Southern Appalachian Digital Collections

Western Carolina University (21) View all

Western Carolinian Volume 68 Number 09

items 12 of 28 items
  • hl_westerncarolinian_2004-03_vol68_no09_12.jpg
Item
?

Item’s are ‘child’ level descriptions to ‘parent’ objects, (e.g. one page of a whole book).

  • MUSEUM: In 24 Hour Psycho, part of Scottish artist Douglas Gordons show at the Hirshhorn, the Alfred Hitchcock film takes a full day to run. In his most famous works, Gordon takes Hollywood movies and manipulates them to make their mechanisms show. The implication is that it's not only Gordon's wacky artists world that turns out to be a constructed fiction, but also some chunk of the world we all live in. (Photo courtesy of Lee Stalsworth | Hirshhorn Museum and Sculpture Garden; collection of Kunstmuseum Wolfsburg) New Services Are Minding Your Business By Leslie Walker | The Washington Post Admiral John Poindexter must be irked. The furor over his Total Information Awareness surveillance plan helped trigger his departure from the Pentagons research agency last year. Now entrepreneurs are selling new data-mining tools that do similar things on a smaller scaleand venture capitalists are hurling money at them. The new tools are business cousins of Friendster and the other social-networking sites that took the Net by storm last year, helping people set up electronic networks of friends. But like Poindexters ill-fated schemea massive plan that would have allowed the creation of electronic dossiers on millions of Americans to sniff out potential terroriststhe business-networking tools raise prickly privacy issues. Rather than creating simple electronic Rolodexes, business-networking tools go deeper. They aim to help companies make faster sales by identifying and mining electronic new-boy networks of personal contacts. They help professionals get introductions to people they dont know, relying on mathematical formulas to analyze data crumbs left by peoples electronic communications. On the surface, products from start-ups such as Visible Path Corp. and Spoke Software Inc. may seem helpful and innocuous, but in the background many users may have no idea how much data is being mined. I was stunned when I signed onto Spokes network for the first time this week and searched for my name. Up came an eight-year-old photograph of me, accompanied by a 150-word profile that I had hastily written years ago. It sits on an old Web page that is no longer publicly linked on The Washington Posts Web site. My dossier also linked to five seemingly random articles I wrote in years past. When I searched on other peoples names, it showed me their dossiers, too, along with a list of people who presumably had in their contact lists both my e-mail address and those of my search targets. What I found interestingand chillingwas how automated this obviously was, considering I gave Spoke no information except my e-mail address when I signed up. Vendors seem acutely aware of the potential to invade privacy, especially since some of their tools do massive snooping on both internal corporate networks and the public Web to generate dossiers of people who never signed up to participate. We have hired a privacy officer to address these concerns, said Ben Smith, chief executive of Spoke, based in Palo Alto, Calif. And if you want to be off our system, we have a process that allows you to opt out. So far we have removed two out of the 15 million people on our network. You read that right: 15 million people have been identified so far by Spokes automated profiler. Thats a lot, considering Spoke went live in October 2002. Both Spoke and Visible Path sell their software primarily to corporations, not individuals. The idea is to provide tools for finding helpful business partners and making blind introductionsallowing, say, a lawyer for Silly Computers Inc. to electronically ask a former classmate from Harvard who once did legal work for Microsoft to help him pitch a business deal to Bill Gates. The introduction would be blind in the sense that the Silly Computer lawyer wouldnt know the identity of his former classmate. After comparing a gazillion electronic address books, the software would identify someone who had swapped e-mail with Gates and also had a career overlap with the lawyer. It would offer to forward the lawyers message to his ex-classmate without telling the lawyer the intermediarys name. If the potential upside is that the tools help workers squeeze more out of everyone theyve met and make new contacts, the potential downside is, well, the same. A world in which salespeople are using higher-powered electronic networking tools would inevitably be a world in which more pushy people engage in more intrusive behavior. Both Spoke and Visible Path say they provide controls to let users decide how much personal information they want to be visible across the network. How does it work? Both Spoke and Visible Path send crawlers around a corporations internal computer networksniffing telltale clues, say, from employee Outlook files about who they e-mail and how often, who replies to particular messages and who doesnt, which names show up in electronic calendars and phone logs. Then it cross-references those snippets with information from other company databases, including sales records from PeopleSoft and SalesForce.com. Smith said he wasnt a believer when someone first proposed the idea to him. I told them I thought it was goofy. That was before Sept. 11, 2001. Afterward, Smith found himself doing work for national security agencies that involved data trails left by terrorists. One glimpse of a massive map of electronic connections among suspected terrorists changed his mind. I saw you could make amazing things happen, he recalled. No doubt thats true, but lets hope the truly amazing part doesnt turn out to be some data-Chernobyl, triggered by even more aggressive relationship-mining tools that wind up humiliating rather than helping people. And by the way, does anyone believe Poindexters plan is really dead? Lsli Walker's e-mail address is walkerl@washpost.com. 2004 The Washington Post we_news@email .wcu.edu Free Credit Reports That Cost You Your Privacy By Don Oldenburg | The Washington Post You know those online privacy policy statements most of us scan or skip totally? The legal gibberish defining to what extent a company gives out or peddles the personal and financial information you provide when making an online purchase? A reader from Severna Park, Md., who is also a careful reader of such privacy disclosures, e-mailed to say that last weeks column, in warning about the proliferation of flashy commercial Web sites offering free credit reports, neglected to mention another reason to be wary. T believe you missed a critical gotcha, he writes. As reported, most of those offers come with a catch that could end up costing you more than the standard $9 credit-report fee. Ordering one typically requires signing up for a 30-day free trial of a credit monitoring service that supposedly keeps tabs on your credit history and alerts you when there are changes or if something fishy is going on. One online firm promotes its monitoring service with, Once you ve tried it, you wont want to be without it! That may be true for some consumers. But what many customers tempted by the free report miss is that if they dont cancel within the trial period, their credit card is automatically charged for a one-year subscription to the service$40 to $80. And the other gotcha: There is an even higher price, the reader says. Reading the privacy disclosure information, I was surprised that you were agreeing to let them use everything in your credit report for marketingby them, by their affiliated companies and by others. Bad enough that many privacy policies state that they re going to share your name, address, phone, Social Security number, birth date, even credit-card number for marketing purposestresulting in more junk mail, spam and telemarketing calls (yes, even if you signed on to the federal Do Not Call Registry, because now you have a business relationship). But the free-reports companies have the whole enchiladayour entire credit report. I certainly do not want everything in a credit report going into a marketers database, says the reader. A random sampling of a dozen policy statements on sites offering free credit report deals found a mix of privacy policies. Most promote vigilance in protecting personal data while disclosing they use and share customer info for marketing. A few offer complete opt-outs. Still others look like privacy sieves. One sites chilling statement put it this way: We may disclose any of the information that we collect to our affiliated companies. We do not share information with any non-affiliated third party except in select circumstances. ... In addition, we may disclose all of the information we collect to companies that perform services on our behalf such as the credit reporting agencies ... credit card processors, e-mail communications management firms or call center providers. Lesson: Read privacy disclosures before doing a transaction online or offand opt-out of any of it whenever you can. And heres a timely wake-up call: The reader says that after carefully combing the privacy statement of a popular tax software program a year ago while filing his federal tax return online, he was slack-jawed at how vulnerable even his private tax data was. ; Beating Fax Spams? After reading the Jan. 27 column on fax spams, Silver Spring, Md., reader Jen Cromwell wrote asking for help. We have a fax machine but not a dedicated fax line. We plug in the fax when we know someone has to fax us something, she says. Several months ago, we began receiving calls in the middle of the night. A fax machine was trying to connect to our number. Cromwell says the annoyance repeatedly woke her family up. One night she tried plugging in the machine to get the fax, hoping to call the required-by-law phone number and stop the faxes. But it was a Nigerian scam fax with no phone number. When she called Verizon for help, it said it could only block calls from local numbers and this fax isnt local. Any suggestions? she pleads. This ones open to readers: Any solutions to the middle- of-the-night fax blues out there? 2004 Washington Post 299 Se ee orn em
Object
?

Object’s are ‘parent’ level descriptions to ‘children’ items, (e.g. a book with pages).