Why Are Some Americans Changing Their Names?

Why Are Some Americans Changing Their Names?
In 2008, Newsweek published an article on then-presidential candidate Barack Obama titled “From Barry to Barack.” The story explained how Obama’s Kenyan father, Barack Obama Sr., chose Barry as a nickname for himself in 1959 in order “to fit in.” But the younger Barack – who had been called Barry since he was a child – chose to revert to his given name, Barack, in 1980 as a college student coming to terms with his identity.

How Passports Evolved To Help Governments Regulate Your Movement

How Passports Evolved To Help Governments Regulate Your MovementThe Trump administration is denying passports to U.S. citizens who live in Texas near the U.S.-Mexico border, according to news reports.

The administration is accusing applicants of having inadequate documentation of their birth on U.S. soil, and refusing to issue them passports on that basis.

The Voice That Inspired The Civil Rights Movement

The Voice That Inspired The Civil Rights MovementIt is no coincidence that two of Aretha Franklin’s celebrated contemporaries who travelled to Detroit to see the singer in the last stages of her illness were Stevie Wonder and Jesse Jackson. It is hard to overestimate Franklin’s importance to both music and the civil rights movement – and the presence of one of music’s greatest figures alongside Martin Luther King Jr’s right-hand man at her bedside in the final days of her life is a fitting tribute to one of the true greats of Black American culture.

Why Do People Fall Prey To Scams?

Why Are There So Many Suckers?

If you have a mailbox, you probably get junk mail. If you have an email account, you probably get spam. If you have a phone, you probably get robocalls.

How Your Tweets Could Be Used As Evidence Against You

How Your Tweets Could Be Used As Evidence Against YouAs we increasingly use social media platforms such as Facebook, Twitter, Instagram and WhatsApp to communicate with each other, many of us are unaware of the ways in which our posts might later resurface – and get us into trouble with the law.

How Your Genome May Have Already Been Hacked

How Your Genome May Have Already Been HackedCalifornia law enforcement announced the possible capture of a long-sought serial killer. Shortly after, it was reported that police had used public DNA databases to determine his identity.

Why We Trust Our Privacy To Some Apps But Not Others

Why We Trust Our Privacy To Some Apps But Not Others
As concerns about privacy increase for people using mobile apps, new research suggests that trust and engagement may hinge on perceptions about how the app uses personal data and whether it seeks user input before delivering services.

Why The Internet Is Not Designed For People

Why The Internet Is Not Designed For People
As a scholar of the social and political implications of technology, I would argue the internet is designed to be hostile to the people who use it. I call it a “hostile information architecture.”

You Don't Have To Quit Facebook, But Don't Trust It, Either

You Don't Have To Quit Facebook, But Don't Trust It, EitherIs it time to give up on social media? Many people are thinking about that in the wake of revelations regarding Cambridge Analytica’s questionable use of personal data from over 50 million Facebook users to support the Trump campaign.

How Can Differential Privacy Protect Your Data?

It’s no secret that big tech companies like Facebook, Google, Apple and Amazon are increasingly infiltrating our personal and social interactions to collect vast amounts of data on us every day.

Encrypted Smartphones Secure Your Identity, Not Just Your Data

Encrypted Smartphones Secure Your Identity, Not Just Your Data
Smartphones store your email, your photos and your calendar. They provide access to online social media sites like Facebook and Twitter, and even your bank and credit card accounts. And they’re keys to something even more private and precious – your digital identity.

How Secure Is Your Data When It's Stored In The Cloud?

cloud privacy 2 2As cloud storage becomes more common, data security is an increasing concern. Companies and schools have been increasing their use of services like Google Drive for some time, and lots of individual users also store files on Dropbox, Box, Amazon Drive, Microsoft OneDrive and the like.

How Technology Is Changing What Young People Share Online

How Technology Is Changing What Young People Share OnlineThe revelation that New Zealand children as young as six or seven are posting sexually explicit images of themselves online may come as a shock to many, especially parents. The reality is that for many teenagers today, engaging with explicit material is not uncommon.

How The Government Can Steal Your Stuff

How The Government Can Steal Your StuffShould someone wearing a badge have the power to relieve a suspected drug dealer of his Maserati on the spot without giving him an opportunity to flee or liquidate and launder his assets? Known as civil asset forfeiture, this practice might sound like a wise policy.

Why In The Future It Should Be Consumers That Go On Strike

Why In The Future It Should Be Consumers That Go On StrikeI belong to a generation that has been told there is no other choice other than to be flexible in the labour market. For many of us, the idea of a long-term employment contract in a company where there is the possibility to progress belongs to another time.

What Are The Orwellian Dystopias Of The 21st Century?

07 08 dystopiaFictional metaphors matter, and in the battle to safeguard our civil liberties few metaphors matter more than George Orwell’s 1984. Although first published almost 70 years ago, the lasting salience of this most archetypal dystopia is undeniable.

Why We Should Not Know Our Own Passwords

Why We Should Not Know Our Own PasswordsSince 2009, U.S. Customs and Border Protection agents have been allowed to search electronic devices carried by citizens or noncitizens as they cross the border into the United States from other countries.

How To Identify And Stop Fraudsters

How To Identify And Stop FraudstersA common stereotype of fraudsters is that they are psychopaths. That fraudsters are considered manipulative, callous and remorseless is understandable, considering the consequences of fraud.

Why Every American Deserves a Guaranteed Minimum Income From Common Wealth

Why Every American Deserves a Guaranteed Minimum Income From Common WealthThe big, rarely asked question about our current economy is who gets the benefits of common wealth? Common wealth has several components. One consists of gifts of nature we inherit together: our atmosphere and oceans, water­sheds and wetlands, forests and fertile plains, and so on (including, of course, fossil fuels).

Backdoors And Spyware On Smartphones Is The Norm In China

Backdoors And Spyware On Smartphones Is The Norm In ChinaKryptowire, a security firm, recently identified several models of Android mobile devices that have preinstalled permanent software, known as firmware, that serve as backdoor that collects sensitive personal data, including text messages, geolocations, contact lists, call logs and transmits them to a third-party server in Shanghai, China.

enarzh-CNtlfrdehiidjaptrues

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}