Author: The Conversation

Plot twists in the TikTok saga continue to emerge daily, with a proposed deal to secure the future of the video sharing platform in the United States now in doubt. Under the deal — which US President Donald Trump initially approved but now may not — US computer tech firm Oracle and retailer Walmart proposed a joint venture called TikTok Global, which would see customer data move to US-controlled infrastructure. https://twitter.com/BLaw/status/1308208656945688576? This venture would have allowed TikTok to continue operating in the US. Trump had earlier ordered TikTok to be removed from mobile app stores but enforcement of the order could be delayed if the Oracle-Walmart deal…

Read More

I have computer chips in my hands. The tiny (two millimetre by 12 millimetre) glass ampules are nestled just under the skin on the back of each of my hands and were implanted by a local body piercer several years ago. The chip in my right hand is a near-field communication device that I scan with an app on my smart phone to access and rewrite the information I have stored on it. It can contain a minuscule 888 kilobytes of data storage and only communicates with devices less than four centimetres away. In my left hand is a chip…

Read More

Facebook has announced the latest version of its successful standalone virtual reality (VR) headset, the Oculus Quest 2. The new device packs more computing power and a sharper screen than its predecessor, and is also US$100 cheaper. https://www.youtube.com/watch?v=ATVGl9wOJsM&feature=emb_logo Facebook’s Oculus Quest 2 is a powerful wireless VR headset for gaming and, Facebook hopes, much more. The Oculus Quest 2 is the latest step in Facebook’s long-term strategy of making VR more accessible and popular. Facebook recently brought all its VR work under the umbrella of Facebook Reality Labs, it has announced new applications like the Infinite Office VR workplace, and will also require a Facebook login for…

Read More

You might have seen a recent article from The Guardian written by “a robot”. Here’s a sample: I know that my brain is not a “feeling brain”. But it is capable of making rational, logical decisions. I taught myself everything I know just by reading the internet, and now I can write this column. My brain is boiling with ideas! Read the whole thing and you may be astonished at how coherent and stylistically consistent it is. The software used to produce it is called a “generative model”, and they have come a long way in the past year or two. But…

Read More

There is an urgent need to understand why people troll. Recent estimates show about one in three internet users have experienced online harassment. Across several research studies, I have attempted to construct the psychological profile of those who trolls to harm others. In my most recent study, I wanted to see if trolling could be linked to self-esteem. Do people troll because they have low self-worth? What is trolling? In scientific literature, internet trolling is defined as a malicious online behaviour, characterised by aggressive and deliberate provocation of others. “Trolls” seek to provoke, upset and harm others via inflammatory messages and posts. Trolling can refer to…

Read More

To enlarge a phone, or not to enlarge a phone? That is the question. In the world of flagship smartphones, there seems to be one clear trend: bigger is better. Manufacturers are trying to strip away anything that might stand in the way of the largest possible slab of screen. There is also growing demand for thinner phones with diminishing bezels (the area surrounding a screen). This trend has now culminated in the latest innovation in smartphone design, the foldable screen phone. These devices sport thin OLED self illuminating screens that can be folded in half. The newest release is the Samsung Galaxy Z fold 2…

Read More

iPhone users are about to receive access to Apple’s latest mobile operating system, iOS 14. It will come with the usual array of shiny new features, but the real game-changer will be missing – at least until January. For the first time, iOS 14 is to require apps to get permission from users before collecting their data – giving users an opt-in to this compromise to their privacy. This caused a major backlash from companies that rely on this data to make money, most notably Facebook. So why did Apple decide to jeopardise the business models of major rivals and their advertisers, and will…

Read More

Passwords have been used for thousands of years as a means of identifying ourselves to others and in more recent times, to computers. It’s a simple concept – a shared piece of information, kept secret between individuals and used to “prove” identity. Passwords in an IT context emerged in the 1960s with mainframe computers – large centrally operated computers with remote “terminals” for user access. They’re now used for everything from the PIN we enter at an ATM, to logging in to our computers and various websites. But why do we need to “prove” our identity to the systems we access? And why are…

Read More

As we all head back to school during a global pandemic, it’s a good time to ask whether students are learning the skills they need to keep themselves and their communities safe. Over the last decade, scholars, policy makers and citizens have been concerned about whether young people had the key skills they needed to survive and thrive in the digital economy. Canada, the United Nations and the World Economic Forum, among others, have developed position papers and programs aimed at promoting digital skills. Coding, in particular, has been promoted as an essential component of public education. Most public schools now teach students…

Read More

Passwords, by definition, are secrets. We use them to identify ourselves to systems and gain authorized access to places that other people are denied access to. Every online account is an identity, but only if it is reserved for the exclusive use of its owner. But when it comes to the passwords of children, grown-ups often pull rank, claim ownership and exercise authority without a moment’s hesitation. Breached accounts Over the past decade, there have been almost 10,000 data breaches involving personal information of all kinds, from financial transactions to health data. Data breaches are often enabled by the availability of…

Read More