Placeholder Content Image

Why do organisations still struggle to protect our data? We asked 50 professionals on the privacy front line

<p><em><a href="https://theconversation.com/profiles/jane-andrew-10314">Jane Andrew</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>; <a href="https://theconversation.com/profiles/dr-penelope-bowyer-pont-1550191">Dr Penelope Bowyer-Pont</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>, and <a href="https://theconversation.com/profiles/max-baker-25553">Max Baker</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p>More of our personal data is now collected and stored online than ever before in history. The rise of data breaches should unsettle us all.</p> <p>At an individual level, data breaches can compromise our privacy, cause harm to our finances and mental health, and even enable identity theft.</p> <p>For organisations, the repercussions can be equally severe, often resulting in major financial losses and brand damage.</p> <p>Despite the increasing importance of protecting our personal information, doing so remains fraught with challenges.</p> <p>As part of a <a href="http://www.doi.org/10.25910/psq3-q365">comprehensive study</a> of data breach notification practices, we interviewed 50 senior personnel working in information security and privacy. Here’s what they told us about the multifaceted challenges they face.</p> <h2>What does the law actually say?</h2> <p>Data breaches occur whenever personal information is accessed or disclosed without authorisation, or even lost altogether. <a href="https://www.abc.net.au/news/2024-06-20/optus-hack/104002682">Optus</a>, <a href="https://www.abc.net.au/news/2022-11-09/medibank-data-release-dark-web-hackers/101632088">Medibank</a> and <a href="https://www.afr.com/technology/canva-criticised-after-data-breach-exposed-139m-user-details-20190526-p51r8i">Canva</a> have all experienced high-profile incidents in recent years.</p> <p>Under Australia’s <a href="https://www8.austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/pa1988108/">privacy laws</a>, organisations aren’t allowed to sweep major cyber attacks under the rug.</p> <p>They have to notify both the regulator – the Office of the Australian Information Commissioner (OAIC) – and any affected individuals of breaches that are likely to result in “<a href="https://www8.austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/pa1988108/#:%7E:text=Whether%20access%20or%20disclosure%20would%20be%20likely%2C%20or%20would%20not%20be%20likely%2C%20to%20result%20in%20serious%20harm%2D%2Drelevant%20matters%20%C2%A0">serious harm</a>”.</p> <p>But according to the organisational leaders we interviewed, this poses a tricky question. How do you define serious harm?</p> <p>Interpretations of what “serious harm” actually means – and how likely it is to occur – vary significantly. This inconsistency can make it impossible to predict the specific impact of a data breach on an individual.</p> <p>Victims of domestic violence, for example, may be at increased risk when personal information is exposed, creating harms that are difficult to foresee or mitigate.</p> <h2>Enforcing the rules</h2> <p>Interviewees also had concerns about how well the regulator could provide guidance and enforce data protection measures.</p> <p>Many expressed a belief the OAIC is underfunded and lacks the authority to impose and enforce fines properly. The consensus was that the challenge of protecting our data has now outgrown the power and resources of the regulator.</p> <p>As one chief information security officer at a publicly listed company put it:</p> <blockquote> <p>What’s the point of having speeding signs and cameras if you don’t give anyone a ticket?</p> </blockquote> <p>A lack of enforcement can undermine the incentive for organisations to invest in robust data protection.</p> <h2>Only the tip of the iceberg</h2> <p>Data breaches are also underreported, particularly in the corporate sector.</p> <p>One senior cybersecurity consultant from a major multinational company told us there is a strong incentive for companies to minimise or cover up breaches, to avoid embarrassment.</p> <p>This culture means many breaches that should be reported simply aren’t. One senior public servant estimated only about 10% of reportable breaches end up actually being disclosed.</p> <p>Without this basic transparency, the regulator and affected individuals can’t take necessary steps to protect themselves.</p> <h2>Third-party breaches</h2> <p>Sometimes, when we give our personal information to one organisation, it can end up in the hands of another one we might not expect. This is because key tasks – especially managing databases – are often outsourced to third parties.</p> <p>Outsourcing tasks might be a more efficient option for an organisation, but it can make protecting personal data even more complicated.</p> <p>Interviewees told us breaches were more likely when engaging third-party providers, because it limited the control they had over security measures.</p> <p>Between July and December 2023 in Australia, there was an increase of <a href="https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2023">more than 300%</a> in third-party data breaches compared to the six months prior.</p> <p>There have been some highly publicised examples.</p> <p>In May this year, many Clubs NSW customers had their personal information potentially <a href="https://www.rimpa.com.au/resource/more-than-a-million-australian-data-records-potentially-exposed-in-nsw-club-and-pub-data-breach.html#:%7E:text=Outabox%2C%20the%20IT%20services%20provider,and%20has%20notified%20law%20enforcement">breached</a> through an attack on third-party software provider Outabox.</p> <p>Bunnings suffered a <a href="https://australiancybersecuritymagazine.com.au/bunnings-customer-data-compromised/">similar breach</a> in late 2021, via an attack on scheduling software provider FlexBooker.</p> <h2>Getting the basics right</h2> <p>Some organisations are still struggling with the basics. Our research found many data breaches occur because outdated or “legacy” data systems are still in use.</p> <p>These systems are old or inactive databases, often containing huge amounts of personal information about all the individuals who’ve previously interacted with them.</p> <p>Organisations tend to hold onto personal data longer than is legally required. This can come down to confusion about data-retention requirements, but also the high cost and complexity of safely decommissioning old systems.</p> <p>One chief privacy officer of a large financial services institution told us:</p> <blockquote> <p>In an organisation like ours where we have over 2,000 legacy systems […] the systems don’t speak to each other. They don’t come with big red delete buttons.</p> </blockquote> <p>Other interviewees flagged that risky data testing practices are widespread.</p> <p>Software developers and tech teams often use “production data” – real customer data – to test new products. This is often quicker and cheaper than creating test datasets.</p> <p>However, this practice exposes real customer information to insecure testing environments, making it more vulnerable. A senior cybersecurity specialist told us:</p> <blockquote> <p>I’ve seen it so much in every industry […] It’s literally live, real information going into systems that are not live and real and have low security.</p> </blockquote> <h2>What needs to be done?</h2> <p>Drawing insights from professionals at the coalface, our study highlights just how complex data protection has become in Australia, and how quickly the landscape is evolving.</p> <p>Addressing these issues will require a multi-pronged approach, including clearer legislative guidelines, better enforcement, greater transparency and robust security practices for the use of third-party providers.</p> <p>As the digital world continues to evolve, so too must our strategies for protecting ourselves and our data.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/236681/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/jane-andrew-10314">Jane Andrew</a>, Professor, Head of the Discipline of Accounting, Governance and Regulation, University of Sydney Business School, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>; <a href="https://theconversation.com/profiles/dr-penelope-bowyer-pont-1550191">Dr Penelope Bowyer-Pont</a>, Researcher, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>, and <a href="https://theconversation.com/profiles/max-baker-25553">Max Baker</a>, Associate professor, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-organisations-still-struggle-to-protect-our-data-we-asked-50-professionals-on-the-privacy-front-line-236681">original article</a>.</em></p>

Legal

Placeholder Content Image

Does the royal family have a right to privacy? What the law says

<p><em><a href="https://theconversation.com/profiles/gemma-horton-1515949">Gemma Horton</a>, <a href="https://theconversation.com/institutions/university-of-sheffield-1147">University of Sheffield</a></em></p> <p>From court cases to conspiracy theories, the royal family’s right to privacy is, somewhat ironically, nearly always in the spotlight. The latest focus is Kate Middleton, Princess of Wales, whose whereabouts have been the subject of <a href="https://www.townandcountrymag.com/society/tradition/a60008117/kate-middleton-health-speculation-conspiracy-theories-online/">online speculation</a> after it was announced she was undergoing abdominal surgery and would be away from public duties until after Easter.</p> <p>This comes just weeks after King Charles <a href="https://www.bbc.co.uk/news/uk-68208157">revealed that he is undergoing treatment for cancer</a>, and a legal settlement between Prince Harry and Mirror Group Newspapers over <a href="https://www.bbc.co.uk/news/uk-68249009">illegal phone hacking</a>.</p> <p>Interest in the personal lives of the royals and other celebrities <a href="https://www.tandfonline.com/doi/full/10.1080/1461670X.2016.1150193">is a constant</a>, driving newspaper sales and online clicks for decades. You only needs to consider the media frenzy that followed Princess Diana to <a href="https://www.tandfonline.com/doi/full/10.1080/17512786.2013.833678">see this</a>, and its potentially devastating consequences.</p> <p>From a legal perspective, the British courts have ruled that everyone – the royal family included – is entitled to a right to privacy. The Human Rights Act incorporates into British law the rights set out by the European Convention on Human Rights. This includes article 8, which focuses on the right to privacy.</p> <p>In the years after the Human Rights Act came into force, courts ruled on a string of cases from celebrities claiming that the press invaded their privacy. Courts had to balance article 8 of the convention against article 10, the right to freedom of expression.</p> <p>Rulings repeatedly stated that, despite being in and sometimes seeking the limelight, celebrities should still be afforded a right to privacy. Some disagree with this position, such as prominent journalist <a href="https://www.independent.co.uk/news/uk/home-news/prince-harry-hacking-piers-morgan-b2336442.html">Piers Morgan, who has criticised</a> the Duke and Duchess of Sussex asking for privacy when they have also released a Netflix documentary, a broadcast interview with Oprah Winfrey and published a memoir.</p> <p>But the courts have made the position clear, as in the case concerning Catherine Zeta-Jones and Michael Douglas after Hello! Magazine published unauthorised photographs from their wedding. The <a href="https://eprints.whiterose.ac.uk/190559/3/Final%20Edited%20Version%20-%20Celebrity%20Privacy%20and%20Celebrity%20Journalism-%20Has%20anything%20changed%20since%20the%20Leveson%20Inquiry_.pdf">court stated</a> that: “To hold that those who have sought any publicity lose all protection would be to repeal article 8’s application to very many of those who are likely to need it.”</p> <p>There is no universal definition of privacy, but scholars have identified key concepts encompassing what privacy can entail. In my own research, I have argued that the <a href="https://eprints.whiterose.ac.uk/190559/3/Final%20Edited%20Version%20-%20Celebrity%20Privacy%20and%20Celebrity%20Journalism-%20Has%20anything%20changed%20since%20the%20Leveson%20Inquiry_.pdf">notion of choice</a> is one of these. Privacy allows us to control the spread of information about ourselves and disclose information to whom we want.</p> <h2>Privacy and the public interest</h2> <p>There are exceptions to these protections if the person involved had no reasonable expectation of privacy, or if it was in the public interest for this information to be revealed. There is no solid, legal definition of the “public interest”, so this is decided on a case-by-case basis.</p> <p><a href="https://www.tandfonline.com/doi/full/10.1080/17577632.2021.1889866">In the past</a>, the public interest defence has been applied because a public figure or official has acted hypocritically and the courts have stated there is a right for a publisher to set the record straight.</p> <p>When it comes to medical records and information concerning health, case law and journalistic <a href="https://www.ipso.co.uk/editors-code-of-practice/">editorial codes of conduct</a> are clear that this information is afforded the utmost protection.</p> <p>Model Naomi Campbell was pictured leaving a Narcotics Anonymous meeting and these images were published by the Daily Mirror. The court found that there had been a public interest in revealing the fact she was attending these meetings, as she had previously denied substance abuse.</p> <p>The House of Lords accepted that there was a public interest in the press “setting the record straight”. Nonetheless, the publication of additional, confidential details, and the photographs of her leaving the meeting were a <a href="https://www.theguardian.com/media/2004/may/06/mirror.pressandpublishing1">step too far</a>. The House of Lords highlighted the importance of being able to keep medical records and information private.</p> <h2>Royal health</h2> <p>When it comes to the royals, the history of <a href="https://www.townandcountrymag.com/society/tradition/a23798094/lindo-wing-st-marys-hospital-facts-photos/">publicity</a> around royal births, often posing with the newborn royal baby outside of the hospital, has set a precedent for what the public can expect about the royals’ medical information. When they choose to go against this tradition, it can frustrate both royal-watchers and publishers.</p> <p>King Charles made the choice to openly speak about his enlarged prostate to “assist public understanding”. And, as Prostate Cancer UK noted, this has worked – they noted a <a href="https://www.independent.co.uk/news/uk/home-news/king-charles-cancer-statement-treatment-b2494190.html">500% increase in people visiting their website</a>. However, he has chosen to not to divulge information about his cancer diagnosis beyond the fact that he is receiving treatment. This is his right.</p> <p>While revealing further information might stop speculation and rumours about his health, it is not the king’s duty to divulge private, medical information. However, if his health begins to impact his ability to act as monarch, the situation could change.</p> <p>It might be that the press finds more information about his health without his knowledge, but unless they have a genuine public interest in publishing this information, privacy should prevail.</p> <p>You would no doubt want your private medical information kept secret, not shared around your workplace and speculated on unless it was absolutely necessary. It is thanks to these laws and court precedent that you don’t have to worry about this. The royal family, regardless of their position, should expect the same standard.</p> <p><a href="https://theconversation.com/profiles/gemma-horton-1515949"><em>Gemma Horton</em></a><em>, Impact Fellow for Centre for Freedom of the Media, <a href="https://theconversation.com/institutions/university-of-sheffield-1147">University of Sheffield</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/does-the-royal-family-have-a-right-to-privacy-what-the-law-says-224881">original article</a>.</em></p>

Legal

Placeholder Content Image

7 ways to create realistic financial goals that you'll actually stick to

<p>Establishing robust financial habits not only fosters comfort but also alleviates anxieties about the road ahead. A positive change in our financial circumstances commences with a shift in our money mindset. When you shift to creating lasting change, you can achieve more than you believe is possible.  </p> <p>When creating financial goals that you’ll actually stick to, parallels can be drawn between achieving physical and financial fitness. Let’s take a look.</p> <ol> <li><strong>Precision in Goal Setting</strong></li> </ol> <p>Just like any other endeavour, the path to financial well-being requires setting clear objectives that are both quantifiable and feasible. Whether it's building an emergency fund or saving for a major purchase, your goals need to be well-defined and measurable. </p> <p>Just as a fitness regimen consists of various exercises targeting different muscle groups, your financial goals should cover different aspects of your financial life.</p> <ol start="2"> <li><strong>The Inaugural Step</strong></li> </ol> <p>The hardest part is starting – there will always be competing priorities.   Think of it as taking one step at a time.  Starting your financial goals might feel overwhelming due to competing priorities and uncertainties. </p> <p>Start small and build momentum gradually. Establish a budget, track your expenses, and save a modest amount regularly. </p> <ol start="3"> <li><strong>Avoiding Extreme Measures</strong></li> </ol> <p>Remember, lasting change comes from sustainable actions. Financial quick fixes like waiting for bonuses or tax returns won't foster healthy habits and can lead to financial fatigue. Instead, embrace gradual progress; small efforts compound over time. </p> <p>The allure of crash diets can be tempting, but they rarely yield lasting results. Instead, opt for consistent, manageable actions. Focus on building sustainable habits, like making regular contributions to savings or investments.</p> <ol start="4"> <li><strong>The Power of Knowledge</strong></li> </ol> <p>Equip yourself with information. Education is a powerful tool in achieving financial well-being.  Understanding the options available is pivotal to making informed financial decisions. Gain a comprehensive understanding of your financial options. </p> <p>Research investment opportunities and strategies that align with your goals. Knowledge empowers you to navigate the complex landscape of personal finance confidently.</p> <ol start="5"> <li><strong>Exploration of Strategies</strong></li> </ol> <p>Just as someone might prefer running over cycling, finding financial strategies that resonate with you enhances your chances of long-term success. Experiment with diverse approaches to identify what resonates best, reducing stress and enhancing commitment. </p> <p>Opt for strategies that resonate with your values, minimise stress and amplifying commitment.</p> <ol start="6"> <li><strong>Consistency </strong></li> </ol> <p>Success lies in cultivating steady habits over time, ensuring enduring benefits. Just as regular workouts lead to improved physical health, cultivating small, consistent financial habits over time leads to enhanced financial well-being. </p> <p>Set up automated transfers to savings accounts, make incremental increases in contributions, and avoid overspending.</p> <ol start="7"> <li><strong>Intermittent Rewards</strong></li> </ol> <p>Occasionally treat yourself.  Sporadic indulgences can enhance well-being and acknowledge hard-earned victories. Rewarding yourself for achieving financial milestones enhances your commitment and prevents financial fatigue. It's essential to strike a balance between frugality and enjoyment.</p> <p>By embracing these principles, we not only engineer realistic financial objectives but also cement a commitment to achieving them. That’s the key to lasting financial prosperity.</p> <p><strong><em>Amanda Thompson, author of Financially Fit Women, is a sought-after speaker and qualified financial adviser.  As the founder of Endurance Financial, Amanda is driven to support women to have a great relationship with money and own their own financial success. For more information visit <a href="http://www.endurancefinancial.com.au">www.endurancefinancial.com.au</a></em></strong></p> <p><em>Image credits: Getty Images</em></p>

Money & Banking

Placeholder Content Image

How scammers use psychology to create some of the most convincing internet cons – and what to watch out for

<p><a href="https://theconversation.com/profiles/stacey-wood-473147"><em>Stacey Wood</em></a><em>, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><a href="https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/cybercrime-fraud-most-common-crime-uk/">Online fraud is today’s most common crime</a>. Victims are often told they are foolish for falling for it, but fraudsters use psychological mechanisms to infiltrate the defences of their targets, regardless of how intelligent they are.</p> <p>So it’s important to keep up with the latest scams and understand how they work.</p> <p>Recently, consumer protection magazine Which? <a href="https://www.which.co.uk/news/article/the-4-most-convincing-scams-weve-seen-in-2023-so-far-a7bRP9s0KJvG">identified some of the most convincing scams of 2023</a>. These scams all have one thing in common – they insidiously take advantage of people’s cognitive biases and psychological blind spots.</p> <p>They included “pig butchering” a way of fattening up victims with affection, the missing person scam which involves posting fake content on social media pages, the traditional PayPal scam, and a new scam called the “fake app alert” in which malware is hidden on apps that look legitimate.</p> <h2>Pig butchering</h2> <p>In our work as fraud psychology researchers we have noticed a trend towards hybrid scams, which combine different types of fraud. Hybrid scams often involve crypto investments and <a href="https://www.psychologytoday.com/us/blog/the-fraud-crisis/202210/new-scams-committed-forced-trafficked-labor">sometimes use trafficked labour</a> In the US alone, <a href="https://www.fbi.gov/contact-us/field-offices/springfield/news/internet-crime-complaint-center-releases-2022-statistics">the FBI recently reported</a> that people lost US $3.3 billion (£2.6 billion) in 2023 to investment fraud.</p> <p>Pig butchering is a long-term deception. <a href="https://www.cnbc.com/2023/05/02/pig-butchering-scammers-make-billions-convincing-victims-of-love.html">This type of scam</a> combines elements of <a href="https://www.actionfraud.police.uk/a-z-of-fraud/romance-scams">romance scams</a> with an investment con. The name comes from the strategy of <a href="https://www.theguardian.com/money/2023/may/22/dating-cons-and-dodgy-apps-among-most-common-scams-says-uk-watchdog">“fattening up” a victim with affection before slaughter</a>.</p> <p>It will usually begin with <a href="https://www.which.co.uk/policy-and-insight/article/pig-butchering-among-most-convincing-scams-of-2023-so-far-which-warns-aDRtr4I1UT1R">standard scam approach like a text</a>, social media message, or an introduction at a job board site.</p> <p>Victims may have their guard up at first. However, these scams can unfold over months, with the scammer slowly gaining the victims’ trust and initiating a romantic relationship all the while learning about their vulnerabilities.</p> <p>For example, details of their financial situation, job stresses, and dreams about the life they want. Romance scammers often saturate their targets with affection and almost constant contact. Pig butchering sometimes involves several trafficked people working as a team to create a single persona.</p> <p>Once the victim depends on the scammer for their emotional connection, the scammer introduces the idea of making an investment and uses fake crypto platforms to demonstrate returns. The scammers may use legitimate sounding cryptocoins and platforms. Victims can invest and “see” strong returns online. In reality, their money is going directly to the scammer.</p> <p>Once a victim transfers a substantial amount of money to the con artist, they are less likely to pull out. This phenomenon is known as the <a href="https://www.sciencedirect.com/science/article/abs/pii/0749597885900494">“sunk cost fallacy”</a>. Research has shown people are likely to carry on investing money, time and effort in activities they have already invested in and ignore signs the endeavour isn’t in their best interests.</p> <p>When the victim runs out of money or tries to withdraw funds, they are blocked.</p> <p>The victim is left with not only financial devastation, but also the loss of what they may imagine to be their most intimate partnership. They are often <a href="https://cloud-platform-e218f50a4812967ba1215eaecede923f.s3.amazonaws.com/uploads/sites/6/2021/12/VC-Who-Suffers-Fraud-Report-1.pdf">too embarrassed to discuss the experience</a> with friends and family or to report to the police.</p> <h2>PayPal scams</h2> <p>Fake payment requests are a common attack that works by volume rather than playing the long game. Payment requests appear to come from a genuine PayPal address. Fraudulent messages typically begin with a generic greeting, an urgent request and a fake link.</p> <p>For example, Dear User: You’ve received a payment, or you have paid too much. Please click link below for details. Users are directed to a spoofed website with a legitimate sounding name such as www.paypal.com/SpecialOffers and asked to enter their account information and password.</p> <p>Both of us have received these scam requests – and even we found them difficult to discern from legitimate PayPal request emails. These scams work through mimicry and play on the human tendency to trust authority. Legitimate PayPal correspondence is usually automatic bot language, so it is not difficult to imitate.</p> <p>But remember, genuine messages from PayPal <a href="https://www.paypal.com/ca/for-you/account/security/fraud-dangers#:%7E:text=Any%20email%20from%20PayPal%20will,bank%20account%2C%20or%20credit%20card.">will use your first and last name</a>.</p> <h2>The missing person scam</h2> <p>This seems to be a new scam that exploits a person’s kindness. In the past, charity scams involved posing as charitable organisation responding to a <a href="https://www.aarp.org/money/scams-fraud/info-2019/charity.html">recent, real calamity</a>.</p> <p>The new missing person scam is more sophisticated. The initial plea is a <a href="https://www.thesun.co.uk/tech/20875699/facebook-fake-missing-child-scam-warning/">fake missing person post</a> that generates likes and shares, increasing its credibility and exposure. Then the fraudster edits the content to create an investment scheme which now has the veneer of legitimacy.</p> <p>This scam may work because the initial consumers are unaware that the content is fraudulent, and there is no obvious request. In psychology, this type of persuasion is known as “<a href="https://thedecisionlab.com/reference-guide/psychology/social-proof">social proof</a>” – the tendency of individuals to follow and copy behaviour of others.</p> <h2>Fake app alerts</h2> <p>People post mobile apps, designed to steal users’ personal information, on the Google Play or Apple app store.</p> <p>The app often has a <a href="https://www.edinburghnews.scotsman.com/news/crime/another-person-comes-forward-after-banking-app-scam-3584340">legitimate function</a>, which gives it a cover. Consumers unknowingly jeopardise their private information by downloading these apps which use malware to access additional information.</p> <p>Although there has been <a href="https://tech.co/news/fake-android-apps-delete">media coverage of Android security issues</a>, many users assume malware <a href="https://www.ben-evans.com/benedictevans/2020/8/18/app-stores">cannot bypass app store screening</a>. Again, this scam plays on people’s <a href="https://psycnet.apa.org/doiLanding?doi=10.1037%2F0021-9010.92.3.639">trust in authority figures</a> to keep tjem safe.</p> <p>Discuss any investment opportunities with friends, family members or professionals. It’s much easier said than done, but exercising caution one of the best strategies to reduce the chance of becoming a fraud victim.</p> <p>Scammers count on people paying little to no attention to their emails or messages before clicking on them or providing valuable information. When it comes to scams, the devil is in the missing details.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/207759/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/stacey-wood-473147">Stacey Wood</a>, Professor of Psychology, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, Professor in Decision Science, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-scammers-use-psychology-to-create-some-of-the-most-convincing-internet-cons-and-what-to-watch-out-for-207759">original article</a>.</em></p>

Technology

Placeholder Content Image

Live art exists only while it is being performed, and then it disappears. How do we create an archive of the ephemeral?

<p>Live performance exists only in the moment it is being performed. Its ephemeral nature means it is transient and impermanent, and cannot be experienced again in precisely the same way. </p> <p>How do artists hold on to the works that they make? What of the invisible labour that is rarely acknowledged or named? </p> <p>Over the last ten years, performance artist Leisa Shelton has completed a series of participatory artworks which focus on the mutability of the archive: gathering audience testimonies and mapping artistic lineages. </p> <p>Now her new show, Archiving the Ephemeral, brings five works together in a beautifully curated installation. </p> <p>Archiving the Ephemeral is a celebration of the artist, the artistic process and the audience experience. </p> <p>Shelton’s expansive career, built on collaboration, care and conversation, grounds the exhibition. The show reflects her focus on curating and re-framing interdisciplinary work to address the limited opportunities for recognition of contemporary independent Australian performance.</p> <h2>Meticulous design</h2> <p>Marked by a spare, distinctive design, Archiving the Ephemeral is located in the Magdalen Laundry at the Abbotsford Convent. </p> <p>Rich with a bright green wooden industrial interior and aged painted walls, the laundry is a perfect background for the specifically placed items, the carefully lit tables and the long lines of patterned artefacts. </p> <p>Fragile ideas are framed and held within a crafted, artisan aesthetic. Objects are carefully made and remnants are meticulously gathered.</p> <p>Along one side of the space, 132 brown paper packets are laid out in a continuous line on the floor. Each package contains a set of archival materials, burned to ash, which corresponds to an artistic project from Shelton’s career.</p> <p>An accompanying video depicts Shelton’s meticulous process of burning, piece by piece, her entire performance archive to ash. </p> <p>In a methodical and meditative process, the ash is sifted and packaged into the hand-crafted paper bags. The bags are then hand-punched and sewn with twine, typed, labelled and categorised: a kind of devotional honouring of the materials even as they are brought to dust. </p> <h2>A living archive</h2> <p>The exhibition includes an opportunity for each of us to become part of the living archive through conversations with two ground-breaking elders of Australia’s performance art scene, <a href="https://abbotsfordconvent.com.au/news/in-conversation-with-stelarc-and-jill-orr/">Jill Orr and Stelarc</a>. </p> <p>On the night I attend, I sit with Stelarc. We discuss Kantian <a href="https://en.wikipedia.org/wiki/Immanuel_Kant">notions of time</a> as he tells me about his <a href="http://stelarc.org/?catID=20353">Re-Wired/Re-Mixed Event for Dismembered Body</a> (2015). It’s a delightful moment of personal connection with an artist I’ve admired for years.</p> <p>Across one wall are four large hanging papers listing the name of every artist on every <a href="https://www.artshouse.com.au/about-us/">Arts House</a> program from 2006-2016, laboriously typed. </p> <p>On the night I attend, these lists elicit lively conversations among the artists present as we study the names and dates (in my case, slightly desperately searching to see if my own name is there), and recall shows, people, events, stories and collaborations.</p> <p>Much of Shelton’s work is gathered from conversations with audience members about art and artists. </p> <p>In Mapping, a set of burnished stainless-steel canisters, beautifully marked with engraved identifications, sit on a bench underneath a suspended video screen on which artist names appear and disappear in an endless, floating loop. </p> <p>The canisters contain details of profoundly memorable artists and performances collected from 1,000 interviews, dated and stamped. They are hand-welded, sumptuous objects which hold the interview cards securely locked under fireproof glass designed to withstand cyclones, fires and floods.</p> <p>The many hand-written files of Scribe contain multiple documents which can be taken out and read. The sheer number of pages is overwhelming, and the breadth of audience commentary – joyful, moved, connected, inspired – is breathtaking.</p> <p>It’s a poignant reminder of the traces borne out beyond the artist’s own experience of performing a work: an often surreal and lonely moment once the audience has left the room.</p> <h2>A practice of care</h2> <p>Archiving the Ephemeral fosters a practice of care and acknowledgement which extends to the practical ways in which our trajectory through the room and engagement with the artworks is enabled. </p> <p>The Convent is an apt site for such a careful collection. Analogue processes and objects are foregrounded. Typewriters, brown paper, string, awls and aprons are part of the painstaking construction process. Attendants and scribes act as custodians in the space, facilitating a gentle holding of the material.</p> <p>We are given the opportunity to continue the archive as it evolves and devolves around us. As I make my way through the space, I notice my own embodied archival actions - taking notes, speaking to others - as I continue the trajectory of documenting the documents. We are not just witnessing one artist’s body of work. Archiving the Ephemeral focuses on the need for greater visibility, recognition and honouring of Australia’s experimental and independent artists, and speaks to the many collaborations, associations, and intricate connections that mark a significant – if unacknowledged – cultural legacy.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/live-art-exists-only-while-it-is-being-performed-and-then-it-disappears-how-do-we-create-an-archive-of-the-ephemeral-201939" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Art

Placeholder Content Image

Why loneliness is both an individual thing and a shared result of the cities we create

<p>If you’re feeling lonely, you’re not alone. Loneliness is an <a href="https://www.ipsos.com/en/loneliness-increase-worldwide-increase-local-community-support">increasingly common experience</a>, and it can have severe consequences. People who feel lonely are at <a href="https://doi.org/10.1007/s12160-010-9210-8">higher risk of serious health issues</a>, including heart disease, immune deficiency and depression.</p> <p>Traditionally, loneliness has been viewed as an individual problem requiring individual solutions, such as psychological therapy or medication. Yet loneliness is caused by feeling disconnected from society. It therefore makes sense that treatments for loneliness should focus on the things that help us make these broader connections. </p> <p>The places where we live, work and play, for example, can promote meaningful social interactions and help us build a sense of connection. Careful planning and management of these places can create <a href="https://www.gov.uk/government/publications/loneliness-annual-report-the-third-year/tackling-loneliness-annual-report-february-2022-the-third-year">population-wide improvements in loneliness</a>.</p> <p>Our research team is investigating how the way we design and plan our cities impacts loneliness. We have just published a <a href="https://authors.elsevier.com/c/1gNq14pqpjtIuw">systematic review</a> of research from around the world. Overall, we found many aspects of the built environment affect loneliness. </p> <p>However, no single design attribute can protect everyone against loneliness. Places can provide opportunities for social interactions, or present barriers to them. Yet every individual responds differently to these opportunities and barriers.</p> <h2>What did the review look at?</h2> <p>Our review involved screening over 7,000 published studies covering fields such as psychology, public health and urban planning. We included 57 studies that directly examined the relationship between loneliness and the built environment. These studies covered wide-ranging aspects from neighbourhood design, housing conditions and public spaces to transport infrastructure and natural spaces.</p> <p>The research shows built environments can present people with options to do the things we know help reduce loneliness. Examples include chatting to the people in your street or neighbourhood or attending a community event.</p> <p>However, the link between the built environment and loneliness is complex. Our review found possibilities for social interaction depend on both structural and individual factors. In other words, individual outcomes depend on what the design of a space enables a person to do as well as on whether, and how, that person takes advantage of that design.</p> <p>Specifically, we identified some key aspects of the built environment that can help people make connections. These include housing design, transport systems and the distribution and design of open and natural spaces.</p> <h2>So what sort of situations are we talking about?</h2> <p>Living in small apartments, for example can increase loneliness. <a href="https://link.springer.com/article/10.1007/s10901-020-09816-7">For some people</a>, this is because the smaller space reduces their ability to have people over for dinner. Others who live in <a href="https://doi.org/10.1017/S0144686X15000112">poorly maintained housing</a> report similar experiences.</p> <p>More universally, living in areas with good access to <a href="https://doi.org/10.1017/S0144686X19001569">community centres</a> and <a href="https://doi.org/10.1093/ije/dyab089">natural spaces</a> helps people make social connections. These spaces allow for both planned and unexpected social interactions.</p> <p>Living in environments with good access to destinations and transport options also protects against loneliness. In particular, it benefits individuals who are able to use <a href="https://doi.org/10.1093/gerona/glu069">active transport (walking and cycling) and high-quality public transport</a>. </p> <p>This finding should make sense to anyone who walks or takes the bus. We are then more likely to interact in some way with those around us than when locked away in the privacy of a car.</p> <p>Similarly, built environments <a href="https://doi.org/10.1002/jcop.21711">designed to be safe</a> — from crime, traffic and pollution — also enable people to explore their neighbourhoods easily on foot. Once again, that gives them more opportunities for social interactions that can, potentially, reduce loneliness.</p> <p>Environments where people are able to express themselves were also found to protect against loneliness. For example, residents of housing they could personalise and “make home” reported feeling less lonely. So too did those who felt able to “<a href="https://doi.org/10.7870/cjcmh-2002-0010">fit in</a>”, or identify with the people living close by.</p> <h2>Other important factors are less obvious</h2> <p>These factors are fairly well defined, but we also found less tangible conditions could be significant. For example, studies consistently showed the importance of socio-economic status. The interplay between economic inequalities and the built environment can deny many the right to live a life without loneliness.</p> <p>For example, <a href="https://doi.org/10.1080/19491247.2021.1940686">housing tenure</a> can be important because people who rent are less able to personalise their homes. People with lower incomes can’t always afford to <a href="https://doi.org/10.1177/1440783320960527">live close to friends</a> or in a neighbourhood where they feel accepted. Lower-income areas are also notoriously under-serviced with <a href="https://doi.org/10.1016/j.jtrangeo.2020.102869">reliable public transport</a>, <a href="https://link.springer.com/article/10.1186/1471-2458-14-292">well-maintained natural spaces</a> and <a href="https://doi.org/10.1016/j.healthplace.2007.11.002">well-designed public spaces</a>.</p> <p>Our review reveals several aspects of the built environment that can enhance social interactions and minimise loneliness. Our key finding, though, is that there is no single built environment that is universally “good” or “bad” for loneliness. </p> <p>Yes, we can plan and build our cities to help us meet our innate need for social connection. But context matters, and different individuals will interpret built environments differently.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/why-loneliness-is-both-an-individual-thing-and-a-shared-result-of-the-cities-we-create-198069" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Caring

Placeholder Content Image

“Have a second phone”: Aussie spy chief’s warning on social media use

<p dir="ltr">MPs have been urged to use a second phone if they want to access social media apps such as TikTok, after one of Australia’s top spy bosses spoke about how these apps use our personal information.</p> <p dir="ltr">Rachel Noble, the Director-General of the Australian Signals Directorate (ASD), recommended that politicians and their staff should adopt the practice during a Senate estimates hearing.</p> <p dir="ltr">She also said that having a phone without access to social media was the only way to have “absolute certainty” of data privacy.</p> <p dir="ltr">“Our advice was, frankly, for people who are members of parliament who might be particularly targets of espionage … that if you wanted absolute certainty that your social media app couldn’t have access to those things … would be to have a second phone which you exclusively use for that,” Ms Noble said.</p> <p dir="ltr">The warning comes after it was reported earlier this year that the ASD had confidential meetings with politicians and their staff to warn them that some apps undertake excessive data collection and request access to contact lists, location data and photos.</p> <p dir="ltr">Last year, the Department of Home Affairs restricted TikTok use on work phones, joining the Department of Defence in doing so.</p> <p dir="ltr">During the hearing, Ms Noble said that in some cases social media apps were collecting additional information extending “beyond the content of messages, videos and voice recordings”.</p> <p dir="ltr">“Social media apps are monetising what you do on your phone, what you access, what you look at for how long, who your friends are – they will seek to get demographics of your friends in order to push you the information and get you to buy things,” she said.</p> <p dir="ltr">With some apps headquartered outside Australia, such as China, Ms Noble said the information collected could be accessed legally or be subject to covert collection.</p> <p dir="ltr">Sectors of the Australian public service aren’t the only ones restricting use of social media apps on work phones, with parliaments in the United States and New Zealand warning against using TikTok on government devices.</p> <p><span id="docs-internal-guid-4a365f66-7fff-12a0-c84b-6e36f0ce1003"></span></p> <p dir="ltr"><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

3 times you should never “accept cookies” on a site

<p><strong>To cookie or not to cookie?</strong></p> <p>Cookie-consent pop-ups are one of the biggest annoyances on the Internet. Almost every site you visit has a notice saying, “This website uses cookies to improve your experience. Do you agree?” or something similar. Typically, we click “yes” or “agree” without even thinking about it because we’re eager to get to the content. But should we? Not necessarily.</p> <p><strong>What are cookies, exactly?</strong></p> <p>Before we delve into the dos and don’ts of cookie consent, here’s a little refresher on this Web tool: Cookies are essentially information collectors and trackers in the form of small text files stored on your browser by the sites you visit. Some are useful. For example, a cookie saved on your browser makes it so you don’t have to re-enter your log-in information every time you visit one of your favourite websites. Cookies can also remember your shopping preferences so that you get a personalised experience when you visit the website. Others, however, track how you use a website, how often you go there, your IP address, your phone number, what types of things you look at and buy, and other information you may not want to share.</p> <p><strong>Do you have to accept cookies?</strong></p> <p>Many companies have you click “yes” so that they’re compliant with current privacy laws. This means that once you click, you’ve given the company permission to use your information as they see fit without the worry of legal backlash. Most of the time, cookies are no big deal. There are a few occasions, though, where you should decline cookies. Don’t worry – if you find yourself in a situation where you need to decline or simply want to decline for whatever reason, most websites will work just fine without collecting your information. With that said, here’s when saying no to the cookies is a good idea.</p> <p><strong>Sketchy sites</strong></p> <p>Beware when you’re on an unencrypted website (these websites will have an unlocked lock icon by the web address) while using a public Wi-Fi network. The information collected by cookies can be intercepted by hackers because there isn’t any security to stop them. Your best bet when borrowing Wi-Fi from your local coffee shop or fast-food joint is to use your browser’s private or incognito mode. While in this mode, cookies aren’t collected by default (though you can manually turn off cookie blocking on some browsers), no matter where your Internet journeys take you.</p> <p><strong>Third-party cookies</strong></p> <p>If the cookie-consent pop-up mentions third-party cookies, click “decline.” Accepting gives the website the right to sell your browsing behaviour to a data broker. The broker then combines your behaviour on one website with information from other websites and builds an extremely detailed profile of you as a consumer. “The broker then sells that profile to other third parties who want to market to people like you,” says Harry Maugans, CEO of Privacy Bee, a proactive privacy management tool for consumers. “As you can imagine, this chain extends infinitely. Once you lose control of your personal data, it gets packaged and repackaged in all kinds of ways. It’s scary but true.”</p> <p>According to Maugans, some third-party cookies are even nefarious. You could become a victim of “cookie stealing” or “session hijacking.” This is when a hacker gains access to a browser and mimics users to be able to steal cookies from that browser. This can put you at risk of identity theft if hackers manage to steal cookies that store your personal information or credit card information.</p> <p>If you’re worried that you might accidentally accept third-party cookies, there’s an easy way to make things fool-proof. Go into your browser and choose to allow only required cookies or “first party” cookies. These cookies are the helpful ones mentioned earlier and are usually only used by the website you’re visiting.</p> <p><strong>When you’re using private information</strong></p> <p>If you don’t feel comfortable sharing the information you’re using or accessing on a website with a stranger, don’t use cookies on that site. According to Jeremy Tillman, president of the privacy company Ghostery, you should avoid cookies on sites where you do your banking, access your medical information, or use other private information.</p> <p>If you’re afraid that you’ve already accepted cookies on websites where you wouldn’t want your information gathered, go into your browser and use the “clear cookies” option. This will prevent sites from collecting your information in the future, as long as you decline the next time a site asks you to accept its cookies.</p> <p><em><span id="docs-internal-guid-ab23c7bc-7fff-94d0-086f-61fdae71f0de">Written by Alina Bradford. This article first appeared in <a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/3-times-you-should-never-accept-cookies-on-a-site" target="_blank" rel="noopener">Reader’s Digest</a>. For more of what you love from the world’s best-loved magazine, <a href="http://readersdigest.innovations.com.au/c/readersdigestemailsubscribe?utm_source=over60&amp;utm_medium=articles&amp;utm_campaign=RDSUB&amp;keycode=WRA87V" target="_blank" rel="noopener">here’s our best subscription offer.</a></span></em></p> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

Instagram and Facebook are stalking you on websites accessed through their apps. What can you do about it?

<p>Social media platforms have had some bad <a href="https://theconversation.com/concerns-over-tiktok-feeding-user-data-to-beijing-are-back-and-theres-good-evidence-to-support-them-186211" target="_blank" rel="noopener">press</a> in recent times, largely prompted by the vast extent of their data collection. Now Meta, the parent company of Facebook and Instagram, has upped the ante.</p> <p>Not content with following every move you make on its apps, Meta has reportedly devised a way to also know everything you do in external websites accessed <em>through</em> its apps. Why is it going to such lengths? And is there a way to avoid this surveillance?</p> <p><strong>‘Injecting’ code to follow you</strong></p> <p>Meta has a custom in-app browser that operates on Facebook, Instagram and any website you might click through to from both these apps.</p> <p>Now ex-Google engineer and privacy researcher Felix Krause has discovered this proprietary browser has additional program code inserted into it. Krause developed a tool that <a href="https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser?utm_source=tldrnewsletter" target="_blank" rel="noopener">found</a> Instagram and Facebook added up to 18 lines of code to websites visited through Meta’s in-app browsers.</p> <p>This “code injection” enables user tracking and overrides tracking restrictions that browsers such as Chrome and Safari have in place. It allows Meta to collect sensitive user information, including “every button and link tapped, text selections, screenshots, as well as any form inputs, like passwords, addresses and credit card numbers”.</p> <p>Krause published his <a href="https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser?utm_source=tldrnewsletter" target="_blank" rel="noopener">findings</a> online on August 10, including samples of the <a href="https://connect.facebook.net/en_US/pcm.js" target="_blank" rel="noopener">actual code</a>.</p> <p>In response, Meta has said it isn’t doing anything users didn’t consent to. A Meta spokesperson said:</p> <blockquote> <p>We intentionally developed this code to honour people’s [Ask to track] choices on our platforms […] The code allows us to aggregate user data before using it for targeted advertising or measurement purposes.</p> </blockquote> <p>The “code” mentioned in the case is <a href="https://connect.facebook.net/en_US/pcm.js" target="_blank" rel="noopener">pcm.js</a> – a script that acts to aggregate a user’s browsing activities. Meta says the script is inserted based on whether users have given consent – and information gained is used only for advertising purposes.</p> <p>So is it acting ethically? Well, the company has done due diligence by informing users of its intention to collect <a href="https://www.facebook.com/privacy/policy" target="_blank" rel="noopener">an expanded range</a> of data. However, it stopped short of making clear what the full implications of doing so would be.</p> <p>People might give their consent to tracking in a more general sense, but “informed” consent implies full knowledge of the possible consequences. And, in this case, users were not explicitly made aware their activities on other sites could be followed through a code injection.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Facebook reached out to me, saying the system they’ve built honours the user’s ATT choice.</p> <p>However, this doesn’t change anything about my publication: The Instagram iOS app is actively injecting JavaScript code into all third party websites rendered via their in-app browser. <a href="https://t.co/9h0PIoIOSS">pic.twitter.com/9h0PIoIOSS</a></p> <p>— Felix Krause (@KrauseFx) <a href="https://twitter.com/KrauseFx/status/1557777320546635776?ref_src=twsrc%5Etfw">August 11, 2022</a></p></blockquote> <p><strong>Why is Meta doing this?</strong></p> <p>Data are the central commodity of Meta’s business model. There is astronomical value in the amount of data Meta can collect by injecting a tracking code into third-party websites opened through the Instagram and Facebook apps.</p> <p>At the same time, Meta’s business model is being threatened – and events from the recent past can help shed light on why it’s doing this in the first place.</p> <p>It boils down to the fact that Apple (which owns the Safari browser), Google (which owns Chrome) and the Firefox browser are all actively placing restrictions on Meta’s ability to collect data.</p> <p>Last year, Apple’s iOS 14.5 update came alongside a <a href="https://www.apple.com/au/privacy/control/" target="_blank" rel="noopener">requirement</a> that all apps hosted on the Apple app store must get users’ explicit permission to track and collect their data across apps owned by other companies.</p> <p>Meta has <a href="https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser?utm_source=tldrnewsletter" target="_blank" rel="noopener">publicly</a> said this single iPhone alert is costing its Facebook business US$10 billion each year.</p> <p>Apple’s Safari browser also applies a default setting to block all third-party “cookies”. These are little chunks of <a href="https://www.trendmicro.com/vinfo/us/security/definition/cookies" target="_blank" rel="noopener">tracking code</a> that websites deposit on your computer and which tell the website’s owner about your visit to the site.</p> <p>Google will also soon be phasing out third-party cookies. And Firefox recently announced “total cookie protection” to prevent so-called cross-page tracking.</p> <p>In other words, Meta is being flanked by browsers introducing restrictions on extensive user data tracking. Its response was to create its own browser that circumvents these restrictions.</p> <p><strong>How can I protect myself?</strong></p> <p>On the bright side, users concerned about privacy do have some options.</p> <p>The easiest way to stop Meta tracking your external activities through its in-app browser is to simply not use it; make sure you’re opening web pages in a trusted browser of choice such as Safari, Chrome or Firefox (via the screen shown below).</p> <p><img src="https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=548&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=548&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=548&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=689&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=689&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/478879/original/file-20220812-20-6je7m8.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=689&amp;fit=crop&amp;dpr=3 2262w" alt="" /></p> <p><em><span class="caption" style="color: #999999; text-align: center;">Click ‘open in browser’ to open a website in a trusted browser such as Safari.</span><span style="color: #999999; text-align: center;"> </span><span class="attribution" style="color: #999999; text-align: center;">screenshot</span></em></p> <figure class="align-right "><figcaption></figcaption></figure> <p>If you can’t find this screen option, you can manually copy and paste the web address into a trusted browser.</p> <p>Another option is to access the social media platforms via a browser. So instead of using the Instagram or Facebook app, visit the sites by entering their URL into your trusted browser’s search bar. This should also solve the tracking problem.</p> <p>I’m not suggesting you ditch Facebook or Instagram altogether. But we should all be aware of how our online movements and usage patterns may be carefully recorded and used in ways we’re not told about. Remember: on the internet, if the service is free, you’re probably the product. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/188645/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/david-tuffley-13731" target="_blank" rel="noopener">David Tuffley</a>, Senior Lecturer in Applied Ethics &amp; CyberSecurity, <a href="https://theconversation.com/institutions/griffith-university-828" target="_blank" rel="noopener">Griffith University</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/instagram-and-facebook-are-stalking-you-on-websites-accessed-through-their-apps-what-can-you-do-about-it-188645" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

How to create your own flower arrangements

<p>Flowers are a sure-fire way to make just about anyone’s day. Whether you’re giving them as a gift, using them to decorate you house or making a centrepiece for an occasion, flowers will instantly brighten with their beauty. Here are some tips for creating your own flower arrangements at home.</p> <p><strong>Look for inspiration</strong><br />With Pinterest, Twitter, Facebook and Instagram, inspiration for flower arrangements is now literally endless. Magazines and books are also a great source for ideas.</p> <p><strong>Select a colour scheme</strong><br />When deciding on a colour scheme for your flower arrangement, there are a few things to consider. Firstly, is it an arrangement to go in a vase in your home and if so, what are the colours of the room it is going in? Or perhaps it is a gift for a friend and if so, what’s the occasion? Lastly, what time of year is it? These factors will influence what you go for. If the arrangement is for a house then you’ll need to pick colours that suit the room. If it is for an occasion, you’ll want to consider if you need bright and happy colours, or something more subtle. Lastly, if it's summer, it’s best to opt for colours that celebrate that time of year.</p> <p><strong>Write up a recipe</strong><br />Prepare a recipe for your floral arrangements, just as you do when making a meal. Include tools and supplies needed, the amount of flowers and go from there. If you're making an arrangement for home, you’ll likely just need the bucket, vase, a couple of tools for grooming the flowers (see below). For a bouquet, you’ll need all of that minus the vase and add in some ribbon and string, or if you’re after a centrepiece, you will also need a block of floral foam and a votive to make your arrangement in. It’s always a good idea to buy a few more flowers than you think you’ll need. A standard flower arranging supply tool kit would include: clippers, floral tape, ribbons, floral moss, flower preservative, rose strippers if you have roses, and vases. Once you have your recipe, you'll know what you need.</p> <p><strong>Off to the market</strong><br />You have a few options when it comes to where to buy your blooms: you could start in your own garden if you’re on a budget, otherwise there are lots of wholesale flower markets, or grocery stores, store front florists, farmer’s markets and mail order. We recommend heading to wholesale markets. The produce comes straight from farms, the variety is amazing and you can generally get the best value for your money. Keep in mind that in order to get the best flowers from the markets, you’ll have to get there early and some markets open at 4 or 5am. Check what markets are closest to you.</p> <p><strong>Pick your flowers</strong><br />Peonies or gardenias, roses or carnations, orchids or irises? It is best to select flowers according to the time of year and what’s in season. Out-of-season flowers are likely to be harder to come by and expensive. There are some places in which you can pre-order, so it might be worth a phone call to discuss your options. Otherwise, just Google what you’re interested in and see what's in season where you live and make your plan around that. When you’re at the market or store, make sure the flowers you buy are not beginning to wilt. Ideally, there should be a few green buds in the mix and petals should feel firm and have no brown edges.</p> <p><strong>Grooming</strong><br />First you need to pick out any dead or broken blooms and petals. Next, you need to cut each stem by at least one inch at an angle using a sharp knife, scissors, or clippers. Then it is very important to get them into some water. Buckets work well to keep them in and a tall bucket in which the stems can gently rest on the sides will work best. The fewer leaves left below the waterline in the vase the better as leaves steal nutrients from blooms and can also cause the water to get nasty faster. Be sure to pull of the extra greenery. Most flowers (except tulips and hyacinths) do best in lukewarm water.</p> <p><strong>Caring for your flowers</strong><br />Keep the water fresh and change daily to keep the flowers healthy. It’s also good to trim the stems periodically to help them stay hydrated.</p> <p><strong>Step-by-step guide to flower arranging<br /></strong><br />1. Begin by placing two or three more branchy stems into the vase (or in your hand if you're making a bouquet) as this will help you get an idea of the overall shape you want your arrangement to take. You want to create a sense of width as well as height, so really work those angles.</p> <p>2. Now start adding the attention-grabbing blooms one at a time, again at different heights. Try placing one big bloom right on the edge of the vase, and one at least an inch or two higher. If it looks like your arrangement is growing a set of eyeballs, snip one of the stems.</p> <p>3. Turn your vase often and consider working from different angles. Even if you vase ends up in a corner or against a wall when you’re done, you want it looking good from all sides.</p> <p>4. Go slowly and don’t be afraid to take things out if it’s not working. Keep going, adding alternate colours, sizes and shapes. Mix foliage and greenery with vivid hues, ensuring you don’t damage them. When you feel like you’re done, try adding two or three longer gestural stems (ranunculus or anemones) at an unexpected height or angle to pump up the drama.</p> <p><em>Image credits: Getty Images</em></p>

Home & Garden

Placeholder Content Image

Musician sells artworks she created live on stage

<p dir="ltr">Grammy-nominated pop star Halsey is doing her bit to support reproductive rights in the US, as she enters the world of fine arts. </p> <p dir="ltr">Currently on tour around America, Halsey has created five artworks while performing live on stage, with the pieces now for sale at Sotheby’s. </p> <p dir="ltr">All proceeds from the sales will benefit the National Network of Abortion Funds. </p> <p dir="ltr">The drawings are included in the <a href="https://www.sothebys.com/en/buy/auction/2022/contemporary-discoveries-4?locale=en">Contemporary Discoveries</a> exhibition, which features artists such as David Hockney, Andy Warhol, and Os Gêmeos. </p> <p dir="ltr">Halsey’s works are expected to fetch around $7,000 each, with bids currently ranging </p> <p dir="ltr">between $5,500 and $6,500.</p> <p dir="ltr">She created each piece on different nights of her Love and Power Tour, while singing an untitled three-minute song. </p> <p dir="ltr">Hand moving in tandem with the melody, Halsey swiftly brought to life on white canvas androgynous faces punctuated by primary colours. </p> <p dir="ltr">According to the artist, the paintings are meant to symbolise the individual energies of each audience.</p> <p dir="ltr">Halsey has long been an outspoken advocate for women's rights and reproductive healthcare access. </p> <p dir="ltr">After the U.S. Supreme Court overturned Roe V. Wade in July, she <a href="https://www.vogue.com/article/my-abortion-saved-my-life-roe-v-wade-halsey">shared her personal experience</a> with a life-saving abortion procedure in an essay for Vogue. </p> <p dir="ltr">“I miscarried three times before my 24th birthday,” She wrote. “One of my miscarriages required ‘aftercare,’ a gentle way of saying that I would need an abortion, because my body could not terminate the pregnancy completely on its own and I would risk going into sepsis without medical intervention.”</p> <p dir="ltr">“Many people have asked me if, since carrying a child to term after years of struggling to do so, I have reconsidered my stance on abortion,” Halsey continued. “The answer is firmly no. In fact, I have never felt more strongly about it.”</p> <p dir="ltr"><em>Image credits: Getty Images / Sotheby’s</em></p>

Art

Placeholder Content Image

After Roe v Wade, here’s how women could adopt ‘spycraft’ to avoid tracking and prosecution

<p>The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.</p> <p>Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.</p> <p>The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.</p> <p>Thousands have engaged with online posts calling on women to <a href="https://www.theguardian.com/world/2022/jun/28/why-us-woman-are-deleting-their-period-tracking-apps" target="_blank" rel="noopener">delete their period tracking apps</a>, on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are <a href="https://www.reuters.com/world/us/new-mexico-shields-abortion-providers-ahead-expected-patient-surge-2022-06-27/" target="_blank" rel="noopener">reportedly</a> bracing for an influx of women from US states.</p> <p>As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.</p> <p>But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Menstrual tracking app Stardust is one of Apple’s top three most-downloaded free apps right now. It’s also one of few apps that has said it will voluntarily—without being legally required to—comply with law enforcement if it’s asked to share user data. <a href="https://t.co/sJ17VAiLvp">https://t.co/sJ17VAiLvp</a></p> <p>— Motherboard (@motherboard) <a href="https://twitter.com/motherboard/status/1541456351414583297?ref_src=twsrc%5Etfw">June 27, 2022</a></p></blockquote> <p><strong>The privacy myth</strong></p> <p>Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.</p> <p>Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.</p> <p>Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.</p> <p>Recent events have demonstrated how tenuous our privacy is. <a href="https://www.theverge.com/2019/10/22/20926585/hong-kong-china-protest-mask-umbrella-anonymous-surveillance" target="_blank" rel="noopener">Protests in Hong Kong</a> have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify <a href="https://theconversation.com/police-surveillance-of-black-lives-matter-shows-the-danger-technology-poses-to-democracy-142194" target="_blank" rel="noopener">Black Lives Matter</a> protesters.</p> <p>Articles appeared in Australian <a href="https://www.crikey.com.au/2022/06/29/protests-police-government-surveillance-how-to-avoid/" target="_blank" rel="noopener">media outlets</a> with advice on how to avoid being surveilled. And people were directed to websites, such as the <a href="https://www.eff.org/wp/behind-the-one-way-mirror" target="_blank" rel="noopener">Electronic Frontier Foundation</a>, dedicated to informing readers about how to avoid surveillance and personal data collection.</p> <p>What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of <a href="https://theconversation.com/surveillance-cameras-will-soon-be-unrecognisable-time-for-an-urgent-public-conversation-118931" target="_blank" rel="noopener">cameras</a>, <a href="https://theconversation.com/how-to-hide-from-a-drone-the-subtle-art-of-ghosting-in-the-age-of-surveillance-143078" target="_blank" rel="noopener">drones</a>, automated number plate readers (<a href="https://theconversation.com/number-plate-recognition-the-technology-behind-the-rhetoric-17572" target="_blank" rel="noopener">ANPR/ALPR</a>), <a href="https://www.q-free.com/reference/australia/" target="_blank" rel="noopener">toll payment devices</a>, <a href="https://www.dhs.gov/publication/acoustic-surveillance-devices" target="_blank" rel="noopener">acoustic collectors</a> and of course any internet-connected <a href="https://theconversation.com/smartphone-data-tracking-is-more-than-creepy-heres-why-you-should-be-worried-91110" target="_blank" rel="noopener">device</a>.</p> <p>In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.</p> <p><strong>Data deleted, not destroyed</strong></p> <p>Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.</p> <p>Law enforcement and even commercial companies have the ability to access or track certain metrics including:</p> <ul> <li>international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card</li> <li>international mobile equipment identity (IMEI), which is directly related to their device itself.</li> </ul> <p>Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.</p> <p>Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.</p> <p>Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).</p> <p>The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.</p> <p>Adding to that, we recently saw headlines about <a href="https://theconversation.com/bunnings-kmart-and-the-good-guys-say-they-use-facial-recognition-for-loss-prevention-an-expert-explains-what-it-might-mean-for-you-185126" target="_blank" rel="noopener">facial recognition technology</a> being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.</p> <p>And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.</p> <p>In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to <a href="https://www.wsj.com/articles/the-cias-former-chief-of-disguise-drops-her-mask-11576168327" target="_blank" rel="noopener">alter their facial characteristics</a>.</p> <p>Then again, while these measures help in the physical world, they do little to stop online detection.</p> <p><strong>Digital stealth</strong></p> <p>Online, the use of a virtual private network (<a href="https://theconversation.com/explainer-what-is-a-virtual-private-network-vpn-12741" target="_blank" rel="noopener">VPN</a>) and/or the onion browser, <a href="https://theconversation.com/explainer-what-is-the-dark-web-46070" target="_blank" rel="noopener">Tor</a>, will help improve anonymity, including from internet service providers.</p> <p>Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.</p> <p>One example is <a href="https://www.ccleaner.com/ccleaner/download" target="_blank" rel="noopener">CCleaner</a>. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.</p> <p>There are also plenty of online applications that allow the use of <a href="https://theconversation.com/dont-be-phish-food-tips-to-avoid-sharing-your-personal-information-online-138613" target="_blank" rel="noopener">temporary email addresses</a> and phone numbers, and even temporary accommodation addresses for package deliveries.</p> <p>To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.</p> <p>And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Not to be that guy but it seems like it really should be bigger news that the national guard is now helping crack down on abortion protests <a href="https://t.co/DGh83in0Cm">https://t.co/DGh83in0Cm</a></p> <p>— Read Wobblies and Zapatistas (@JoshuaPotash) <a href="https://twitter.com/JoshuaPotash/status/1541527897273409536?ref_src=twsrc%5Etfw">June 27, 2022</a></p></blockquote> <p><em><a href="https://theconversation.com/profiles/dennis-b-desmond-1252874" target="_blank" rel="noopener">Dennis B Desmond</a>, Lecturer, Cyberintelligence and Cybercrime Investigations, <a href="https://theconversation.com/institutions/university-of-the-sunshine-coast-1068" target="_blank" rel="noopener">University of the Sunshine Coast</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: Getty Images</em></p>

Legal

Placeholder Content Image

“You are disgusting”: Prince William accuses man of stalking his children

<p dir="ltr">The Cambridges seem to be embroiled in a row with YouTube, after the family claim a video that breaches their privacy has been viewed thousands of times despite attempts to block it.</p> <p dir="ltr">The video, which clocked 20,000 views on Monday according to the <em><a href="https://www.nzherald.co.nz/lifestyle/you-are-disgusting-duke-of-cambridge-confronts-stalker-who-came-looking-for-his-children/G2V23LT2HCTYNTOZKGGDJBUQ44/" target="_blank" rel="noopener">NZ Herald</a></em>, shows Prince William confronting a photographer after he was filmed on a bike ride with his family near Sandringham, Norfolk, sometime last year.</p> <p><span id="docs-internal-guid-a49da7cc-7fff-6cab-c9d3-8092ba55f520"></span></p> <p dir="ltr">William is seen reproaching the man, who was videoing the prince, while Kate and their three children are off-camera nearby.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Obsessed with Prince William kicking off <a href="https://t.co/NgKgyU5eLZ">pic.twitter.com/NgKgyU5eLZ</a></p> <p>— I Don't Know Her (@l_dont_know_her) <a href="https://twitter.com/l_dont_know_her/status/1541554976689897474?ref_src=twsrc%5Etfw">June 27, 2022</a></p></blockquote> <p dir="ltr">“If you want to have this altercation we can have this altercation,” William says in the clip, while appearing to be calling someone on his mobile phone.</p> <p dir="ltr">Kate can be heard in the background, telling the man, “We came with our children.”</p> <p dir="ltr">“I know, I know, I just realised who it was and I’ve stopped,” the man said.</p> <p dir="ltr">“You didn’t, you’re out here looking for us,” William replied.</p> <p dir="ltr">“You drove past us outside our house, I saw you,” Kate said, which the man denied doing. </p> <p dir="ltr">The man claimed he wasn’t following the family, to which William replies: “Yes you are, you are stalking around here looking for our children”.</p> <p dir="ltr">The Duke of Cambridge then references the incident where the man followed the family while on a bike ride, lashing out when the man denies following them.</p> <p dir="ltr">“You are outrageous, you are disgusting, you really are. How dare you behave like that,” William says.</p> <p dir="ltr">The short clip was uploaded over the weekend, over a year after the incident occurred.</p> <p dir="ltr">Kensington Palace has responded by claiming the clip is a breach of the family’s privacy, with William shown to be on a private bike ride with his family, who were blurred out in the video.</p> <p dir="ltr">It is understood that staff are seeking the removal of the video in line with their usual policy about privacy, which seems to have been successful as of publication.</p> <p dir="ltr">However, versions of the clip continue to circulate on other social media platforms, including TikTok and Twitter.</p> <p dir="ltr">The balance between William’s family’s privacy and their roles in the public eye is something he has spent many years negotiating with the British media, in which he has authorised a small number of photographs of the children to be released each year while insisting on otherwise total privacy.</p> <p dir="ltr">Traditional British print media doesn’t publish videos or photos of the royal family in private situations, particularly when Prince George, Princess Charlotte and Prince Louis are involved.</p> <p dir="ltr">But images are often posted on social media and sold to European publications working under different laws.</p> <p dir="ltr">A spokesperson for YouTube is yet to comment on the situation.</p> <p dir="ltr"><span id="docs-internal-guid-7133d0e2-7fff-91e7-880d-93501fb7d3c1"></span></p> <p dir="ltr"><em>Image: Twitter</em></p>

Legal

Placeholder Content Image

ACCC says consumers need more choices about what online marketplaces are doing with their data

<p>Consumers using online retail marketplaces such as eBay and Amazon “have little effective choice in the amount of data they share”, according to the <a href="https://www.accc.gov.au/publications/serial-publications/digital-platform-services-inquiry-2020-2025/digital-platform-services-inquiry-march-2022-interim-report" target="_blank" rel="noopener">latest report</a> of the Australian Competition &amp; Consumer Commission (ACCC) Digital Platform Services Inquiry.</p> <p>Consumers may benefit from personalisation and recommendations in these marketplaces based on their data, but many are in the dark about how much personal information these companies collect and share for other purposes.</p> <p><a href="https://www.accc.gov.au/media-release/concerning-issues-for-consumers-and-sellers-on-online-marketplaces" target="_blank" rel="noopener">ACCC chair Gina Cass-Gottlieb</a> said:</p> <blockquote> <p>We believe consumers should be given more information about, and control over, how online marketplaces collect and use their data.</p> </blockquote> <p>The report reiterates the ACCC’s earlier calls for amendments to the Australian Consumer Law to address unfair data terms and practices. It also points out that the government is considering <a href="https://www.ag.gov.au/integrity/consultations/review-privacy-act-1988" target="_blank" rel="noopener">proposals for major changes to privacy law</a>.</p> <p>However, none of these proposals is likely to come into effect in the near future. In the meantime, we should also consider whether practices such as obtaining information about users from third-party data brokers are fully compliant with existing privacy law.</p> <p><strong>Why did the ACCC examine online marketplaces?</strong></p> <p>The ACCC examined competition and consumer issues associated with “general online retail marketplaces” as part of its <a href="https://www.accc.gov.au/focus-areas/inquiries-ongoing/digital-platform-services-inquiry-2020-2025" target="_blank" rel="noopener">five-year Digital Platform Services Inquiry</a>.</p> <p>These marketplaces facilitate transactions between third-party sellers and consumers on a common platform. They do not include retailers that don’t operate marketplaces, such as Kmart, or platforms such as Gumtree that carry classified ads but don’t allow transactions.</p> <p>The ACCC report focuses on the four largest online marketplaces in Australia: Amazon Australia, Catch, eBay Australia and Kogan. In 2020–21, these four carried sales totalling $8.4 billion.</p> <figure class="align-center "><em><img src="https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=401&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=401&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=401&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/460716/original/file-20220502-18-4pvx0.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=3 2262w" alt="" /></em><figcaption><em><span class="caption">Online marketplaces such as Amazon, eBay, Catch and Kogan facilitate transactions between third-party buyers and sellers.</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/new-york-usa-november-1-2018-1219079038" target="_blank" rel="noopener">Shutterstock</a></span></em></figcaption></figure> <p>According to the report, eBay has the largest sales of these companies. Amazon Australia is the second-largest and the fastest-growing, with an 87% increase in sales over the past two years.</p> <p>The ACCC examined:</p> <ul> <li>the state of competition in the relevant markets</li> <li>issues facing sellers who depend on selling their products through these marketplaces</li> <li>consumer issues including concerns about personal information collection, use and sharing.</li> </ul> <p><strong>Consumers don’t want their data used for other purposes</strong></p> <p>The ACCC expressed concern that in online marketplaces, “the extent of data collection, use and disclosure … often does not align with consumer preferences”.</p> <p>The Commission pointed to surveys about <a href="https://www.accc.gov.au/system/files/Consumer%20Policy%20Research%20Centre%20%28CPRC%29%20%2818%20August%202021%29.pdf" target="_blank" rel="noopener">Australian consumer attitudes to privacy</a> which indicate:</p> <ul> <li>94% did not feel comfortable with how digital platforms including online marketplaces collect their personal information</li> <li>92% agreed that companies should only collect information they need for providing their product or service</li> <li>60% considered it very or somewhat unacceptable for their online behaviour to be monitored for targeted ads and offers.</li> </ul> <p>However, the four online marketplaces analysed:</p> <ul> <li>do not proactively present privacy terms to consumers “throughout the purchasing journey”</li> <li>may allow advertisers or other third parties to place tracking cookies on users’ devices</li> <li>do not clearly identify how consumers can opt out of cookies while still using the marketplace.</li> </ul> <p>Some of the marketplaces also obtain extra data about individuals from third-party data brokers or advertisers.</p> <p>The <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3432769" target="_blank" rel="noopener">harms from increased tracking and profiling</a> of consumers include decreased privacy; manipulation based on detailed profiling of traits and weaknesses; and discrimination or exclusion from opportunities.</p> <p><strong>Limited choices: you can’t just ‘walk out of a store’</strong></p> <p>Some might argue that consumers must not actually care that much about privacy if they keep using these companies, but the choice is not so simple.</p> <p>The ACCC notes the relevant privacy terms are often spread across multiple web pages and offered on a “take it or leave it” basis.</p> <p>The terms also use “bundled consents”. This means that agreeing to the company using your data to fill your order, for example, may be bundled together with agreeing for the company to use your data for its separate advertising business.</p> <p>Further, as my research has shown, there is <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3905693" target="_blank" rel="noopener">so little competition on privacy</a> between these marketplaces that consumers can’t just find a better offer. The ACCC agrees:</p> <blockquote> <p>While consumers in Australia can choose between a number of online marketplaces, the common approaches and practices of the major online marketplaces to data collection and use mean that consumers have little effective choice in the amount of data they share.</p> </blockquote> <p>Consumers also seem unable to require these companies to delete their data. The situation is quite different from conventional retail interactions where a consumer can select “unsubscribe” or walk out of a store.</p> <p><strong>Does our privacy law currently permit all these practices?</strong></p> <p>The ACCC has reiterated its earlier calls to amend the Australian Consumer Law to prohibit unfair practices and make unfair contract terms illegal. (At present unfair contract terms are just void, or unenforceable.)</p> <p>The report also points out that the government is considering proposals for major changes to privacy law, but <a href="https://theconversation.com/a-new-proposed-privacy-code-promises-tough-rules-and-10-million-penalties-for-tech-giants-170711" target="_blank" rel="noopener">these changes</a> are uncertain and may take more than a year to come into effect.</p> <p>In the meantime, we should look more closely at the practices of these marketplaces under current privacy law.</p> <p>For example, under the <a href="https://www.legislation.gov.au/Series/C2004A03712" target="_blank" rel="noopener">federal Privacy Act</a> the four marketplaces</p> <blockquote> <p>must collect personal information about an individual only from the individual unless … it is unreasonable or impracticable to do so.</p> </blockquote> <p>However, <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3905693" target="_blank" rel="noopener">some online marketplaces</a> say they collect information about individual consumers’ interests and demographics from “<a href="https://www.ebay.com.au/help/policies/member-behaviour-policies/user-privacy-notice-privacy-policy?id=4260&amp;mkevt=1&amp;mkcid=1&amp;mkrid=705-53470-19255-0&amp;campid=5338596835&amp;customid=&amp;toolid=10001#section4" target="_blank" rel="noopener">data providers</a>” and <a href="https://www.amazon.com.au/gp/help/customer/display.html?nodeId=202075050&amp;ref_=footer_iba" target="_blank" rel="noopener">other third parties</a>.</p> <p>We don’t know the full detail of what’s collected, but demographic information might include our age range, income, or family details.</p> <p>How is it “unreasonable or impracticable” to obtain information about our demographics and interests directly from us? Consumers could ask online marketplaces this question, and complain to the <a href="https://www.oaic.gov.au/privacy/privacy-complaints" target="_blank" rel="noopener">Office of the Australian Information Commissioner</a> if there is no reasonable answer.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/182134/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/katharine-kemp-402096" target="_blank" rel="noopener">Katharine Kemp</a>, Senior Lecturer, Faculty of Law &amp; Justice, UNSW, <a href="https://theconversation.com/institutions/unsw-sydney-1414" target="_blank" rel="noopener">UNSW Sydney</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/accc-says-consumers-need-more-choices-about-what-online-marketplaces-are-doing-with-their-data-182134" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

How does Spotify use your data? Even experts aren’t sure

<p dir="ltr">Spotify has revolutionised the music industry, and its ability to recommend music tailored to your personal taste has been a standout feature.</p> <p dir="ltr">But it isn’t the only app to provide this kind of personalised experience, with Artificial Intelligence being used to create your personalised newsfeeds on Facebook and Twitter, recommend purchases on Amazon, or even the order of search results on Google.</p> <p dir="ltr">To achieve this, these apps and websites use our data in their recommendation algorithms - but they are so secretive about these algorithms that we don’t fully know how they work.</p> <p dir="ltr">In a search for answers, a team of New Zealand legal and music experts <a href="https://www.scimex.org/newsfeed/tinder-and-spotifys-fine-print-arent-clear-about-how-they-use-our-data-for-recs" target="_blank" rel="noopener">pored over</a> several versions of the privacy policies and Terms of Use used by Spotify and Tinder to determine how our data is being used as new features have been rolled out.</p> <p dir="ltr">Their work, published in the <em><a href="https://doi.org/10.1080/03036758.2022.2064517" target="_blank" rel="noopener">Journal of the Royal Society of New Zealand</a></em>, found that Spotify’s privacy policy has nearly doubled since its launch in 2012, which reflects an increase in the amount of data the platform now collects.</p> <p dir="ltr"><strong>The algorithm hungers for data</strong></p> <p dir="ltr">Originally, Spotify collected basic information such as the kinds of songs played, the playlists created, and the email address, age, gender, and location of a user, as well as their profile picture, and the pictures and names of their Facebook friends if their profile was linked.</p> <p dir="ltr">In the 2021 policy, Spotify collects voice data, users’ photos, and location data - and the team of experts have connected this expansion to the patents the company owns.</p> <p dir="ltr">That same year, “Spotify was granted a patent that allows the company to promote ‘personalised content’ based on the ‘personality traits’ it detects from voice data and background noise,” the authors wrote, suggesting the algorithm has changed to capture voice data.</p> <p dir="ltr">As for its Terms of Use, the authors found both Spotify and Tinder used ambiguous wording and vague language, despite expectations that it would be somewhat transparent because it is a legal agreement between the platform and its users.</p> <p dir="ltr">They noted that the opaque style of the Terms of Use made analysis more difficult.</p> <p dir="ltr">Despite this, they found that from 2015, Spotify’s recommendations were also influenced by “commercial considerations”, including third-party agreements Spotify had with other companies.</p> <p dir="ltr">The team of experts argue that this particular change “provides ample room for the company to legally highlight content to a specific user based on a commercial agreement”.</p> <p dir="ltr">Meanwhile, Spotify has also started offering artists the option to lower their royalty rate “in exchange for an increased number of recommendations”.</p> <p dir="ltr">Taken together, the authors argue that this means that the playlists made specifically for us could be influenced by factors outside of our control, “like commercial deals with artists and labels”.</p> <p dir="ltr"><strong>Users deserve answers</strong></p> <p dir="ltr">Though they made these findings, the authors note that some will still be speculative while companies stay tight-lipped about how their algorithms work.</p> <p dir="ltr">“When companies are uncooperative, and typical academic inquiry cannot be complete without breaching contractual agreements, we maintain that scholarly investigation can have a speculative character,” they wrote.</p> <p dir="ltr">“This suggestion does not mean that a less academic rigour can be expected or granted about making assumptions on the basis of partial, observable data. Instead, we propose that it is the companies’ remit and burden to refute such assumptions and communicating the clarity of their systems.”</p> <p dir="ltr">With many of us using services like Spotify, Tinder, Google and Amazon on a daily basis, it’s up to these companies to become more transparent in how they use our information with the understanding that we deserve to know what happens to the data that makes us, us.</p> <p><span id="docs-internal-guid-22451cbe-7fff-7512-7ed6-c621fbd456c7"></span></p> <p dir="ltr"><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

Past policies have created barriers to voting in remote First Nations communities

<p>The rate of voter participation in federal elections by people living in remote Indigenous communities has been <a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">lower than the national average</a> since First Nations people were granted the right to vote in 1962. In recent years, the rate has been in <a href="http://doi.org/10.22459/DAER.05.2012;%20http://doi.org/10.25911/5df209771dd57" target="_blank" rel="noopener">decline</a>. Rates are lowest in the Northern Territory.</p> <p>The low rate of participation among First Nations people living in remote communities could affect the lower house election results in the Northern Territory seat of Lingiari. Warren Snowden has stepped down after 20 years holding the seat.</p> <p><strong>Determining rates of voter participation</strong></p> <p>Measuring the number of First Nations people (or any particular demographic group) who vote in federal elections is challenging. Electoral rolls do not include information about cultural identity. Census figures, which could be used as a basis for comparison against voter turnout rates, are imprecise.</p> <p>Data from the 2005 NT Assembly general election <a href="http://doi.org/10.22459/DAER.05.2012;%20https:/press.anu.edu.au/publications/directions-australian-electoral-reform" target="_blank" rel="noopener">show</a> voting rates were 20% lower in electorates with the highest Indigenous populations.</p> <p>In his study of the 2019 federal election, Australian National University researcher <a href="http://doi.org/10.25911/5df209771dd57" target="_blank" rel="noopener">Will Sanders</a> found</p> <blockquote> <p>perhaps only half of eligible Aboriginal citizens […] may be utilising their right to vote.</p> </blockquote> <p>Reports from the Northern Territory’s most recent Assembly election also found <a href="https://www.abc.net.au/news/2020-08-21/poor-indigenous-voter-turnout-at-nt-election/12580688" target="_blank" rel="noopener">record low</a><a href="https://www.abc.net.au/news/2020-08-15/coronavirus-impacting-on-remote-voter-turnout-nt-election/12559066">turnout</a> across Indigenous communities.</p> <p><a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">Research</a> <a href="http://doi.org/10.25911/5df209771dd57" target="_blank" rel="noopener">shows</a> rates of informal votes are also higher in remote Indigenous communities.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">NLC accuses the Australian Electoral Commission of 'failing' Aboriginal voters [Matt Garrick, ABC]<br />Northern Territory land council has accused the AEC of failing Aboriginal people by not engaging more bush voters to have their say at the federal election.<a href="https://t.co/fCKRluGaoD">https://t.co/fCKRluGaoD</a> <a href="https://t.co/J3a04DyJJB">pic.twitter.com/J3a04DyJJB</a></p> <p>— First Nations Tgraph (@FNTelegraph) <a href="https://twitter.com/FNTelegraph/status/1514025685521952770?ref_src=twsrc%5Etfw">April 12, 2022</a></p></blockquote> <p><strong>Barriers to First Nations people voting</strong></p> <p>Decisions made at the federal level over the last three decades appear to have provided significant obstacles to voting in some First Nations communities.</p> <p>First is the 1996 abolition of the Aboriginal and Torres Strait Islander Election Education and Information Service.</p> <p><a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">Two</a> <a href="http://doi.org/10.22459/DAER.05.2012;%20https:/press.anu.edu.au/publications/directions-australian-electoral-reform" target="_blank" rel="noopener">studies</a> point to this abolition as a potential reason for a decline in voting rates in remote Indigenous communities since the mid-nineties.</p> <p>Established in 1979, this service existed specifically to increase voter registration rates among First Nations people. This was done by, for example, providing voter education and election materials in Indigenous languages.</p> <p>The second decision was the 2005 abolition of the Aboriginal and Torres Strait Islander Commission.</p> <p>First Nations people participated in five of the Commission’s elections administered by the same Australian Electoral Commission responsible for federal elections. Although voting was voluntary, <a href="https://openresearch-repository.anu.edu.au/bitstream/1885/41511/3/2003_DP252.pdf" target="_blank" rel="noopener">analysis</a> shows participation was higher in northern and central Australia than in southern Australia.</p> <p>The third relevant policy change was the passage of the 2006 Electoral Integrity Bill. This introduced more stringent rules for the identification required to vote, making it more difficult for people in <a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">at least one remote community</a> to register to vote.</p> <p>The Morrison government’s unsuccessful 2021 proposal to introduce even tougher <a href="https://www.canberratimes.com.au/story/7488468/govt-accused-of-trumpist-move-to-suppress-voting/?cs=14264" target="_blank" rel="noopener">voter identification laws</a> would likely <a href="https://www.theguardian.com/australia-news/2021/oct/27/proposed-voter-id-laws-real-threat-to-rights-of-indigenous-australians-and-people-without-homes" target="_blank" rel="noopener">exacerbate this problem</a>.</p> <p>The fourth policy decision was a 2012 change to the Commonwealth Electoral Act, known as the “Federal Direct Enrolment and Update”.</p> <p>This enabled the Australian Electoral Commission to register eligible Australians to vote based on information available through several government agencies. These include Centrelink/the Department of Human Services, the Australian Taxation Office, and the National Exchange of Vehicle and Driver Information Service.</p> <p>But the Electoral Commission has <a href="http://doi.org/10.25911/5df209771dd57" target="_blank" rel="noopener">chosen not to use this mechanism for enrolment in parts of Australia</a> where mail is sent to a single community address (“mail exclusion areas”).</p> <p>This means people living in many remote communities are not automatically added to the electoral roll, unlike most of the rest of Australia.</p> <p>West Arnhem Regional Council mayor Matthew Ryan and Yalu Aboriginal Corporation chairman Ross Mandi launched an official complaint to the Australian Human Rights Commissioner over this issue in June last year.</p> <p>They <a href="https://www.abc.net.au/news/2021-06-19/nt-voters-racial-discrimination-human-rights-commission/100227762" target="_blank" rel="noopener">argued</a> failure to apply the Federal Direct Enrolment and Update in remote communities represents a breach of the Racial Discrimination Act.</p> <p>A <a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">survey</a> of residents in one remote community on South Australia’s APY lands found a lack of information contributed to low participation in elections.</p> <p>Obstacles included:</p> <ul> <li> <p>a lack of materials available in appropriate languages</p> </li> <li> <p>uncertainty about how to cast a formal vote</p> </li> <li> <p>problems related to literacy, and</p> </li> <li> <p>a lack of appropriate identification necessary to enrol.</p> </li> </ul> <p>In October last year, the Australian Electoral Commission announced new funding for its <a href="https://www.aec.gov.au/media/2021/10-28.htm" target="_blank" rel="noopener">Indigenous Electoral Participation program</a> with the aim of increasing enrolment rates; the upcoming election will show if the program is working.</p> <p><strong>Lingiari</strong></p> <p>Given that voting is compulsory in Australia, non-participation is a concern in any election. But these issues are likely to be particularly relevant in the 2022 federal election, at least in the seat of Lingiari.</p> <p>Lingiari covers all of the Northern Territory outside the greater Darwin/Palmerston area. So it is the one House of Representatives division where Indigenous Australians (many of them living in remote communities) have clear electoral <a href="http://doi.org/10.25911/5df209771dd57" target="_blank" rel="noopener">power</a>.</p> <p>Providing more mobile polling booths could help make voting easier for people in remote Indigenous communities. Currently, these booths can be present for as little as two hours during an entire election period.</p> <p>There is also <a href="https://doi.org/10.1111/j.1467-8497.2010.01552.x" target="_blank" rel="noopener">evidence</a> Indigenous people are more likely to vote in elections for Indigenous candidates, and for candidates who have visited their community.</p> <p>Warren Snowden has represented the electorate since its creation in 2001, but he is not contesting this election; the seat is up for grabs.</p> <p>Indigenous people will determine who takes Snowden’s place. But how many of them vote may be limited by their ability to enrol, the availability of information in an appropriate language, and access a polling booth.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/181194/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/morgan-harrington-1207111" target="_blank" rel="noopener">Morgan Harrington</a>, Research Fellow, Centre for Aboriginal Economic Policy Research, <a href="https://theconversation.com/institutions/australian-national-university-877" target="_blank" rel="noopener">Australian National University</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/past-policies-have-created-barriers-to-voting-in-remote-first-nations-communities-181194" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: The Australian Electoral Commision (<a href="https://www.flickr.com/photos/auselectoralcom/48720382352/in/album-72157710806573631/" target="_blank" rel="noopener">Flickr</a>)</em></p>

Legal

Placeholder Content Image

Scientists creating inhalable Covid vaccine

<p dir="ltr">Scientists are a step closer to creating an inhalable “aerogel” vaccine that successfully induces an immune response against Covid.</p> <p dir="ltr">Researchers at Penn State University developed and patented a gel-like material, called an "aerogel," to deliver antimicrobials to the lungs to treat bacterial respiratory infections, particularly tuberculosis.</p> <p dir="ltr">Graduate student in biomedical engineering and a lead author of the <a href="https://www.psu.edu/news/story/inhalable-aerogel-triggers-immunity-covid-19-mice-may-block-transmission/" target="_blank" rel="noopener">study</a> Atip Lawanprasert said there was an advantage to the inhalable formulation for those who don’t like needles.</p> <p dir="ltr">“One is avoidance of needles. Inhalable vaccines might be able to help increase the rate of vaccination because so many people are afraid of injections,” he said.</p> <p dir="ltr">“No matter how high the efficacy of a vaccine, if people don’t get it, then it’s not useful.”</p> <p dir="ltr">Scott Medina, an assistant professor of biomedical engineering at the university, said the team started working on the inhalable vaccine when the pandemic began.</p> <p dir="ltr">“When the pandemic started, we decided to develop an inhalable formulation for COVID-19 by combining our aerogel with a nucleic acid-encoded antigen — specifically, DNA that encodes the SARS-CoV-2 proteins,” he said.</p> <p dir="ltr">Their Covid formula, also known as CoMiP (coronavirus mimetic particle), was created to target alveolar macrophages, a type of white blood cell that surrounds and kills microorganisms, removes dead cells, and stimulates the action of other immune system cells.</p> <p dir="ltr">“Alveolar macrophages represent attractive targets for inhalable vaccines because they are abundant within the lungs, and previous evidence has suggested that they may be important in early COVID-19 pathogenesis,” Medina explained.</p> <p dir="ltr">“Alveolar macrophages are one of our key defenders against viral infection because they serve to present antigens to the rest of the immune system.”</p> <p dir="ltr">The CoMips were tested on mice which were then given a booster dose two weeks later.</p> <p dir="ltr">The samples from the animals were collected 14 days after the vaccine, and day 28, after the booster, which found no significant change in the systemic antibody levels between mice who received CoMiP and those that didn't.</p> <p dir="ltr">The researchers also collected samples from immunised mice to assess differences in the total and spike-protein specific lung mucosal IgA antibodies - the predominant antibody isotype in the mucosal immune system</p> <p dir="ltr">They found a significant increase in the total IgA for mice vaccinated with CoMiPs, but IgA specifically targeting the SARS-CoV-2 spike protein was lower than expected for the vaccinated animals.</p> <p dir="ltr">Medina said data was “encouraging” but more will need to be done.</p> <p dir="ltr"><em>Image: Shutterstock</em></p>

Body

Placeholder Content Image

Readers respond: If you could create any law, what would it be?

<p dir="ltr">We asked you what laws you would create if you had the power to, and we were flooded with answers.</p> <p dir="ltr">From addressing issues with the pension to targeting roundabouts and the weather, here are some of the laws you would create if you could.</p> <p dir="ltr"><strong>Daphne Gardinier</strong> - Make the pension the same as the minimum wage.</p> <p dir="ltr"><strong>Gwen Friend</strong> - That people learn how to use roundabouts!! Especially in regional areas!</p> <p dir="ltr"><strong>Tony Beckett</strong> - To ban all fighting around the world and live in peace and quiet.</p> <p dir="ltr"><strong>Kimberly Anne Taylor </strong>- Remove tax on food items. Politicians must pay for their own security after office. They also do not receive a pension until they are 65 or older.</p> <p dir="ltr"><strong>Eileen Kennett</strong> - Make it harder to become a politician in this country.</p> <p dir="ltr"><strong>Archie Kamaldien</strong> - Change the name of ‘Opposition Party’ to ‘Challenging Party’ so they don’t have to oppose everything the current party is doing BUT to challenge them to do a better job.</p> <p dir="ltr"><strong>Geoff Little</strong> - One year compulsory imprisonment for illegal parking in a disabled parking space.</p> <p dir="ltr"><strong>Alan Connelly</strong> - No feet hanging out your car when in traffic.</p> <p dir="ltr"><strong>Frances Fitch</strong> - Well you can’t legislate against stupidity so I don’t think I’ll bother 😎</p> <p dir="ltr"><strong>Vera Rothwell</strong> - I’d ban winter!</p> <p dir="ltr"><strong>Ray Smetzer</strong> - Football is illegal.</p> <p dir="ltr"><strong>Greg McCafferty</strong> - No more stupid questions.</p> <p><span id="docs-internal-guid-08754050-7fff-9db3-6625-80156830aaf0"></span></p> <p dir="ltr"><em>Image: Getty Images</em></p>

Legal