Aller au contenu principal
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Advanced Search
Content Type:
News & Analysis
Zoom is not the worst, just getting the attention software deserves
Tuesday, April 21, 2020
Content Type:
News & Analysis
International Health Day during a pandemic: an opportunity to reflect
Friday, April 10, 2020
Content Type:
Examples
Researchers scraped videos of transgender vloggers off YouTube without their knowledge to train facial recognition software
Friday, May 3, 2019
Content Type:
Examples
Design flaw leaves Bluetooth devices vulnerable
Wednesday, April 1, 2020
Content Type:
Examples
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
Wednesday, April 1, 2020
Content Type:
Examples
Key Negotiation of Bluetooth attack
Wednesday, April 1, 2020
Content Type:
Case Study
…it protects our property
lun 30/03/2020 - 14:16
Content Type:
Case Study
...it helps to protect our nationality
mer 25/03/2020 - 17:46
Content Type:
News & Analysis
The UN’s Legal Identity Task Force: Opportunities and Risks
Wednesday, March 11, 2020
Content Type:
Examples
Pregnancy persists on the internet despite miscarriage in real life
Saturday, May 5, 2018
Content Type:
Examples
Bricks-and-mortar retailers adapt online tracking techniques for the physical world
Saturday, May 5, 2018
Content Type:
Examples
Big data intelligence company builds advertising audiences from mobile tracking at Iowa caucuses
Saturday, May 5, 2018
Content Type:
Examples
Royal Parks covertly tracks visitors via mobile phone data
Friday, May 4, 2018
Content Type:
Examples
Research shows that users can be uniquely identified from just four apps
Friday, May 4, 2018
Content Type:
Examples
New police technologies assign individual "threat scores"
Thursday, May 3, 2018
Content Type:
Examples
Affective computing provides new frontier in user manipulation
Thursday, May 3, 2018
Content Type:
Examples
Banks turn to smartphone metadata to assess lending risk
Thursday, May 3, 2018
Content Type:
Examples
Anti-Choice Groups Use Smartphone Surveillance to Target ‘Abortion-Minded Women’ During Clinic Visits
Thursday, May 3, 2018
Content Type:
Examples
MIT device uses wireless signals to identify emotions
Thursday, May 3, 2018
Content Type:
Examples
Baidu aggregates map search data to predict crowd formation
Wednesday, May 2, 2018
Content Type:
Impact Case Study
Fighting data-exploitative business models
Wednesday, May 2, 2018
Content Type:
Impact Case Study
Fighting disproportionate identity systems and policies
Wednesday, May 2, 2018
Content Type:
Video
Digital stop and search - public concern about the police secretly downloading content from smartphones
Tuesday, March 27, 2018
Content Type:
Examples
Austria proposes to seize asylum seekers' devices to check their identities and travel routes
Saturday, December 8, 2018
Content Type:
Examples
Before Cambridge Analytica 'research' was 'gay' face and 'personality' studies
Tuesday, December 4, 2018
Content Type:
Examples
Mined behavioural computing data shows early signs of Parkinson's Disease
Tuesday, December 4, 2018
Content Type:
Examples
EU pilots AI border agents to mine microexpressions
Thursday, November 29, 2018
Content Type:
Examples
Researchers attempt to predict depression from Facebook posts
Saturday, February 9, 2019
Content Type:
Examples
Consumer behaviour closely predicts politices, race, income, education, gender
Saturday, February 9, 2019
Content Type:
Examples
Choice of iOS or Android can predict credit-worthiness
Saturday, February 9, 2019
Pagination
Première page
« First
Page précédente
‹‹
Page
1
Page courante
2
Page
3
Page suivante
››
Dernière page
Last »
Get Involved
Act with Us
Donate
Join