Why Are Some Americans Changing Their Names?

Why Are Some Americans Changing Their Names?
In 2008, Newsweek published an article on then-presidential candidate Barack Obama titled “From Barry to Barack.” The story explained how Obama’s Kenyan father, Barack Obama Sr., chose Barry as a nickname for himself in 1959 in order “to fit in.” But the younger Barack – who had been called Barry since he was a child – chose to revert to his given name, Barack, in 1980 as a college student coming to terms with his identity.

How Passports Evolved To Help Governments Regulate Your Movement

How Passports Evolved To Help Governments Regulate Your MovementThe Trump administration is denying passports to U.S. citizens who live in Texas near the U.S.-Mexico border, according to news reports.

The administration is accusing applicants of having inadequate documentation of their birth on U.S. soil, and refusing to issue them passports on that basis.

Why Do People Fall Prey To Scams?

Why Are There So Many Suckers?

If you have a mailbox, you probably get junk mail. If you have an email account, you probably get spam. If you have a phone, you probably get robocalls.

How Your Genome May Have Already Been Hacked

How Your Genome May Have Already Been HackedCalifornia law enforcement announced the possible capture of a long-sought serial killer. Shortly after, it was reported that police had used public DNA databases to determine his identity.

Why We Trust Our Privacy To Some Apps But Not Others

Why We Trust Our Privacy To Some Apps But Not Others
As concerns about privacy increase for people using mobile apps, new research suggests that trust and engagement may hinge on perceptions about how the app uses personal data and whether it seeks user input before delivering services.

Why The Internet Is Not Designed For People

Why The Internet Is Not Designed For People
As a scholar of the social and political implications of technology, I would argue the internet is designed to be hostile to the people who use it. I call it a “hostile information architecture.”

You Don't Have To Quit Facebook, But Don't Trust It, Either

You Don't Have To Quit Facebook, But Don't Trust It, EitherIs it time to give up on social media? Many people are thinking about that in the wake of revelations regarding Cambridge Analytica’s questionable use of personal data from over 50 million Facebook users to support the Trump campaign.

How Can Differential Privacy Protect Your Data?

It’s no secret that big tech companies like Facebook, Google, Apple and Amazon are increasingly infiltrating our personal and social interactions to collect vast amounts of data on us every day.

Encrypted Smartphones Secure Your Identity, Not Just Your Data

Encrypted Smartphones Secure Your Identity, Not Just Your Data
Smartphones store your email, your photos and your calendar. They provide access to online social media sites like Facebook and Twitter, and even your bank and credit card accounts. And they’re keys to something even more private and precious – your digital identity.

How Secure Is Your Data When It's Stored In The Cloud?

cloud privacy 2 2As cloud storage becomes more common, data security is an increasing concern. Companies and schools have been increasing their use of services like Google Drive for some time, and lots of individual users also store files on Dropbox, Box, Amazon Drive, Microsoft OneDrive and the like.

How Technology Is Changing What Young People Share Online

How Technology Is Changing What Young People Share OnlineThe revelation that New Zealand children as young as six or seven are posting sexually explicit images of themselves online may come as a shock to many, especially parents. The reality is that for many teenagers today, engaging with explicit material is not uncommon.

What Are The Orwellian Dystopias Of The 21st Century?

07 08 dystopiaFictional metaphors matter, and in the battle to safeguard our civil liberties few metaphors matter more than George Orwell’s 1984. Although first published almost 70 years ago, the lasting salience of this most archetypal dystopia is undeniable.

Why We Should Not Know Our Own Passwords

Why We Should Not Know Our Own PasswordsSince 2009, U.S. Customs and Border Protection agents have been allowed to search electronic devices carried by citizens or noncitizens as they cross the border into the United States from other countries.

Backdoors And Spyware On Smartphones Is The Norm In China

Backdoors And Spyware On Smartphones Is The Norm In ChinaKryptowire, a security firm, recently identified several models of Android mobile devices that have preinstalled permanent software, known as firmware, that serve as backdoor that collects sensitive personal data, including text messages, geolocations, contact lists, call logs and transmits them to a third-party server in Shanghai, China.

What Is Brainjacking And Is It A Cyber-security Threat?

What Is Brainjacking And Is It A Cyber-security Threat?We live in an interconnected age where wirelessly controlled computing devices make almost every aspect of our lives easier, but they also make us vulnerable to cyber-security attacks. Today, nearly everything can be hacked, from cars to lightbulbs

Corporations Want Your Digital Data and the FCC Must Stop Them

Corporations Want Your Digital Data and the FCC Must Stop ThemWhen Yahoo! confirmed that it had experienced a massive online attack from hackers who stole personal information from more than 500 million people — including names, emails and phone numbers — it revealed a disturbing truth about our digital media system.

We Can Read All Your Email, And You'll Never Know

We Can Read All Your Email, And You'll Never KnowFear of hackers reading private emails in cloud-based systems like Microsoft Outlook, Gmail or Yahoo has recently sent regular people and public officials scrambling to delete entire accounts full of messages dating back years.

Is Your Employer Watching You Online?

Is Your Employer Watching You Online? A new study reveals employers are using online information about job applicants without their knowledge, to inform hiring decisions. Approximately 55% of organizations now have a policy about this type of practice, called profiling.

More Third Parties Know What You Do Online

More Third Parties Know What You Do OnlineFor more than two decades, people have used the internet to research, shop, make friends, find dates, and learn about the world. And third parties have been watching—and learning.

Buying And Selling Hacked Passwords: How Does It Work?

Data breaches are a regular part of the cyberthreat landscape. They generate a great deal of media attention, both because the quantity of information stolen is often large, and because so much of it is data people would prefer remained private.

Securing Web Browsing: Protecting The Tor Network

Securing Web Browsing: Protecting The Tor NetworkThere are more than 865 encryption tools in use worldwide, all addressing different aspects of a common problem. People want to protect information: hard drives from oppressive governments, physical location from stalkers, browsing history from overly curious corporations or phone conversations from nosy neighbors.

How To Stop Your Phone From Being Hacked

How To Stop Your Phone From Being HackedIf you’ve ever forgotten your phone or left it at home for the day, you will have realised just how much you use it. On average, we check our mobile phones about 110 times a day.

Can Your Devices Spy On Your Every Move?

people talking phonesWe now have dozens of smart devices in our houses and even on our bodies. They improve our lives in so many ways – from lowering energy consumption in our homes to egging us on to be active.

Why Apple Is Making A Stand Against The FBI

Why Apple Is Making A Stand Against The FBIApple has been ordered to help FBI investigators access data on the phone belonging to San Bernardino gunman Syed Rizwan Farook. The technical solution proposed by the FBI appears to undermine Apple’s earlier claim that they would be unable to help.

Hello Barbie, Hello Hackers: Accessing Personal Data Will Be Child's Play

Hello Barbie, Hello Hackers: Accessing Personal Data Will Be Child's PlayAt the top of some children’s Christmas present wish list this year will be the new Hello Barbie doll. Mattel’s latest doll connects to the internet via Wi-Fi and uses interactive voice response (IVR) to effectively converse with children. When the doll’s belt button is pushed, conversations are recorded and uploaded to servers operated by Mattel’s partner, ToyTalk.

How Much Does Your Smart Home Know About You?

How Much Does Your Smart Home Know About You?How much does your smart home know about you? That was the question that Charles Givre, a data scientist at Booz Allen Hamilton, set out to answer in a recent experiment. Givre has an account on Wink, a platform designed to control, from a single screen, his Internet-connected home devices, such as door locks, window shades and LED lights.

If You Think Your Emails Are Private, Think Again

If You Think Your Emails Are Private, Think AgainWhen you type up a racy email to a loved one, do you consider the details private? Most of us would probably say yes, even though such messages often end up filtered through intelligence agencies and service providers.

The Internet Hasn't Killed Privacy, But It Has Changed It Forever

The Internet Hasn't Killed Privacy, But It Has Changed It ForeverWhen people say “privacy is dead”, it’s usually for one of two reasons. Either they truly believe that privacy is irrelevant or unachievable in today’s hyper-connected world or, more often, that not enough is being done to protect privacy when huge amounts of personal information are being posted online

Our Surveillance Society Needs A Dose Of Integrity To Be Reliable

Our Surveillance Society Needs A Dose Of Integrity To Be ReliableAt this moment, there are likely many eyes on you. If you are reading this article in a public place, a surveillance camera might be capturing your actions and even watching you enter your login information and password. Suffice it to say, being watched is part of life today.

Like It Or Not Your Life Is Facebook's Business Model

Like It Or Not Your Life Is Facebook's Business Model

Facebook’s recent apology for its Year in Review feature, which had displayed to a grieving father images of his dead daughter, highlights again the tricky relationship between the social media behemoth and its users' data.

Who Is Tracking You?

Who's Tracking You

It is a wonder if the general population is quite certain they are comfortable with being tracked. Some folks are horrified by what tracking technology is capable while other just shrug their shoulders and say "I don't have anything to hide".

enarzh-CNtlfrdehiidjaptrues

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}