FPF-AISP_Nothing to Hide
[…] channels may have the broadest numeric reach, specialized media may be more effective for reaching marginalized or traditionally underrepresented groups. Similarly, digital media may be quick and cheap, but may not be effective at reaching less technologically- connected communities (older communities, persons with certain disabilities, or communities disconnected by the digital divide). Consider using […]
Slides
[…] of Clinical Epidemiology, Mailman School of Public Health Columbia University Twitter: @ dbarthjones E -mail: [email protected] Misconceptions about HIPAA De – identified Data: “It doesn’t work…” “easy, cheap, powerful re – identification” ( Ohm, 2009 ” Broken Promises of Privacy “) *Pre -HIPAA Re -identification Risks {Zip5, Birth date, Gender} able to identify 87% […]
Notes 12-06-2017
[…] for phishing email/clicking on stuff o Unsafe browsing habits o Use of “Free” WiFi: EXAMPLE: Pineapples, wh ich are devices that spoof Wi -Fi hotspots, are cheap and easy to obtain. At a recent con ference, we set up a pineapple and named it “AT&T Wi -Fi.” Within a minute , we had […]
POLICY CHOICES FOR A DIGITAL AGE
[…] higher levels. Instead, since the end of the Great Recession, productivity growth has been at near all-time lows. This is because the ‘4.0’ technologies are not yet cheap enough or good enough to replace existing technology systems en masse. Take the case of autonomous vehicles (AVs), the source of much consternation in terms of […]
"Your Phone May Be Tracking Your Every Move; Here's How to Stop It"
[…] of granting apps permission to track your location. Jules explained: “If there’s an appropriate message, they offer everybody who’s been at a bar at midnight downtown a cheap taxi ride home, well that’s kind of cool,” Polonetsky said. “If it’s we know you were at a doctor’s office or at a strip club, or […]
UAS_Privacy_Best_Practices_6-21-16
[…] to existing federal and state laws. VOLUNTARY BEST PRACTICES FOR UAS PRIVACY, TRANSPARENCY, AND ACCOUNTABILITY 8 Appendix Guidelines for Neighborly Drone Use Drones are useful. New, fairly cheap drones are easy to use. But just because they are cheap and simple to fly doesn’t mean the pictures and video they take can’t harm other […]
Big Data and Privacy Paper Collection
[…] political, professional, religious, and sexual associations. The Government can store such records and efficiently mine them for information years into the future. And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that const rain abusive law enforcement practices: ‘limited police resources […]
Vagle – Has Katz Become Quaint.docx
[…] political, professional, religious, and sexual associations. The Government can store such records and efficiently mine them for information years into the future. And because GPS monitoring is cheap in comparison to convent ional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abus ive law enforcement practices: ‘ limited […]
Hirsch_In Search of the Holy Grail Global Privacy Rules
[…] from, and/or share data with , each of these individuals or entities . I nternational data transfers and economic globalization build on and reinforce one another. Fast, cheap and reliable international data transfers support the growth of global business. Increased economic globalization, in turn, widens t he demand for , and investment in , […]
Thierer_The Pursuit of Privacy in a World Where Information Control Is Failing
[…] use geolocation technologies to pinpoint the movement of themselves and others in real time. 88 Meanwhile, new digital translation tools and biometric tech‐ nologies are becoming widely available to consumers. Tools such as Google Goggles, available for many smartphones, let users snap pictures of anything they see and have it identified by Google’s search engine, with the results provided almost instantly to the user. 89 Eventually, these technologies will merge with “wearable computing” technologies that will, for example, let the buttons on our shirts feed live streams of our daily movements and interactions into social networking sites and databases. 90 Peo‐ 85. Id. 86. J ONATHAN ZITTRAIN , THE FUTURE OF THE INTERNET —A ND HOW TO STOP IT 221 (2008) (” Cheap sensors generatively wired to cheap networks with cheap pro‐ cessors are transforming the nature of privacy.”). 87. J OHN PALFREY & URS GASSER , BORN DIGITAL : UNDERSTANDING THE FIRST GENERATION OF DIGITAL NATIVES 62 (2008) (“Young people are turning to mobile devices in droves. They use them to post more information about themselves and their friends into the ether.”); Jennifer Valentino‐DeVries, The Economics of Surveil‐ lance, W ALL ST. J. D IGITS BLOG (Sept. 28, 2012, 10:30 PM), http://blogs.wsj.com/digits/2012/09/28/the‐economics‐of=surveillance/?mod=WSJBlog (quoting Col. Lisa Shay, a professor of electrical engineering at the U.S. Military Academy at West Point, who notes that “nowadays cellphones are sensors,” and […]