demand for Internet services (and promote economic growth) in the region, in the near term several factors will likely restrain demand for these services among the general population, including low per capita income, low levels of computer/smartphone ownership, and poor-quality domestic networks.
Everyone is able to live stream if they want to. However, some people live stream negative and illegal things due to the loopholes of regulations. That is really dangerous.
- “Live streaming of news events creates ethical dilemma”
Critics say the lack of regulation of live streaming could lead to “a kind of voyeurism and click-bait journalism”.
- “The dark side of live streaming that no one seems able to stop”
In an interview last month about Facebook’s recent push into live-streaming video, chief executive Mark Zuckerberg repeats the word “raw” as if it’s some kind of sacred totem. Facebook Live is “raw and visceral”, he says. It’s this “new, raw” way to communicate. Zuckerberg doesn’t seem to realise that, when it comes to online video, “raw and visceral” can be a very bad thing.
- “Facebook’s plan to stop people from livestreaming sex? You”
The immediacy and intimacy of live broadcasting can be extremely powerful for politicians, musicians, and journalists to speak directly to you from around the world. But it could also be jarringly powerful for, say, a terrorist organization live broadcasting a beheading or a small porn business live streaming sex. And since Facebook defaults to saving the live video as a replayable one, unsavory “live” content can spread even after the broadcast ends.
- “YouTube cuts live stream of pregnant giraffe over nudity concerns”
The owner of a New York zoo planning to live-stream a giraffe giving birth says the video feed was briefly removed from YouTube because animal rights activists labeled it sexually explicit.
Electric Cars/Self-driving Cars
Are electric cars really green? Is self-driving really safe?
- “Tesla’s electric cars aren’t as green as you might think”
Devonshire Research Group, an investment firm that specializes in valuing tech companies, dug into the data and concluded that Tesla’s environmental benefits may be more hyped than warranted. It’s arguing that Teslas (and, by extension, all electric vehicles) create pollution and carbon emissions in other ways.
- “5 Things that give self-driving cars headaches”
Here are five situations that, for now at least, often confound self-driving cars and the engineers working on them.
- “The Dangers of ‘self-driving’ car hype”
Rushing adoption of automated vehicles could be hazardous—and turn off consumers for good.
- “The very human problem blocking the path to self-driving cars”
IT WAS A game of Dots that pushed Erik Coelingh to rethink his entire approach to self-driving cars. Coelingh, Volvo’s head of safety and driver assist technologies, was in a simulator, iPad in hand, swiping this way and that as the “car” drove itself, when he hear an alert telling him to take the wheel.
- Video “The Messy Ethics of self-driving cars”
The development of self-driving cars presents one of the greatest ethical conundrums in history. Because of these inventions, which will save thousands of lives every year, we will have to decide how to kill people.
- Report “Self-driving cars: mapping access to a technology revolution”
The report examines the current state of the technology, current approaches to regulation, and potential technological and policy barriers to full use by people with disabilities, and provides recommendations for preventing or eliminating those barriers, including model legislative language.
Revenge pornography, or revenge porn (informal), is the sexually explicit portrayal of one or more people that is distributed without their consent via any medium. The sexually explicit images or video may be made by a partner of an intimate relationship with the knowledge and consent of the subject, or it may be made without his or her knowledge.
- “Revenge porn could become a crime in Kentucky”
Breakups can be nasty. But as Americans’ digital and physical lives become increasingly entwined, jilted lovers can punish their exes in a devastatingly public way: By posting their former partners’ intimate photos — and personal information — online.
- “Facebook’s new plan may curb revenge porn, but won’t kill it”
FACEBOOK NEEDED TO move against nonconsensual porn. The scandal surrounding Marines United, a secret Facebook group of 30,000 servicemen who shared dozens of women’s private images without permission, proved that. Now, the social media giant finally shuffling in the right direction.
- “Underage revenge porn: social media and the dangers of living in a public-private space”
Along with the increase in online grooming, there is now an unprecedented rise in revenge porn among school children.
- “Revenge porn helpline ‘to close’ as government cuts funding”
Labor MP Sarah Champion asks equalities minister how victims will have access to support if only helpline shuts in March.
- “Revenge porn’: one in five report they have been victims in Australian survey”
‘Image-based abuse has emerged so rapidly … that inevitably our laws and policies are struggling to catch up,’ academic says.
- “Revenge porn is bad, criminalizing it is worse”
First Amendment issues are hardly the most compelling reason why we should reject the push to criminalize revenge porn.