Technocreep

Home > Other > Technocreep > Page 28
Technocreep Page 28

by Thomas P. Keenan


  292. LinkedIn. “Our New User Agreement and Privacy Policy,” September 12, 2013, accessed at http://blog.linkedin.com/2013/08/19/updates-to-linkedins-terms-of-service/

  293. Cluely, Graham. “Shameful and creepy. LinkedIn opens its doors to kids as young as 13 years,” blog posting, August 20, 2013, accessed at http://­grahamcluley.com/2013/08/linkedin-kids-13-years-old/

  294. Rivlin, Jack. “LinkedIn is signing up children–it’s official, we’ve ruined childhood,” August 21, 2013, accessed at http://blogs.telegraph.co.uk/technology/jackrivlin/100009930/linkedin-is-signing-up-children-its-official-weve-ruined-childhood/

  295. Canadian Press. “Facebook considering opening site to preteens,” CBC News, October 22, 2013, accessed at http://www.cbc.ca/news/technology/facebook-considers-opening-site-to-preteens-1.2158439

  296. Oliver, Gabriel. “The 5 Most Unsettling Disney Theme Park Easter Eggs,” July 1997, accessed at www.cracked.com/article_19977_the-5-most-unsettling-disney-theme-park-easter-eggs.html

  297. Sato, Munehiko, et al. “Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects,” May 5, 2012, accessed at http://www.disneyresearch.com/wp-content/uploads/touchechi2012.pdf

  298. Disney Research. “Inshin-Den-Shin, Transmitting Sound Through Touch,” story and video, n.d., accessed at http://www.disneyresearch.com/project/ishin-den-shin/

  299. Weiser, M. “The computer for the 21st century.” Scientific American, (9)September 1991, pp. 94-104.

  300. McMahon, Tamsin. “Open secrets online: What’s personal and what’s corporate?,” Macleans, March 8, 2014, accessed at http://www.macleans.ca/economy/business/open-secrets-3/

  301. Chan, Sewell. “Leona Helmsley’s Unusual Last Will,” New York Times City Room blog posting, August 29, 2007, accessed at http://cityroom.blogs.nytimes.com/2007/08/29/leona-helmsleys-unusual-last-will/

  302. Associated Press. “Trouble, the millionaire Maltese, dies,” The Guardian, June 9, 2011, accessed at http://www.theguardian.com/world/2011/jun/09/trouble-millionaire-maltese-dies

  303. Jermyn, Diane. “How to write a ‘fur kid’ into your will,” Globe and Mail, July 31, 2012, accessed at http://www.theglobeandmail.com/globe-investor/personal-finance/financial-road-map/how-to-write-a-fur-kid-into-your-will/article4449089/

  304. http://www.formalwill.ca/will-products-canada

  305. Horn L, et al. “The Importance of the Secure Base Effect for Domestic Dogs–Evidence from a Manipulative Problem-Solving Task,” PLoS ONE 8(5): e65296.

  306. Miller, Greg A. Going … Going … Nuts!: The Story Had to Be Told, 2004, PublishAmerica, Frederick, MD.

  307. http://www.improbable.com/ig/winners/#ig2005

  308. Google. “Google Voice Expands to new Markets,” blog posting, April 1, 2012, accessed at http://googlevoiceblog.blogspot.ca/2012/04/google-voice-expands-to-new-markets.html

  309. Garber, Megan. “Animal Behaviorist: We’ll Soon Have Devices That Let Us Talk With Our Pets,” The Atlantic, June 4, 2013, accessed at http://www.theatlantic.com/technology/archive/2013/06/animal-behaviorist-well-soon-have-devices-that-let-us-talk-with-our-pets/276532/

  310. Ibid.

  311. BBC. “World: Americas: Furby toy or Furby spy?” January 13, 1999, accessed at http://news.bbc.co.uk/2/hi/americas/254094.stm

  312. Assange, Julian. Cypherpunks: Freedom and Future of the Internet. New York: OR Books, 2012.

  313. Hoover, Dwayne. “6 Things You Won’t Believe Got Banned by Modern Governments, cracked.com, May 12, 2011, accessed at http://www.cracked.com/article_19192_6-things-you-wonE28099t-believe-got-banned-by-modern-governments.html

  314. Furby Central. “Furby Cheats,” blog posting, n.d., accessed at http://www.virtualpet.com/vp/farm/furby/furby.htm

  315. Mimitchi.com. “What does ‘Kitty Kitty’ mean?,” blog posting, n.d, accessed at http://www.mimitchi.com/html/ffaq4.htm

  316. BBC. “Disposing of a Furby,” blog posting, n.d., accessed at http://www.bbc.co.uk/dna/place-london/plain/A71641

  317. Silvanovich, Natalie. “What Will the Tamagotchi Become? and Other Questions of Tamagotchi Life,” blog posting, n.d., accessed at http://www.kwartzlab.ca/2013/06/what-will-tamagotchi-become-and-other-questions-tamagotchi-life/

  318. Brewster, Signe. “Cyborg insects could map collapsed buildings for first responders,” Gigaom, October 16, 2013, accessed at http://gigaom.com/2013/10/16/cyborg-insects-could-map-collapsed-buildings-for-first-responders/

  319. Backyard Brains. “The Roboroach,” n.d., accessed at https://backyardbrains.com/products/roboroach

  320. Lockwood, Jeffery. Six-Legged Soldiers: Using Insects as Weapons of War. New York: Oxford University Press, 2009.

  321. Edwards, Lin. “Cyborg beetles to be U.S. military’s latest weapon (w/Video),” phys.org, October 15, 2009, accessed at http://phys.org/news174812133.html

  322. Brandon, Elicia. “Jules Says Goodbye,” video, YouTube, November 20, 2006, accessed at http://www.youtube.com/watch?v=xRR33WDFi_k

  323. Annie. “US Army Robots Will Outnumber Human Soldiers in a Decade,” blog posting, November 25, 2013, accessed at http://news.filehippo.com/2013/11/us-army-robots-will-outnumber-human-soldiers-in-a-decade/

  324. NIMA TV. “Android brothels: robot prostitutes could replace humans by 2050,” YouTube, April 23, 2012.

  325. Yeoman, Ian, Mars, Michelle. “Robots, Men and Sex Tourism,” Futures, 44(2012)pp. 365-371, Elsevier, 2011.

  326. YouGov. “Omnibus Poll,” February 20-21, 2013, accessed at http://big.assets.huffingtonpost.com/toplinesbrobots.pdf

  327. Blain, Loz. “[NSFW] Realtouch Interactive: Remote sex is no longer a thing of the future (Part 2),” gizmag, May 30, 2013, accessed at http://www.gizmag.com/realtouch-interactive-remote-sex-teledildonics/27441/

  328. Efee Link. “App Controlled Interactive Sex Toys for Long Distance Lover Over the Internet,” https://www.youtube.com/watch?v=RymJS60xGlo

  329. Ikeda, Hayato. “VR Tenga Demo (1): Oculus Rift + Novint Falcon + Tenga,” accessed at http://www.youtube.com/watch?v=nLXVinyXjgA

  330. Lin, Patrick, et al. Robot Ethics. Cambridge, MA: MIT Press.

  331. Turkle, Sherry. “Sociable Robots,” talk at 2013 AAAS meeting, video, at 54:30, accessed at http://www.solvingforpattern.org/2013/02/17/sherry-turkle-aaas-talk-on-sociable-robotics/

  332. Erick Schonfeld. “Eric Schmidt Tells Charlie Rose Google Is ‘Unlikely’ To Buy Twitter And Wants To Turn Phones Into TVs,” TechCrunch, March 7, 2009, accessed at http://techcrunch.com/2009/03/07/eric-schmidt-tells-charlie-rose-google-is-unlikely-to-buy-twitter-and-wants-to-turn-phones-into-tvs/

  333. Champeau, Rachel. “UCLA study finds that searching the Internet increases brain function,” UCLA Newsroom, October 14, 2008, accessed at http://newsroom.ucla.edu/portal/ucla/ucla-study-finds-that-searching-64348.aspx

  334. Small, Gary, Vorgan, Gigi. iBrain: Surviving the Technological Alteration of the Modern Mind, New York: Harper Collins, 2008.

  335. http://money.cnn.com/2013/04/08/technology/security/shodan/index.html

  336. Chazan, M, et al. “Microstratigraphic evidence of in situ fire in the Acheulean strata of Wonderwerk Cave, Northern Cape province, South Africa,” PNAS 2012 109 (20) E1215–E1220.

  337. Nissenbaum, Helen. “Privacy as Contextual Integrity,” 79 Wash. Law Review, 119 (2004) pp. 119-157.

  338. Madrigal, Alexis C. “The Philosopher Whose Fingerprints Are All Over the FTC’s New Approach to Privacy,” The Atlantic, March 29, 2012, accessed at http://www.theatlantic.com/technology/archive/2012/03/the-philosopher-whose-fingerprints-are-all-over-the-ftcs-new-approach-to-privacy/254365/

  339. Bilton, Nick. “Girls Around Me: An App Takes Creepy to a New Level,” New York Times, March 30, 2012, accessed at http://bits.blogs.nytimes.com/2012/03/30/girls-around-me-ios-app-takes-creepy-to-a-new-level/

  340. Jentsch, Ernst Anton. “On the Psychology of the Uncanny,” Psychiatrisch-Neurologische Wochenschrift 8.22 (25 Aug. 1906): 195-98 and 8.23 (1 Sept. 1906): 203-
05, translated by Roy Sellars, accessed at http://art3idea.psu.edu/locus/Jentsch_uncanny.pdf

  341. Colon, Alex. “Foursquare and the future of check-ins,” Gigaom, March 19, 2014, accessed at http://gigaom.com/2014/03/19/foursquare-and-the-future-of-check-ins/

  342. Perez, Sarah. “Social Travel App Jetpac Ditches Facebook, Pivots To Instagram-Based ‘City Guides’ For At-A-Glance Recommendations,” TechCrunch, December 5, 2013, accessed at http://techcrunch.com/2013/12/05/social-travel-app-jetpac-ditches-facebook-pivots-to-instagram-based-city-guides-for-at-a-glance-recommendations/

  343. Ackerman, Spencer, Ball, James. “Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ,” The Guardian, February 28, 2014, accessed at http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo

  344. Canada Research Chair in Electronic Health Information, accessed at http://www.chairs-chaires.gc.ca/chairholders-titulaires/profile-eng.aspx?profileID=1690

  345. Teotonio, Isabel. “Canadian woman denied entry to U.S. because of suicide attempt,” Toronto Star, January 29, 2011, accessed at http://www.thestar.com/news/gta/2011/01/29/canadian_woman_denied_entry_to_us_because_of_suicide_attempt.html

  346. Bradley, Simon, “Whistleblowers and Spying Experts Talk Privacy,” Swiss Broadcasting Corporation, October 1, 2013, accessed January 15, 2014 at www.swissinfo.ch/eng/whistleblowers-and-spying-experts-talk-privacy/37016178

  347. Sanger, David E., and Shanker, Thom. “N.S.A. Devises Radio Pathway Into Computers,” New York Times, January 14, 2014, accessed January 15, 2014 at http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html

  348. Leafkiller, et al. “How to See Who Views Your Facebook Profile the Most,” WikiHow, n.d., accessed at http://www.wikihow.com/See-Who-Views-Your-Facebook-Profile-the-Most

  349. http://www.unfriendfinderfacebook.com

  350. http://www.eyelock.com/index.php/products/myris

  351. Monks, Kieron. “The guns that know who is firing them: Can smart tech make firearms safer?,” CNN, March 26, 2014, accessed at http://edition.cnn.com/2014/03/26/tech/innovation/smart-guns-know-whos-firing/index.html?hpt=hp_c6

  352. Phillips v. Telus Corp., 2002 BCPC 499, in which Lila Dawn Phillips was awarded damages of one dollar because her phone company refused to accept payment of her bill in cash at its retail outlet.

  353. Slade, Daryl. “Accused killer searched ‘how to dissolve a body’,” Calgary Herald, December 11, 2013, p. A8.

  354. Barbaro, Michael, Zeller, Tom Jr. “A Face Is Exposed for AOL Searcher No. 4417749,” New York Times, August 9, 2006, accessed at http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=2&

  355. http://www.priv.gc.ca/cf-dc/2014/2014_001_0114_e.asp

  356. http://classactiondefense.jmbm.com/pineda_class_action_defense_cal.pdf

  357. Mabe, Tom. “The Angel of Death cemetery prank call,” n.d., accessed at https://www.youtube.com/watch?v=oLnQXmkR3dI

  358. Schwartz, John. “Consumers Finding Ways to Zap Telemarketer Calls,” New York Times, December 18, 2002, accessed January 15, 2014 at http://www.nytimes.com/2002/12/18/business/consumers-finding-ways-to-zap-telemarketer-calls.html?src=pm

  359. Bradford University. “Can Tattoos Cause Harm?,” accessed January 15, 2014 at http://www.bradford.ac.uk/about/news/tattoo-risk/?bnr.

  360. Tattoo Archive. “Identification,” accessed January 15, 2014 at http://www.tattooarchive.com/tattoo_history/identification.html

  361. FBI. “Image-Based Matching Technology Offers Identification and Intelligence Prospects,” accessed January 15, 2014 at http://www.fbi.gov/about-us/cjis/cjis-link/december-2012/Image-Based%20Matching%20Technology%20Offers%20Identification%20and%20Intelligence%20Prospects

  362. Rebuttal evidence in re: California v. Michael Joe Jackson, accessed January 15, 2014 at http://www.sbscpublicaccess.org/docs/ctdocs/052505pltmotchandler.pdf

  363. Bhardwaj, Julian. “What is your phone saying behind your back?,” Naked Security, October 2, 2012, accessed January 15, 2014 at http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/

  364. http://www.cockeyed.com/ebay/safeway_card/ebay_copy.html

  365. Terdiman, Daniel. “Gaming the Safeway Club Card,” Wired, July 11, 2003, accessed at http://www.wired.com/techbiz/media/news/2003/07/59589

  366. www.directlabs.com, accessed January 15, 2014.

  367. As countless presenters have declared in their slide decks: IANAL/IANYL–“I am not a lawyer/I am not your lawyer.”

  368. New York Law, ypdcrime.com, n.d., accessed at http://ypdcrime.com/penal.law/article190.htm

  369. http://www.howtogetitincanada.com/how-to-get-the-us-version-of-itunes-in-canada/

  370. Rayman, Graham. “Ken Tarr Launches a Hoax Campaign on an Industry Immune to Shame,” Village Voice, June 5, 2013, accessed January 15, 2014 at www.villagevoice.com/2013-06-05/news/ken-tarr-reality-tv/full/

  371. Applebaum, Yoni. “How the Professor Who Fooled Wikipedia Got Caught by Reddit,” The Atlantic, May 15, 2012, accessed January 15, 2014 at www.theatlantic.com/technology/archive/2012/05/how-the-professor-who-fooled-wikipedia-got-caught-by-reddit/257134/

  372. www.reddit.com/r/AskReddit/comments/sxkig/opinions_please_reddit_do_you_think_my_uncle_joe/c4htt9n

  373. Hansell, Saul. “TiVo is Watching When You Don’t Watch, and It Tattles,” New York Times, July 26, 2006, accessed January 15, 2014 at http://www.nytimes.com/2006/07/26/technology/26adco.html?ex=1311566400&en=143cb4893c1c45a9&ei=5090&partner=rssuserland&emc=rss

  374. Watson, Julie. “Cecilia Abadie, California Motorist, Cleared In Google Glass Case,” January 16,2014, accessed January 18, 2014 at http://www.huffingtonpost.com/2014/01/16/cecilia-abadie_n_4613257.html

  375. Ball, James. “NSA collects millions of text messages daily in ‘untargeted’ global sweep,” The Guardian, January 16, 2014, accessed January 16, 2014 at www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep

  376. www.007voip.com/

  377. Schneier, Bruce. “How the NSA Attacks TOR/Firefox Users with QUANTUM AND FOXACID,” October 7, 2013, accessed at www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html

  378. http://getnarrative.com/

  379. Google, Inc. “Introducing our smart contact lens project,” Google Official Blog, January 16, 2014, accessed at http://googleblog.blogspot.com/2014/01/introducing-our-smart-contact-lens.html

  380. Prey. “Amazing creativity: Use Prey to Track Your Bike,” The Prey Blog, n.d., accessed at http://preyproject.com/blog/2012/09/amazing-ingenuity-using-prey-to-track-your-bicycle

  381. Huffington Post UK. “‘Brainless Thief’ Steals Phone Then Uploads Selfie To Whatsapp,” Huffington Post UK, January 23, 2014, accessed at http://www.huffingtonpost.co.uk/2013/10/13/brainless-thief-steals-phone-uploads-selfie-whatsapp_n_4094357.html

  382. Associated Press, “New York City man sets dating app honey trap to recover iPhone,” January 5, 2013, accessed January 15, 2014 at http://www.cbc.ca/news/world/nyc-man-sets-dating-app-honey-trap-to-recover-iphone-1.1304693

  383. In re: Google Cookie Placement Consumer Privacy Litigation, 12-md-02358, U.S. District Court, District of Delaware (Wilmington).

  384. Sons of Maxwell. “United Breaks Guitars,” YouTube, July 6, 2009, accessed at http://www.youtube.com/watch?v=5YGc4zOqozo

  385. Pfeiffer, Eric. “Woman gets $3,500 fine and bad credit score for writing negative review of business,” Yahoo! News, November 15, 2013, accessed at http://news.yahoo.com/woman-gets–3-500-fine-and-bad-credit-score-for-writing-negative-review-of-business-233833012.html

  386. tripper61PA. “Skyauction Scam,” Tripadvisor.com, June 28, 2011, accessed at http://www.tripadvisor.ca/ShowTopic-g499445-i9177-k4596925-Skyauction_Scam-Akumal_Yucatan_Peninsula.html

  387. http://nyc2600.net/about

  388. https://defcon.org/html/defcon-21/dc-21-speakers.html#Keenan

  389. http://www.blackhat.com/asia-14/br
iefings.html#Keenan

  390. https://www.defcon.org/html/defcon-21/dc-21-vendors.html

 

 

 


‹ Prev