The curated garden problem

The curated garden problem

When Apple first enabled third party applications on the iPhone, they were accused by many of violating user freedoms by creating a walled garden, that being the requirement that all applications installed on the platform must be installed via their iOS App store. Apple promoted this as allowing application vetting for performance and security: particularly …

+ Read More

Social engineering and the role of business

Social engineering and the role of business

In the context of security, social engineering refers to the act of tricking a person into handing over financial, sensitive or security details by impersonating someone the victim might normally expect to deal with.┬áThis differs from identity theft, in that the goal is to get the victim to handover useful information that might be used …

+ Read More

Do some parents engage in identify theft?

Do some parents engage in identify theft?

It’s something you’ll see from time to time on Facebook and other forms of social media. Little Sally suddenly has a Facebook profile and is friends with her mummy and daddy, her aunts and uncles, her grandparents and other close family friends. Except, Little Sally isn’t 13 years old, the legal age at which point …

+ Read More

Peek-a-boo, your boss might be tracking you

Peek-a-boo, your boss might be tracking you

Background On Friday, 24 April 1992, Brian Kush reported to the RISKS List: Yesterday while driving through GA, my Cellular Phone rang. Since I was roaming I was not expecting a call. When I answered it, it was a recording welcoming me to Bell South Mobility and offered instructions on using there [sic] service. I …

+ Read More

Death in the information age

Death in the information age

Introduction In the late 90s, a person who worked in the same office as me died in fairly horrific circumstances. At the time at work, I was out as a gay man, and he was profoundly closeted. As far as I’m aware, at the time at least only one other person in the office knew …

+ Read More

Accessibility and Functional Technology for People with Disability

Accessibility and Functional Technology for People with Disability

In 1995, the SMS was introduced into Australia, and could be used with varying degrees of functionality by those with GSM phones. While initially the intention of SMS may have been little more than to alert users of an available voicemail, it quickly gained popularity as an alternate communication system. This accelerated in 2000 when …

+ Read More

A Chinese Panopticon

A Chinese Panopticon

In the late 18th Century, Jeremy Bentham, often considered to be the father of utilitarianism, codified the notion of the┬ápanopticon. The panopticon was at once simple and disturbing. Conceived as a new form of gaol, the panopticon would be a prison where all cells were arranged around a central guard or watchtower. There would be …

+ Read More

Examining the ethics of “Dieselgate”

Examining the ethics of “Dieselgate”

Diesel engines had been touted for some time by car manufacturers as being cleaner and more efficient than their petrol cousins. Such was the power of the diesel message that these cars rose steadily in popularity in Europe for over a decade, and excepting 2009, represented more than 50% of the new passenger car sales …

+ Read More

What is Ethics? (A primer)

What is Ethics? (A primer)

Introduction Perplexingly for many, what is ethics? is a question that people have been struggling to answer for centuries. There are, in fact, many schools of thought as to how we might define the concept behind a seemingly straight-forward and easy to understand word. Perhaps it is easier to start first with a compelling definition …

+ Read More

%d bloggers like this: