Get LISNews via email! Enter Your Email Address:
A Revised Taxonomy of Social Networking Data: Lately Bruce Schneier has been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but he's seeing a lot of confusion in even forming the questions. Social networking sites deal with several different types of user data, and it's essential to separate them.
THis is his taxonomy of social networking data, which he first presented at the Internet Governance Forum meeting last November, and again -- revised -- at an OECD workshop on the role of Internet intermediaries in June.
ALA's Intellectual Freedom Round Table has a blog post suggesting that thinking about online privacy on the 'human scale' (eg, other people seeing our information) is too limited.
So by thinking about privacy violations on a human scale, we convince ourselves that even though the capability exists to track us, our privacy is only potentially violated. For our privacy to actually be violated, someone (Google, Facebook, or the FBI) would have to specifically notice us.
Instead, unexpected correlations like the Star Trek/pedophilia connection may turn innocuous online activity into something that triggers a red flag.
I have met too many librarians who take a myopic approach to privacy. That is, privacy is so important to our members that we don’t even let them decide what information to keep or share. We just wipe all our records after some time so they don’t get caught up in the Patriot Act web. What’s worse, we feel that by creating an environment that protects privacy (by eliminating choice) we are protecting the members, when in fact the information they would expose to us is so inconsequential compared to their other activities it almost doesn’t matter.
Instantly online-17 golden rules for mobile social networks
Instantly online-17 golden rules to combat online risks and for safer surfing mobile social networks The EU ‘cyber security’ Agency - ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones, ‘Online as soon as it happens“. The report points out the risks and threats of mobile social networking services, e.g. identity theft, corporate data leakage and reputation risks of mobile social networks. The report also gives 17 ‘golden rules’ on how to combat these threats.
6 Ways We Gave Up Our Privacy: Privacy has long been seen as a basic, sacred right. But in the Web 2.0 world, where the average user is addicted to Google apps, GPS devices, their BlackBerry or iPhone, and such social networking sites as Facebook and Twitter, that right is slowly and willingly being chipped away. In fact, some security experts believe it's gone already.
Adding to this sobering reality is that public and private entities have a growing array of tools to track our movements, habits and choices. RFID tags are on more of the items we take for granted. Those discount cards you use at the grocery store offer companies an excellent snapshot of the choices you make. And in the post 9-11 world, the government has greatly expanded its power to spy on you with such laws as The Patriot Act.
The Northern California chapter of the American Civil Liberties Union has put out a campaign designed to raise awareness of the privacy implications of Facebook's developer platform. It's focusing specifically on the popular "quiz" applications, like "Which Cocktail Best Suits Your Personality?" and "Which Wes Anderson Movie Character Are You?" These are largely one-time-use apps that many a Facebook user clicks on and tries out with little concern. CNET reports.
According to the ACLU chapter, "millions of people on Facebook who use third-party applications on the site, including the popular quizzes, do not realize the extent to which developers of quizzes and other applications have access to personal information. Facebook's default privacy settings allow nearly unfettered access to a user's profile information, including religion, sexual orientation, political affiliation, photos, events, notes, wall posts, and groups." For the promotion, it's put together a quiz about how much you know about Facebook-based quizzes.
Side note: Creating a Facebook quiz app to draw attention to the pratfalls of Facebook quiz apps is very meta.
Even for a place where personal information is under siege, the case of Brandy Combs is unusual.
University of Florida police allege Combs stole a university librarian’s personal information to fraudulently obtain more than $31,000 in student loans and took a student’s information to get a false student identification. He was arrested on May 20 on charges of fraud and passing false checks.
While the details of the case were unusual, having a breach of private information at UF was not. The university experienced more than 130 confirmed privacy breaches in 2008, compromising the information of about 358,000 individuals, according to the UF Privacy Office.
UF officials said they’re taking steps to improve security as new regulations increase reporting requirements and fines for breaches. But they say the nature of a university means keeping large amounts of information that is sought by hackers and others.
“Every university, because it’s a university, is a prime target,” said Chuck Frazier, UF’s interim chief information officer. “You can be attacked from anyplace and every place.” The Gainesville Sun.
This just in from the Electronic Frontier Foundation with most of their call shown after the "read more" jump: -- Read More
We are putting together a group of authors (or their heirs or assigns) who are concerned about the Google Book Search settlement and its effect on the privacy and anonymity of readers.
Bruce Schneier: "This isn't a technological problem; it's a legal problem. The courts need to recognize that in the information age, virtual privacy and physical privacy don't have the same boundaries. We should be able to control our own data, regardless of where it is stored. We should be able to make decisions about the security and privacy of that data, and have legal recourse should companies fail to honor those decisions."