Jump to content
Prof. Snyder's Courses

Linda L.

CSLP DE
  • Content count

    26
  • Joined

  • Last visited

  • Days Won

    6

Linda L. last won the day on November 12 2013

Linda L. had the most liked content!

About Linda L.

  • Rank
    Linda L.

Profile Information

  • Location
    San Luis Obispo County, California
  1. For anyone in the class who is especially interested in the field of Internet privacy, you might want to check out the IAPP (International Association of Privacy Professionals at www.privacyassociation.org) I joined a few months ago and am finding it to be an excellent resource.
  2. Hello Anthony, It seems that one of the toughest challenges around gaining more control over individual Internet privacy is that if good guys have more rights to control their Internet personas, so would the bad guys.... Also, there seems to be limited cooperation (or collaboration) amongst countries in terms of coming to agreement on cybercrime and bringing the bad guys to justice.
  3. In pondering the reading assignment for this week, I was merely posing a question about achieving greater online security: would this mean a tradeoff between giving up some level of openness and creativity but not going so far as the appliance device model (lockdown). That was all.... One comment here: if the concept of "good security" requires technical knowledge, most of us, the majority of all users, are in trouble!
  4. I am very intrigued by issues surrounding the lack of privacy on the Internet vs. reasonable expectation of privacy and also the lack of control that individuals and businesses have relative to removing potentially damaging digital information. Are we all just “cyber naked” now and we need to accept it and move on? Brenner’s book is especially troubling. Only with effort, knowledge, or some expense (if you have to hire someone to remove, re-build, or repair your Internet persona) does it seem we can remove potentially damaging information about ourselves from the Internet. And what if you are just “creeped out” about too much information (damaging or not) about yourself so readily accessible by the world, including those with evil intentions? I recently heard about some legislation that will take effect in 2015 (SB-568 California, Section 22581) concerning minors’ right to remove negative or harmful information about themselves from the Internet (text, photos, etc). Should a similar law be extended to all individuals or would this promote a security nightmare for law enforcement? (again the theme of privacy vs. security) What tradeoffs might be involved? “Big Brother” Google What if we don’t want Google to take pictures of our homes and post them for the world to see? What more can or should the private sector, especially social networking giants and Google, do to protect users and be more transparent? Rather than focusing on what the individual shares on the Internet and how this impacts individual privacy now and maybe forever, I would also like to discuss what rights individuals have concerning what they can remove from the Internet. Is there any policy in the pipeline about this issue? Although many companies like Abine and reputation.com are cropping up, I’m not sure of their effectiveness in helping individuals and/or companies control what is “out there” now or in the future. Generativity: cause or potential solution to privacy invasion matters? Might the generative nature of the Internet be good news for a digital future that includes a streamlined, easy way for individuals to exert more control over their Internet persona(s)? Is greater individual privacy desirable (or not) in the context of cyber security and law enforcement? Is there any policy being developed to regulate data aggregators, how this massive data is being used, and by whom it is used, that would afford additional privacy protection to individuals? Is the Cloud just a new target? On the topic of the Cloud and 3rd Party Records Doctrine, to your knowledge have there been any significant Cloud-based security breaches? What implications does the Cloud have for law enforcement? For example, in the case of child pornography being stored or files transferred via the Cloud?
  5. Cybersecurity News Resources

    also you might want to check out www.darkreading.com for links to very informative articles, many of which touch on the issues we are exploring in this class. For example, an article by Rothman: http://www.darkreadi...trust/240161994 Rothman references the following article by Krebs, scary stuff about data broker giants being hacked by an ID Theft Service: http://krebsonsecuri...-theft-service/
  6. Larry M., I like the definition of security you propose here. I think the Internet of current times (especially social network platforms) falls extremely short of this definition: Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear; confidence. Something that gives or assures safety My question: To achieve these freedoms and assurances, what are the trade offs? Are there other options beyond the concepts of generativity (ultimate creativity) vs. appliances (ultimate control) that we have not yet thought of, that will assure greater security? Perhaps a middle ground of some sort to help drive new policy....
×