Sunday, March 11, 2012


Allows citizens to take matters into their own hands... In the rest of the world, does this translate into Anonymous? Wikileaks?
Revisiting Privacy and Dignity: Online Shaming in the Global E-Village
March 10, 2012 by Dissent
An article available on SSRN:
Revisiting Privacy and Dignity: Online Shaming in the Global E-Village, Anne Sy Cheung, University of Hong Kong – Faculty of Law, February 24, 2012
Abstract:
Using public shaming as a form of criminal sanction has remained a controversial topic. Yet in the Internet era, we do not need to wait for state approval to administer this form of punishment. Rather, online shaming against those who have violated social norms is proliferating fast in cyberspace, where the personal information of targeted individuals is often disclosed and displayed for the purpose of humiliation and social condemnation. Whether or not the victims themselves are perpetrators of wrongdoing in the first place, this article argues that online shaming is a blatant form of attack on a person’s innate dignity, and is a violation of the right to privacy. Drawing on recent jurisprudence from both the English Courts and the European Court of Human Rights on the relationship between the right to private life and dignity, the discussion will explain how the role of dignity has informed the development of privacy right where its value has played a distinctive role. This refers especially to the context in which the plaintiffs could be said to be partly at fault as transgressor-victims. In this article, the term ‘dignity’ refers to one’s innate personhood, integrity and self-respect.

(Related) How to wage CyberWar...
"A lengthy report prepared for the U.S. government about China's high-tech buildup to prepare for cyberwar includes speculation about how a potential conflict with the U.S. would unfold — and how it might only take a few freelance Chinese civilian hackers working on behalf of China's People's Liberation Army to sow deadly disruptions in the U.S. military logistics supply chain. As told, if there's a conflict between the U.S. and China related to Taiwan, "Chinese offensive network operations targeting the U.S. logistics chain need not focus exclusively on U.S. assets, infrastructure or territory to create circumstances that could impede U.S. combat effectiveness," write the report's authors, Bryan Krekel, Patton Adams and George Bakos, all of whom are information security analysts with Northrop Grumman. The report, "Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage," focuses primarily on facts about China's cyberwar planning but also speculates on what might happen in any cyberwar."


I can see where this would be a bit intimidating. Why couldn't the Police?
Berkeley police chief sends sergeant to reporter's home to request story changes; First Amendment experts call move 'despicable'
Minutes after reading a late-night news story online about him that he perceived to be inaccurate, Berkeley Police Chief Michael Meehan ordered a sergeant to a reporter's home insisting on changes, a move First Amendment experts said reeked of intimidation and attempted censorship.
Meehans's actions were "despicable, totally despicable," said Jim Ewert, general counsel of the California Newspaper Publisher's Association. "It's the most intimidating type of (censorship) possible because the person trying to exercise it carries a gun."
Bay Area News Group reporter Doug Oakley said he was shaken by the 12:45 a.m. Friday knock on the door of his Berkeley home. He said at first he and his wife thought something was drastically wrong or perhaps that a relative had died.


Is the US about to get out of the Internet Control business?
"The 'no cost' contract between the U.S. Department of Commerce and ICANN over hosting the Internet Assigned Names and Number Authority (IANA) was supposed to be re-let this March. Now, it has been withdrawn, and the National Telecommunications and Information Administration (NTIA) says that 'we are cancelling this RFP because we received no proposals that met the requirements requested by the global community.' This is a pretty stunning vote of no confidence in ICANN by the U.S. government, on the eve of the 43rd ICANN meeting in Costa Rica. Speculation is that this is related to the attempts of the ITU-T to take over Internet governance, but it also could be over the new global top level domains. I am sure we will be hearing a lot more about this in the weeks to come."


Another Math tool Interesting that the first thing the Comments debate is the Affero license...
"LastCalc is a cross between Google Calculator, a spreadsheet, and a powerful functional programming language, all with a robust and flexible heuristic parser. It even lets you write functions that pull in data from elsewhere on the web. It's all wrapped up in a JQuery-based user interface that does as-you-type syntax highlighting. Today, LastCalc's creator, Ian Clarke (Freenet, Revver), has announced that LastCalc will be open sourced under the GNU Affero General Public License 'to accelerate development, spread the workload, and hopefully foster a vibrant volunteer community around the project.'"
[Some others:


Worth reading because I think he has a point...
3 Predictions On The Future Of Enterprise Software
There are three key paradigm shifts that accelerate the consumerization of business software:
  • The devices we use — would you rather use a Dell desktop computer or an iPad?
  • The way we work — Twitter turned out to be a fantastic collaboration tool that allowed a real-time flow of information between people. Yammer emerged to do that in the enterprise. Evernote is a fantastic tool for note taking. Why use anything else in your work environment?
  • The way we interact with software — It is NOT fun to use Path 2.0 on your way to work and then open a traditional business application once you get there.


I hope you have a thumb drive with your favorite browser (and other applications) that you carry with you in case you need to get online (or do work) at locations that don't have your software installed. Here are places to get even more apps.
At MakeUseOf, we have provided you with countless articles on perfecting your USB flash drive with portable applications. If you’ve yet to see our Best Portable Apps page, you need to give it a look. Portable software can really change the way you work and enjoy your personal Internet experience.
[...and of course http://portableapps.com/


I would never use a service like this to send messages to my Ethical Hackers. I might be confused with some evil, criminal master-mind. I use it to send messages to my lawyer (who then sends messages to my Ethical Hackers)
… Write a message and send a link to your friend. They can read the message, but not easily copy it. A certain amount of time after they open the message, it is deleted forever. You can even add a password, if you want additional security.


I was going to hold this for sharing with my fellow teachers, but it occurred to me that this might make some interesting (humorous?) presentations.
The keynote speaker for NCTIES was my friend Ken Shelton. I've known Ken for a few years now and one thing that I know for sure about Ken is that he knows how to design a presentation (more on that in another post). In his keynote, Ken shared a great idea for getting students enjoy documenting the research process instead of groaning about having to document it. Ken's suggestion is to have students create Google Search Story videos.
The Google Search Stories Video Creator allows you to create a short video about the searches that you perform on Google. To create your video you enter your search terms, select some background music, and let the creator render a video for you. Ken showed a video of a search for North Carolina barbecue restaurants. Below is a search story about an Internet-famous wedding dance.

No comments: