The University of British Columbia
UBC - A Place of Mind
The University of British Columbia Vancouver campus
Digital Tattoo: Your digital identity matters. Let’s discuss.
  • Home
  • Tutorials
    • Privacy and Surveillance
    • Academic and Professional Life
    • Copyright and Open Access
  • Quizzes
  • Teaching Resources
  • About
  • Team

» Home » Jason Cheung

Jason Cheung

Jason Cheung

National Digital Identification – Potential Benefits and Risks [Part 2/2]

National Digital Identification – Potential Benefits and Risks [Part 2/2]

By Jason Cheung on May 30, 2019 | Tagged with biometric data, Digital identity, Government Control, identification, online identity

In the previous section, we looked at the concept of national digital identity, as well as what national digital identification looks like in countries around the world. In this section, we will discuss the potential benefits and risks that come with the implementation of national digital identification programs. What are the Potential Benefits of National […]

Read More | No Comments

National Digital Identification – What does National ID Look Like Around the World? [Part 1/2]

National Digital Identification – What does National ID Look Like Around the World? [Part 1/2]

By Jason Cheung on May 23, 2019 | Tagged with biometric data, Digital identity, Government Control, identification, online identity

Countries around the world are implementing digital solutions for identifying their citizens and residents. However, the benefits of using national digital identification systems are also met with risks. In this post, we will discuss forms of identification look like, and pose questions around opportunities and pitfalls of its use. What is Identity? First of all, […]

Read More | No Comments

A Model for Your Data Double: What Your Behaviour Tells Algorithms

A Model for Your Data Double: What Your Behaviour Tells Algorithms

By Jason Cheung on May 7, 2019 | Tagged with algorithms., Data, Data Collection, Data Ownership, Panoptykon, personal data

Have you thought about the impacts of your actions while online? Maybe you have deleted a post that you made in error, or accidentally clicked on an ad while browsing the web. Although these actions were accidental to you, they may have been perceived as intentional actions that characterize your online identity to an algorithm […]

Read More | No Comments

In the News: Mozilla’s 2019 Internet Health Report

In the News: Mozilla’s 2019 Internet Health Report

By Jason Cheung on April 30, 2019 | Tagged with internet, mozilla

Mozilla released their third annual report on the state of the internet and its impact on global society [1]. They asked the following five questions about the internet and identified both positive and negative trends since their report in 2018: Is it safe? How open is it? Who is welcome? Who can succeed? Who controls […]

Read More | No Comments

Voice as Identity: Rising Use of Vocal Biometrics

Voice as Identity: Rising Use of Vocal Biometrics

By Jason Cheung on April 24, 2019 | Tagged with biometric data, Digital identity, identity theft, surveillance

In this blog post, we will look at: What are voice biometrics? Why would companies want to start using voice biometrics? Are there risks in using voice biometrics? We may be becoming more familiar, and even more comfortable, with using biometric identifiers for authentication or security keys. A common usage of a type of biometric […]

Read More | 1 Comment

Recourse for Hacked Data – Part 2

Recourse for Hacked Data – Part 2

By Jason Cheung on April 9, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data

In this second half, we will look at: Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account Critical perspectives Are there adequate consequences for information fiduciaries if they expose my data? The difficulty in establishing liability […]

Read More | 1 Comment

Recourse for Hacked Data – Part 1

Recourse for Hacked Data – Part 1

By Jason Cheung on April 2, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data

In this two-part blog post, we will look at: What is an ‘information fiduciary’? What you should do when an information fiduciary you trust gets hacked? Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account What […]

Read More | No Comments

In the News: Government Malware Disguised as Android Apps

In the News: Government Malware Disguised as Android Apps

By Jason Cheung on April 2, 2019 | Tagged with anti-virus, Government Surveillance, Hacking, malware, privacy, smartphone, spyware, surreptitious, surveillance

A report by Vice News [1] published last week points to a report made by the cybersecurity group Security Without Borders [2] about Android malware that disguises itself as innocuous apps on Google’s Play Store. While disguising malicious software as harmless applications is not a technique that is new [3], the article published by Vice […]

Read More | No Comments

In the News: Researchers Create ‘Master Key’ Fingerprint to Fool Biometric Security

In the News: Researchers Create ‘Master Key’ Fingerprint to Fool Biometric Security

By Jason Cheung on March 19, 2019 | Tagged with biometric data, cybersecurity, fingerprint, In the News, personal data

Do you use fingerprints as part of the security of your mobile phone? If you think that the unique characteristics of your fingers provide adequate protection from unauthorized access to your personal information, read on! According to a report by TheNextWeb [1], researchers at New York University have created a set of master fingerprint keys […]

Read More | No Comments

In the News: WinRAR Users Threatened By Security Flaw

In the News: WinRAR Users Threatened By Security Flaw

By Jason Cheung on February 26, 2019 | Tagged with file compression, freeware, In the News, security flaw

According to a report by ZDNet [1], WinRAR, a popular Windows software for file compression and decompression, is at risk of a security flaw unless updated. Researchers at Check Point Software Technologies [2], a cybersecurity company, discovered a vulnerability in the .ACE file format of compressed files. WinRAR is well known for offering its software […]

Read More | No Comments

  • 1
  • 2
  • …
  • 4
  • Next

People said…

  • Jaclyn Fong on Your Privacy and AI Tools
  • Anonymous on Your Privacy and AI Tools
  • Jaclyn Fong on The Data Detox Challenge
  • Jaclyn Fong on Addictive by Design: How TikTok Keeps You Hooked
  • Jason on Addictive by Design: How TikTok Keeps You Hooked
Creative Commons License
Except where otherwise noted, this website is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Irving K Barber Learning Centre
Vancouver Campus
1961 East Mall
Vancouver, BC Canada V6T 1Z1
Email digital.tattoo@ubc.ca
Find us on
   
Back to top
The University of British Columbia
  • Emergency Procedures |
  • Terms of Use |
  • Copyright |
  • Accessibility