Mary Ellen Bates: Seriously Searching Social

Seriously Searching Social (Slideshare) EXTRACT   Stealth research DOs & DON’Ts @mebs 16 DOs Set privacy settings to “STUN” Manage clients’ expectations Anonymize any requests for help Remember, this ain’t Dialog @mebs 17 DON’Ts DON’T assume the 80:20 rule DON’T leave footprints DON’T name names when asking for help @mebs 18 Social search strategies @mebs …

Electronic Frontier Foundation: Human Rights Require a Secure Internet

Human Rights Require a Secure Internet Between 15th-19th of September, in the week leading up the first year anniversary of the 13 Necessary and Proportionate Principles, EFF and the coalition behind the Principles will be conducting a Week of Action explaining some of the key guiding principles for surveillance law reform. Every day, we’ll take …

Review (Guest): The Global War for Internet Governance

Laura DeNardis A Guide to the “Technologically Concealed” in Internet Governance, January 21, 2014 By Francesca Musiani The final draft of Laura DeNardis’s most recent book, officially released on January 1st, 2014, had most likely been finalized before Edward Snowden’s recent revelations about the pervasive surveillance implemented by the U. S. National Security Agency entered …

Patrick Meier: Crowdsourced Crisis Map of UAV/Aerial Videos for Disaster Response

Crowdsourced Crisis Map of UAV/Aerial Videos for Disaster Response The first version of the Humanitarian UAV Network’s Crisis Map of UAV/aerial videos is now live on the Network’s website. The crowdsourced map features dozens of aerial videos of recent disasters. Like social media, this new medium—user-generated (aerial) content—can be used by humanitarian organizations to complement their damage assessments and thus …