Issues

Privacy and Security

Information technology lets people learn about one another on a scale previously unimaginable. Information in the wrong hands can be harmful. Scholars on this site consider problems of privacy, fraud, identity, and security posed by the digital age.

Back to main Privacy and Security page

Quotes

When Social Media Mining Gets It Wrong


Alessandro Acquisti
Source: MIT Technology Review
August 9, 2011

Face-ID Tools Pose New Risk


Alessandro Acquisti
Source: Wall Street Journal
August 1, 2011

Protect Your Privacy Online


Alessandro Acquisti
Source: Kiplinger's Personal Finance Magazine
June 1, 2011

Lawmakers Look at Phone Tracking


Joseph Turow
Source: Washington Post
May 8, 2011

Child porn case shows danger of Net routers


John Palfrey
Source: Boston Herald
April 26, 2011

Freedom and Anonymity: Keeping the Internet Open


Jonathan Zittrain
Source: Scientific American
February 24, 2011

'Do Not Track' Internet Privacy Bill Introduced in House


M. Ryan Calo
Source: Los Angeles Times
February 11, 2011
Results 291 - 300 of 303
|< < 26 27 28 29 30 > >|

TAP Blog

Woodrow Hartzog Discusses How Contact-Tracing Apps Could Reshape Surveillance

In an op-ed article for the Los Angeles Times, Woodrow Hartzog, Professor of Law and Computer Science at Northeastern University, shares his insights into Google and Apple’s contact tracing project, and he discusses the “three concerns to keep in mind about relying on technology to mitigate the COVID-19 crisis.”

TAP Staff Blogger

Fact Sheets

Social Networking

Social networking websites are places on the Internet where people can connect with those who share their interests. Additionally, they can function as economic “platforms” that serve different groups of many users, including consumers, advertisers, game developers, and others. 

Featured Article

Fixing Social Media's Grand Bargain

Social media firms like Facebook offer services for free in exchange for data from end users, using the data to sell advertising. This bargain encourages social media firms and advertisers to manipulate users.

By: Jack M. Balkin