The ability, especially of corporations or governments, to collect data that should not be publicly available.
Data Privacy (54)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- 8 min
- Kinolab
- 2019
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
- Kinolab
- 2019
Social Media Data and Cooperation with Law Enforcement
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
Are things said on social media fair game for law enforcement to use against a person? Does this include data that a user might not even know a company has gathered on them? How might “abstractions” of a user formed by a social media company be misused to make a bad judgement about a person? Should social media information and profiles of users made by companies be used in attempts to stop crime or criminals before any wrongdoings are committed? What are the dangers of big data companies having a close relationship with law enforcement?
-
- 5 min
- Kinolab
- 2014
In this vignette, Matt describes his backstory as a member of an online community who used technology called “Z-eyes” to walk each other through activities such as flirting with women at bars. The Z-eyes technology directly streams all audiovisual data which his friend Harry experiences to his screen, and Matt is additionally able to use facial recognition and information searches to offer background information which enhances Harry’s plays.
- Kinolab
- 2014
Vicarious Digital Living
In this vignette, Matt describes his backstory as a member of an online community who used technology called “Z-eyes” to walk each other through activities such as flirting with women at bars. The Z-eyes technology directly streams all audiovisual data which his friend Harry experiences to his screen, and Matt is additionally able to use facial recognition and information searches to offer background information which enhances Harry’s plays.
What are some problems with technology such as this being invisible, in terms of privacy? Could this have legitimate therapeutic purposes, such as being a treatment for social anxiety? How should technology like Z-eyes be regulated?
-
- 7 min
- Slate
- 2019
Discussion of Facebook’s massive collection of human faces and their potential impact on society.
- Slate
- 2019
-
- 7 min
- Slate
- 2019
Facebook’s Face-ID Database Could Be the Biggest in the World. Yes, It Should Worry Us.
Discussion of Facebook’s massive collection of human faces and their potential impact on society.
Is Facebook’s facial recognition database benign, or a slow-bubbling volcano?
-
- 5 min
- ARS Technica
- 2019
Google records some audio and has language experts review it to improve language skills of the technology. However, this may raise privacy concerns as sometimes they record by accident when users aren’t trying to use the Google Assistant.
- ARS Technica
- 2019
-
- 5 min
- ARS Technica
- 2019
Google workers listen to your “OK Google” queries– one of them leaked recordings
Google records some audio and has language experts review it to improve language skills of the technology. However, this may raise privacy concerns as sometimes they record by accident when users aren’t trying to use the Google Assistant.
Do you use a virtual assistant? What for? Are you always conscious of what you are asking, or do you say things that you think no one is hearing?
-
- 7 min
- Wired
- 2019
Tracking technology used by parents to check on their children raises concerns regarding privacy and independence. Data on location and driving metrics also prove valuable for companies and advertisers.
- Wired
- 2019
-
- 7 min
- Wired
- 2019
On TikTok, Teens Meme the Safety App Ruining Their Summer
Tracking technology used by parents to check on their children raises concerns regarding privacy and independence. Data on location and driving metrics also prove valuable for companies and advertisers.
What are the limits of technology used for parental control? How much agency are children and teens entitled to in terms of parent surveillance?