Filter posts by:
4chan, Ethics and Digital Methodology

4chan, Ethics and Digital Methodology

How much are you willing to disclose online? Do you post your phone number? Do you have embarrassing pictures on Facebook? Do you Tweet your current location? I think it’s fair to say most people have boundaries when it...
The Internet Is Taking My Pictures

The Internet Is Taking My Pictures

Unlike Google Maps, Russia’s Yandex Карты is much more tourist friendly in that it does not blur your face away when you have been caught on camera! Yandex does not seem to uphold an evenly strict privacy policy as...
#You’re fired

#You’re fired

Thoughts and funny incidents on… contemporary ways to lose your job (  via Blogspot/ WordPress, Facebook, Twitter) There are many valid reasons for an employee to lose his job: the pretense of economic crisis, the company closing down, the...

The Invention of the Century: Privacy

Privacy is considered to be an important issue for it is not just a social structure within a community, which can be regulated by social control anymore. It has developed to a dialectic notion of widespread surveillance activities within...

Facebook Launches Three Key Features To Protect Privacy

It seems that Mark Zuckerberg has listened to all the nagging about how Facebook is violating the privacy of their users. On the live press-conference of Facebook yesterday, Zuckerberg announced a few features that the social networking site will...

Adopted Teen Traced on Social Network

A great example of how the privacy issues we face on social networks are not just limited to our data being sold to marketers. This BBC interview tells how a British girl was traced by her natural sister on...

Be free. Don’t adjust your Facebook privacy settings

Chun states that we, the users, perceive new media, in particular the Internet, to be free, democratic and save. We think we are in control of our content, but just like with other technologies, we can never have total...
Hyves, THE information source for companies

Hyves, THE information source for companies

How would I do research in web 2.0 and Social Network Sites? First I have to make clear for myself what web 2.0 exactly is. According to Tim O’Reilly, one of the founders of web 2.0, web 2.0 existed...

Book Review: Check in/ check uit. De digitalisering van de openbare ruimte. [The Digitalization of Public Space] by C. van ’t Hof, R. van Est, F. Daemen

Is it still possible to check out? Check in/ check uit. De digitalisering van de openbare ruimte. stems from the assumption that new media developments such as OV-chipkaart and Google Street view are the visible parts of a fundamental...

The Privacy Paradox in a control society

Nowadays a lot of people are in some form represented on the internet. These virtual forms can include profiles on social network sites like Facebook and Twitter, but also as writings on a personal websites and blogs. They has...

Book-review- Open 19: Beyond Privacy. New Perspectives on the Public and Private Domain

Book-review- Open 19: Beyond Privacy. New Perspectives on the Public and Private Domain Jorinde Seijdel (Editor), Liesbeth Melis (Editor) ISBN: 978-90-5662-736-,144 pages, This book is an edition of Open, published by SKOR a foundation of art and public...

Book Review – Access Controlled : the shaping of power, rights and rule in cyberspace

Access Controlled reports on the new normative terrain of internet filtering, censorship of Web content, and online surveillance. The preface and foreword are clear about what the reader can expect per chapter and also...

I Fly with my Little Spy! New Stealth Techno-Toys.

The recent debate about the proposed use of military-style surveillance drones in the United Kingdom, and further afield, has fuelled fears and given rise to concern over the continual erosion of the individual’s right to privacy and safety. ...

Burning Questions

Is Google the always-on, silent recorder of global zeitgeist? There’s Google Trends, which lists most searched-for sites and topics in the last week, month or year around the globe. This has been a useful tool for digital publishers to...

The Battle for the Internet

Things seem to be looking up in the battle for the Internet. For years now ACTA negations have been mired in secrecy and controversy. The leaked documents from the negotiations painted a bleak picture of corporations using their lobbying...

Persistence of Life-Streams – An Inquiry Into the Implications of Mixed Surveillance

Here’s the final version of my thesis which covers the nature and implications of (participatory) surveillance in the field of social media, and specifically in life-streaming services like Twitter and Facebook. (PDF can be downloaded here). Introduction: In this...
Google, Buzz off! A reflection..

Google, Buzz off! A reflection..

While many technology and media journalists are now focusing their attention on Facebook’s recent privacy moves, I’d like to shed some light on an earlier privacy issue: the implementation of Google Buzz. Some of you might be are aware...

Post-Privacy: Talk by Christian Heller

The first session at the Geneva Lift Conference covered “The Redefinition of Privacy” and what privacy and personal security means in the 21st Century. Independent Futurist Christian Heller spoke on the topic of Post-Privacy. Below is a summary on his views on...

Social Media, Privacy and Publicity with danah boyd

Last week I had the opportunity to attend at a symposium held at the Tilburg Institute for Law, Technology and Society (TILT) entitled as ‘Privacy and Social Network Sites’. The keynote speaker of the day would be danah boyd,...

The Beast File: Google

This video, created for ‘Hungry Beast‘, a news program that airs in Australia on the ABC1, depicts Google as a dangerous, pretentious, ubiquitous and ever growing advertising giant: ‘building an empire on your street, in your phone, in your...

Paranoid of the Proprietary: To Skype or Not to Skype

Today at the eComm conference, Sten Tamkivi presented an informative range of statistics of Skype use. Some 8% of all telecom “minutes” are routed by Skype as of last year. This is a huge portion of the total for...

The notion of ‘disorientation’ and the proxy server

 Few days ago, I was editing my assignment-entry on Wikipedia (logged in) when I received a warning (generated by bot or editor) that the IP I am currently using might belong to a proxy server. Although the administrator of...

Implications of Twitter: Crime 2.0

Sept. 30, 2008. White man about 20 years of age, wearing a blue shirt, yellow vest, safety goggle and a respirator mask. An ordinary road-worker going to work you might think. No you’re wrong, this is the story of...

Ning’s Privacy Issues

My background is not only media studies/theories but I’m also enrolled in the Bachelor program of Law at the University of Amsterdam. This post is about my critique on the interaction between privacy and user on Ning.com. For class...