Increased police monitoring of young people leads to more school discipline referrals and arrests, typically of Black and Latino youth.
When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video.
Have you ever felt a creeping sensation that someone’s watching you? Then you turn around and you don’t see anything out of the ordinary. Depending on where you were, though, you might not have been completely imagining it.
Houses are getting smarter: smart thermostats manage our heating, while smart fridges can monitor our food consumption and help us order groceries. Some houses even have smart doorbells that tell us who is on our doorstep.
Many people think of privacy as a modern invention, an anomaly made possible by the rise of urbanization. If that were the case, then acquiescing to the current erosion of privacy might not be particularly alarming.
Scholars disagree about whether the formerly whites-only neighbourhoods of Johannesburg, South Africa’s largest and most economically important city, have become substantially desegregated since the end of apartheid in 1994
Pursuing master’s and doctoral degrees may help people improve their careers and help bring about changes in society, ranging from human rights protection, environmental conservation and gender equality to religious, racial and cultural solidarity.
There are the obvious examples: fingerprint scanners that unlock doors and facial recognition that allows payment through a phone. But there are other devices that do more than read an image — they can literally read people’s minds.
A new conceptual model depicts the complex relationship between policing and population health.
Most participants in a recent study had no idea that their email addresses and other personal information had been compromised in an average of five data breaches each.
The wearable technology market is booming, with half a billion wearables sold globally in 2020. Apps on these devices, or the devices themselves, often claim to monitor our health to spot illnesses, track our workouts to help us reach our fitness goals, or keep an eye on
The destination of stolen data depends on who is behind a data breach and why they’ve stolen a certain type of data.
The best way to reduce crime in the future is probably what caused it to drop in the first place: helping our families, neighborhoods, and schools raise kids who are respectful of others and don't need to steal to get by
Police academies provide little training in the kinds of skills necessary to meet officers’ growing public service role, according to my research.
Hackers and cybercriminals place a high premium on our mobile phone numbers – with which they can do a lot of damage with very little effort.
If you hear “This call is being recorded for training and quality control,” it isn’t just the customer service representative they’re monitoring.
In 1915, Gabrielle Darley killed a New Orleans man who had tricked her into a life of prostitution. She was tried, acquitted of murder and within a few years was living a new life under her married name, Melvin.
Who owns your face? Of course, a silly question … right? But what about the data generated from your face? And what does it mean to have your face become data?
In recent years, the most popular gadgets sold on Amazon have included a variety of smartphones, wearable tech, tablets, laptops and digital assistants such as Amazon’s Echo Dot. But any device connected to the internet (including almost all of the above) exposes our personal data to a host of threats.
Thomas Hobbes recognized almost four centuries ago, if everyone just does what they please, no one can trust anyone. We end up with chaos, uncertainty and a “war of all against all.”
As the ongoing pandemic has a larger segment of the population working from home — with all of its attendant distractions — and the setting is ripe for exploitation. The humble home router has become the surface attack...
Page 1 of 16