Forty percent of adults have experienced online harassment

Survey report

1-minute Tech Talk radio segment

Posted in Article | Comments Off

Apple VP tells CNET that a touch-screen Mac is unlikely

craig

Apple Senior VP Craig Federighi

When I first started playing around with Windows 8 laptops I wondered if Apple would ever follow suit with touch-screen Macs. But it turns out that the company has studied that question and has decided – at least for now — to stick with trackpads and keyboard for input.

Craig Federighi, Apple senior vice president of software engineering told CNET News that “We don’t think it’s the right interface, honestly,” and that”Mac is sort of a sit-down experience.

You can read the full CNET story here.

 

 

Posted in Article | Comments Off

Digital Trust Foundation seeking proposals regarding online privacy, safety and security

igital Trust Foundation seeking proposals on online privacy, safety and security

igital Trust Foundation seeking proposals on online privacy, safety and security

A new foundation, born out of a lawsuit regarding Facebook’s Beacon project, is giving away more than $6 million “to fund projects and initiatives that promote the cause of online privacy, safety, and security.”

It seems like an eternity ago, but in 2007, Facebook launched the Beacon advertising program that transferred data from external websites over to Facebook so that users could share their purchases and other activities via the social network. Beacon didn’t go well and the immediate reaction from some privacy advocates and Facebook users was negative enough to prompt CEO Mark Zuckerberg to apologize a month later for “mistakes building this feature.” It also prompted a class action suit against Facebook, which resulted in a $9.5 million settlement. The Foundation received approximately $6.7 million after attorney’s fees, plaintiff payments, and other expenses.

I am one of the three court-appointed members of the Digital Trust Foundation’s(DTF) board of directors, along with Berkeley Law School faculty member and privacy expert Chris Hoofnagle and Facebook Chief Privacy Officer Erin Egan. The Foundation operates independently of Facebook. (Disclosure: I am co-director of ConnectSafely.org, a non-profit Internet safety organization that receives financial support from Facebook, but does not and will not receive any support from the Foundation. Foundation board members are not paid for service.)

The Foundation has identified five program areas and is now seeking proposals for the two of those areas: privacy education for youth and general funding for promotion of online privacy, safety and security. In early 2015, we will invite proposals in the areas of understanding socioeconomic status and privacy, assessing digital abuse, and innovation in privacy enhancing technologies.

Details and requests for proposals are available at the Foundation website.

General Funding for Promotion of Online Privacy, Safety and Security

The Foundation is investing $2.2 million in programs that “support effective existing programs related to online privacy, safety, and/or security,” and to “build capacity of and provide stability for online privacy, safety, and/or security.” Letters of interest for this area are due on October 31, 2014, with final proposals due on December 5, 2014.

Per the guidelines in the settlement, this could include any projects “designed to educate users, regulators, and enterprises regarding critical issues relating to protection of identity and personal information online through user control, and to protect users from online threats.” That’s pretty broad language so, in addition to privacy threats, we’re also entertaining proposals regarding security and safety.

Privacy Education for Youth

The Foundation is investing $1 million in privacy education for youth. Proposals are due on November 21, 2014. As we state in the RFP for this program area, the goals of this program are to “increase the privacy resilience of children and teens in the face of complex data sharing environments and to help children and teens develop skills and resources to protect them in the digital environment throughout life.”

The Foundation will fund three strategies:

• Implementation & Assessment of Online Privacy Education Programs
• Online Privacy Campaigns for Youth
• Online Privacy Messaging Best Practices White Paper

We are particularly interested in education programs and campaigns that enhance digital literacy among youth so that they have the “skills needed to successfully and safely navigate technology and the Internet” along with the ability to interpret information they see and “to make decisions about how and when to share information online.”

Posted in Article | Comments Off

Windows 10 a good move for Microsoft

Hats off to Microsoft for its “Back to the Future” decision to release a new version of Windows that’s likely to be familiar to most users.

Windows 10 is basically damage control for Microsoft. A couple of years ago, after years of research and development, the company released a radically different version of the world’s most popular computer operating system.

Windows 8, which followed on the heels of the very successful Windows 7, was billed as a “reimagined operating system, from the chipset to the user experience,” that “introduces a totally new interface that works smoothly for both touch and mouse and keyboard.” It almost seems as if they tested Windows 8 on complete computer novices while ignoring the hundreds of million people who already know how to use a computer. And, while Microsoft was certainly correct about the “totally new interface,” it didn’t work all that “smoothly” for mouse and keyboard users.

I use Windows 8.1 on a couple of machines and, while I like it on tablets, I’m not thrilled with the desktop experience though by installing a third-party Start menu and using some other tricks, I’ve been able to make my Windows 8 desktop PC behave more like Windows 7. However, users shouldn’t have to rely on third parties or sophisticated hacks to have an experience that is familiar to them. And even with these hacks, Microsoft’s radically new (and I would argue inefficient) so-called “modern” interface still pops up unexpectedly at times, which can be a major annoyance.

Microsoft heard, but at first misunderstood the outcry over Windows 8 and tried to sooth users by issuing Windows 8.1, which brought back the “Start” menu. But instead of giving people a menu that looks familiar, all it did was bring up that new modern interface, which makes matters even worse.

As far as I can tell, Windows 10 appears to address at least some of the user-interface problems though I’ll withhold judgment until I can actually test the final version of the operating system — likely sometime next year.

Windows 8 is hardly the only popular product to suffer from an unwelcome interface change. Last year Google made changes to Gmail and Maps that continue to annoy me. They took away the “search nearby” box in Maps that I used to use to find businesses near addresses such as a hotel near a convention center. You can still do that in Maps, but it’s harder now.

Google also changed the user interface on Gmail, making the common task of adding a CC or a BCC (blind copy) to a message a lot less obvious. And there was the famous Apple iOS 7 release that angered a lot of iPhone and iPad users and caused Mashable to write “Navigating iOS 7 has been far less intuitive than previous iterations.”

 I’m still struggling with the major user interface change that Microsoft made in 2007 when it introduced a new version of Microsoft Office which, according to a Microsoft blog post, “replaced the traditional menus and toolbars with this new Ribbon so that you can find and use the features you need — and use — a lot easier.” They claimed to have “made it so that it’s intuitive for you and, perhaps most importantly, easy to get accustomed to,” but I’m still not accustomed to having to hunt around to find an icon on a ribbon versus accessing a feature from a clearly marked and well-organized set of menus. To deal with it, I wound up purchasing a third party add-in called “ClassicMenu” that gives me the option to using the old menus.

Ironically, this is only an issue on the Windows version of Word. Apple insists that Mac apps have traditional menus so even though Microsoft offers the Ribbon on Mac Office; it didn’t take away the menus.

And therein lies the solution to interface changes. It’s fine to add features and new interface options, but companies should give users a choice as to whether to use a new way of interacting with a product or stick with what’s tried and true.

While Apple has made its share of user interface blunders, it got it right in 2011 when it introduced Launchpad as part of its Mac OS Lion release. The new interface replaces the Mac desktop with an iOS-like full screen array of icons that let you launch apps with a single click. But Launchpad is optional and it doesn’t launch by default. Mac users who want it are welcome to use it while the rest of us continue business as usual, knowing that it’s there if we want it.

So, software developers, please respect your user base when revising your products. I understand your need to come out with new products (and hence new revenue) and convince your user base to upgrade to something newer and better, but the way to do that is to make real improvements that enhance the user experience without having to force people to change the way they with your products.

 

Posted in Article | Comments Off

Why cybersecurity is patriotic and humanistic

uncle sam

I’d like to add National Cyber Security Awareness Month to the 4th of July, Memorial Day and Veterans Day as yet another patriotic holiday. And while we’re at it, let’s make it a global celebration. That’s because protecting your own devices and accounts is more than patriotic, it’s downright humanistic, because you’re benefiting your fellow “netizens” around the globe.

National Cyber Security Awareness Month (#NCSAM) is being celebrated throughout October as part of the Stay Safe Online project that’s supported by hundreds of companies, organizations and government agencies.

Putting others at risk

The fact is that we live in an interconnected cyber eco-system where each connected device and account has an impact on others. I’m not saying that you’ll singlehandedly bring down the world’s financial systems if your social media account is compromised, but you might put other users at risk — especially your friends who could be pestered by spam posts from criminals claiming to be you. And it could be worse than just annoying if anyone clicks on a malicious link appearing to come from you or winds up sending “you” money, which will instead go to a criminal. The same is true if your computer or email system gets infected and winds up causing friends to get spam email.

And if you don’t lock your cell phone, there’s a risk that someone could use it to harass your contacts or even strangers as if the messages are coming from you. Yet another reason you should protect others by protecting yourself.

Don’t become a zombie

Another altruistic reason to protect your devices is to make sure your computer doesn’t become a zombie on some criminal’s botnet. Bad guys have figured out ways to infect other people’s machines and turn them into unwitting accomplices in their efforts to infect even more machines, send out spam or break into networks and PCs. It’s actually a pretty simple concept. They put malicious software on your PC which turns your machine into an attacker that goes after other systems while also putting you at risk, perhaps by capturing your usernames and passwords and other data. I’m not being paranoid. This really happens, as this Microsoft web page explains.

Teach your children well

Screen Shot 2014-10-04 at 10.29.09 PM

It’s also patriotic to pass on good values to our kids, so please make sure you help them understand their responsibilities when it comes to cybersecurity. Last year ConnectSafely.org(the non-profit Internet safety organization where I serve as co-direct0r) published A Parents’ Guide to Cybersecurity that outlines what parents can do to help their kids protect themselves.

In addition to providing tips and advice, the guide answers parents’ top five questions about cybersecurity:

  1. What are the biggest security threats to kids?
  2. How do I talk with my child about security?
  3. How do we protect our family’s computers?
  4. How do we protect our mobile devices?
  5. Why do we always hear “Never share your passwords”?

And speaking of passwords…

Check out ConnectSafely’s tips and slideshow on how to create, use and manage  a secure and unique passwords.

Posted in Article | Comments Off

Why Facebook Hates And Fights Fake Likes

Read the full post at Forbes.com

Posted in Article | Comments Off

JP Morgan Chase Warns Customers About Massive Data Breach

Read the full post at Forbes.com

Posted in Article | Comments Off

iPhone 6 Plus Vs. LG G3 Is No Slam-Dunk For the iPhone

Read the full post at Forbes.com

Posted in Article | Comments Off

Why Cyber Security Matters To Everyone

Read the full post at Forbes.com

Posted in Article | Comments Off

RESPECT: Makes young people safer online

images (2)

Aretha said it best in 1967

The conversation around Internet safety has moved a long way since the 1990s when it focused mostly on porn and predators and we’ve even evolved since 2009 when ConnectSafely published Online Safety 3.0: Empowering and Protecting Youth.

Along with colleagues, I’ve been doing a lot of thinking about how to position online safety messaging and how to integrate it with offline risks (the overlap is pretty major) and with youth rights — an important part of the discussion that is often missing.

I realize that something as complex as the way we interact with connected technology can’t really be reduced to a soundbite or even an acronym, but that didn’t stop me from trying. So, to make things simple, I’m paying homage to Aretha Franklin, whose classic song “R-E-S-P-E-C-T” sets the tone for how I think we should be talking about youth online safety and rights.

Read on to “find out what it means to me.” And when you’re done, click on the image below to listen to Aretha sing it out.

Rights and Responsibilities:

Human rights for young people are essential to their safety. And that not only includes their right to be safe, but their right of free speech and assembly. These rights are guaranteed in the U.S. Constitution and the UN Convention on the Rights of the Child and they apply online as well as off. Blocking access to social media, for example, violates their rights and, I would argue, their safety as well. Rights also tie into privacy, such as student rights to the privacy of their personal data on their own devices and school servers.

And to help safeguard our rights and the rights of others, it’s important to be Responsible for our actions online and off.

Emotional literacy (AKA ‘Social Emotional Learning’):

No matter how hard we try, adults can’t possibly stomp out all bullying and cruelty, But there is research to show that we can help head it off at the pass by teaching emotional literacy, also known as Social Emotional Learning, from kindergarten on. Helping young people learn compassion, empathy and kindness will go a long way toward creating the kind of world that we all want to live in.

Security:

You can’t be safe or free if you’re not secure. We need to not only get industry and government to help secure our devices and infrastructure, but teach everyone — starting with children — how to protect their devices and their data against unauthorized intrusion.

Privacy and Protection:

We all have a right to privacy. Whether it’s government, companies or even prying educators and parents, kids have a right to keep their information private. Sure there are exceptions when it comes to some parents’ need to monitor and guide their children but, as a general rule, children should be treated RESPECTfully, which includes respecting their privacy.

Young people do have the right to be protected from harm, but it’s impossible to shield them from all potential harms, which is why resiliency is so important.

Education and digital literacy:

Digital literacy can go a long way toward protecting us online. And it’s not just knowing how to operate computers and mobile devices. It’s developing the critical thinking skills and internal compass to help make good decisions in our digital lives, including making good media choices.

Consideration:

Being considerate of others means not just treating them with respect and kindness but also respecting their privacy and their rights. It’s about taking the time to think about how our actions will affect others and doing the right thing.

Thoughtfulness and Tolerance:

“Think before you click” is just one of many sound bites that come under the general category of thoughtfulness. It doesn’t take long to think about the implications and consequences of what you’re about to do, especially in a medium like the Internet where there really is no such thing as an “eraser button.”

Tolerance means accepting and celebrating our differences and giving ourselves and each other a break now and then.  Embracing the notion that it’s OK to be different goes a long way towards reducing bullying and meanness.

 

Posted in Article | Comments Off