Dangers and Concerns of Modern Technologies (2019)

Augusta Nissly | May 9, 2019

3D Printing
4D Printing
Artificial Intelligence
AI Medical Ethics Issues
Big Data
Cloud Computing
Commercial Drones
Cyber Intelligence Sharing and Protection Act (CISPA)
Cyber Attacks/Threats/Security
Dark Web
Data Theft
The Decline of Retail Stores Due to E-Commerce and Online Shopping
Decline of Traditional News Media
Digital Divide
Digital Millennium Copyright Act (DMCA)
Electric Cars/Self-driving Cars
Fake News
Fiber Cable Rationing
Going Viral
Information Overload
Internet Censorship
Internet Dating
Internet Fraud
Internet of Things
Internet for the Poor
Job Displacement
Live Streaming
M banking and Microfinance
Malware and Spyware
Money Laundering
Nanotechnology/the gray goo/
Net Neutrality
Revenge Porn
Sharing Economy
Smart Grid
Social Media/Social Networking
Technology Addiction and Diseases
Telecommuting Virtual Reality & Augmented Reality
Water Grid Vulnerability



3D Printing

Article: How 3D Printing Is Fighting Global Warming
What does industrial 3D printing have to do with going green? More than you might think. In the effort to combat climate change there are opportunities offered by 3D printing, which could further reduce our negative impact on the environment.

Article: The Threat 3D Printing Could Pose To Global Security
3D Printing has the potential to unleash global threats, how can we create policy frameworks to put us ahead of those threats?

Report: Additive Manufacturing [3D Printing] in 2040 -Powerful Enabler, Disruptive Threat
Additive manufacturing also known as 3D printing — has local and international security implications in the near and long terms. To better understand the security implications, a RAND research team briefly reviewed the existing literature, conducted interviews with stakeholders and subject-matter experts, and convened a workshop with technology and security experts.

Article:10 Disadvantages of 3D Printing Technology
3D printing also has dark-sides, for example, high energy consumption and harmful emissions.

Article:Tackling the risks of 3D printing
Worker safety is a new risk for 3D printing because workers are exposed to new type materials.

Article: All your questions about 3D guns answered
U.S. officials and lawmakers are grappling with a new reality — citizens having the ability to print firearms at home.

Article:Emerging technologies: when terrorists print their own weapons
People concerns about 3D printing may be used by terrorists to build their weapons and cause more chaos to the world. So, Lubrano supports more regulations on 3D printing.

Video:Beyond bionics: how the future of prosthetics is redefining humanity – video

From DIY prosthetics realized through 3D printing technology to customized AI-driven limbs, science is at the forefront of many life-enhancing innovations

Report: A Policymaking Guide on Additive Manufacturing (3D Printing)
The U.S. is a leader in additive manufacturing research and adoption, however, there are unique risks related to information assurance and intellectual property protection that require attention

back to top



4D Printing

Article: Four Ways 4D printing is Becoming a Reality
An exploration on how we can apply 4D printing technology across industry sectors

Video: 4D Toys: a box of four-dimensional toys, and how objects bounce and roll in 4D
Showing 4D Toys and an explanation of how 4D objects would look like and bounce around from the perspective of a 3D being.

Article: What is 4D imaging radar? And why might it be the key to cars with full autonomy?
The incredible demand for autonomous vehicles has driven the development of different kinds of sensors, and 4D sensors might be the most likely to identify danger

Video: A Beginner’s Guide to the Fourth Dimension
The fourth dimension can be confusing for us 3D beings. Here is a straightforward guide to help you understand  its intricacies

back to top




Article: What Is 5G And How Does It Differ From 4G, 3G And What Came Before?
There is a lot of hype around the development of 5G technology, but what exactly is it and how does it differ from 4G and 3G?

Video: Five Myths about 5G, Debunked
The Wall Street Journal debunks the five most common myths about 5G

Article: 5G Is Coming. Here’s Everything You Need to Know About It
5G is about to radically change how we communicate with each other and our devices

Article: Coming To A City Near You, 5G. Fastest Wireless Yet Will Bring New Services
5G is predicted to propel innovation in transportation, manufacturing, medicine and areas we still can’t anticipate.

back to top



Artificial Intelligence

Article: The State of AI in 2019
In 2019 we shouldn’t focus on generalized AI, but instead the subfield of machine learning, which is having the biggest impact on the world right now.

Report: The Privacy Expert’s Guide to AI And Machine Learning
The privacy challenges AI and machine learning models raise for policymakers

Article: A Crucial Step for Averting AI Disasters
A diverse staff can help avoid biased algorithms that cause public embarrassments

Article: How Artificial Intelligence Can Influence Governance, Risk, and Compliance
Governance, Risk, and Compliance (GRC) activities need to deal with different risks which caused by “Known Unknowns” and “Unknown Unknowns.”

Article:Artificial Intelligence: The concerns
As developing of AI, people may worry about following topics: 1)lethal autonomous weapons, 2) integrity and unbiased systems, 3) access to data, knowledge, technology, 4) privacy, 5) security, 6) technological unemployment, 7) ethics, responsibility and difficult decisions, 8) disproportional power and control over data, and 9) avoiding the ‘dystopia’.

Article:4 Things Everyone Should Fear About Artificial Intelligence and the Future
Vanian mentions four aspects which may draw people’s attention: 1) phishing scams could get even worse, 2) hackers start using AI like financial firms, 3) fake news and propaganda is only going to get worse, and 4)AI could make weapons more destructive

Video: What are the risks of artificial intelligence?
This video discusses ten risks of AI, for example, job replacement and redistribution, and existential risk from superintelligence.

Article: How to help AI find human trafficking victims
An exploration into how technology, specifically AI, can help to protect people against sexual assault and aide in supporting survivors.

Article: Elon Musk Worries That AI Research Will Create an ‘Immortal Dictator’
Elon Musk shares his concern about what we could be facing if we don’t take serious steps to regulate AI

Experts operating in the AI space say Musk’s scenarios risk distracting from more pressing concerns.

back to top



AI Medical Ethics Issues

Article: Researchers say use of artificial intelligence in medicine raises ethical questions
Stanford researchers discuss the ethical implications of using machine-learning tools in making health care decisions for patients.

Article: They’ve Taken America’s Temperature — and It’s Running High
We are able to track colds and flu outbreaks by smart thermometers, here is how the data is collected.

back to top




Article: What Happens When An Algorithm Cuts Your Health Care
New algorithm processes patients information and then computes the number of hours of care they should be receiving

Article: Franken-algorithms: the deadly consequences of unpredictable code
As we keep writing more code, we are layering onto previous code, possibly creating code sequences that we are unable to understand.

Article: What is a consensus algorithm & why does it matter?
Consensus algorithms are the backbone of blockchain. These algorithms are responsible for maintaining the decentralized nature of blockchain. Here is why it matters.

Article: Inside Facebook’s suicide algorithm: Here’s how the company uses artificial intelligence to predict your mental state from your posts
Facebook has developed an algorithm that automatically scores all posts in the U.S. and selects other countries and rates them on a scale for imminent harm

Article: Computer risk algorithms and judicial decision-making
Using computer algorithms in the judicial system, such as setting bail conditions and determining criminal sentences, may have potential risks. Because inputting historically biased data into these models contributes to a perpetuation of “bad data” and generates misleads to future judgments.

Article:Are Algorithms Building the New Infrastructure of Racism?
Algorithms may be misled to racism due to people’s online behavior.

Article: When your boss is an algorithm
Close to a million active Uber drivers in the United States and Canada, are operating without a human supervisor, it sounds great, but who exactly do you go to when something goes wrong?

back to top



Big Data

Article: 3 ways that big data reveals what you really like to watch, read and listen to
A deep dive into consumption analytics and how companies such as Netflix are using them to create and sell products.

Article: The bigger big data gets, the bigger the risk it poses
As data sets grow in size they also grow in power, increasing concern that it will be stolen, or used maliciously.

Article: Beyond CSI: How big data is reshaping the world of forensics
The forensics industry is exploring how to balance human skill with automated analysis.

Article:How Trustworthy Is Big Data?
This article discusses big data trustworthy in ten aspects, for example, data credibility and Data validity.

Reports:Joint Committee Final Report on Big Data
The report comes from European Supervisory Authorities (ESAs) and discuses benefits and risks of big data.

back to top




Article: Risk Factors Associated with Biometric Identification
Imposter attacks, spoof attacks and storage of biometric data may generate risks to biometric identification application development.

Article: Hospitals Turn to Biometrics to Identify Patients
Hospitals tackle patient-identification problem by utilizing biometrics such as   iris and palm-vein scanning.

Article: House Oversight Committee May Hold A Hearing On Facial Recognition Technology
Facial recognition technology is at the intersection of privacy, civil liberties, and oversight, requiring lawmakers to consider a policy framework to govern its use

Article: Some Thoughts on Facial Recognition Legislation
In recent months, concerns have been raised about how facial recognition could be used to discriminate and violate civil rights. In response to the concerns Amazon  talked to customers, researchers, academics, policymakers, and others to understand how to balance benefits with risks.

Video: Just how dangerous is facial recognition?
Facial recognition technology is recognized as a great technological breakthrough, but what are privacy and security risks that accompany it?

Article:AI in Biometrics and Security – Current Business Applications
This paper lists four different recognition and shows six organizations’ solutions of biometrics. In the end, Madhavan gives his own forecast about future revenue forecasts in biometrics.

Article: The dangers of facial recognition software
Widespread social media challenges such as the “10 year photo challenge” are fun but also create a set of data perfectly suited for training facial recognition algorithms.

back to top




Article: How Bitcoin Grew Up and Became Big Money
As the bitcoin’s price has risen, it’s become another investment vehicle for the financial system it was meant to replace. 10 years later, bitcoin is part of the system it was meant to overthrow.

Article:Bitcoin is all the rage — but is it worth the risk?
Bert Ely, principal of Ely & Company Inc., a consulting firm in Alexandria discusses why bitcoin is bad for average investors and what people can learn from the recent drop of bitcoin.

Article: Beyond the Bitcoin Bubble
How cryptocurrency could wind up building something much more important than wealth

Article: Veteran Investor Makes A Bold Prediction About Bitcoin And The Future Of Money
Veteran investor predicts it will be just a few short years before everyone is using bitcoin and it will be just criminals who want to hold onto cash

back to top




Video: What is Blockchain Technology? A Step-by-Step Guide For Beginners
Blockchain is the technology that everyone is calling ‘genius’ but what is it and how does it actually work

Article: Chinese internet users turn to the blockchain to fight against government censorship
Blockchain is proving to be a valuable tool in achieving victories in the fight against China’s strict internet censorship.

back to top




Video: How Twitter bots are recycling Cold War techniques to sow political division
On the one hand, people do not know they follow some bots account. On the other hand, Twitter does not want to point out these bots due to business consideration. These two reasons enhance the risk of bots

Article: Twitter bots were more active than previously known during the 2018 midterms, a new study suggests
Twitter bots were a much more active presence than previously known during last year’s midterm elections

Report: Majority of Canadians think Facebook will negatively impact federal election: survey
The majority of Canadians think that Facebook is untrustworthy with personal data and does a poor job at monitoring its influence on politics

Report:Risk Management for and by the BOT
This report comes from Deloitte and stresses risk management for the bot and risk management by the bot

Article: Bots are cheap and effective. One startup trolls them into going away
Startup abandons traditional way for trying to eliminate bots and takes new approach to shutting down the pesky data scrappers

Article: Alexa-like bots will listen out for suicidal patients under NHS technology revolution
Bots will analyze mental health patients conversations with smart devices such as Amazon’s Alexa and scan the conversation for warning signs

Article: Chatbots Are a Danger to Democracy
An exploration of bots potential threat to freedom of speech

Article: Uncovering Instagram Bots With a New Kind of Detective Work
Instagram bots might give users a boost in follower numbers, but they also help marketers reach and understand a wider range of users

back to top




Article: Inside a Chinese Censorship factory
An inside look at how companies in China approach posting content online in effort to not violate laws and regulations, and the debate on whether algorithms can efficiently censor content.

Article: The Social Media Censorship Dumpster Fire
Censors have the ability to be unpredictable, and social media companies are struggling to come up with right formula that doesn’t require human moderators. Is the answer for these companies to put the responsibility on the user?

Article: “Men are Scum”: Inside Facebook’s War on Hate Speech
Facebook has a system for purging hate speech and people are questioning if the hateful speech restrictions are censoring primarily political statements in the process.

Article: UK Regulators Propose Broad Social Media Regulations to Counter ‘Online Harms’
The proposal is the latest in a series of increased efforts by governments around the world to respond to harmful content online.

Article: How the “Great Firewall” extends beyond China
When we talk about censorship in China we depict that the issues that arise are only for that one country, instead it is affecting platforms worldwide.

Article: The most common forms of censorship the public doesn’t know about
Conversations on Internet censorship tend to be centered on the symptoms of the problem, but we need to spend more time diving into understanding the underlying conditions that make Internet censorship possible.

back to top



Cloud Computing

Article: Cloud Service Failure: 3 Things to Know
This Article mentions three risks of cloud computing: 1) cloud service providers are a growing source of systemic cyber risk; 2) multiple threat vectors can take down the cloud; 3) society is underinsured against the impact of cloud failure.

Article: 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud
This paper identifies 12 risks of cloud computing and divides them into two categories:  1) cloud-unique threats and risks, and 2) cloud and on premise threats and risks

Video: Cloud Computing is Changing How we Adopt Tech
An outline of how cloud computing affects the corporate worlds adoption of technology.

back to top



Commercial Drones

Article: Commercial Drones Unleashed: New Rules May Spark Industrial Revolution
The government has increased the height that commercial drones are allowed to fly, FAA put rules into place and companies move from experimentation to everyday uses.

Article: Insight Around the New Drone Rules for Canada
Transport Canada puts into place new regulations for drone use, set to take place June 2019

Article: Statement by the Commercial Drone Alliance Applauding Passage of FAA Reauthorization Act of 2018
Legislation Opens the Door to Expansion of Beneficial Commercial Drone Operations Safely and Securely

Article: How Much Of A Threat Do Drones Pose To Air Travel? Here’s What You Should Know
Are drones a danger to manned aircraft? We need more research to fully understand

Video: U.S. drones now required show identification
Previously drone owners were allowed to place the device’s registration number inside the craft’s battery compartment, but now it must be visible

back to top




Article: Key Challenges and Drawbacks with Crowdfunding
Crowdsourcing can be used in business, but people should take care their entrepreneurship, idea protections and business decisions.

Article: How Crowdsourcing is Changing Education
Crowdsourcing can benefit education by informing policy and process, informing research and knowledge generation, and using the crowd to redesign learning.

Article: Crowdsourcing – Pros and Cons and how Your Business Can Profit from It
This article discusses Pros and Cons of crowdsourcing. For Cons, the danger of manipulation, the danger of loss of image and danger of internal conflict are discussed.

Article: GoFundMe CEO: One-Third of Site’s Donations Are to Cover Medical Costs
At its conception popular crowdsourcing app Go Fund Me did not anticipate that it would be used to raise money for medical cost

Article: Blockchain Startup Takes on Mainstream Crowdfunding Sites to Cut Number of Failed Projects
A new blockchain platform is challenging established crowdfunding sites and there accountability.

back to top




Article: Facebook and Telegram Are Hoping to Succeed Where Bitcoin Failed
Internet messaging companies are planning to roll out new cryptocurrencies over the next year that are meant to allow users to send money to contacts on their messaging systems.

Video: Why Visa and PayPal need to fully embrace Cryptocurrency
To avoid being left in the dust payment companies need to make the move into cryptocurrency

Article: Crypto Isn’t Disrupting Payments Yet But Stay Tuned, Ellis Says
Financial expert says for now traditional payment systems do not need to be worried about being upended by cryptocurrency, but it is worth keeping an eye on

Article: European regulatory chief wants new cryptocurrency rules
The chairman of the European Securities and Markets Authority has indicated he supports applying financial instrument regulation to assets such as bitcoin to help protect investors.

back to top




Article: 6 Types of Cyberbullying
Cyberbullying is to harass, threaten, or embarrass another person via the internet. There are five types of cyberbully which are 1) harassing someone, 2) impersonating someone, 3) using photographs, 4) creating websites, blogs, polls and more, 5) participating in video shaming, 6) engaging in subtweeting or vaguebooking.

Article: Social media firms ‘failing’ to tackle cyberbullying
This paper identifies how cyberbully works and finds social networks cannot solve mental problems which caused by cyberbully.

Article: 11 Ways to Deal with a Workplace Cyberbully
This paper gives people eleven useful suggestions to deal with the cyberbully, for example, do not respond immediately and close the doors of communication to the cyberbully.

Article: Cyberbullying is a Worldwide Problem
This paper concrete data and fact to illustrate cyberbullying is a worldwide problem. Legislation solutions are discussed by using Singapore and UK as examples.

Article: Iowa Study finds parents unsure how to handle cyberbullying
A study release by the University of Iowa shows that parents realize cyberbullying is an issue, and one that they will need to team up with the schools to overcome, however they just aren’t sure how to do so.

back to top



Cyber Intelligence Sharing and Protection Act (CISPA)

Article: National Security vs Privacy
Privacy is a part of the civil right and should not be offended by CISPA and other political power.

Article: The Knock-Down, Drag-Out Fight Over Cybersecurity Legislation
An examination of just how much impact the advocates and activists had on the ultimate legislation.

back to top



Cyber Attacks/Threats/Security

Article: Overview of rapid cyberattacks
This paper identifies three aspects of cyber attacks: 1) features of cyber attacks, 2) impacts of cyber attacks on techniques and business, and 3) why rapid cyber attacks are different from other attacks.

Article: The new ways we could get hacked (and defended) in 2019
Threats are becoming more sophisticated, harder to detect, and more dangerous, but technology and talent combating against is evolving too

Article: How the Pentagon Should Deter Cyber Attacks
A RAND scientist gives DoD five suggestions about the defense of cyberattack

Article: Smart Cities Are Most Vulnerable to Cyber Security Risks
With cities utilizing smart technology solutions to increase operational efficiency and share information, cybersecurity has become a major concern

back to top



Dark Web

Article: What is the Dark Web? What is the Deep Web? How to Access the Dark Web
This article identifies three terms: dark web, deep web and dark internet. To make people understand dark web better, this paper also analyzes why people use the dark web and how to access it.

Article:A beginner’s guide to the dark web
Dickson gives people a brief introduction to the dark web: what dark web is, how to use it and how to access it.

Report: Dark Web
Kristin Finklea, a specialist in Domestic Security, wrote this report for Congressional Research Service. This report provides detailed information of dark web and mentions governments’ activities of dark web.

Report: The Impact of the Dark Web on Internet Governance and Cybersecurity
This report comes from the Centre for International Governance Innovation and Chatham House, and discusses thirteen different cybercrime in the dark web.

Video:What is the Dark Web?
This video describes the development of dark web, what government did to shut down the dark web, and how dark web influence real-life.

Article: How to tell the deep web from the dark web
The terms “deep web” and “dark web” are often thought to be interchangeable, this article explains why they are not.

Article: Here’s how much your personal data is selling for on the dark web
Know your Dark Web worth by calculating the value of your personal data.

Article: The ‘deep web’ may be 500 times bigger than the normal web. Its uses go well beyond buying drugs
More than just a playground for illegal activity, the dark web is proving useful for circumventing internet censorship.

Article: Think Bitcoin is Anonymous? Some Dark Web Users Find Out its Not
At its inception Bitcoin was an untraceable way to pay for things, but that seems to be changing as research uncovers ways to unmask bitcoin users

back to top



Data Theft

Article: How to Protect Yourself from Identity Theft
This paper shows identity theft briefly and gives people seven specific methods to protect their identity. Besides that, children identity theft is also mentioned.

Article: Identity theft has never been more rampant
Identity theft is very serious and 30 percent of U.S. consumers were notified of a breach in the past year, up from 12 percent in 2016. To help people protect themselves, Kristof gives four suggestions, for example, password protection.

Dataset: World’s Biggest Data Breaches
This website is a dataset of data breaches records in different fields.

Article: 6 Months, 945 Data Breaches, 4.5 Billion Records
A report by Gemalto states that 945 data breaches led to a staggering 4.5 billion data records being compromised worldwide in the first half of 2018.

Article: California to close data breach notification loopholes under new law
California notably has some of the strongest data theft regulations in place, but with breaches increasing in size and frequency the state is trying to take its regulations to the next level to protect citizen data.

back to top



The Decline of Retail Stores Due to E-Commerce and Online Shopping

Article: How Has the E-commerce Revolution Changed the Retail Industry
The internet changes rules of business which can be shown in the accelerating of the online retail industry.

Article: The Rise of Online Retail Has Cascading Effects for Corporate America

According to the Census Bureau, nearly 10% of all retail sales are now made online, and the trend doesn’t seem to be slowing down. The Rise of Online Retail Has Cascading Effects for Corporate America

Article: What Big Consumer Brands Can Do to Compete in a Digital Economy
No industry is failing faster than retail, big brands have to be innovative if they want to keep up with the digital economy

Infographic: How Millennial Online Shopping is Changing the Retail Industry
Millennials make 54 percent of their purchases online and 67 percent of millennials prefer shopping online than heading to an actual store.

back to top


Decline of Traditional News Media

Article: Social media for the first time tops newspapers as a news source for US adults
New research report concludes that more U.S. adults get their news from social media than from print newspapers.

Report: Social media outpaces print newspapers in the U.S. as a news source
Study shows that adults are turning to social media for news, also shows younger adults don’t rely on one platform in the way that the majority of their elders rely on TV.

Article: Not fake news: News jobs are disappearing
According to U.S. Bureau of Labor Statistics, more than half jobs in the news industry have disappeared in the past 15 years.

Article: Don’t believe the hype: The decline of trust in mainstream media
Lost trust is one reason for the decline of traditional news media, and nearly 25% people think fake news should take responsibilities.

Article: People Prefer Digital Over Print for News & Views
People’s preference change is one reason for decline of traditional media. According to an Omnes Media study, 36 percent of the participants do not read newspaper, 45 percent read newspaper sometimes, 8 percent read it once a week, and 12 percent are daily newspaper readers.

back to top




Article: When seeing is no longer believing
A detailed look at what the U.S. government is doing to combat the threat proposed by Deep fake videos

Article: Fake Porn Videos Are Terrorizing Women. Do We Need a Law to Stop Them?
Advances in AI software is allowing users to graft heads of celebrities and ordinary people to bodies of X rated actresses and releasing the videos. It is really hard to determine if the videos are fake.

Article: You thought fake news was bad? Deep fakes are where truth goes to die
AI technology can now make it look like anyone says anything, will this be the new wave of misinformation warfare?

back to top



Digital Divide

Article: Ajit Pai Claims His FCC Improved Broadband Access
Federal Communications Commissioner Ajit Pai says the Federal Communications Commission’s annual broadband assessment will show that his deregulatory policies have substantially improved access in the United States.

Article: How the ‘digital divide’ is holding the U.S. economy back
To close the digital divide, this paper identifies three causes of digital divide and roles of different stakeholders.

Article: Dividing the country won’t bridge the digital divide
Republican and Democratic should work together to improve American infrastructures which is the major reason for the U.S. digital divide.

Graphic: America’s digital divide, in two maps
This paper uses two graphics to show the U.S. rural broadband accessibility and speed of America’s broadband.

Report: Study Confirms Persistence of Rural Digital divide
The Center for Equity in Learning released a new study on the persistent digital divide in America’s rural communities

Article: Rural Electric Cooperatives: The Digital Divide’s Salvation
Rural electric cooperatives have characteristics that make them uniquely qualified to take significant and meaningful strides in conquering the digital divide

Report: Congress, More Than a Dozen States Consider Legislation to Expand Broadband Access
Research shows lawmakers are supporting efforts that will help to increase the understanding of broadband challenges and solutions

back to top



Digital Millennium Copyright Act (DMCA)

Article: What Is DMCA? A Guide to Copyright Law
A full rundown of DMCA and insight into how copyright holders often abuse the law to protect their own interests

Article: Make Sure You’re Covered in 2018: The DMCA’S New Requirement to qualify for Safe Harbor Protection From Copyright Infringement Claims
The DMCA has a critical safe harbor provision for OSPs that exempts them from copyright infringement liability arising from a third party’s actions. All OSPs are required to register their designated agent via the U.S. Copyright Office’s new online directory.

Article: Copyright’s Safe Harbors Preserve What We Love About the Internet
EU’s proposed Copyright in the Digital Single Market Directive is causing some people in the U.S. to reconsider our safe harbor laws here.

Article: A DMCA exemption could bring ‘dead’ games back to life
The U.S. Copyright Office is considering updating DMCA rules to make an exemption for abandoned online games, which is good news for gamers and gaming industry.

Article: Video Game Companies Seek DMCA Exemption for Online Video Game Preservation
Abandoned video games may revive via the new update of DMCA. Museums, libraries and archives can operate new servers for these game, if the new policy is approved.

back to top




Article: Gambling and Gaming in Belgium: Opportunities and Risks associated with Online Digital Gambling
This paper uses Belgium as an example to discuss opportunities and risks of E-gambling via specific data and detailed analysis.

Article: Using blockchain, this company wants to make online gambling less of a gamble
Blockchain casino is a growing force, which can provide a large share of the airdrop and fairness functions.

Resource: Legal U.S. Online Gambling Guide
An interactive map that lets users explore gambling regulations state by state

Article: Online gambling: the hidden epidemic
For some young people online gambling innovation and smartphone usage is proving increasingly toxic

back to top




Article: Child pornography circulating on Facebook messenger
People should block child pornography circulating on Facebook messenger by stopping sharing these pictures.

Report: Adult & Pornographic Websites – U.S. Market Research Report
This is a market report about adult and pornographic websites and has several basic data information about market size and growth rate.

Article: YouTube’s Latest Child Exploitation Controversy Has Kick-Started A War Over How To Fix The Platform
Who is responsible for fixing the child exploitation issue taking place on YouTube? The popular video platform is trying to push responsibility onto users and content creator

Article: Tumblr’s Porn Ban Revals Who Controls What We See Online
Previously Tumblr defended adult content posted on their platform, now they are banning it

Article: Proposed law in Hawaii would block porn sites unless users pay fee to fund victims of sex trafficking
Hawaii is the latest state to introduce a version of the Human Trafficking and Child Exploitation Prevention Act, which seeks to restrict access to pornography

Artice: India’s Online Porn Ban Actually Caused Consumption to Surge, Research Suggests
In October 2018 authorities in India ordered all internet service providers to block user access to 827 websites containing pornography, research is showing users are finding alternative ways to view porn online

back to top




Article: Switzerland offers cash for finding security holes in its e-voting system
Switzerland is inviting white hats from all around the world to try to compromise its future electronic voting system during an upcoming mock election. The hope is that any software flaws will be found and removed before the system is used for real.

Article: The Crisis of Election Security
America’s electronic voting systems are proving to be vulnerable, why isn’t anything being done about it?

Article: eVoting and Identity Verification in the Digital Age
This paper discusses benefits (convenient and low cost) and challenges (identity and hackers) about e-voting. In the end, this paper believes innovation technologies can solve these challenges and e-voting will get people’s trust.

Article: Electronic voting machines clear hurdles in Georgia House
If state legislation is passed voters in Georgia could soon see touch screen electronic voting machines.

Article: Why Finland And Estonia Disagree About Internet Voting
Comparing with Estonia, which embraces e-voting, shortage of electronic voting systems leads Finland against e-voting.

Article: How risky are flawed e-voting systems for democracy?
This paper comes from Swissinfo, a news website, and mentions E-voting may damage democracy due to the uncertainty of cybersecurity.

back to top




Article: Electronic Waste (E-Waste): How Big of a Problem is it?
This paper provides an overview to E-waste problem, which includes definition, categories of e-waste, e-waste pollution, and solutions. Besides that, some facts of e-waste are discussed via specific data.

Article: The World Economic Forum Tells Davos: Electronics Are ‘the Fastest-Growing Waste Stream in the World’
We live in a world where people throw away broken devices instead of replacing them and it’s poisoning our planet.

Article: Electronic Waste Disposal – Why You Need to Be Careful
E-waste influences three aspects: business, environment and society. In business, companies should take care reputation, profits and carbon footprint. For environment, water, air and soil pollution are three major parts. For society, e-waste may cause leakage of people’s information.

Article: An end to electronic waste: United Nations organisations highlight their commitment
The United Nations paves the way for coordination and collaboration on e-waste management.

Article: E-Waste State of the Union: Recycling Facts, Figures and the Future
Nearly 100 percent of e-waste can be recycled, however it’s the fastest growing segment in the solid waste stream.

Article: Almost everything you know about e-waste is wrong
E-waste occurs throughout the life of our devices, not only when we discard them.

back to top



Electric Cars/Self-driving Cars

Report: 2018 Self-Driving Safety Report
This report comes from General Motors and shows what they did to produce their self-driving cars.

Article: Privacy concerns and self-driving cars: Are we ready for autonomous vehicles?
People concern they may suffer privacy leakage and hacker attacks when they use self-driving cars.

Article: Unbelievable Benefits and Drawbacks of The Self-Driving Car
Five drawbacks of the self-driving car are discussed in this paper: 1) expensive, 2) potential for technology to go wrong, 3) licensing infrastructure not yet in place, 4) potential greater pollution, and 5) potential loss of privacy.

Guide: Wired’s guide to self driving cars
Self driving cars are officially commercially available, this comprehensive guide helps us understand what exactly that means.

back to top



Fake News

Article: Journalists Raise Concerns About ‘Fake News’ Rhetoric After Man’s Arrest for Threats to CNN
“Fake News” rhetoric generates hate speech to CNN, which is concerned as a threat by journalists.

Article: France passes controversial ‘fake news’ law
France’s parliament has passed a new law, which aims to empower judges to order the immediate removal of “fake news” during election campaigns.

Listen: Fake News: An Origin Story
NPR podcast “Hidden Brain” digs deep into the history behind fake news.

Article: Facebook’s efforts to stop fake news are making it worse
This paper is provided by New York Post and discusses how FaceBook tries to solve “fake news” and why their attempts suffer some challenges.

Article: Google ups its anti-fake news game ahead of EU elections
Google commits to staying ahead of fake news with well trained staff and a variety of tools to help news organizations combat fake news.

Article: Over-65s Most Likely to Share Fake News, Says Study
Lack of digital media literacy could be the reason Americans above the age of 60 are major sharers of fake news.

Article: The Grim Conclusions of the Largest-Ever Study of Fake News
When it comes to Twitter, false news reached more people than the truth

Article: How 18th-century information wars can solve the problem of 21st-century ‘fake news’
Taking a page from our ancestors, humanities can play a critical role in overcoming the fake news epidemic

Video: How your brain tricks you into believing fake news
Is our desire for quick and easy answers the driving factor behind our ability to be duped by fake news?

Report: Less than you think: Prevalence and predictors of fake news dissemination on Facebook
Study examines individual characteristics that are associated with sharing fake news

back to top



Fiber Cable Rationing

Report: Digital in 2018
This report finds Africa’s internet users increase by 20 percent

Article: By 2025 internet penetration will increase by 130 percent in Sub-Saharan Africa
According to GSMA’s report, Africa’s internet population will increase 284 million from 211 in 2017.

Article: Internet Speed and Economic Development in Africa
Africa has a poor internet speed comparing to the rest of the world. Kenya is a good example to show high internet speed can contribute to economy growth.

back to top




Article: Virtual ATM skimming new threat to businesses: Symantec
With ransomware coming up short cyber criminals are now installing malicious software onto retailers systems and stealing customers payment information.

Article: Forget Phishing and Ransomware. Formjacking Is the New Favorite Hack of Cyber Crooks
Affecting an average of 4,800 websites per month, formjacking is one of the newest favorite ways for hackers to steal personal data

Article: Cyber criminals shift focus toward e-commerce sites: study
All it takes is a few simple lines of code and consumers information is formjacked

back to top



Going Viral

Article: The Twitter Invoice
People are starting to ask journalist for payment after they embedd their tweets in articles.

Article: Accidentally famous: The psychology of going viral
Fame from going viral , can influence our lives in serious ways

Article: The ‘Momo challenge’ isn’t a viral danger to children online. But it sure is viral.
The viral spread of the Momo challenge may say less about the danger these challenges pose to young people and more about the fear that the Internet can inspire

Article: How a recipe goes viral on Instagram
What is it that makes certain posts such as recipes resonate with so many thousands of social media users?

Article: What It Felt Like When “Cat Person” Went Viral
Going viral is living the dream and a nightmare all rolled into one

back to top




Article: Automated Hacking Tool Autosploit Cause Concerns Over Mass Exploitation
As developing the automated hacking tool, organizations should use a clear, accurate and up-to-date picture of every service they expose to the internet.

Article: 10 Most Powerful (Known) Active Hacking Groups
This paper lists most powerful hacking groups, which shows hacktivism relates to global politics.

Article: Should we be scared of hacktivists?
Marco Romagna, a Ph.D. candidate, discusses motivations of hacktivists and thinks policy makers should think hacktivism is a form of protest.

Article: The States with the Most Hacktivism Incidents
Using FBI data, predictions are made on which U.S. states are most at risk for hacktivism during elections.

Article: How hacktivist groups pose a global cybersecurity threat
A deep dive into hacktivist groups and cybersecurity trends and ideas for anticipating and defending against future attacks.

Listen: An Anarchist Explains How Hackers Could Cause Global Chaos
Former Anonymous member provides insight intio cyber-revolutionaries and their motivations

back to top




Report: ICANN60 By the Numbers
This report includes technical, demographic, and attendance statistics, and summarizes findings from ICANN’s second Annual General Meeting of the new meeting strategy.

Article: EU Tells ICANN: You’re Unprepared for GDPR Regulations
General Data Protection Regulation (GDPR) goes into effect in May and EU thinks ICANN does not reach its requirements.

Report: Celebrating Four Years of Supporting the Asia Pacific Region
This is an official report from ICANN and shows achievements of ICANN in Asia Pacific region.

Article: ICANN Begins Publishing Monthly Reports on Generic Top-Level Domain Security Threats
ICANN just released its first monthly report on high level security threats

Article: What to expect when the internet gets a big security upgrade
ICANN is upgrades to more security keys increasing security for DNS but failure to upgrade servers could cause problems reaching websites.

back to top



Information Overload

Article: Can democracy survive information overload?
Democracy may suffer a lot from information overload because the biggest challenge to democracy in the 21st century is that uninformed voters are being replaced by misinformed ones.

Article: Dealing with Information Overload in Telematics (9 Strategies)
This paper discusses six symptoms of information overload of management, for example, runaway fuel cost and poor customer satisfaction level. Besides that, nine strategies are also given by this paper.

Article: Information overload is nothing new
Information overload isn’t something new, it is a problem that has presented itself in throughout history, the problem today is that we have yet to develop successful techniques to help us navigate the abundance of digital data.

Article: To Beat Information Overload, Be Selective in Your Focus
“Clarity of focus” and “Space to get to your best work” are two strategies to solve information overload in people’s daily life.

Article: Information Overload: How It Hurts Investors
This article comes from Investopedia and identifies causes of information overload,

back to top



Internet Censorship

Article: Copyright, The First Wave of Internet Censorship
The Digital Millennium Copyright Act’s (DMCA) may make copyright law become a tool for unscrupulous internet censors.

Listen: Censorship on Social Media
NPR’s podcast “All Things Considered” discusses Internet censorship particularly on social media

Article: Why some countries are building ‘walls’ in the worldwide web
A few governments are trying to block certain corners of the internet, claiming that the tactic is to provide protection from hate speech, fake news and foreign election meddling.

Article: The State of Internet Censorship in Europe
The EU has a few restrictions that make it challenging to access certain types of content or entire websites on the Internet.

Article: India Proposes Chinese-Style Internet Censorship
The country’s government is considering broad new powers to suppress online content.

Article: China’s digital protectionism puts the future of the global Internet at risk
What will happen if China’s blatant digital protectionism continues to go unchallenged?

Data: Share of global internet users who are concerned about the government censoring the internet as of November 2014, by region
This graphic shows share of global internet users who are worried about the government censoring the internet, which suggest concerns of internet censorship is a global issue.

Article: Fighting Fake News: A Back Door Trick to Enact Internet Censorship
This article is provided by wakeup-world.com and discusses 1) the relationship between fighting fake news and censorship, and 2) other causes of censorship, for example

back to top



Internet Dating

Article: ‘Least Desirable’? How Racial Discrimination Plays Out in Online Dating
Racial Discrimination is happening in online dating, but some people think these are dating preferences.

Report: The Safest and Most Dangerous States for Online Dating
This report uses specific date show how safe each state are in online dating.

Article: Online Dating Scams: More Than Just Your Heart Is at Risk
This paper comes from experian.com and answers three questions: 1) what is romance scams? 2) how to protest yourself? 3) how to solve these troubles?

Article: I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets
Is the data provided to dating apps being hacked or sold?

Article: When Love Becomes a Scam
Scammers are abusing online dating programs, leading to heartbreak both emotionally and financially for the scammers’ victims

Article: For better or worse: Looking for love in the internet age
Online dating and social media have revolutionized how we look for love, how does this affect our health and well-being?

back to top



Internet Fraud

Article: Officials issue warning about risk of tax refund fraud
Adam Krupp, the department commissioner of the Indiana Department of Revenue, provides six tips for avoiding tax fraud, for example, protect financial documents and do not give a business or organization your Social Security number.

Article: How to spot online scams
This paper comes from hotspotshield.com and assumes five scenarios of internet fraud which people should take care.

Article: Why it is time to strengthen your password
Data breaches are on the rise; follow these tips to strengthen your password

Article: Types of Internet Fraud and How They Work
There are all kinds of attack strategies out there. To protect yourself, you need to know the types of internet scams to look for and how to avoid them.

back to top



Internet of Things

Article: Risk and Opportunity in the Internet of Things
This paper uses concrete data and emphasizes three aspects of risks of IoT: 1) many CMT risk professionals may be unaware of connections to the Internet of Things, 2) system operation and security dominate IoT provider concerns; users increasingly concerned with physical risks, and 3) CMT risk managers view themselves as innovation partners.

Article: The Internet of Things’ Dangerous Future: Bruce Schneier
An outline of the problems associated with IoT, both technical and political, and some suggested regulatory solutions.

Article: 7 Big Problems with the Internet of Things
This paper comes from cmswire.com and identifies seven problems of IoT: walled of the internet, cloud attacks, AI-Built security issues, botnet problems, limited AI, lack of confidence, and understanding IoT.

Article: 2018 Roundup Of Internet Of Things Forecasts And Market Estimates
An overview of notable IoT advancements in 2018 and projections for what we will see in 2019.

Report: IoT Innovation Report
Deloitte releases its annual report on IoT and Innovation highlighting the current impact of IoT and future challenges.

back to top



Internet for the Poor

Article: Viewpoint: Poor broadband access puts rural areas at a disadvantage
Poor broadband accessibility is bad for business and students’ learning in the rural area.

Article: Trump’s FCC wants to take the internet away from poor
Lifeline lets poor people use a $9.25 monthly household subsidy to get internet service, but Trump’s FCC may make this subsidy goes away.

Article: Using Big Data and the Internet of Things to Help End Poverty
Jim Kim, the president at the World Bank, thinks IoT and big data can benefit poor people and solve their poverty problems, such as refugees’ problem, traffic congestions, and pollution.

Article: Bridging the digital divide: NAU researcher using innovative technology, social science to improve lives in underserved communities
Underserved populations are still on the wrong side of the so-called digital divide—missing out on a wide range of educational, cultural and economic opportunities widely available to the rest of the country.

Article: Broadband Is Largely Inaccessible to Those Who Need it Most
High prices and low accessibility hinder poor and rural communities from subscribing to high-speed internet.

back to top



Job Displacement

Article: Are Robots Competing for Your Job?
Three key pieces of advice for not losing your job to automation

Report: Unfulfilled promises Amazon fulfillment centers do not generate broad-based employment growth
Amazon fulfillment center may not create net job increase. Government spending on Amazon warehouses is hard to get returns.

Data: Every study we could find on what automation will do to jobs, in one chart
MIT Technology Review started keeping tabs on all the numbers different groups have come up with about predicted job losses (and some gains) at the hands of automation, robots, and AI and compiled them into one chart.

Article: The Question with AI Isn’t Whether We’ll Lose Our Jobs — It’s How Much We’ll Get Paid
With the right policies we can get the best of both worlds: automation without rampant unemployment.

Article: Automation and AI will disrupt the American labor force. Here’s how we can protect workers
Five strategies to help maximize the benefits that automation and AI may bring, while mitigating the potential harms.

Article: What types of jobs are at risk?
These position is facing a high risk of job displacement: Seller, administrative occupations, customer service positions, finance administrative occupations, and elementary shortage occupations.

Article: Women are more at risk of losing their jobs thanks to tech, WEF says
According to a study by the World Economic Forum, 57 percent of the 1.4 million U.S. jobs, which belong to women, may be displaced by automation in the next eight years.

Article: No, A Robot (Probably) Won’t Take Your Job
This paper is provided by medium.reinvent.net and discusses AI job displacement objectively by mentioning “man-machine collaboration” and “some jobs are going away”.

Article: AI and robots could threaten your career within 5 years
AI has potential to replace people’s job and this displacement is already starting. People should prepare new skills to meet future demands and to overcome this challenge.

Article: Do we understand the impact of artificial intelligence on employment?
Displace effect and productivity effect are two opposite ways which caused by AI. Understanding AI’s potential, making rules for AI and designing policies to accommodate new technology possibilities are three steps for AI era.

Article: These jobs are most at risk for being automated
Automation is threatening cookers and servers, cleaner, movers and warehouse workers, retail salesman, nurses and truck drivers.

Video: Alibaba’s Jack Ma: In the Next 30 Years People Will Work 4 Hours A Day
Next 30 years are going to be painful because some people may not catch up with the wave of technology innovation. Great changes will happen. People may work 4 hours per day and 4 days per week. People should take advantage from big data.

Report: Artificial Intelligence, Automation, and the Economy
AI and job replacement draw the White House’s attention. Obama administration made this report and generated several potential policies to respond this challenge.

back to top



Live Streaming

Article: The Hidden Dangers of Twitch
Twitch is the world’s leading social video platform and community for video gamers, nerd culture and creative arts. Some parents concern live streaming content and chat behaviors which may mislead their children.

Report: Streamlabs Livestreaming Q4 Report
This report comes from Streamlabs and shows livestreaming Q4 data, which includes market share and viewer numbers.

Article: 62 Must-Know Live Video Streaming Statistics
This article indicates 62 live streaming data and uses these data to show some important business features of live streaming.

Article: Twitch is now blocked in China
Major streaming site is no longer accessible and no longer available in the local Apple store. Previously it was among the top free apps in China.

back to top



M banking and Microfinance

Article: 3 major mobile payment security risks, and how to avoid them
For mobile payment security, phone losing, cyber thieves, and malware are major risks.

Article: The Many Benefits of an Online Checking Account
Online checking account has five advantages: 1) proving an easy way to manage your finances, 2) automated functions can bring peace of mind, 3) time-saving, 4) earning rewards can be effortless and 5) paying fewer and lower fees.

Article: Mastercard and Doconomy Launch the Future of Sustainable Payments
Mobile banking sets out to combat climate change by enabling services that allow customers to reduce their CO 2 footprints through carbon offsetting.

back to top



Malware and Spyware

Article: Mobile Malware Risk: Why Prevention is Better than Cure, and What You Can Do About It
Keith O’Byrne gives several tips for mobile users to prevent malware risks, for example, preventing threats from infecting mobile system, blocking malicious content, and passwords security.

Article: 2019 Malware Trends to Watch
This article identifies the top malware trends predicted to surface in 2019.

Article: New challenge for WhatsApp: Malware that can steal WhatsApp messages found on phones
A malware which can steal WhatsApp messages from Android phones was found. The most concern of this malware is it can trick an Android feature which designed to help disabled accessibility.

Article: Malware attacks that hunt for porn site login credentials on the rise
There is an increase in PCs getting attacked with malware that’s designed to steal login credentials for the top adult video websites.

Article: Researchers Discover Malware That Targets Apple Mac Computers and Cryptocurrency Exchanges
CookieMiner malware can modify computers to install software for the purpose of cryptocurrency mining.

back to top



Money Laundering

Article: Bitcoin ATMs May Be Used to Launder Money
There are more than 4,000 Bitcoin ATMs worldwide and they are being used as a vehicle for money laundering

Article: How Can Blockchain Help With Anti-Money Laundering
Blockchain technology enhances regulatory reporting for a number of directives including financial institutions.

Video:How Uber ghost rides are linked to online money laundering
Online service marketplaces create an open environment for electronic money laundering, known as ‘transaction laundering’.

Report: Guidance Notes on the Prevention and Detection of Money Laundering and Terrorist Financing in the Cayman Islands
The Cayman Islands Monetary Authority uses this report to show their awareness of the global tendency to fight against money laundering, terrorist financing and other financial crime.

Report: Anti-money laundering and counter-terrorist financing measures
The Financial Action Task Force (FATF) uses this report to show what measures Portugal government uses to against money laundering and terrorist financing.

Reports: Foreign governments step up anti-money laundering efforts. Yet, the impact on illicit financial flows is uncertain.
This report shows how foreign governments’ attempts of anti-money laundering.

Article: 669 cryptocurrency money-laundering cases suspected in April-December
Japanese police announced that 669 cases of suspected money laundering relate to cryptocurrencies and exchange operators.

back to top



Nanotechnology/the gray goo/

Report: 2018 Nanotechnology & Fuel Cell Research Review
A look at how Nanotechnology continued to become deeply integrated in various industrial applications in 2018

Article: Can Nanotechnology Build The AI Of The Future?
This article covers how AI and nanotechnology can come together and build the future of humanity’s existence.

Article: The Issue of Ethics in The Development of Nanotechnology
Weaponry and other dangerous components are major concern of ethics in nanotechnology development.

Article: What Are the Risks of the Development of Nanotechnology in Medcine?
Scientist finds eight risks of nanotechnology in the medical field, for example, the nanoparticles can lead to lung damage and nanomaterials may act like a virus or bacteria in the body after self-replicating itself.

Article: Some Benefits & Risks of Nanotechnology
This paper mentions benefits of nanotechnology in different industries and indicates eights potential risks in business and regulations aspects

Article: The Trends of Nanotechnology and its Application in the Automotive Sector
Nanotechnology has advantages in the automotive industry, specifically on the exterior and automotive wrapping. Nanotechnology also has potential to benefit disabled people.

back to top



Net Neutrality

Article: Net Neutrality Goes Back To Court
A year later we are revisiting the decision to overturn Net Neutrality

Article: Net neutrality is dead — what now?
A roadmap to understanding the Internet without Net Neutrality laws

Article: Ending Net Neutrality Is a Business Risk, Netflix Says
Netflix says the end of Net Neutrality is bad for internet speeds and the media streaming company’s business.

Article: Net Neutrality Explained
A Q&A published by NYU Law School on details of net neutrality and what it means for it to end

Article: What you need to know about net neutrality
This paper provides what people need to know about net neutrality, and how the end of it could change the way Americans experience the Internet. Besides, that, who gets benefits and who gets damages is also argued by this paper.

Article: Why Net Neutrality Was Repealed and How It Affects You
Obama-era net neutrality rules were repealed by the Federal Communications Commission. The repealed rules are Blocking, Throttling, and Paid Prioritization. People have three concerns about these changes: 1) broadband providers may change their selling strategy; 2) consumers may suffer from pay-to-play deals; 3) industry giants may gain great advantages in the market.

back to top




Article: Industries most at risk of phishing attacks revealed
In small and middle business field, small insurance companies have highest percentage of phish-prone employees. None profit organizations have leading position in large companies.

Article: Mobile Phishing and the Gaping Mobile Security Hole
Phishing attackers may use social media sites and Apps deliver their messages. To increase security, companies should route employees’ mobile data traffic to a central gateway where protection can be applied.

Article: 5 Methods That Can Harm Your Business
Employees should take care five types of phishing attacks: phishing, spear phishing, whale phishing, business Email compromise (BEC), and clone phishing.

Article: Phishing Is the Internet’s Most Successful Con
Phishing is an attack on humans not computers and we need to talk about it

Article: Combating phishing scams beyond the point of entry
We have made strides in protecting information and taking steps to prevent fraud, but despite our efforts criminals have also had success exploring alternative methods for phishing and obtaining information.

Article: Phishing in 2019: Trends and Research
Cybersecurity can continue to advance, but we will still be at risks because humans are a highly vulnerable part of the online safety equation.

back to top




Article: Legislation would stiffen penalties for ransomware attacks
Lawmakers prompted to take action against ransomware in response to attacks on Maryland hospitals in the last year.

Article: 8 Recent, Dangerous Ransomware Examples
This paper mentions eight dangerous ransomwares: Locky, Troldesh, GlobeImposter, Philadelphia, Cerber, WannaCry, NotPetya, and Bad Rabbit.

Article: Understanding ransomware and the impact of repeated attacks
Organizations are still not prepared well to face new ransomware threats. Ransomware attacks are expensive, which includes money, time device, and opportunities.

Article: A day in the life of a cyber criminal
An inside look at how a cyber criminal prepares and launches his scheme

Video: Ransomware “WannaCry” explained
An explanation of one of the largest ransomware attacks ever enacted

Report: Cybercriminals are Moving on From Ransomware to Cryptojacking
IBM research team reports that Ransomware and Malware are out and cryptojacking is in store. Previously it was among the top free apps in China.

back to top




Article: How Prisons Can Use Tech to Slow Their Ever-Revolving Doors
Tech can increase skills, connections, and self-confidence—the very things needed for successful re-entry

Article: Digital literacy will reduce recidivism in the long term
Implementing digital technology into correctional education will prepare offenders for re-entry into the outside world, and increase their chance of staying out of prison

Article: Can Edtech Behind Bars Help Keep People Out?
Tech startup introduces a tablet based educational platform that combats recidivism

Report: The Changing State of Recidivism: Fewer People Going Back to Prison
Pew Research Center analyzes data from 23 states on recidivism and finds a 23 percent drop

back to top



Revenge Porn

Article: Revenge porn: What to do if you’re a victim
If you’re a victim of revenge porn, you should do these things to protect yourself: 1) keep evidence, 2) report the photos or videos to the website, 3) tell friends and family, 4) consider your next step, 5) find law protection, and 6) don’t panic.

Article: What Is Revenge Porn?
This paper gives an overview of revenge porn and discusses why people do it and protection methods.

Article: Revenge Porn Is Officially Punishable by Law in New York City
In New York City, revenge porn criminals are facing one year in jail and a 1,000 fine, which went into effect in February.

Article:  41 States + DC Now Have Revenge Porn Laws
The Cyber Civil Rights Initiative has compiled a list of the current revenge porn in the United States. Revenge Porn is currently regulated by the states.

Article: Facebook’s plan to stop revenge porn may be even creepier than revenge porn
Facebook, facing increased scrutiny over its decision-making, launched a program intended to combat a growing problem on the platform: revenge porn. The solution may involve users submitting their own needs to Facebook.

Article: Baker administration refiles bill on cyberbullying, “revenge porn”
The Governor of Massachusetts is not giving up on his attempt to crack down on cyberbullying, sexting and revenge porn, but the refilled legislations is missing a key component- victims’ rights.

back to top




Article: Advantages and Disadvantages of Robotic Automation
On the one hand, the robot has four advantages: cost-effectiveness, improving quality assurance, increasing productivity, and working in hazardous environments. On the other hand, the robot also has three disadvantages: potential job losses, initial investment costs, and hiring skilled staff.

Article: We Need to Approach AI Risks Like We Do Natural Disasters
The risks posed by intelligent devices will soon surpass the magnitude of those associated with natural disasters. So, people should consider risk management about the robot and provide insurance service for it.

Article: Does Robotics and Artificial Intelligence Have A Future in the Health Care Space?
This paper analyzes safety and personal information issues about healthcare robots.

Article: The 10 Grand Challenges Facing Robotics in the Next Decade
Ten different challenges for robotics development in the next decade are identified, for example, new materials and fabrication schemes, power and energy, and robot swarms.

Article: Five ways robotics will make food delivery better
The robotic advancements making food delivery even better.

Article: Robotics program introduces girls to tech
Fewer than 20 percent of engineers in the United States are women, and even less globally, new programs are being launched to increase those numbers.

Article: This robotics museum in Korea will construct itself (in theory)
Seoul launches robotic construction project, assigning robots with the task of building their own museum

Article: On-Demand Grandkids and Robot Pals to Keep Senior Loneliness at Bay
Insurers consider robotic technology to prevent loneliness in seniors

back to top



Sharing Economy

Article: 4 big trends for the sharing economy in 2019
The sharing economy will continue to grow with the middle class driving usage

Article: From Airbnb to city bikes, the ‘sharing economy’ has been seized by big money
If we want to continue to see the sharing economy grow, do we need to consider protecting it from market?

Article: Does the sharing economy truly know how to share?
Sharing economy companies need to work with governments to create policies that help them increase their benefits and mitigate their negative impacts

Article: In a shared economy, who should bear the risks that come with it?
Lloyd’s found that 71 percent of consumers prefer to use sharing economy services if insurance was offered, and majority consumers think provides and platform should provide protection for the consumer.

Report: Sharing risks, sharing rewards: Who should bear the risk in the sharing economy?
This report provides several facts about sharing economy development in different countries to help platforms realize about that.

Article: The dark side of the sharing economy
According to this paper, sharing economy is about the sharing of idle assets, usually via tech platforms, in ways that produce economic, environmental, social and practical benefits. Sharing economy companies should take care people, take responsibilities and think holistically to provide basic services.

Article: The Economic Impact of the Sharing Economy
As sharing economy grows, people start to notice some negative impacts of it, such as grows faster than traditional markets, concerns of regulations, and black income.

back to top



Smart Grid

Report: Security for smart Electricity GRIDs
This report uses flow charts to show how to increase security for smart electricity GRIDs.

Video: What is the Smart Grid?
Smartgrid.gov provides a video explaining how the smart grid works and why it is important

Article: Canada to host region’s largest smart grid system
The system will allow the integration of electric vehicle charging and distributed renewable energy resources to lower the utility’s operational costs and customer bills

Article: Hackers are attacking the electric grid
Last September, hackers attacked the U.S. power grid to look for weaknesses to exploit. A hacker’s final goal is to handle a master control center.

Report: California Smart Grid Annual Report to the Governor and the Legislature
This Annual Report on California’s Smart Grid activities provides overview of the California Public Utility Commission’s (CPUC’s or the Commission’s) recommendations for a Smart Grid.

Report: Guidelines for Smart Grid Cybersecurity
The Smart Grid Interoperability Panel– Smart Grid Cybersecurity Committee provides an analytical framework for cybersecurity strategy development and mentions risks and vulnerabilities of smart grid-related characteristics.

back to top



Social Media/Social Networking

Article: Benefits and Risks of Social Media
Social media addiction, cyberbullying, invasion of privacy, and the burden of comparisons with idealized depictions of others are four potential risks of social media.

Article: The Benefits and Risks of Social Media Marketing
Impact of word of mouth, cybersecurity and employee credibility is major risks for social media marketing.

Article: Your Boring, Everyday Life Belongs on Social Media
Can encouraging people to post everyday mundane images on social media help decrease our anxiety?

Article: Regulate social media? It’s a bit more complicated than that
An argument for common international guidelines on how to address social media and the issues that rise from its use

Article: Is It Time to Regulate Social Media Influencers?
As the influencer market grows, fraud is becoming more rampant, and it’s increasingly difficult to discern when influencers are engaging in above-board, ethical publishing, and when they’re taking questionable shortcuts that dupe both the brands that pay them and the social media followers they’re meant to influence.

Article: The Slippery Slope of Regulating Social Media
Social media has, in effect, socialized speech and has us calling into questions when/if it should be regulated

back to top



Technology Addiction and Diseases

Article: 5 Ways to Kick Your Technology Addiction
Logan Chierotti, CEO of LoganChierotti.com, gives five suggestions for people who addicted to technology: 1) re-develop your behaviors, 2) digital detox periods, 3) email & social media limits, 4) pick a partner in crime, and 5) celebrate your successes.

Report: Is Internet Addiction a Viable Mental Health Issue?
The American Psychological Association recognizes addiction as a complex brain disease that can take over a person’s life. This report provides information on the various versions of technology addiction and who studies have found to be most vulnerable.

Article: Social media is a modern necessity — here’s how bosses can help employees avoid getting addicted
Bosses can use these strategies to help their employee avoid technology addiction: 1) create distraction-free time, 2) encourage screen-time boundaries, 3) make lunch a thing, and 4) offer support for employees and their children.

Article: technology addiction (internet addiction)
Excessive use, negative repercussions, and withdrawal symptoms are three signal of technology addiction.

Video: Digital detox: 3 ways to kick your tech addiction
Everything in moderation including using your smartphone

back to top



Telecommuting Virtual Reality & Augmented Reality

Microsoft employees express unhappiness with company providing augmented reality technology to the Army, citing that they did not sign up to help make weapons . CEO rebuffs their protest.

Article: The Ultimate Guide to Understanding Augmented Reality (AR) Technology
Augmented Reality (AR) is proving itself as a very useful tool in our everyday lives. This article provides an in-depth overview of the technology and how it is being used.

Article: What if you never saw your colleagues again?
AR and VR have expanded the opportunity to telecommute and the practice is becoming rapidly more common. How will this technology shape our work and our minds?

Article: The very real health dangers of virtual reality
CNN gives three suggestions for parents when their children are using VR devices: 1) clear the playing field, 2) stay around with your children, 3) add “motion sickness,” and 4) do not play in overly tired condition.

Article: VR Side Effects: Risks and Dangers of Virtual Reality Abuse
If people abuse VR devices, they might suffer nausea, dizziness, epileptic seizure, loss of orientation in space, and eye & vision problems.

Article: 10 ethical concerns that will shape the VR industry
Users should be aware of VR’s ethical problems, for example, social isolation, overestimation of abilities, and unpalatable fantasies.

back to top




Article: Inside Twitter’s Struggle Over What Gets Banned
Leadership at Twitter tries to get a handle on what constitutes dehumanizing speech and grapples with finding a technological solution.

Article: Twitter’s data problems could be even worse than Facebook’s
Carleton English thinks Twitter’s data problem is worse than Facebook’s because data licensing accounted for 18 percent of Twitter’s revenue in 2017.

Article: How Is Twitter Affecting Our Mental Health?
Can our brains process all of the information Twitter throws at us? They can’t.

Article: Your Old  Tweets Give Away More Location Data Than You Think
In 2019 Twitter users have to opt in to sharing geo location data, but that wasn’t always the case, what happened to all of the geo location data Twitter collected?

Article: Twitter’s Great Bot Purge And Can We Really Trust Active User Numbers?
Twitter addresses the issue of “bots” but critics are still skeptical

Article: Twitter’s fake news problem is getting worse
This paper uses Arab Spring, 2016 election, and bots as examples to discuss Twitter’s fake news problem.

Article: The latest Twitter revelations demonstrate how little we actually understand social media
This paper indicates two Twitter’s political problems: 1) Russian tweets and the 2016 election and 2) the fake follower issue.

back to top



Water Grid vulnerability

Guide: Water Sector Cybersecurity Brief for States
Cyber-attacks are a growing threat to critical infrastructure sectors, including water and wastewater system

Article: We’d be crippled by a cyberattack on our utilities
The damage from an attack on our critical infrastructure would be harrowing. We need a strategy to defend our nation from potentially crippling cyberattacks

Article: Cybersecurity For Water Utilities
With the digitalization of the water sector come endless opportunities, but it also brings new challenges

Report: Protecting Drinking Water Utilities From Cyber Threats
Drinking water utilities are increasingly incorporating technology into operations and raising its vulnerable to cyberthreats.

back to top