Week #14 – Data Leak
–Originally published at SmartCitizens Is awesome how arond the course we had been arguing about were we are when we talk about the technology, in
A Connected Course
–Originally published at SmartCitizens Is awesome how arond the course we had been arguing about were we are when we talk about the technology, in
–Originally published at Smart Citizens – Medium All social media applications should be clear about how they use their user’s information, it is known that
–Originally published at Smart Citizens A lot of people, specially parents, keep saying things like take care, why do you have so many friends in
–Originally published at We R Smart Citizens First of all, I present the evidence of the ECOA answering: On the other hand, I will write
–Originally published at We R Smart Citizens This post will talk about some more details about well known cases in violation of privacy. It is
–Originally published at We R Smart Citizens As I was, once again, reading about news for smart cities, I came across many of them using
–Originally published at SmartCitizens – Julia's Blog Inverse Surveillance happens when those who are usually watched begin watching their watchers. The Inverse Surveillance Project was created
–Originally published at CB00881 – Smart Cities – Building Software This is my fourth class with Ken as my teacher (I’ve taken Software Engineering, Software
–Originally published at SmartCitizens – Julia's Blog Times have changed since the introduction of the Internet, specially social media. It has become an indispensable tool
–Originally published at Smart Cities – Software engineering Woaaa this post was so interesting! maybe because I like “conspiracy” things. To understand why this whole