A Quote by Rebecca MacKinnon

The user in China wants the same thing that any Internet user wants - privacy in conversations, maximum access to information, and the ability to speak their minds online.
Armed with nothing more than a Facebook user's phone number and home address, anyone with an Internet connection and a few dollars can obtain personal information they should never have access to, including a user's date of birth, e-mail address, or estimated income.
Tribalism isn't a bad thing. If you're a Facebook user, or Twitter user or Foursquare user or LinkedIn user, those are all tribes... and they may even have sub-tribes. It's not pejorative, it's declarative.
People who bet against the Internet, who think that somehow this change is just a generational shift, miss that it is a fundamental reorganizing of the power of the end user. The Internet brings tremendous tools to the end user, and that end user is going to use them.
What the Internet's value is that you have access to information but you also have access to every lunatic that's out there that wants to throw up a blog.
The very ability to empathize with a user requires that I have an understanding of that user's value and needs. This is what leads to many product fails. The individuals developing the innovation don't actually use it.
Be reactionary. React to what the market wants. And the market wants one-on-one real time engagement. Now that we have the tools to engage, I'm going to continue fighting for the end user.
Knowledge resides in the user and not in the collection. It is how the user reacts to a collection of information that matters.
On the monetization front, our strengthening leadership in internet user base and broadening reach of our platform have already positioned us as a must-buy platform in online video for brand advertisers to reach a nationwide audience within China.
Privacy is an age of universal email collection and spying, with millions of CCTV cameras and warrantless spying pervasive; privacy has become virtually nonexistent and, therefore, extremely scarce and desirable. Bitcoin can be a completely anonymous transaction that maintains the user's privacy beyond the reach of any authority.
China's efforts to dominate 5G telecommunications will only increase Beijing's opportunities to collect intelligence, disrupt communications and threaten user privacy world-wide. I have personally told U.S. allies that using such Chinese-owned technology will severely limit America's ability to share vital intelligence with them.
Minimize the user's memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate.
I know he wants to get serious. He's definitely not a player, not a poser, not a loser, not a user.
When hackers have access to powerful computers that use brute force hacking, they can crack almost any password; even one user with insecure access being successfully hacked can result in a major breach.
At any time of day, hundreds of different versions of Facebook are running on the Internet - with a changed color here, a moved button there - and the user response to each variation is measured. And the same is done with advertising.
The bread and butter of any internet service is user behavior.
I love a hotel that offers Wi-Fi Internet access, especially if it's free. But I never access sensitive information, like my bank account or an online shopping site that stores my credit card information, on a public Wi-Fi connection.
This site uses cookies to ensure you get the best experience. More info...
Got it!