article thumbnail

6 Ways Emerging Technologies Are Set to Change the Use of Social Media

SocMed Sean

This is made possible by the use of metadata, which can recognize a face and then provide the details of a person from his or her social media profile. The only worry that many experts have is that some of these technologies might impact the privacy of the users of social media and leave their details open for unethical hackers to misuse.

article thumbnail

Bloggers Are Not Journalists – But They Are Abducted, Imprisoned Tortured and Assassinated the Same #HowManyMore

Laurel Papworth

It’s probably worth investigating the number of bloggers killed in the “Line of Duty”… Today, George Brandis Attorney General for Australia stated that “ bloggers are not journalists ” in regard to the #metadata debate (Government accessing Big Data vs Privacy debate). ” (Last month).

Blogger 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

With no metadata or search, shared drives become un-navigable. According to Seth Gottlieb , the Content Management and Collaboration Lead at Optaros , â??a Governance. Human Resources. Information Architecture. Internal Communications. Intranet 2.0. Knowledge Management. Multimedia. Technology Vendors. This Month. November 2006.

article thumbnail

The complete knowledge sharing guide. | lucasmcdonnell.com

Buzz Marketing for Technology

Collaboration (16). Why doesnt collaborative blog ranking exist? Collaboration. Categories. Announcements (26). Blogs (28). Business (22). Content Management (2). Intellectual Property (4). Knowledge Management (35). Memes (10). PayPerPost (1). Technology (28). Time Management (3). Writing (2). April 2008. March 2008.

RSS 100
article thumbnail

FedRAMP Certification: What Is It, Why It Matters, and Who Has It

Hootsuite

the flow of information and metadata. Confidentiality: Protections for privacy and proprietary information. For “systems that are low risk for uses like collaboration tools, project management applications, and tools that help develop open-source code.” Spend time accurately defining your boundary.

article thumbnail

Computer Security for NGOs

Little Web Giants

It’s a scary situation: On the one hand it seems almost impossible to protect our privacy and safety online, and on the other, we simply can’t get by without our devices. I believe all individuals and private organisations have a fundamental right to data privacy and security. Why is Understanding Computer Security Important for NGOs?

article thumbnail

Computer Security for NGOs

Little Web Giants

It’s a scary situation: On the one hand it seems almost impossible to protect our privacy and safety online, and on the other, we simply can’t get by without our devices. I believe all individuals and private organisations have a fundamental right to data privacy and security. Why is Understanding Computer Security Important for NGOs?