privacy
See the following -
How To Break Out Of PRISM
NSA scandal has exploded fears of being watched on the Internet, but a new website lists ways to escape the Panopticon Read More »
- Login to post comments
How to Stop Big Data from Becoming Big Brother
As big data and the requisite mega-analysis that goes along with it becomes more common, there is an increasing outcry from voices in our society questioning whether big data is becoming Big Brother.
- Login to post comments
I Challenged Hackers To Investigate Me And What They Found Out Is Chilling
It’s my first class of the semester at New York University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. [...] I’m being hacked — and only have myself to blame. Read More »
- Login to post comments
IBM's Smarter Approach To Contextual Cities
I am writing a book called Age of Context with Robert Scoble. It is expected to be complete in October. Following is an excerpt from a chapter called Contextual Cities and the New Urbanists. Read More »
- Login to post comments
If PRISM Is Good Policy, Why Stop With Terrorism?
Defenders of the program say its effectiveness excuses it -- but they ignore the Fourth Amendment. Read More »
- Login to post comments
In A Close Vote, Congress Shamefully Defeats Amendment That Sought To Curtail NSA Surveillance
The US House of Representatives came within a few votes of passing a novel amendment that attempted to strike out funding for the highly contentious NSA calling records surveillance program... Read More »
- Login to post comments
In Depth Review: New NSA Documents Expose How Americans Can Be Spied On Without A Warrant
The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. [...] Read More »
- Login to post comments
In Secret, Court Vastly Broadens Powers Of N.S.A.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks [...]. Read More »
- Login to post comments
In Secret, Court Vastly Broadens Powers Of N.S.A.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say. Read More »
- Login to post comments
Indian Health Service Solving e-Health Challenges With Help From VA
The Indian Health Service's electronic health records system is getting an upgrade. And it's following the same joint EHR plan as the Department of Veterans Affairs and the Defense Department. Read More »
- Login to post comments
Industry Agrees To New Mobile App Guidelines
Industry groups and privacy advocates on Thursday were near agreement on voluntary guidelines for mobile apps that should make it easier for consumers to know what personal information is getting sucked from their smartphone or tablet and passed along to marketers. Read More »
- Login to post comments
Information Asymmetry – The Politics Of Health IT Policy
Let’s recognize Healthcare.gov as the dawn of mass patient engagement – and applaud it. Before this website, patients were along for the ride. Employers choose most of the insurance benefits, hospital web portals are an afterthought, and getting anything done with an insurance company, for both doctors and patients, means a phone call and paper. [...] Read More »
- Login to post comments
Innovation And Trust In Open Source
It has been a fascinating year in Internet security, privacy, and related technologies. NSA revelations have given us a glimpse through the looking glass, leading to questions about the trustworthiness of the core technologies used to power the Internet. Read More »
- Login to post comments
Integrating Social Services IT Brings Benefits, Risks
Whether or not they’re expanding coverage eligibility under the Affordable Care Act, state Medicaid programs are subject to a fair amount of financial and policy flux these days. Read More »
- Login to post comments
Intermountain, Deloitte Launch Comparative Effectiveness Tool
Intermountain Healthcare, in collaboration with consulting firm Deloitte, unveiled a data analytics tool this week that will leverage information from electronic health records improve patient treatment efforts via comparative effectiveness research. Read More »
- Login to post comments