For use in POGO 750 Course Spring 2020 Semester
Prepared by: Uhunoma Edamwen
3D Printing
4D Printing
5G
Artificial Intelligence –personnel dislocation
Artificial Intelligence—military issues
AI Medical Ethics Issues
Algorithmic Management
Big Data
Biometrics
Bitcoin/ Etherium and Cryptocurrencies
Blockchain
Bots
Censorship
Cloud Computing
Commercial and Military Drones
Crowdsourcing
Cryptojacking
Cryptocurrency
Cyberbullying
Cyber Intelligence Sharing and Protection Act (CISPA)
Cyber Attacks/Threats/Security
Dark Web/Deep web
Data Theft
The Decline of Retail Stores Due to E-Commerce and Online Shopping
Decline of Traditional News Media
Deepfakes
Digital Divide
Digital Millennium Copyright Act (DMCA)
Doxxing
E-Gambling
E-Pornography
E-Voting
E-Waste
Electric Cars/Self-driving Cars
Fake News
Fiber Cable Rationing
Formjacking
Going Viral
Hacktivism
ICANN
Information Overload
Internet Censorship
Internet Dating
Internet Fraud
Internet of Things
Internet for the Poor
Job Displacement
Live Streaming
Mobile banking and Microfinance
Malware and Spyware
Money Laundering
Nanotechnology/the gray goo
Net Neutrality
Phishing
Ransomware
Recidivism
Revenge Porn
Robotics
Sharing Economy
Smart Grid
Social Media/Social Networking
Technology Addiction and Diseases
Telecommuting, Virtual Reality, and Augmented Reality
Twitter
Water Grid vulnerability
Wearable Technology
3D Printing
2020
- Article | 21 states file lawsuit against selling blueprints online to print 3D guns
- Article | New Frontiers Could Benefit 3D Printing ETF
2019
- Article | 3D-printed guns are back, and this time they are unstoppable
- Video & Article | 7 Industries in 2019 That Are Currently Being Disrupted by 3D Printing
- Article | Potential Hazards of Additive Manufacturing
- Article | 3D-printable guns will require us to rethink our approach on gun safety
- Academic Article | Nanomaterials exposure as an occupational risk in metal additive manufacturing
2018
- Video & Article | All your questions about 3D guns answered
- Article | How 3D Printing Is Fighting Global Warming
- Video | Beyond bionics: how the future of prosthetics is redefining humanity – video
- Article | The Threat 3D Printing Could Pose To Global Security
- Article | 10 Disadvantages of 3D Printing Technology
- Article | Emerging technologies: when terrorists print their own weapons
- Report | Additive Manufacturing [3D Printing] in 2040 -Powerful Enabler, Disruptive Threat
4D Printing
2020
- Academic Article | 4D Printing of a Bioinspired Microneedle Array with Backward‐Facing Barbs for Enhanced Tissue Adhesion
- Report | Revolutionary reversible 4D printing
2019
- Article | Four Ways 4D printing is Becoming a Reality
- Article | How will 4D printing disrupt our current manufacturing techniques?
- Article | Developments in 4D-printing: a review on current smart materials, technologies, and applications
- Article | How 4D Printing Will Transform the Future
- Article | 4D printing and the rise of smart materials
2017
- Video | Advanced Manufacturing
5G
2020
- Article | The Guardian view on Huawei and 5G: the risks are real
- Article | Health Scares Slow the Rollout of 5G Cell Towers in Europe
2019
- Article | 5G Is Coming. Here’s Everything You Need to Know About It
- Video | Five Myths about 5G, Debunked
- Article | Coming To A City Near You, 5G. Fastest Wireless Yet Will Bring New Services
- Article | 5G From Space Won’t Solve All Slow Internet
- Article | 5G Is Coming: How Worried Should We Be about the Health Risks?
- Article | China Isn’t the Only Problem With 5G
- Article | Forecasters fear 5G wireless technology will muck up weather predictions
- Report | Securing Our 5G Future
- Video | 5G: What It Means for IoT
- Academic Article | 5G: Revolution or Hype?
Artificial Intelligence –personnel dislocation
2020
- Article | China says robots and AI won’t lead to “significant” loss of jobs
- Article | The Robots Are Coming. Prepare for Trouble.
2019
- Article | A Crucial Step for Averting AI Disasters
- Article | The State of AI in 2019
- Article | Unbridled Adoption Of Artificial Intelligence May Result In Millions Of Job Losses And Require Massive Retraining For Those Impacted
- Article | AI could overtake high-wage jobs, study finds
- Report | How Robots Change The World
2018
- Article | The Privacy Expert’s Guide to AI And Machine Learning
- Article | Elon Musk Worries That AI Research Will Create an ‘Immortal Dictator’
- Video | AI ethics and AI risk – Ten challenges
- Article | 4 Things Everyone Should Fear About Artificial Intelligence and the Future
- Article | How to help AI find human trafficking victims
- Article | Is Artificial Intelligence a Threat to Humanity?
- Academic Article | Net Job Creation in an Increasingly Autonomous Economy: The Challenge of a Generation
- Academic Article | Artificial intelligence: Implications for the future of work
Artificial Intelligence—military issues
2020
- Article | U.S. Army Could Use Robots to Haul Ammunition
- Article | The Killer Algorithms Nobody’s Talking About
- Article | ‘Deep fake’ imagery manipulation poses threat to society not just military, US General warns
2019
- Article | Military artificial intelligence can be easily and dangerously fooled
- Article | Terrorist Groups, Artificial Intelligence, and Killer Drones
- Article | Death by algorithm: the age of killer robots is closer than you think
- Article | Ex-Google worker fears ‘killer robots’ could cause mass atrocities
- Article | Swarms of Drones, Piloted by Artificial Intelligence, May Soon Patrol Europe’s Borders
- Article | China is worried an AI arms race could lead to accidental war
- Report | Artificial Intelligence and National Security
- Video | Killer robots: Scientists concerned over ethics of military AI | Al Jazeera English
- Academic Article | Artificial Intelligence, Robotics, Ethics, and the Military: A Canadian Perspective
AI Medical Ethics Issues
2020
- Article | An algorithm that can spot cause and effect could supercharge medical AI
- Article | An AI Epidemiologist Sent the First Warnings of the Wuhan Virus
2019
- Article | They’ve Taken America’s Temperature — and It’s Running High
- Article | Dangers of artificial intelligence in medicine
- Article | The Dangers of AI in the Healthcare Industry [Report]
- Article | The “inconvenient truth” about AI in healthcare
- Report | Risks and remedies for artificial intelligence in health care
- Article | AI Comes to Medicine Amid Some Concerns About Safety
- Article | AI in Healthcare: Data Privacy and Ethics Concerns
- Article | Warnings of A Dark Side in A.I. Healthcare
- Video | Racial bias found in health care company algorithm
- Academic Article | AI in health care: Improving outcomes or threatening equity?
2018
Algorithmic Management
2020
- Article | Countering automation without representation
- Article | Technology Can’t Fix Algorithmic Injustice
2019
- Article | What is a consensus algorithm & why does it matter?
- Article | Inside Facebook’s suicide algorithm: Here’s how the company uses artificial intelligence to predict your mental state from your posts
- Article | Never mind killer robots—here are six real AI dangers to watch out for in 2019
- Article | When Algorithms Make Managers Worse
- Article | The Gnawing Anxiety of Having an Algorithm as a Boss
- Article | Is algorithmic management systemically flawed?
- Report | Fairness in algorithmic decision-making
- Video | The Weekly | What Is YouTube Pushing You To Watch Next
- Academic Article | Algorithmic management: The case of Airbnb
2018
- Article | When your boss is an algorithm
- Article | What Happens When An Algorithm Cuts Your Health Care
- Article | Franken-algorithms: the deadly consequences of unpredictable code
- Article | Computer risk algorithms and judicial decision-making
Big Data
2020
- Article | Big Data, Big Risks: Addressing the High-Tech & Telecoms Threat Landscape
- Article | Avast shutters data-selling subsidiary amid user outrage
2019
- Article | 3 ways that big data reveals what you really like to watch, read and listen to
- Article | Beyond CSI: How big data is reshaping the world of forensics
- Article | The bigger big data gets, the bigger the risk it poses
- Article | The Unexpected Consequences of Big Data
- Article | The Guardian view on crime and algorithms: big data makes bigger problems
- Video | Amazon, Jeff Bezos and collecting data | DW Documentary
- Academic Article | Predictive policing: not yet, but soon preemptive?
2018
- Report | Joint Committee Final Report on Big Data
- Article | How Trustworthy Is Big Data?
Biometrics
2020
- Article | Trump administration to begin collecting DNA from detained immigrants
- Article | London Cops Will Use Facial Recognition to Hunt Suspects
2019
- Article | AI in Biometrics and Security – Current Business Applications
- Article | House Oversight Committee May Hold A Hearing On Facial Recognition Technology
- Article | The dangers of facial recognition software
- Article | Some Thoughts on Facial Recognition Legislation
- Article | Hospitals Turn to Biometrics to Identify Patients
- Article | Culture Clash on Facial Recognition: China and the West Take Different Paths
- Article | The Fear of Biometric Technology in Today’s Digital World
- Video | Hackers Claim ‘Any’ Smartphone Fingerprint Lock Can Be Broken In 20 Minutes
- Report | Garbage In, Garbage Out: Facial Recognition On Flawed Data
- Academic Article | Facial Recognition is the Plutonium of AI
2018
Bitcoin/ Etherium and Cryptocurrencies
2020
- Article | Bitcoin Has Lost Steam. But Criminals Still Love It.
- Article | Into Africa: tech leaders weigh in on Jack Dorsey’s planned move to the continent
- Academic Article | Cryptodamages: Monetary value estimates of the air pollution and human health impacts of cryptocurrency mining
2019
- Article |Veteran Investor Makes A Bold Prediction About Bitcoin And The Future Of Money
- Article | How Bitcoin Grew Up and Became Big Money
- Article | Sorry, but cryptocurrency will likely make you uncomfortable in 2020
- Report | Cryptocurrency crime surges, losses hit $4.4 billion by end-September: CipherTrace report
- Article | Bitcoin consumes more energy than Switzerland, according to new estimate
- Article | Estimating the environmental impact of Bitcoin mining
- Video | Bitcoin Accounts for 95% of Cryptocurrency Crime, Says Analyst
2018
- Article | Bitcoin is all the rage — but is it worth the risk?
- Article | Beyond the Bitcoin Bubble
Blockchain
2020
- Article | Why you’re likely to keep hearing about utilities and blockchain in 2020
- Article | Why the World Economic Forum Is Creating a Blockchain ‘Bill of Rights’
2019
- Article | Chinese internet users turn to the blockchain to fight against government censorship
- Article | Child abuse images hidden in crypto-currency blockchain
- Article | There’s No Good Reason to Trust Blockchain Technology
- Article | Bitcoin Mining May Be Pumping As Much CO2 Per Year As Kansas City
- Video | The Rise of Blockchain and the Privacy Risks Associated With It
- Report | Bitcoin, Blockchain, and the Energy Sector
- Academic Article | Does regulation of illegal content need reconsideration in light of blockchains?
Bots
2020
- Article | Bots Are Destroying Political Discourse As We Know It
- Article | 58.5 billion robocalls made in 2019, up 22 percent
2019
- Article | Alexa-like bots will listen out for suicidal patients under NHS technology revolution
- Article | Bots are cheap and effective. One startup trolls them into going away
- Article | Twitter bots were more active than previously known during the 2018 midterms, a new study suggests
- Report | Majority of Canadians think Facebook will negatively impact federal election: survey
- Article | Bad bots now make up 20 percent of web traffic
- Video | Everything You Need To Know About Internet Bots
- Academic Article | Digital propaganda, political bots and polarized politics in India
2018
- Article | Chatbots Are a Danger to Democracy
- Article | Uncovering Instagram Bots With a New Kind of Detective Work
- Video | How Twitter bots are recycling Cold War techniques to sow political division
- Report | Risk Management for and by the BOT
Censorship
2020
- Article | What tech companies should do about their content moderators’ PTSD
- Article | Coronavirus sends Asia’s social media censors into overdrive
2019
- Article | Inside a Chinese Censorship factory
- Article | UK Regulators Propose Broad Social Media Regulations to Counter ‘Online Harms’
- Article | The Social Media Censorship Dumpster Fire
- Article | “Men are Scum”: Inside Facebook’s War on Hate Speech
- Article | How the “Great Firewall” extends beyond China
- Article | How the Iranian Government Shut Off the Internet
- Article | Reddit Restricts Pro-Trump Forum Because of Threats
- Article | Reddit Users Rally Against Chinese Censorship After $300 Million Funding Round
- Report | Free Speech and the Regulation of Social Media Content
- Video | Russia Internet Law: New regulations take effect amid concerns
- Academic Article | Human-Machine Collaboration for Content Regulation: The Case of Reddit Automoderator
2018
Cloud Computing
2020
- Article | Why 2020 could be the year Amazon becomes unstoppable
- Article | Google Photos accidentally sent people’s private videos to strangers
2019
- Video | What is Cloud Computing?
- Article | 3 Threats That Could Hold Back the Cloud Gaming Revolution
- Article | Cloud Gaming and its Concerning Implications
- Video | Without Amazon, most of the internet disappears
- Article | Cloud gaming: Google Stadia and Microsoft xCloud explained
- Report | Cloud Computing: Background, Status of Adoption by Federal Agencies, and Congressional Activities
- Article | 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud
- Article | Cloud Service Failure: 3 Things to Know
- Academic Article | Challenges In Cloud Computing on Security Issues And Solutions
Commercial and Military Drones
2020
- Article | Proposed FAA Drone Rules Prompt Industry Pushback
- Article | U.S. Commercial Drone Deliveries Will Finally Be a Thing in 2020
2019
- Article | Commercial Drones Unleashed: New Rules May Spark Industrial Revolution
- Article | Insight Around the New Drone Rules for Canada
- Article | How Much Of A Threat Do Drones Pose To Air Travel? Here’s What You Should Know
- Article | The F.A.A. Wants to Start Tracking Drones’ Locations
- Report | Drone technology uses and applications for commercial, industrial and military drones in 2020 and the future
- Article | https://www.latimes.com/business/story/2019-11-17/drone-deliveries-environment-trucks
- Article | Here’s how Amazon robots could make the deliveryman extinct
- Article | Coming soon to the battlefield: Robots that can kill
- Video | Danger in the skies? Close calls with drones skyrocketing
- Academic Article | Making Drones to Kill Civilians: Is it Ethical?
2018
- Article | Statement by the Commercial Drone Alliance Applauding Passage of FAA Reauthorization Act of 2018
Crowdsourcing
2020
- Article | ‘We aim to crowdsource a million computers in 2020’
- Article | Hyperconnected, receptive and do-it-yourself city. An investigation into the European “imaginary” of crowdsourcing for urban governance
2019
- Article | Key Challenges and Drawbacks with Crowdfunding
- Article | Crowdsourcing – Pros and Cons and how Your Business Can Profit from It
- Article | Blockchain Startup Takes on Mainstream Crowdfunding Sites to Cut Number of Failed Projects
- Article | GoFundMe CEO: One-Third of Site’s Donations Are to Cover Medical Costs
- Article | Failed crowdfunded gadgets are forcing Kickstarter and Indiegogo to change
- Article | The crowdfunded phone of the future was a multimillion-dollar scam
- Video | The dark side of crowdfunding
- Article | When GoFundMe Gets Ugly
- Article | The Hidden Cost of GoFundMe Health Care
- Report | IMPLEMENTATION OF FEDERAL PRIZE AND CITIZEN SCIENCE AUTHORITY: FISCAL YEARS 2017-18
- Academic Article | Fraud in Medical Crowdfunding: A Typology of Publicized Cases and Policy Recommendations
Cryptojacking
2020
- Article | Is Cryptojacking Dead after Coinhive Shutdown?
- Video | Interpol Collaborates With Cybersecurity Firm to Tackle Cryptojacking
2019
- Article | Cryptojacking: The Silent, but Insidious Security Threat
- Article | A new cryptocurrency mining malware uses leaked NSA exploits to spread across enterprise networks
- Article | Popular ‘cryptojacking’ service Coinhive will shut down next week
- Article | The silent rise of cryptojacking
- Article | What’s in Your Wallet? Resource-Draining Cryptojacking Attacks Are on the Rise
- Report | Cryptojacking Dropped 78% In Second Half of 2019: SonicWall Report
- Academic Article | Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
2018
Cryptocurrency
2020
- Report | Report: Cryptocurrencies Show Signs of Maturing But Remain Too Risky
- Article | UK offers $130K for software that can trace Bitcoin, Ethereum, and (hopefully) Monero
- Article | Cryptocurrency Act of 2020, the new US Bill
2019
- Article | Facebook and Telegram Are Hoping to Succeed Where Bitcoin Failed
- Video | Why Visa and PayPal need to fully embrace Cryptocurrency
- Article | Crypto Isn’t Disrupting Payments Yet But Stay Tuned, Ellis Says
- Article | European regulatory chief wants new cryptocurrency rules
- Article | Terrorists are using crypto to pay for attacks. It’s time to stop them
- Article | The current state of crypto regulation is hurting US companies
- Article | BBC: New Files Allegedly Connect $450M in Lost Bitcoin to Russian Intelligence
- Video | Inside The Cryptocurrency Revolution | VICE on HBO
- Academic Article | The destabilising effects of cryptocurrency cybercriminality
Cyberbullying
2020
- Article | Tumblr is rolling out an internet literacy initiative to help combat misinformation and cyberbullying
- Article | Tumblr is rolling out an internet literacy initiative to help combat misinformation and cyberbullying
2019
- Article | 6 Types of Cyberbullying
- Article | 11 Ways to Deal with a Workplace Cyberbully
- Article | Iowa Study finds parents unsure how to handle cyberbullying
- Article | Twitter launches its controversial ‘Hide Replies’ feature in the US and Japan
- Article | In trying to clear ‘confusion’ over anti-harassment policy, YouTube creates more confusion
- Article | Cyberbullying is on the rise among middle and high school students, report finds
- Article | Cyberbullying facts and statistics for 2016-2019
- Article | New algorithm can distinguish cyberbullies from normal Twitter users with 90% accuracy
- Report | Cyberbullying Statistics 2020
- Video | Instagram’s new tool lets you semi-block haters, bullies, trolls without them knowing
- Academic Article | Social media can harm when use displaces sleep or exercise or involves bullying, finds study
2018
Cyber Intelligence Sharing and Protection Act (CISPA)
- Article | A Quick Guide to the Senate’s Newly Passed Cybersecurity Bill
- Article | Senate Approves Cybersecurity Bill: What You Need To Know
- Article | Beware the Dangers of Congress’ Latest Cybersecurity Bill
- Article | A Zombie Bill Comes Back to Life: A Look at The Senate’s Cybersecurity Information Sharing Act of 2014
- Article | Why You Should Be Concerned About The Cybersecurity Information Sharing Act
- Report | Unclassified Joint Report on the Implementation of the Cybersecurity Information Sharing Act of 2015
- Article & Video | Reddit Cofounder Calls on Google’s Larry Page to Oppose CISPA
- Academic Article | Fighting for the Internet: Online Blackout Protests and Internet Legislation in the United States, 1996-2018
Cyber Attacks/Threats/Security
2020
- Article | Cyber attacks and electronic voting errors threaten 2020 outcome, experts warn
- Article | Threat of Cyberattack by Iran Still Critical, Experts Say
2019
- Article | Smart Cities Are Most Vulnerable to Cyber Security Risks
- Article | The new ways we could get hacked (and defended) in 2019
- Article | ‘Alexa, are you invading my privacy?’ – the dark side of our voice assistants
- Article | Security researchers expose new Alexa and Google Home vulnerability
- Article | Hackers targeted the admissions and enrollment departments at 62 universities and created thousands of fake student accounts
- Article | DHS warns of vulnerability that could be used to alter flight data in small planes
- Report | Cyber Threatscape Report
- Article & Video | FBI warns of security concerns with new Smart TVs
- Article | Overview of rapid cyberattacks
- Article | How the Pentagon Should Deter Cyber Attacks
- Academic Article | All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
Dark Web/Deep web
2020
- Article | What’s The Difference Between The Dark Web & The Deep Web [+ How To Access Each]
- Article | 36-year-old pleads guilty to selling drugs on dark web
- Article | A dark web tycoon pleads guilty. But how was he caught?
2019
- Article | What is the Dark Web? What is the Deep Web? How to Access the Dark Web
- Article | Here’s how much your personal data is selling for on the dark web
- Article | How to tell the deep web from the dark web
- Article | Over 1,500 Ring passwords have been found on the dark web
- Article | Justice Dept. says it’s taken down ‘world’s largest’ child exploitation sites on the dark web Zac
- Video | Your tax returns may be on the dark web
- Report | Report: 267 million Facebook users IDs and phone numbers exposed online
- Academic Article | Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea
2018
Data Theft
2020
- Article | Personal Data Of 650,000 Oregonians Exposed After Medical Vendor’s Computer Stolen
- Article | As coronavirus challenges mount, WHO’s reputation is being hijacked for data theft scams
- Article | Health Share of Oregon discloses data breach, theft of member PII
- Article | Why identity theft is “so easy” and what consumers can do to combat the threat
2019
- Dataset | World’s Biggest Data Breaches
- Article | California to close data breach notification loopholes under new law
- Article | Capital One Data Breach Compromises Data of Over 100 Million
- Article | Equifax data hack which hit 148million Americans ‘was the work of a foreign state trying to recruit U.S. spies’, experts conclude after no trace of stolen details is found online
- Report | Range of Consumer Risks Highlights Limitations of Identity Theft Services
- Article & Video | Capital One data theft raises questions about securing Amazon Web Services accounts
- Academic Article | THE PATH TO STANDING: ASSERTING THE INHERENT INJURY OF THE DATA BREACH
2018
- Article | 6 Months, 945 Data Breaches, 4.5 Billion Records
- Article & Video | Identity theft has never been more rampant
The Decline of Retail Stores Due to E-Commerce and Online Shopping
2020
- Article | Can Robots Save Brick-And-Mortar Retail Stores?
- Article & Video | Is traditional retail dying? Experts say no, just changing
2019
- Article | The Rise of Online Retail Has Cascading Effects for Corporate America
- Article | Online shopping overtakes a major part of retail for the first time ever
- Article | Retailers lost in the last decade: Toys R Us, Sports Authority, Blockbuster, Borders and Payless
- Article | Retail apocalypse: How e-commerce slowly killed the neighborhood retail store over the past decade
- Data Report | The Crisis in Retailing: Closures and Job Losses
- Academic Article | Flatlined: Combatting the death of retail stores
2018
Decline of Traditional News Media
2020
- Article | The Hedge Fund Vampire That Bleeds Newspapers Dry Now Has the Chicago Tribune by the Throat
- Article | The Decimation of Local News Has Lawmakers Crossing the Aisle
2019
- Article | 5 key takeaways about the state of the news media in 2018
- Article | U.S. newsroom employment has dropped by a quarter since 2008, with greatest decline at newspapers
- Article | How the Collapse of Local News Is Causing a ‘National Crisis’
- Report | Local journalism in crisis: Why America must revive its local newsrooms
- Video | How the decline of newspapers creates ‘news deserts’ around the country
- Academic Article | Digital Media Experiments in China: “Revolutionizing” Persuasion under Xi Jinping
2018
- Article | Social media for the first time tops newspapers as a news source for US adults
- Article | Social media outpaces print newspapers in the U.S. as a news source
- Article | Don’t believe the hype: The decline of trust in mainstream media
- Article | People Prefer Digital Over Print for News & Views
- Article | When Facebook ‘Disrupts’ Journalism, It Degrades Our Democracy
Deepfakes
2020
- Article | Facebook bans deepfake videos ahead of the 2020 election
- Article | Twitter is finally fighting back against deepfakes and other deceptive media
- Article | Understanding the Rise of Nonconsensual Pornography
2019
- Article | Artificial intelligence, deepfakes, and the uncertain future of truth
- Article | Deepfakes, social media, and the 2020 election
- Article | Deepfakes: No Longer a Laughing Matter
- Article & Video | When seeing is no longer believing
- Article | Fake Porn Videos Are Terrorizing Women. Do We Need a Law to Stop Them?
- Video | Digitally Altered ‘Deepfake’ Videos A Growing Threat As 2020 Election Approaches | NBC Nightly News
- Academic Article | Deepfakes and The New Disinformation War
- Academic Article | Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security
2018
- Article | You thought fake news was bad? Deep fakes are where truth goes to die
- Report | Disinformation on Steroids
Digital Divide
2020
- Article | New York City Releases Internet Master Plan, Sets Course to End Digital Divide
- Article | Digital Divide, Citizenship and Inclusion in Amsterdam
2019
- Article | Study Confirms Persistence of Rural Digital divide
- Article | Ajit Pai Claims His FCC Improved Broadband Access
- Article | Rural Electric Cooperatives: The Digital Divide’s Salvation
- Article | Digital Divide Policy Enters the National Conversation
- Video | THE DIGITAL DIVIDE
- Report | FCC 2019 BROADBAND DEPLOYMENT REPORT
- Report | Municipal Broadband Is Roadblocked Or Outlawed In 25 States
2018
- Article | Congress, More Than a Dozen States Consider Legislation to Expand Broadband Access
- Article | How the ‘digital divide’ is holding the U.S. economy back
- Article | America’s digital divide, in two maps
- Article | Dividing the country won’t bridge the digital divide
- Academic Article | From internet access to internet skills: digital inequality among older adults
Digital Millennium Copyright Act (DMCA)
2020
- Article | Apple Lawsuit Against Cyber Startup Threatens ‘Dangerous’ Expansion Of Copyright Law
- Article | Disappointing: Apple The Latest To Abuse DMCA 1201 To Try To Stifle Competition, Security Research, Jailbreaking And More
- Academic Article | Privacy and Legal Automation: The DMCA as a Case Study
2019
- Article | Copyright’s Safe Harbors Preserve What We Love About the Internet
- Article | Tweet complaining about DMCA takedown abuse gets hit with DMCA takedown
- Article | A second YouTuber was harassed with DMCA complaints by the Escape from Tarkov team
- Article | YouTube’s New Lawsuit Shows Just How Far Copyright Trolls Have to Go Before They’re Stopped
- Article | Copyright Policy as Catalyst and Barrier to Innovation and Free Expression
- Video | We Have Destroyed Copyright Law
2018
- Article | What Is DMCA? A Guide to Copyright Law
- Article | Video Game Companies Seek DMCA Exemption for Online Video Game Preservation
Doxxing
2020
- Article | Doxxing to be criminalised from 1 Jan 2020 along with other new offences via amendments to Penal Code and other legislation
- Article | Finance blog Zero Hedge was banned from Twitter after it doxxed a Chinese scientist and claimed they created the Wuhan coronavirus
2019
- Article | Hong Kong protests: tech war opens up with doxxing of protesters and police
- Article | Researchers Show How Europe’s Data Protection Laws Can Dox People
- Article | ‘We’re watching you’: Why doxxing is the new weapon of choice for cyber bullies and trolls
- Report | How a Hacking Case Could Shape Protections For Abortion Clinics
- Video | Conservative students face doxing threat on Texas college campus
- Video | Is Shaun King a hero — or a doxxing vigilante? | Mic Dispatch
2018
- Academic Article | Data Privacy in the Cyber Age: Recommendations for Regulating Doxing and Swatting
E-Gambling
2020
- Article | Andrew Yang: Candidate for U.S. Online Poker Legality
- Video Report | Regulator bans punters from using credit cards for online gambling
- Academic Article | The Prevalence of E-Gambling and of Problem E-Gambling in Poland
2019
- Article | Online casinos ignored my obvious signs of addiction, says gambler
- Article | New NHS figures shed more light on problem gambling levels
- Article | How loot boxes hooked gamers and left regulators spinning
- Video | How social casinos leverage Facebook user data to target vulnerable gamblers
2018
- Article | Online gambling: the hidden epidemic
- Article | Using blockchain, this company wants to make online gambling less of a gamble
E-Pornography
2020
- Article | Pornography Is a Public-Health Problem
- Article | Utah anti-pornography bill would require labels warning of ‘low self-esteem,’ ‘addictive sexual behavior’
2019
- Report | Adult & Pornographic Websites – U.S. Market Research Report
- Article | YouTube’s Latest Child Exploitation Controversy Has Kick-Started A War Over How To Fix The Platform
- Article | Proposed law in Hawaii would block porn sites unless users pay fee to fund victims of sex trafficking
- Article | India’s Online Porn Ban Actually Caused Consumption to Surge, Research Suggests
- Article | Watching pornography rewires the brain to a more juvenile state
- Video | Clinic says teenage porn addiction is ‘on the rise’
2018
- Academic Article | The Use of Online Pornography as Compensation for Loneliness and Lack of Social Ties Among Israeli Adolescents
E-Voting
2020
- Article | Iowa caucus voting app’s ‘security through obscurity’ seeds disinformation and legitimacy concerns
- Article & Video | America is bad at voting (it isn’t just Iowa)
2019
- Article | Switzerland offers cash for finding security holes in its e-voting system
- Article | Is electronic voting a political risk?
- Article | What are the risks of electronic voting and internet voting?
- Article | Some election systems left online and at risk of hacking despite denials from officials
- Report | Voting Machines at Risk: Where We Stand Today
- Video | How Hackers Can Target Voting Machines | NBC News Now
- Academic Article | Online Voting Still Security Pipedream
- Academic Article | Online Voting in a First Nation in Canada: Implications for Participation and Governance
2018
- Article | The Crisis of Election Security
- Article | eVoting and Identity Verification in the Digital Age
- Article | How risky are flawed e-voting systems for democracy?
- Article | Why Finland And Estonia Disagree About Internet Voting
E-Waste
2020
- Article | What happens to your old laptop? The growing problem of e-waste
- Article | Combating e-waste and the growing digital divide | An interview with the founder of Electronic Recycling Association
2019
- Article | The World Economic Forum Tells Davos: Electronics Are ‘the Fastest-Growing Waste Stream in the World’
- Article/Report | EU e-waste ‘illegally’ exported to developing countries: Report
- Article | Public Health Burden of E-waste in Africa
- Report | A New Circular Vision for Electronics Time for a Global Reboot
- Video | Inside Ghana’s ‘graveyard’ for Europe’s e-waste
- Academic Article | Global Trends of E-waste Pollution and Its Impact on Environment
2018
- Article | Electronic Waste Disposal – Why You Need to Be Careful
- Article | An end to electronic waste: United Nations organisations highlight their commitment
- Article | Almost everything you know about e-waste is wrong
- Article | Electronic Waste (E-Waste): How Big of a Problem is it?
Electric Cars/Self-driving Cars
2020
- Article | Are self-driving cars safe for our cities?
- Article | What self-driving cars will really do to cities
2019
- Article | The dirty secret of electric vehicles
- Article | Claims data points to high-end electric car risks: AXA
- Article | Electric vehicles pose ‘real risk’ for autoworkers, with fewer parts — and jobs — required
- 2019 IPR Disinformation in Society Report | Driverless cars aren’t safe enough to share our streets
- Report | Issues in Autonomous Vehicle Testing and Deployment
- Video | Are Tesla Vehicles Really That Much Better For The Environment?
- Academic Article | No One’s Driving: Autonomous Vehicles Will Reshape Cities, but is Anyone Taking Control of How?
- Article | The WIRED Guide to Self-Driving Cars
- Article | Privacy concerns and self-driving cars: Are we ready for autonomous vehicles?
- Report | 2018 Self-Driving Safety Report
Fake News
2020
- Article | An Epidemic of Wuhan Virus Misinformation Is Spreading Online
- Article | Cannabis Misinformation Spreading On Social Media
- Article & Video | How Russian “Fake News” Hardened America’s Divide
2019
- Article | How 18th-century information wars can solve the problem of 21st-century ‘fake news’
- Article | Google ups its anti-fake news game ahead of EU elections
- Article | Over-65s Most Likely to Share Fake News, Says Study
- Report | Less than you think: Prevalence and predictors of fake news dissemination on Facebook
- Article | Fake news: What exactly is it – and how can you spot it?
- Report | 2019 IPR Disinformation in Society Report
- Academic Article | Fake News and Cyber Propaganda: A study of manipulation and abuses on Social Media
2018
- Article | France passes controversial ‘fake news’ law
- Article & Video | How your brain tricks you into believing fake news
- Podcast | Fake News: An Origin Story
- Article | The Grim Conclusions of the Largest-Ever Study of Fake News
- Article | Journalists Raise Concerns About ‘Fake News’ Rhetoric After Man’s Arrest for Threats to CNN
- Article | Facebook’s efforts to stop fake news are making it worse
- Academic Article | The small, disloyal fake news audience: The role of audience availability in fake news consumption
Fiber Cable Rationing
2020
- Article | Google and Facebook turn their backs on undersea cable to China
- Article | Africa Telecoms Infrastructure in 2019
2019
- Article | Ethiopia’s unexplained internet ‘rationing’ continues, activists fume
- Article | The greatest network the world has ever seen: The global internet map
- Article | Google and other tech giants are quietly buying up the most important part of the internet
- Report | Dig Once: The Digital Divide Solution Congress Squandered And Policy That Could Save $126 Billion On Broadband Deployment
- Article & Video | Access to high-speed Internet, cell service in rural Montana: A long ways from adequate
- Article | By 2025 internet penetration will increase by 130 percent in Sub-Saharan Africa
- Report | Digital in 2018
- Academic Article | Promoting export of ICT based services through the export policy of Bangladesh
Formjacking
2020
- Article | Dennis Horton: ‘Formjacking’ another online threat
- Article | Business Disruption Becoming Main Attack Objective For More Adversaries
2019
- Article | Forget Phishing and Ransomware. Formjacking Is the New Favorite Hack of Cyber Crooks
- Article | Cyber criminals shift focus toward e-commerce sites: study
- Article | Formjacking attacks target customers at checkout
- Article | Formjacking: The newest way hackers are stealing credit card information
- Report | 2019 Internet Security Threat Report
- Video | What is formjacking? New cyber security scam is on the rise
- Academic Article | Trends Review of the Contemporary Security Problems in the Cyberspace
Going Viral
2020
- Article | Teen prank going viral social media is dangerous to health, home safety
- Article | When going viral goes wrong
- Article | Dangerous TikTok Challenge That Exposes User’s Eyes To Phone’s Flash Goes Viral
- Video | Parents Warned About Dangerous Viral Game
2019
- Article | The ‘Momo challenge’ isn’t a viral danger to children online. But it sure is viral.
- Article | How a recipe goes viral on Instagram
- Article | What It Felt Like When “Cat Person” Went Viral
- Article | The machine always wins: what drives our addiction to social media
- Academic Article | Winning and losing on social media: Comparing viral political posts across platforms
2018
- Article | The Twitter Invoice
- Article & Video | Accidentally famous: The psychology of going viral
Hacktivism
2020
- Article | US adds hacktivists, social media manipulators to top intel threats
- Podcast | Cyber Adversaries Constantly Evolving (Radio)
- Article | Teen hackers are defacing unsuspecting US websites with pro-Iran messages
- Article | We Are Anonymous: A Brief History of the Internet’s Most Elusive Hacktivist Collective
2019
- Article | Hacktivism returns to its roots as a cyber warfare tool
- Report | The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015
- Video | Anonymous Comes to Town: The hackers who took on high school sexual assault in Ohio
- Academic Article | From clicktivism to hacktivism: Understanding digital activism
2018
- Article | The States with the Most Hacktivism Incidents
- Article & Video | How hacktivist groups pose a global cybersecurity threat
- Article | Should we be scared of hacktivists?
- Article | 10 Most Powerful (Known) Active Hacking Groups
- Article & Audio | An Anarchist Explains How Hackers Could Cause Global Chaos
- Article | Automated Hacking Tool Autosploit Cause Concerns Over Mass Exploitation
ICANN
2020
- Article | Who Should Control the Internet’s .Org Addresses?
- Article | ICANN Needs To Ask More Questions About the Sale of .ORG
2019
- Article | ICANN Begins Publishing Monthly Reports on Generic Top-Level Domain Security Threats
- Article | Controversial sale of .org domain manager faces review at ICANN
- Article | 2019: The Beginning of the End of the Open Internet Era
- Article | If ICANN Won’t Stand Up to EU in WHOIS Dispute, Then the U.S. Congress Should
- Article | Selling off online domain names threatens internet governance
- Article | The global rise of Internet sovereignty
- Academic Article | When public principals give up control over private agents: The new independence of ICANN in internet governance
2018
- Article | What to expect when the internet gets a big security upgrade
- Article | EU Tells ICANN: You’re Unprepared for GDPR Regulations
Information Overload
2020
- Article | Information overload and unsustainable workloads in the era of electronic health records
- Article | Americans are already exhausted with the 2020 election, and it’s just getting started. Other countries have laws limiting the length of campaigns.
2019
- Article | Information Overload: How It Hurts Investors
- Article | Fighting information overload instead of contributing to it: Some 2019 predictions about business models for news
- Article | Information overload: The promise and risk of quantum computing
- Podcast | Information Overload?
2018
- Article | Information overload is nothing new
- Article | Can democracy survive information overload?
- Article | To Beat Information Overload, Be Selective in Your Focus
- Article | Dealing with Information Overload in Telematics (9 Strategies)
- Article | Information Overload Exhausting Americans
- Video | Smartphones and our information overload
- Report | Almost seven-in-ten Americans have news fatigue, more among Republicans
- Academic Article | Online social media fatigue and psychological wellbeing—A study of compulsive use, fear of missing out, fatigue, anxiety and depression
2017
- Academic Article | Too much information? Predictors of information overload in the context of online news exposure
Internet Censorship
2020
- Article | Russia is bolstering its internet censorship powers – is it turning into China?
- Article | Iran’s digital dystopia shows why we should never give government control of the internet
- Report | The Global Cost of Internet Shutdowns in 2019
- Article | How sub-Saharan Africa lost $2.16 billion to Internet censorship
2019
- Article | China’s digital protectionism puts the future of the global Internet at risk
- Article | Why some countries are building ‘walls’ in the worldwide web
- Article | The State of Internet Censorship in Europe
- Article | India Proposes Chinese-Style Internet Censorship
- Article | India’s Recent Move On Internet Regulations
- Article | Tech Companies Didn’t Plan for Chinese Censorship
- Academic Article | Implicit and Explicit Control: Modeling the Effect of Internet Censorship on Political Protest in China
- Article & Audio | Censorship on Social Media
- Article | Copyright, The First Wave of Internet Censorship
- Article | Fighting Fake News: A Back Door Trick to Enact Internet Censorship
Internet Dating
2020
- Article | Report reveals dating apps leak personal data to ad firms
- Article | Hackers steal more than 70,000 photos of Tinder users and put them on cyber crime sites ‘to create fake profiles for catfishing frauds’
2019
- Article | When Love Becomes a Scam
- Article | For better or worse: Looking for love in the internet age
- Article | Group dating app found leaking basically everything about its users worldwide
- Article | Dating app reveals data breach on Valentine’s Day
- Video | Iowa woman warns of dating apps after her startling experience
- Report | Disintermediating your friends: How online dating in the United States displaces other ways of meeting
- Academic Article | Everyday violence: Women’s experiences of intimate intrusions on Tinder
- Academic Article | Online Dating and the Risk of Sexual Assault to College Students
- Report | The Safest and Most Dangerous States for Online Dating
- Article | Online Dating Scams: More Than Just Your Heart Is at Risk
- Article & Audio | ‘Least Desirable’? How Racial Discrimination Plays Out in Online Dating
Internet Fraud
2020
- Report | 2019 Internet Crime Report Released
- Article | Ashley Madison cyber-breach: 5 years later, users are being targeted with ‘sextortion’ scams
- Article | Scammers targeting seniors for financial fraud
- Article | Millenials are frequent online fraud targets
2019
- Article | Why it is time to strengthen your password
- Article | Types of Internet Fraud and How They Work
- Article | E-Mail Scam Nearly Costs $200,000 for Toledo, Ohio
- Video | Meet the scammers breaking hearts and stealing billions online | Four Corners
- Academic Article | The Gamut of e-commerce: between online fraud and trust towards technology among generation Y
- Academic Article | Is online fraud just fraud? Examining the efficacy of the digital divide
2018
- Article | Officials issue warning about risk of tax refund fraud
- Article | How to spot online scams
Internet of Things
2020
- Article | The security and privacy issues that come with the Internet of Things
- Article | Cybercriminals Can Hack E-Scooters to Eavesdrop on Riders: Researchers
2019
- Article | Our Privacy Nightmare and What Can Be Done About It
- Article | Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons
- Report | Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks
- Academic Article | Amazon: Surveillance as a Service
2018
- Article | 2018 Roundup Of Internet Of Things Forecasts And Market Estimates
- Article | 7 Big Problems with the Internet of Things
- Article | Risk and Opportunity in the Internet of Things
- Report | IoT Innovation Report
- Video | How hackers could use smart home devices to spy on you (Marketplace)
- Video | What is the Internet of Things (IoT) and how can we secure it?
Internet for the Poor
2020
- Article | What Did the FCC Do to Close the Digital Divide?
- Article | What’s Going on With the FCC’s Lifeline Program?
2019
- Article | Bridging the digital divide: NAU researcher using innovative technology, social science to improve lives in underserved communities
- Article | Comcast’s $10 internet plan opens up to all low-income and disabled Americans
- Article | FCC accuses Sprint of defrauding Lifeline program
- Report | Sprint’s Lifeline problems aren’t a new phenomenon – report
- Article | FCC Partially Grants Lifeline Service Standards Relief
- Video | A Celebration of Digital Inclusion
- Academic Article | The reluctant regulator: The Rural Utilities Service and American broadband policy
2018
- Article | Trump’s FCC wants to take the internet away from poor
- Article | Using Big Data and the Internet of Things to Help End Poverty
Job Displacement
2020
- Article | The Impact of Artificial Intelligence – Widespread Job Losses
- Article | Robots Pose the Biggest Risk to Poorest Countries
2019
- Article | Are Robots Competing for Your Job?
- Article | Automation and AI will disrupt the American labor force. Here’s how we can protect workers
- Article | The Robots Are Coming for Our Jobs
- Article | Robots Will Take Jobs From Men, the Young, and Minorities
- Article | It’s time for workers to worry about AI
- Video | Will robots steal our jobs? – The future of work (1/2) | DW Documentary
- Academic Article | Technology scenario: employment implications of radical automation
2018
- Report | Unfulfilled promises: Amazon fulfillment centers do not generate broad-based employment growth
- Article | The Question with AI Isn’t Whether We’ll Lose Our Jobs — It’s How Much We’ll Get Paid
- Article | What types of jobs are at risk?
- Article | Every study we could find on what automation will do to jobs, in one chart
- Article | Women are more at risk of losing their jobs thanks to tech, WEF says
- Article | No, A Robot (Probably) Won’t Take Your Job
Live Streaming
2020
- Article | Tweens targeted for sex acts via live-streaming
- Article | In the age of Twitter and group chats, seconds-long streaming delays can make or break live entertainment
- Report | Streamlabs & Newzoo Q4 Year in Review Live Streaming Industry Report
2019
- Article | The Hidden Dangers of Twitch
- Article | Twitch Has A Sexual Content Problem
- Article | China live-streaming app ‘partly responsible’ in death of rooftopper
- Academic Article | The Price of Free Illegal Live Streaming Services
2018
- Rapid growth of microfinance industry leading to risks of over-borrowing | Twitch is now blocked in China
- Report | Streamlabs Livestreaming Q4 Report
Mobile banking and Microfinance
2020
- Article | The Rise of SIM Swapping: How and Why Bitcoiners Need to Protect Themselves
- Article | Depositors of savings and loans, microfinance schemes to receive payment
2019
- Article | Mastercard and Doconomy Launch the Future of Sustainable Payments
- Article | Cambodia’s “reckless” microfinance industry puts economy at risk
- Article | Rapid growth of microfinance industry leading to risks of over-borrowing
- Article | Criminals hacking phone codes used by customers to verify bank transactions
- Article | The Rise of Cryptocurrency Mobile Banking
- Video | How cyber crooks target bank accounts via payment apps like PayPal
- Academic Article | The Internet Banking [in]Security Spiral
- Academic Article | A Research on Security Vulnerabilities in Online and Mobile Banking Systems
Malware and Spyware
2020
- Article | Apple’s malware problem is getting worse
- Article | Local libraries sidelined by malware attack
- Report | United States government-funded phones come pre-installed with unremovable malware
2019
- Article | Malware attacks that hunt for porn site login credentials on the rise
- Article | Researchers Discover Malware That Targets Apple Mac Computers and Cryptocurrency Exchanges
- Article | 2019 Malware Trends to Watch
- Article | New malware transfers money from your mobile banking app to a hackers’ account
- Article | A powerful spyware app now targets iPhone owners
- Article & Video | Spyware discovered targeting phones through WhatsApp calls
2018
- Academic Article | The Spyware Used in Intimate Partner Violence
Money Laundering
2020
- Article | How shadowy brokers allegedly launder billions for crypto criminals
- Article | $1.4B in illicit Bitcoin was laundered via Binance and Huobi last year, report says
2019
- Article | The digital future of money laundering – and how tech can be used to fight back
- Article | Ad Fraud: The New Way to Launder Money
- Video | Bitcoin ATMs: How Next Generation ATMs are Preventing Money Laundering
- Academic Article | THE NEW TECHNOLOGIES AND THE FIGHT AGAINST MONEY LAUNDERING AND THE TERRORISM FINANCING
- Article & Podcast | Bitcoin ATMs May Be Used to Launder Money
- Article | How Can Blockchain Help With Anti-Money Laundering
- Article & Video | How Uber ghost rides are linked to online money laundering
Nanotechnology/the gray goo
2020
- Article | Nanoparticles produced from burning coal result in damage to mice lungs, suggesting toxicity to humans
- Article | Nano tech, big impact
2019
- Report | 2018 Nanotechnology & Fuel Cell Research Review
- Article | Can Nanotechnology Build The AI Of The Future?
- Article | ‘I wash all my food like crazy’: scientists voice concern about nanoparticles
- Article | Nanoparticles may have bigger impact on the environment than previously thought
- Article | Why nanotechnology could be the key to smarter machines
- Video | How Will Nanotechnology Keep Your Food Safe?
- Academic Article | Nanotechnology – Intentionality and Free-Will
2018
Net Neutrality
2020
- Article | U.S. appeals court will not reconsider net neutrality repeal ruling
- Article | AT&T Keeps Pretending It Wants Real Net Neutrality And Privacy Laws. It Doesn’t.
- Article | How to tell if your provider is throttling your internet
2019
- Article | Net Neutrality Goes Back To Court
- Article | US court says FCC cannot bar states from setting net neutrality rules
- Report | The Net Neutrality Debate: AccesstoBroadband Networks
- Video | Former FCC counselor breaks down California net neutrality ruling
- Academic Article | The Implications of the FCC’s Net Neutrality Repeal
- Academic Article | NET NEUTRALITY GIVETH, THE FCC TAKETH AWAY: THE TRUE POWER OF ISPS AND CPS UNRAVELED
- Article | Net neutrality is dead — what now?
- Article | Ending Net Neutrality Is a Business Risk, Netflix Says
- Article & Video | Net Neutrality Explained
Phishing
2020
- Article | Coronavirus Scams: Phishing, Fake Alerts and Cyberthreats
- Article | Texas School District Loses $2.3 Million in Phishing Incident
- Academic Article | Why Employees (Still) Click on Phishing Links: Investigation in Hospitals
2019
- Article | Combating phishing scams beyond the point of entry
- Article | Phishing in 2019: Trends and Research
- Article | How Phishing Attacks Trick Our Brains
- Article | Rise in Cyber Crimes : Attacks of Phishing on the Verge – How to be Safe?
- Study | Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions
- Video | The Facebook phishing scam you should know about
2018
- Article | Phishing Is the Internet’s Most Successful Con
- Article | Phishing: 5 Methods That Can Harm Your Business
- Article | Industries most at risk of phishing attacks revealed
- Article | Mobile Phishing and the Gaping Mobile Security Hole
Ransomware
2020
- Article | Ransomware Attacks Grow, Crippling Cities and Businesses
- Video | Ransomware attack at Palm Beach County Supervisor of Elections coming to light
- Article | 1 in 6 Massachusetts Communities Hit by ‘Ransomware’ Attacks
- Article & Video | Ransomware attacks are now targeting industrial control systems
- Article | Ransomware attacks are causing more downtime than ever before
2019
- Article | Cybercriminals are Moving on From Ransomware to Cryptojacking
- Article | A day in the life of a cyber criminal
- Article | The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks
- Report | Threat Spotlight: Government Ransomware Attacks
- Academic Article | The Growth of Ransomware and Its Impact on City Governments
2018
- Article | Understanding ransomware and the impact of repeated attacks
- Article | 8 Recent, Dangerous Ransomware Examples
Recidivism
2020
- Article | Surveillance and the City: Tracked Until Proven Innocent?
- Article | The electronic offender monitoring market in Europe and North America to reach € 1.3 billion in 2023
2019
- Article | Can Edtech Behind Bars Help Keep People Out?
- Article | How electronic monitoring sets people on parole up to fail
- Article | AI is sending people to jail—and getting it wrong
- Study | Algorithmic Risk Assessment in the Hands of Humans
- Article | Algorithms and sentencing: What does due process require?
2018
- Report | The Changing State of Recidivism: Fewer People Going Back to Prison
- Article | How Prisons Can Use Tech to Slow Their Ever-Revolving Doors
- Article | Electronic Monitoring Is Neither Effective Nor Humane
- Article | A Popular Algorithm Is No Better at Predicting Crimes Than Random People
- Video | The danger of predictive algorithms in criminal justice
- Academic Article | The accuracy, fairness, and limits of predicting recidivism
Revenge Porn
2020
- Article | Tech plays part in 72% of domestic abuse cases
- Article | Revenge Porn Victims Caught Between Tech and the Law
- Article | Sharing ‘revenge porn’ would get you on the sex offender list under proposed California law
2019
- Article | Baker administration refiles bill on cyberbullying, “revenge porn”
- Article | The Humiliation of Katie Hill Offers a Warning
- Article | Facebook’s Anti-Revenge Porn Tools Failed to Protect Katie Hill
- Article & Video | Ultimate Betrayal: Revenge porn used as leverage, extortion in some cases
- Academic Article | Revenge Porn: The Name Doesn’t Do Nonconsensual Pornography Justice and the Remedies Don’t Offer the Victims Justice
2018
- Article | What Is Revenge Porn?
- Article | Facebook’s plan to stop revenge porn may be even creepier than revenge porn
- Article | Revenge Porn Is Officially Punishable by Law in New York City
- Article & Video | Revenge porn: What to do if you’re a victim
- Laws | 41 States + DC Now Have Revenge Porn Laws
Robotics
2020
- Article | Coronavirus-battling robots deployed to help fight deadly outbreak in China
- Article | Robots taking over the classrooms
2019
- Article | Five ways robotics will make food delivery better
- Article | On-Demand Grandkids and Robot Pals to Keep Senior Loneliness at Bay
- Article | This robotics museum in Korea will construct itself (in theory)
- Study | Need to safeguard drones and robotic cars against cyber attacks
- Article | Robots And Your Food: Should You Be Worried About Hacking?
- Academic Article | Autonomous robot as a source of increased danger in law: harm prevention problems
- Article | Does Robotics and Artificial Intelligence Have A Future in the Health Care Space?
- Article | We Need to Approach AI Risks Like We Do Natural Disasters
- Article | The 10 Grand Challenges Facing Robotics in the Next Decade
Sharing Economy
2020
- Article | Can Technology Solve Economic Disparity?
- Article | The future of work: Embracing informality
- Article | Wrecked cars, homicide and bags of meth: Inside the wild ride of peer-to-peer car rentals
2019
- Article | Does the sharing economy truly know how to share?
- Article | 4 big trends for the sharing economy in 2019
- Article | Does the sharing economy truly know how to share?
- Report | The gig economy is quietly undermining a century of worker protections
- Article & Video | Uber reveals over 3,000 sexual assaults reported in U.S. rides in 2018
- Academic Article | Profits Uber everything? The gig economy and the morality of category work
2018
- Article | From Airbnb to city bikes, the ‘sharing economy’ has been seized by big money
- Article | In a shared economy, who should bear the risks that come with it?
- Article | The Economic Impact of the Sharing Economy
- Article | The dark side of the sharing economy
- Report | Sharing risks, sharing rewards: Who should bear the risk in the sharing economy?
Smart Grid
2020
- Article | How blockchain technology can help decentralize electricity supply
- Article | Cyberattacks Make Smart Grids Look Pretty Dumb
- Article | Cyber challenges facing utilities today
2019
- Article | Canada to host region’s largest smart grid system
- Article & Video | What is the Smart Grid?
- Article | Smart cities make for a larger attack footprint, and more potentially devastating results from a breach or hack.
- Report | Smart Grid Market worth $61.3 billion by 2023
- Report | California Smart Grid Annual Report to the Governor and the Legislature
- Article | Hackers are attacking the electric grid
- Academic Article | Cyber-Security in Smart Grid: Survey and Challenges
Social Media/Social Networking
2020
- Article & Video | Is TikTok actually safe to use?
- Article | Facebook was repeatedly warned of security flaw that led to biggest data breach in its history
- Article | Algorithms on social media need regulation, says UK’s AI adviser
2019
- Article | Your Boring, Everyday Life Belongs on Social Media
- Article | Is It Time to Regulate Social Media Influencers?
- Article | India plans to regulate social media as it can cause disruption
- Article | Africa faces a balancing act on social media regulation
- Report | Trump’s anti-bias order sounds like a nonsensical warning shot against Facebook
- Academic Article | Social media addiction and social media reactions: The implications for job performance
2018
- Article | Regulate social media? It’s a bit more complicated than that
- Article | The Slippery Slope of Regulating Social Media
- Article | Benefits and Risks of Social Media
- Article | The Benefits and Risks of Social Media Marketing
Technology Addiction and Diseases
2020
- Article | We gave teenagers smartphones. Did we rob them of an inner life?
- Article | Study claims iPhone 11 Pro emits more than twice the legally ‘safe’ radiation limit
- Academic Article | Does Smartphone Addiction Fall on a Continuum of Addictive Behaviors?
2019
- Video | Digital detox: 3 ways to kick your tech addiction
- Article | Is ‘Digital Addiction’ a Real Threat to Kids?
- Article & Podcast | Hooked On The Internet, South Korean Teens Go Into Digital Detox
- Report | About three-in-ten U.S. adults say they are ‘almost constantly’ online
- Video | Is your child addicted to gaming? Video game addiction classified as mental health disorder
- Article | 5 Ways to Kick Your Technology Addiction
- Article | Social media is a modern necessity — here’s how bosses can help employees avoid getting addicted
- Article | technology addiction (internet addiction)
Telecommuting, Virtual Reality, and Augmented Reality
2020
- Article & Video | How technology is positively “masking” debilitating problems
- Article | Coronavirus forces world’s largest telework experiment
2019
- Article | Microsoft CEO Defends Army Contract for Augmented Reality
- Article | Beware: Professional Isolation Is More Than Loneliness
- Study | The Effect of Virtual Reality as a form of Escapism
- Report | State Of Remote Work (2019)
- Article | VR/AR Privacy Concerns Emerging with the Field’s Development
- Article | Warning over using augmented reality in precision tasks
- Academic Article | Workplace Isolation Occurring in Remote Workers
- Academic Article | Is there a price telecommuters pay? Examining the relationship between telecommuting and objective career success
- Article | VR Side Effects: Risks and Dangers of Virtual Reality Abuse
- Article | What if you never saw your colleagues again?
- Article | 10 ethical concerns that will shape the VR industry
2020
- Article | Troll armies, ‘deepfake’ porn videos and violent threats. How Twitter became so toxic for India’s women politicians
- Article | A Twitter ‘bug’ led to the address of an Arizona high school trending on the platform ‘for hours.’ What else could go wrong?
- Article | A fake Twitter account stirred tensions between Jews and African Americans. Trolls celebrated.
2019
- Article | Your Old Tweets Give Away More Location Data Than You Think
- Article & Video | Hackers dump data of hundreds of German politicians on Twitter
- Article | Another social media fail exposed your private data
- Video | How to spot a Russian bot on Twitter
- Academic Article | Fake news on Twitter during the 2016 U.S. presidential election
2018
- Article | Inside Twitter’s Struggle Over What Gets Banned
- Article | Twitter’s Great Bot Purge And Can We Really Trust Active User Numbers?
- Article | Twitter’s data problems could be even worse than Facebook’s
- Article | Twitter’s fake news problem is getting worse
- Article | The latest Twitter revelations demonstrate how little we actually understand social media
- Article | Bots in the Twittersphere
Water Grid vulnerability
2020
- Article | Protecting our critical water utility infrastructure from attack
- Article | How to Safeguard Against Cyberattacks on Utilities
- Article & Video | Greenville Water target of international cyber-attack, officials say
2019
- Article | Hackers force water utilities to sink or swim
- Report | Lack of Critical Infrastructure Cybersecurity Investments in Smart Cities will Seed the Future IoT Vulnerabilities
- Academic Article | nvestigation of Cyber Attacks on a Water Distribution System
- Article | We’d be crippled by a cyberattack on our utilities
- Article | Cybersecurity For Water Utilities
- Article | A Perfect Target for Cybercriminals
Wearable Technology
2020
- Article | Consumer Adoption of Health Tech Slowed by Privacy, Security Concerns
- Article | Smartwatch apps let parents keep track of their kids but data breaches mean strangers can watch them too
2019
- Article | Watch Out for Wearables: New Security Risks Posed by Wearables & IoT
- Article | Why your smartwatch and wearable devices are the next big privacy nightmare
- Article | Fitbit Users Thinking Of Ditching Their Devices Because Of The Google Merger
- Report | IDC Reports Strong Growth in the Worldwide Wearables Market, Led by Holiday Shipments of Smartwatches, Wrist Bands, and Ear-Worn Devices
- Article & Video | Google doesn’t want to let Apple run away with the health-tracking market, but it may be too late
- Article | With smart sneakers, privacy risks take a great leap
- Academic Article | Wearable devices in healthcare: Privacy and information security issues