A NYTimes article notes the various privacy concerns with contactless credit cards whose data is relayed by RFID without need of a signature or physical swiping through a machine. Incredibly, cards are being deployed without any encryption (contrary to what…
Category: Values In Design
Understanding how ethical values are embedded in technology, and working to ensure values are considered in technology design practices.
Microsoft Releases Guidelines for Customer Privacy
Microsoft publicly released a 49-page internal document, called Microsoft’s Privacy Guidelines for Developing Software Products and Services outlining recommendations for both Micorsoft and other software developers to help them protect customer privacy when building applications that deal with sensitive information,…
Read More Microsoft Releases Guidelines for Customer Privacy
Protecting Consumers in the Next Tech-ade
The FTC is holding a set of public hearings November 6-8 called Protecting Consumers in the Next Tech-ade, bringing together a diverse collection of scholars and practioners "to examine the key technological and business developments that will shape consumers' core…
Debrief: Social Software and Web 2.0 seminar
I presented at the Social Software and Web 2.0: Critical Perspectives and Challenges for Research and Business seminar and workshop a few days ago at Aalborg University in Denmark. My talk, "The Panoptic Gaze of Web 2.0: How Web 2.0…
Unblinking Symposium
I just came across an amazing-looking multi-disciplinary symposium on privacy and surveillance at Berekely: Unblinking: New Perspectives on Visual Privacy in the 21st Century. The program is quite impressive, including Ian Kerr (who gave the keynote last week at our…
Security Analysis (and Response) of Diebold Voting Machines
Ari Feldman, Alex Halderman, and Ed Felton released an amazing paper on the security of Dielbold's e-voting technology. The paper is accompanied by a ten-minute video that demonstrates some of the vulnerabilities they've uncovered. Here is the paper’s abstract: Security…
Read More Security Analysis (and Response) of Diebold Voting Machines
Facebook Offers Privacy Fix, But Only If You Select It
It appears Facebook has indeed modified their controversial news feed feature to allow more user control over their own privacy. But as Mary Hodder points out, the default settings allow full sharing of informaiton: So, users still must take direct…
Read More Facebook Offers Privacy Fix, But Only If You Select It
More on Facebook and the Contextual Integrity of Personal Information Flows
There has been an interesting discussion on the Association of Internet Researchers mailing list (and across the blogosphere) regarding the addition of feeds at Facebook and the nature of the reaction by its users. Many have criticized the reaction by…
Read More More on Facebook and the Contextual Integrity of Personal Information Flows
Facebook Changes Cause Rift in Flow of Personal Information
Slashdot reports that Facebook, the college student networking site, launched changes to their web site this morning, provoking a massive and immediate response, and not the one the company had hoped for. Hundreds of protest 'Groups' formed, the largest of…
Read More Facebook Changes Cause Rift in Flow of Personal Information
Registration Open: Identity and Identification in a Networked World
Registration is now open for the "Identity and Identification in a Networked World" multidisciplinary graduate student symposium, September 29-30, 2006 at the NYU School of Law. Twenty graduate students from across North America and Europe will share their exciting research…
Read More Registration Open: Identity and Identification in a Networked World

You must be logged in to post a comment.