“(Online counseling) teaches clients to be aware of what’s coming out of their mouths, what they’re feeling and thinking, their wholeness and whole bodies,” Mankita said. “It’s an exciting and empowering thing that we haven’t done in the past (in person) the way we can with text. Text is really powerful.” Online therapy is particularly suited to sex and relationship work, especially for clients who crave a layer of anonymity we can’t get by going through our insurance companies or driving to an office. And clients can seek matches based on compatibility rather than proximity.
Read this item from WIRED’s Regina Lynn
This article discusses how interactive media threaten informational privacy, especially in a legal environment that fails to protect individuals’ right to receive and use content without being scrutinized by private and government institutions.The article observes that as information about media consumption habits make up an increasingly large share of the stock of data that institutions can use in order to make inferences about individuals, it becomes increasingly more difficult for individuals to determine which types of behaviors would cause them to be assigned to a high-risk category. In the light of this observation, the article concludes by proposing that in order to address the uncertainty that individuals face in trying to figure out how institutions use personal information to categorize them into different risk groups, a privacy protection scheme that increases the accountability of these automated and manual interpretation processes is needed.
Synopsis from Lemi Baruh’s Read at your own risk: shrinkage of privacy and interactive media from the journal New Media & Society. Previously from WNM: Google’s Web History: Your search history and the privacy you willingly give away.
For high school principal Eric Trosch, the abuse just keeps coming. We reported earlier this week how Trosch, a Pennsylvania school administrator, became the target of fake MySpace profiles back in 2005, profiles that accused the man of everything from having sex with his students to rolling doobies in his spare time. The whole fiasco ended with one of the students suing Trosch in federal court after being placed in an alternative education program, and Trosch filing his own lawsuit this week against the students responsible. But the profiles keep on coming—a new one was recently erected in Trosch’s name on LinkedIn.
Read this item from Ars Technica
He publicized a vulnerability in a system called Tor, which facilitates anonymous Web surfing and online publishing. Used by political dissidents, journalists, and people who just want additional privacy, Tor routes Internet traffic through a special network of protected servers run by thousands of volunteers….Moore has said that he decided to launch this attack on Tor because he suspects that child pornographers are using the anonymous network to hand out kiddie porn. But it’s also more than that. Via e-mail, he told me, “If anything, I want my demonstration site to serve as a warning for anyone who believes their Web traffic is actually anonymous.”
Read Annalee Newitz’ Exploiting the Code from Alternet
David Cancel, the CTO of the web market research firm Compete Incorporated, raised eyebrows at the Open Data 2007 Conference in New York when he revealed that many Internet service providers sell the clickstream data of their users. Clickstream data includes every web site visited by each user and in which order they were clicked. The data is not sold with accompanying user name or information, but merely as a numerical user value. However, it is still theoretically possible to tie this information to a specific ISP account.
Read this item from Ars Technica. Previously from WNM: Just me and my “clickprint”