Topic: Privacy

superadmin-img-9/11/2014 - 4:22pm
HASTAC ContentSuper contributor
Blog entry
By Cathy Davidson on Sep 11th, 2014
I don't know about you, but just about all of my life is in the hands--or on the server, to be more accurate-- of a lot of people I don't really know...
ScholarLurker
Blog entry
By noopur raval on Jun 15th, 2014
The last few weeks, like everybody else, I've been a silent observer and a rare poster (or not) on the new thing on  the block: Secret. Secret...
Lurker
Blog entry
By Kaarina Mikalson on Jun 13th, 2014
Part of the HASTAC Scholars Collaborative Book Review of It’s Complicated: The Social Lives of Networked Teens by danah boyd ...
ScholarMember
Blog entry
By Jason Luther on Jun 9th, 2014
Part of the HASTAC Scholars Collaborative Book Review of It’s Complicated: The Social Lives of Networked Teens by danah boyd ...
ScholarMember
Blog entry
By Alisa Beer on May 19th, 2014
This post is a response and reaction to the workshop I led on April 23rd at Fordham University, for a class of juniors and seniors, Your Online...
Member
Blog entry
By Meg Miller on May 15th, 2014
Read Part 1Before we go any further, we must consider the idea of digital dualism. While Nathan Jurgenson created the original typology of digital...
Member
Blog entry
By Meg Miller on May 15th, 2014
While Tumblr has offered a unique opportunity for sexual empowerment of people with disabilities, it has also created an avenue for disempowerment...
Member
Blog entry
By Samuel Kortchmar on May 13th, 2014
On April 24th, as part of the Watson Institute for International Studies’s Security Seminar Series, Bruce Schneier gave a talk about the state of the...
ScholarRegular contributor
Blog entry
By Christina Davidson on Apr 25th, 2014
On April 24 at 12pm, Dr. Cathy Davidson, Kaysi Holman and five of her graduate students filed into the Sala Paracas at the Ministry of Culture to...
Syndicate content