According to recent academic and business research, there is an enormous wave of people on its way to adulthood that may very well take us by surprise. And while many …
Four kinds of privacy
Christopher Allen has posted on his interpretation of the four types of privacy and trust. His blog post is quite interesting and separates the definitions into defensive privacy, human-rights privacy, …
Gender, design and technology in Digital Design
Ann Light from Usability News has posted an article titled, Designers argue that Different Brains demand a Different Design Style for Women, based on a discussion at London?s ICA, which …
The Use vs. Intention of aggregated tools
An interesting article by Warren Harrison from IEEE titled, Whose Information Is It Anyway?, comments on a presentation from ICSE 2003 (the International Conference on Software Engineering) which looked at …
Fake War photographs by LA Times
Brad Main from one of my Post-Graduate classes, commented on this cover article which was published in the Sydney Morning Herald last week. The article refered to a fake photograph …
Dystopian visions within IT?
There is an interesting article in NEXT this week in the Sydney Morning Herald titled, Look out for the butterflies by John Lenarcic. The article comments on professional responsibility, privacy, …