Things that caught our eye

“Reflections on the Digital World”

5 Feb, 2015   | by:

Just a quickie about the Internet Monitor project’s second annual report from 2014 “Reflections on the Digital World”. I thought some of y’all might be interested in taking a look inside to see what the Internet Monitor has picked as the most exciting and new developments when it comes to the digital world.

“The report focuses on the interplay between technological platforms and policy; growing tensions between protecting personal privacy and using big data for social good; the implications of digital communications tools for public discourse and collective action; and current debates around the future of Internet governance.”

Probably an interesting read for everyone who is interested in the iii!

Things that caught our eye

The Perils of the New Connectivity…Or How iPhones Can Kill

5 Feb, 2015   | by:

Being currently at the Oxford Internet Institute, I have access to a wide range of great talks by scholars researching the Internet (in fact, there are almost too many events to attend!). On Monday and yesterday two talks touched upon the negative and exploitative aspects of the Internet and its connective culture.

The first talk by Gina Neff focused on venture labor, a concept that Neff introduced in her seminal study “Venture Labor”. It connected Neff’s work on high-tech workers in the “Silicon Alley” of the late 1990s to current developlements related to micro-labor, such as click farms in Bangladesh, low cost transcription services in the Philippines or Mechanical Turk workers and Uber drivers all over the world. Interesting parallels between the venture labor of the late 1990s and micro-work today were revealed in the narratives of the workers themselves. Many of them seem to see their employment as an entrepreneurial investment – a view that is also imposed on them from the outside via government policies and initiatives.

The second talk featured Jenny Chan, a lecturer at the University of Oxford’s “School of Interdisciplinary Area Studies”. She presented an impressive long-range ethnographic study about the employees manufacturing iPhones and iPads in South China. Her talk took the suicides in 2010 as the starting point and showed how these workers are actually “Dying for an iPhone”.

Both talks highlighted that behind the shiny facade of newness, innovation and progress connected with the Internet many people pay a heavy price, are suffering.. or even dying.

Stay tuned for more updates from the OII!

Apple, ,

Things that caught our eye

Taylor Swift trademarked her lyrics? No, she did not. Not yet.

30 Jan, 2015   | by:

Many news media currently report that Taylor Swift has trademarked parts from her lyrics, such as “this sick beat” and “we never go out of style”.

The Wall Street Journal Law Blog:

“Thinking about selling T-shirts with “This Sick Beat” or “Party Like Its 1989” emblazoned on the front? Well, think again, because the only person who can legally do so now is Taylor Swift.”

CNN:

“This means you’ll need Swift’s permisison if you want to use any of those phrases on a whole host of stuff: aprons, “non-medicated” toiletries and — we kid you not — walking sticks.”

Vox:

“Now that she owns the trademark, no one else can make T-shirts that say “This Sick Beat” and sell them outside of her stadium concerts without breaking the law. It’s a smart business move, even if it does seem a little bit silly.”

And MSN (copying Vox who “broke the news”):

“She also own the rights to “Party Like It’s 1989″, “‘Cause We Never Go Out of Style”, “Could Show You Incredible Things” and “Nice to Meet You, Where You Been?””

 

They are all mistaken…

Taylor Swift has only filed an application for a trademark, which does not mean she has a trademark, nor that she will definitely have one in the future. It is now up to the US Patent and Trademark Office to decide whether Swift’s application complies with US trademark law. For instance, one of the requirements Swift’s mark must meet is that there is no “likelihood of confusion” between her mark and other registered trademarks.

Some media have already corrected their mistakes. For instance, The Guardian:

“This article was amended on 29 January to correct references to copyrights, which should have been trademarks, and to acknowledge that the trademarks have not yet been granted.”

You can keep an eye on all Taylor Swift’s trademark applications here.

media, Taylor Swift, trademark law

Things that caught our eye

Suspect in Amanda Todd-case writes open letter claiming innocence

28 Jan, 2015   | by:

Dutch citizen Aydin C., who is accused of assaulting and blackmailing multiple girls, has written an open letter in English claiming that he is innocent and has become a target in an orchestrated hate campaign. Aydin C. sent his open letter to Dutch news network RTL Nieuws (Dutch language).

One of  Aydin C.’s alleged victims was Amanda Todd, who in 2012 committed suicide at the age of 15. Aydin C. is currently in detention and awaiting trial in the Netherlands. On Friday, February 13, his pre-trial detention will be subject of court proceedings (Dutch language).

Aydin C.’s lawyer Christian van Dijk has confirmed that the letter is indeed coming from Aydin C.:


Read Aydin C’s open letter (English).


 

, , ,

Things that caught our eye

Not all FTC Commissioners agreed to publication of FTC Internet of Things Report.

27 Jan, 2015   | by:

The US Federal Trade Commission (FTC) released a Staff Report [PDF] on the Internet of Things earlier today. The report is based on a workshop that the FTC had hosted in late 2013 and holds several recommendations for companies developing Internet of Things devices. Though many have already reported on the release, I would like to focus here on the separate statement [PDF] made by Maureen K. Ohlhausen and  the dissenting statement [PDF] made by Commissioner Joshua D. Wright. While the former had hesitations but supported the publication, the latter was clear in his opposition to publication of the report.

The Report’s recommendations
As the focus here is on the separate statments, I will suffice with the words from the FTC itself in its press release summarising its recommendations to companies developing IoT devices:

  • build security into devices at the outset, rather than as an afterthought in the design process;
  • train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
  • ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
  • when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
  • consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
  • monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.

The Separate Statement by Commissioner Maureen K. Ohlhausen
Though Commissioner Ohlhausen did vote in favour of publication of the report itself, she took the opportunity [PDF] to show her dissatisfaction with two of the staff report’s recommendations.

In her own words:

First, I do not support the recommendation for baseline privacy legislation because I do not see the current need for such legislation. The FTC’s Section 5 deception and unfairness authority already requires notice and opt-in consent for collecting consumers’ sensitive, personally identifiable information. It also protects against uses of personal information that cause substantial, unavoidable consumer harm not outweighed by benefits to consumers or competition. Furthermore, sector-specific laws, such as FCRA, provide additional protections for consumers. Thus, I question what current harms baseline privacy legislation would reach that the FTC’s existing authority cannot.

Second, I am concerned that the report’s support for data minimization embodies what scholar Adam Thierer has called the “precautionary principle,” and I cannot embrace such an approach. The report, without examining costs or benefits, encourages companies to delete valuable data – primarily to avoid hypothetical future harms. Even though the report recognizes the need for flexibility for companies weighing whether and what data to retain, the recommendation remains overly prescriptive.

As a final note she states that she would have liked to see the report include a full exploration of the emerging tension between information technology (including IoT) and the Fair Information Practice Principles’ approach to protecting consumer privacy. She continued:

The staff report acknowledges the conflict, but fails to grapple with it in a substantial way. We will need to address these issues in the relatively near future, and I look forward to playing a role in that effort.

The Dissenting Statement
The criticism by Commissioner Ohlhausen of the report’s lack of a rigorous cost-benefit analysis was shared by Commissioner Wright. But while the former considered that this was not a reason to vote against its release, Commissioner Wright did vote against publication of the report. In his Dissenting Statement he explains his reasons:

I dissent […, AB] because the Workshop Report includes a lengthy discussion of industry best practices and recommendations for broad-based privacy legislation without analytical support to establish the likelihood that those practices and recommendations, if adopted, would improve consumer welfare.

In the footnote accompanying the paragraph he explains that while the FTC’s reports do not have the force of law,

“there is a very real danger that companies may reasonably perceive failure to achieve those practices or to adopt such recommendations as actionable. Where an agency’s recommendations regarding best practices are not supported by cost-benefit analysis, firms may respond by adopting practices or engaging in expenditures that make consumers worse off.”

He continues his criticism by explaining that this report followed a very unusual procedure when it comes to the FTC practice of publishing public reports on “novel, emerging or otherwise important issues”. Leaving procedural issues aside, his problems with the content itself are (briefly & paraphrased) as follows:

(1) The report is based on a one-day workshop, that is hardly the stuff of solid exploration of best practices and a strong basis for legislative recommendations.

(2) The rigorous cost-benefit analysis argument. Without it, the recommendations are not based on a strong footing. Apart form some assertions, there is no analysis at all that came from the Workshop itself.

(3) Commissioner Wright remains unconvinced that the proposed framework which entails a combination of Fair Information Practice Principles and concepts such as “security by design” is the best way to go about the Internet of Things framework.

He concludes that based on the foregoing, that the FTC should do more research before publishing the Workshop Report’s recommendations.


Read the 55-page report here [PDF]
Read the separate statement by Commissioner Ohlhausen here [PDF]
Read the dissenting statement by Commissioner Wright here [PDF]

 

FTC,

Things that caught our eye

Controversy around Cyberbullying Law in Illinois

26 Jan, 2015   | by:

A by now much discussed piece of state legislation in the US has made it to European news. The Guardian reports that the new controversial law in Illinois would ask children to reveal their Facebook passwords if the school has reasonable cause to believe that a student has broken the school’s social media policy. Under the legislation the school has the right to this request even if an incident took place outside of school premises and after school hours. Some school officials report that the media has largely exaggerated the controversy around the law, as Illinois schools had some of these powers already. You can read more here and here.

 

 

Children, ,

Things that caught our eye

1 ISO Standard >150 $ -> #!@*?

23 Jan, 2015   | by:

(Disclaimer #!@*? translates into: why the heck are ISO standards so expensive?)

I’m assuming that everyone knows or has come across an ISO standard sometime during their research. ISO standards are developed by experts in a specific field. Through a consensus process, together they define generic specifications and guidelines to ensure that the relevant industry leaders adhere to the same requirements of products, processes and services.

With respect to the question, why one single ISO standard is so very expensive, the organization answers as follows:

“Developing, publishing and maintaining ISO standards incurs a cost, and revenues from selling them helps ISO and its members to cover an important part of these costs. Charging for standards allows us to ensure that they are developed in an impartial environment and therefore meet the needs of all stakeholders for which the standard is relevant. This is essential if standards are to remain effective in the real world.” (emphasis added)

The first argument is that costs occur and that the money is needed to cover those “production costs”. This seems like a rather valid point: the creation of guidelines on which industry members can agree upon (through a consensus process) seems like a tedious task. Nevertheless, these costs might have occurred either way. For instance, if the industry leaders did not establish such standards but legislators had, as then extensive lobby efforts are required. And such lobby efforts come at a certain cost too.

The second argument of the ISO is to ensure that they are developed in an impartial environment. Here I think some clarification is necessary, as the argument seems a bit blurry. Why would the consensus processes be biased if the ones agreeing on the guidelines knew that everyone could access them for free?

If the standards were free more people could peer-review them and/or blog about potential misfits. Therefore, the question arises: Are these standards so controversial that one would like to deter the greater public from knowing what there is inside and prevent widespread public discourse?

Anyway, in my opinion standards should be free. This point has been brought forward by others too. Reasons brought forward by some individuals of why ISO standards should be free are:

  1. National legislations sometimes incorporate or link ISO standards and thus free access would lead to greater legal certainty (read here).
  2. ISO standards are developed by volunteers and thus there are no significant costs for ISO in producing them (read post 1 or post 2).
  3. Fees may reduce the impact of the standards (read here).

 

 

Things that caught our eye

Smart Cities – Exclusionary by Default?!

14 Jan, 2015   | by:

I’ve been interested in the concept of Smart Cities for two reasons: For one, part of my dissertation is based on the assumption that Smart Cities are the way governments in the near future are going to want to go. If that happens, government bodies will be collecting more and more data from civilians, thus, posing a threat to data protection. Secondly, because I think Smart Cities could entail great opportunities for us to live in a sustainable community, if regulated appropriately. But one problem remains:

“The smart city is full of barriers. First you must be able to connect to the network. Then you must show your credentials by logging in. It’s like showing your passport to take a walk in the park.”, as Dr. Anthony Townsend points out.

Much like inequality, usually people look to the legilsator to solve issues such as exclusion. But I am a strong defender of the idea that if everything we do, think, use, buy, eat and so on, is connected (““), then the way to solve problems arising with this network of everything is not just to take a regulatory approach. We need interdisciplinary solutions.

Townsend’s presentation, he held as part of Delft University of Technology’s 173rd Dies Natalis, was titled: “Can engineers build inclusive Smart Cities?” and his answer was: YES. He showed three approaches which could help solve the exclusionary concerns Smart Cities entail. Therefore, providing three areas that could be improved by engineers without any help of the legislator:

  1. Open Information Architectures: “We need to make data architectures open to drive innovation. Modularity and inter-operability are key — so that anyone can build new applications on top of at little or not cost.”
  2. Transparent and Interpretable Models: “By transparent, I mean that the assumptions embedded in simulations and predictive models, automated infrastructure, and decision-support systems are open to public scrutiny. By interpretable, I mean that machine learning techniques have advanced to such a state that the way they produce results is beyond human understanding.”
  3. Engineering Ethics Education: “Ethics is only just taking hold in engineering and business schools — in the United States, the latest accreditation guidelines for engineering schools — for the first time — requires students receive merely ‘an understanding of professional and ethical responsibility’.”

I will leave you with that and hope to have given you some food for thought. Enjoy Townsend’s full presentation and others on Smart Cities here.

, , ,

Things that caught our eye

Did the UK PM pledge to ban encrypted chat apps?

13 Jan, 2015   | by:

According to ArsTechnica, UK PM David Cameron commented, “Are we going to allow a means of communications which it simply isn’t possible to read? My answer to that question is: ‘No, we must not.'”

The Guardian has the relevant portion of Cameron’s speech.

 

 

Things that caught our eye

This Holiday Season – A New App for your Memories

21 Dec, 2014   | by:

You may be familiar with Timehop, an app that draws from information on your social media accounts to remind you of your fondest memories from the past year (or at least what its algorithms think those memories may be). Now another app is out, called Memoir, which, in addition to this algorithmic curation, also allows you to label your memories, organize them and search for memories based on your current location.

The New York Times reporter summarizes the main concern around such apps much better than I would:

“This is perhaps the time to note that these apps remind us that we are putting a lot of information about ourselves out into the world. That information is easier for a third party to retrieve and organize than we might have imagined. Happy holidays!”

You can read the NYT review here.

 

 

 

Things that caught our eye

Google takes down Google News in Spain

11 Dec, 2014   | by:

This news is just in: Google is taking down its in Spain. Google says that its decision is the result of new Spanish legislation requiring “every Spanish publication to charge services like Google News for showing even the smallest snippet from their publications, whether they want to or not.”

On 16 December Google will pull to the plug on its news service:

“As Google News itself makes no money (we do not show any advertising on the site) this new approach is simply not sustainable. So it’s with real sadness that on 16 December (before the new law comes into effect in January) we’ll remove Spanish publishers from Google News, and close Google News in Spain.”

Read more on this issue on Google’s Europe Blog.

, google news, google tax, para-copyright

Things that caught our eye

The Role of Companies in Addressing Online Threats

4 Dec, 2014   | by:

Tackling a perhaps less addressed aspect of Elonis case, raises the question of social media companies’ role in addressing threats on their platforms.  Citron’s new book “Hate Crimes in Cyberspace” analyzes key issues around how law could move forward in handling free speech challenges and distributing responsibility between schools, parents and Silicon Valley.  You can read more on the aftermath of Supreme Court’s December 1st hearing on NYT’s Room for Debate.

, Freedom of Expression,

Things that caught our eye

Internet Censorship and The Streisand Effect

28 Nov, 2014   | by:

Just some days ago, I read a new and very interesting study on Internet censorship. The author argues that resistance censorship is futile and, in some cases, can even be counterproductive. The latter, or the so-called “Streisand effect”, is defined by the author as:

unintentional virality of any information, online or otherwise, as a consequence of any attempt to censor, suppress, and/or conceal it.

Using web traffic data, the author demonstrates the Streisand effect at work in Pakistan and Turkey – two countries with heavy Internet censorship. In March 2014, the Turkish government censored Youtube and Twitter because of videos implicating the Turkish government in massive corruption scandals. Despite the censorship, Youtube still ranked among the top 5 sites. It turned out that users used circumvention devices, such as proxies and Tor, to access the censored content. Even more surprisingly, one of the videos in question even spiked in popularity after the Youtube censorship. The author:

Using limited and sparse data from multiple sources we have been able to show that not only does censorship not work but it also inadvertently causes restricted content to become popular.

You can find the full study here.

 

 

,

Things that caught our eye

The Elonis Case: Online Death Threats and Free Speech

25 Nov, 2014   | by:

On December 1st, the US Supreme Court will hear Elonis’ First Amendment challenge to his conviction. Elonis had spent three years in prison after posting death threats to his wife on Facebook. While “true threats” are an exception to the rule against criminalizing speech, Elonis argues his posts do not constitute “true threats” because he did not intend to hurt his wife: the aggressive lyrics he posted had a cathartic function for him. Emily Bazelon, senior research fellow at Yale Law School and well-known writer on the topic of online harassment, discusses what is at stake with this decision in her post on the New York Times Magazine.

,

Things that caught our eye

Say Goodbye to Harry Potter – Open Sourcery is what the cool kids practice now

21 Nov, 2014   | by:

Marco Tempest is a digital magician and aims to create illusions with technology. But not to fool people and have them walk out still wondering how that worked. He wants to teach the public what technology can make possible and does this in a fun an interactive way. Take a sneak peak at one of his shows here.

Federico Guerrini wrote a piece about Marco’s work in Forbes. It was an interesting and inspiring read. Guerrini states:

“But it does reach nonetheless its goal, which is to inspire people and make them less suspicious of and more engaged with technology, whether it’s augmented reality, artificial intelligence of another of the many things lots of people talk about, but very few actually are able to understand.”

I think it’s a great idea to share technology and its possibilities with the greater public. By showing the opportunities of technology in a magic show is an interesting take on technology while leaving out all the complicated (and sometimes terrifying) technical stuff. It makes technology more accesible to everyone and helps engage kids, parents, teachers and anyone else who could use a little help from technology but aren’t quite sure how to use it – just like me!

,

Things that caught our eye

Parenting in The Digital Age

20 Nov, 2014   | by:

At its Annual Conference in Washington DC, Family Online Safety Institute (FOSI) presented findings of its research on digital parenting, which reveal how parents perceive potential benefits and harms of their children’s use of technology. You can find the main take-aways here. EU Kids Online also presented the results of their study on children’s online behavior. The goal of the Conference was to attempt to redefine online safety, which seems to be moving away from focus on harm only and towards understanding the contextualized nature of risks, based on research.

, ,

Things that caught our eye

Sorry you don’t have enough Facebook friends to prove you exist.

15 Nov, 2014   | by:

The Guardian reported yesterday that a ‘middle-aged mum of two’ with ‘an impeccable credit record’ who preferred to remain anonymous could not book a B&B via Airbnb because her 50 Facebook friends were not enough to establish that she existed, as she states. The lack of a very abundant online presence (nearly) prevented her from making use of the Airbnb services.

Airbnb requires a verification of the booker’s identity by (1) having a photo as well as both (2) a copy of a passport or driver’s licence and  (3) some some proof of her existence online either by linking a Google, LinkedIn or Google account. Verification of both ‘online’ and ‘offline’ identity. That is quite a lot of personal information. Whilst I understand that in the event anything goes wrong it would be good for the ‘host’ to know who he/she was dealing with, but still, why the need to give Airbnb this host of personal information? Airbnb responded to the article in the Guardian with the statement that the new Verified ID system has received “extremely positive feedback”.

The story has a happy ending; in the end the woman got to book via Airbnb.

Three days, three lost bookings, a spate of emails, and two calls to Casey and her colleague in Colorado later, my problem was resolved. I was “escalated” to one of Airbnb’s “verification specialists”, who allowed me to upload my (very grumpy) video directly to him, explaining who I was. Twenty-four hours after that I got my green light. Off I went, and had a wonderful weekend courtesy of my excellent host “Felix”.

Read the full article here.

airbnb, identity,

Things that caught our eye

Why can’t Google.com just forget too?

12 Nov, 2014   | by:

In his open letter to Google John M. Simpson, Privacy Project Director of Consumer Watchdog, is asking them to implement the EU’s “Right to be Forgotten” for US users on a voluntary basis too. His main argument why Google.com should do so, is that removals of links are not automated. Google has to strike a balance between the interests involved and seems to be doing so quite successfully, as Simpson states:

“I was heartened to see – based on Google’s own numbers – that you appear able to strike this balance in Europe and it does not appear to be an undue burden on your resources.”
The numbers seem pretty promising. So far, Google has received approx. 150’000 removal requests since the CJEU’s decision in May 2014 and has removed approx. 48% of the links in question, keeping the rest online. Thus, Simpson argues in his letter that striking a balance between the respective interests has proven to be easy enough for Google so why not provide the same “service” for US users.
Interesting enough there seems to be a slow movement going on in the US towards more privacy on the Internet. Let’s see if Europe and the US can find common grounds in the near future. Here’s the letter for further reading.

, Google, ,

Things that caught our eye

Haven’t Downloaded OS X Yosemite Yet? – Keep Waiting

5 Nov, 2014   | by: Anna Myers

It’s always a good call to wait a while after new software is released to make sure all the bugs are worked. You may want to wait until the new year with the OS X Yosemite release with recent reports of security flaws in Apple’s newest operating system.

Serious security flaw in OS X Yosemite ‘Rootpipe’ | ZDNet.