Allows citizens to take matters into
their own hands... In the rest of the world, does this translate
into Anonymous? Wikileaks?
Revisiting
Privacy and Dignity: Online Shaming in the Global E-Village
March 10, 2012 by Dissent
An article available
on SSRN:
Revisiting Privacy and Dignity: Online
Shaming in the Global E-Village, Anne Sy Cheung, University of
Hong Kong – Faculty of Law, February 24, 2012
Abstract:
Using public
shaming as a form of criminal sanction has remained a controversial
topic. Yet in the Internet era, we do not need to
wait for state approval to administer this form of punishment.
Rather, online shaming against those who have violated social norms
is proliferating fast in cyberspace, where the personal information
of targeted individuals is often disclosed and displayed for the
purpose of humiliation and social condemnation. Whether or not the
victims themselves are perpetrators of wrongdoing in the first place,
this article argues that online shaming is a blatant form of attack
on a person’s innate dignity, and is a violation of the right to
privacy. Drawing on recent jurisprudence from both the English
Courts and the European Court of Human Rights on the relationship
between the right to private life and dignity, the discussion will
explain how the role of dignity has informed the development of
privacy right where its value has played a distinctive role. This
refers especially to the context in which the plaintiffs could be
said to be partly at fault as transgressor-victims. In this article,
the term ‘dignity’ refers to one’s innate personhood, integrity
and self-respect.
(Related) How to wage CyberWar...
"A lengthy report prepared for
the U.S. government about China's high-tech buildup to prepare for
cyberwar includes speculation about how
a potential conflict with the U.S. would unfold — and how it
might only take a few freelance Chinese civilian hackers working on
behalf of China's People's Liberation Army to sow deadly disruptions
in the U.S. military logistics supply chain. As told, if there's a
conflict between the U.S. and China related to Taiwan, "Chinese
offensive network operations targeting the U.S. logistics chain need
not focus exclusively on U.S. assets, infrastructure or territory to
create circumstances that could impede U.S. combat effectiveness,"
write the report's authors, Bryan Krekel, Patton Adams and George
Bakos, all of whom are information security analysts with Northrop
Grumman. The report, "Occupying the Information High Ground:
Chinese Capabilities for Computer Network Operations and Cyber
Espionage," focuses primarily on facts
about China's cyberwar planning but also speculates on what might
happen in any cyberwar."
I can see where this would be a bit
intimidating. Why couldn't the Police?
Berkeley police chief sends
sergeant to reporter's home to request story changes; First Amendment
experts call move 'despicable'
Minutes after reading a late-night news story online about him that
he perceived to be inaccurate, Berkeley Police Chief Michael Meehan
ordered a sergeant to a reporter's home insisting on changes, a move
First Amendment experts said reeked of intimidation and attempted
censorship.
Meehans's actions were "despicable,
totally despicable," said Jim Ewert, general counsel of the
California Newspaper Publisher's Association. "It's the most
intimidating type of (censorship) possible because the person trying
to exercise it carries a gun."
Bay Area News Group reporter Doug
Oakley said he was shaken by the 12:45 a.m.
Friday knock on the door of his Berkeley home. He said at first he
and his wife thought something was drastically wrong or perhaps that
a relative had died.
Is the US about to get out of the
Internet Control business?
"The 'no cost' contract between
the U.S. Department of Commerce and ICANN over hosting the Internet
Assigned Names and Number Authority (IANA) was supposed to be re-let
this March. Now, it
has been withdrawn, and the National Telecommunications and
Information Administration (NTIA) says that 'we are cancelling
this RFP because we received no proposals that met the
requirements requested by the global community.' This
is a pretty stunning vote of no confidence in ICANN
by the U.S. government, on the eve of the 43rd ICANN meeting in Costa
Rica. Speculation is that this is related to the attempts
of the ITU-T to take over Internet governance, but it also could
be over the new global top level domains. I am sure we will be
hearing a lot more about this in the weeks to come."
Another Math tool Interesting that the
first thing the Comments debate is the Affero license...
"LastCalc
is a cross between Google Calculator, a spreadsheet, and a powerful
functional programming language, all with a robust and flexible
heuristic parser. It even lets you write
functions that pull in data from elsewhere on the web.
It's all wrapped up in a JQuery-based user interface that does
as-you-type syntax highlighting. Today, LastCalc's creator, Ian
Clarke (Freenet, Revver), has announced that LastCalc
will be open sourced under the GNU
Affero General Public License 'to accelerate development, spread
the workload, and hopefully foster a vibrant volunteer community
around the project.'"
[Some others:
Worth reading because I think he has a
point...
3
Predictions On The Future Of Enterprise Software
There are three key paradigm shifts
that accelerate the consumerization of business software:
- The devices we use — would you rather use a Dell desktop computer or an iPad?
- The way we work — Twitter turned out to be a fantastic collaboration tool that allowed a real-time flow of information between people. Yammer emerged to do that in the enterprise. Evernote is a fantastic tool for note taking. Why use anything else in your work environment?
- The way we interact with software — It is NOT fun to use Path 2.0 on your way to work and then open a traditional business application once you get there.
I hope you have a thumb drive with your
favorite browser (and other applications) that you carry with you in
case you need to get online (or do work) at locations that don't have
your software installed. Here are places to get even more apps.
At MakeUseOf, we have provided you with
countless articles on perfecting your USB flash drive with portable
applications. If you’ve yet to see our Best
Portable Apps page, you need to give it a look. Portable
software can really change the way you work and enjoy your personal
Internet experience.
[...and of course
http://portableapps.com/
I would never use a service like this
to send messages to my Ethical Hackers. I might be confused with
some evil, criminal master-mind. I use it to send messages to my
lawyer (who then sends messages to my Ethical Hackers)
… Write a message and send a link
to your friend. They can read the message, but not easily copy it.
A certain amount of time after they open the message, it is deleted
forever. You can even add a password, if you want additional
security.
I was going to hold this for sharing
with my fellow teachers, but it occurred to me that this might make
some interesting (humorous?) presentations.
The keynote speaker for NCTIES
was my friend Ken
Shelton. I've known Ken for a few years now and one thing that I
know for sure about Ken is that he knows how to design a presentation
(more on that in another post). In his keynote, Ken shared a great
idea for getting students enjoy documenting the research process
instead of groaning about having to document it. Ken's suggestion is
to have students create
Google Search Story videos.
The Google
Search Stories Video Creator allows you to create a short video
about the searches that you perform on Google. To create your video
you enter your search terms, select some background music, and let
the creator render a video for you. Ken showed a video of a search
for North Carolina barbecue restaurants. Below is a search story
about an Internet-famous wedding dance.
No comments:
Post a Comment