Privacy (137)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 5 min
- Tech Crunch
- 2025
Users being able to upload conversations they have with Meta AI has led to some viral posts containing personal data with the world.
- Tech Crunch
- 2025
-
- 5 min
- Tech Crunch
- 2025
The Meta AI app is a privacy disaster.
Users being able to upload conversations they have with Meta AI has led to some viral posts containing personal data with the world.
- Do you think that search engines like Google and Bing should also attempt to turn their searches into a social media feed? Why or why not?
- How does the need for new data for AI-based products drive this trend of digital footprint integration? Would you be willing to opt out of an AI ecosystem that collected and posted your search data or would you restrict your searches and use it anyway?
-
- 5 min
- Companion Proceedings of the Web Conference
- 2024
Provides an empirical analysis of content moderation practices across major social media platforms within the European Union (EU), utilizing data from the Digital Services Act (DSA) Transparency Database.
- Companion Proceedings of the Web Conference
- 2024
-
- 5 min
- Companion Proceedings of the Web Conference
- 2024
Content Moderation on Social Media in the EU
Provides an empirical analysis of content moderation practices across major social media platforms within the European Union (EU), utilizing data from the Digital Services Act (DSA) Transparency Database.
- What is the distinction between the moderation of content and censorship?
- How would you define effective content moderation? What has shaped your views on this over the last five years?
-
- 7 min
- WRTV Indianapolis
- 2022
This news segment talks about cyberattacks that target high schools. The segment goes over why schools are a target, how school districts in Indiana have been attacked, and what students and parents can do to prevent attacks happening at their school.
- WRTV Indianapolis
- 2022
-
- 7 min
- WRTV Indianapolis
- 2022
Growing number of Indiana school districts victims of cyberattacks
This news segment talks about cyberattacks that target high schools. The segment goes over why schools are a target, how school districts in Indiana have been attacked, and what students and parents can do to prevent attacks happening at their school.
How does the money allocated to protecting against cyberattacks influence which school districts are targeted by these attacks? What kinds of information would be sensitive in school systems (elementary, secondary, post-secondary)? What risks do cyberattacks that specifically target schools cause and who could be harmed?
-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- Center for Strategic and International Studies
- 2023
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
- Center for Strategic and International Studies
- 2023
Significant Cyber Incidents
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
What are the global impacts of these cyberattacks? What are the risks of the increased amount of both government and personal information online? How can cyberattacks isolated to one country have the potential to impact other nations?
-
- welivesercurity by eset
- 2022
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
- welivesercurity by eset
- 2022
Cybersecurity: A global problem that requires a global answer
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
Besides countries’ governments, who is responsible for preventing cyber threats? What are the benefits of collaboration between countries to prevent cybercrime? What are the roadblocks to this type of collaboration? What are important social factors to consider that may prevent governments from preventing cyber attacks originating from their own borders out to the global cyberspace?