Technology

Placeholder Content Image

Coles launches new AI-powered shopping trolley

<p>Coles is set to become the "first Australian retailer" to introduce AI shopping trolleys, letting shoppers pick, weigh and pay for their groceries without having to visit a checkout.</p> <p>The supermarket giant said its smart trolley uses advanced AI technology, sensors and an in-built scale to scan groceries, including fresh produce, directly into shopping bags.</p> <p>Shoppers can also use an interactive digital screen to identify and locate in-store specials as well as keep track the running total of their shop to help manage their budget and ensure “there are no surprises” when they go to pay. </p> <p>The trolleys are also designed to "streamline the checkout process" as each smart trolley comes with an EFTPOS machine attached.</p> <p>Coles Chief Digital Officer, Ben Hassing, said the introduction of its Smart Trolley showcases Coles’ commitment to delivering value and convenience to customers through innovative digital solutions. </p> <p>“As the first retailer in Australia to introduce AI-powered trolleys, we’re excited to offer our customers a convenient and engaging way to shop in-store, helping them save time, manage their budget and checkout faster – or at their own pace,” Ben said. </p> <p>“The Coles Smart Trolley illustrates our omnichannel approach, leveraging digital capabilities to enrich the in-store experience. </p> <p>“We are committed to testing and learning through innovative solutions to make sure we are delivering on customer needs, increasing convenience, and helping customers discover more value through their shop at Coles.”</p> <p>Coles’ smart trolley was created by New York-based software developers Instacart, which rolled out its AI-powered grocery carts in several supermarkets overseas earlier this year.</p> <p>However, not everyone is onboard with the smart trolleys, as many shoppers said they would "refuse" to use the AI-powered carts, blasting them as “lazy” and expressing fears supermarkets would also store personal data.</p> <p>“I don’t work for them, scan my products and pack my bags, as per your job description,” one raged on Facebook after Instacart launched in US supermarket ShopRite. </p> <p>“Not a chance I will use an AI trolley, I want a human to scan my groceries,” another added.</p> <p>Coles will trial the “all-in-one” shopping device at its Coles Richmond Traders store in Melbourne from January next year.</p> <p>The announcement comes after <a href="https://www.oversixty.com.au/lifestyle/food-wine/woolies-trial-bold-new-scan-as-you-go-trolleys" target="_blank" rel="noopener">Woolworths</a> also announced the launch of "scan as you go" trolleys, although the Woolies carts don't use AI technology to read what is being placed into the trolley, instead enabling shoppers to manually scan each item as they go.</p> <p><em>Image credits: Coles</em></p>

Technology

Placeholder Content Image

Humanising AI could lead us to dehumanise ourselves

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/raffaele-f-ciriello-1079723">Raffaele F Ciriello</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a> and <a href="https://theconversation.com/profiles/angelina-ying-chen-2230113">Angelina Ying Chen</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p>Irish writer John Connolly <a href="https://www.goodreads.com/quotes/3147986-the-nature-of-humanity-its-essence-is-to-feel-another-s">once said</a>: "The nature of humanity, its essence, is to feel another’s pain as one’s own, and to act to take that pain away."</p> <p>For most of our history, we believed empathy was a uniquely human trait – a special ability that set us apart from machines and other animals. But this belief is now being challenged.</p> <p>As AI becomes a bigger part of our lives, entering even our most intimate spheres, we’re faced with a philosophical conundrum: could attributing human qualities to AI diminish our own human essence? Our <a href="https://www.researchgate.net/publication/375086411_Feels_Like_Empathy_How_Emotional_AI_Challenges_Human_Essence">research</a> suggests it can.</p> <h2>Digitising companionship</h2> <p>In recent years, AI “companion” apps such as Replika have attracted millions of users. Replika allows users to create custom digital partners to engage in intimate conversations. Members who pay for <a href="https://help.replika.com/hc/en-us/articles/360032500052-What-is-Replika-Pro#:%7E:text=Replika%20Pro%20gives%20you%20access,relationship%20status%20to%20Romantic%20Partner.">Replika Pro</a> can even turn their AI into a “romantic partner”.</p> <p>Physical AI companions aren’t far behind. Companies such as JoyLoveDolls are selling <a href="https://www.joylovedolls.com/collections/sex-robots">interactive sex robots</a> with customisable features including breast size, ethnicity, movement and AI responses such as moaning and flirting.</p> <p>While this is currently a niche market, history suggests today’s digital trends will become tomorrow’s global norms. With about <a href="https://www.statista.com/chart/31243/respondents-who-feel-fairly-or-very-lonely/">one in four</a> adults experiencing loneliness, the demand for AI companions will grow.</p> <h2>The dangers of humanising AI</h2> <p>Humans have long attributed human traits to non-human entities – a tendency known as anthropomorphism. It’s no surprise we’re doing this with AI tools such as ChatGPT, which appear to “think” and “feel”. But why is humanising AI a problem?</p> <p>For one thing, it allows AI companies to exploit our tendency to form attachments with human-like entities. Replika is <a href="https://replika.com">marketed</a> as “the AI companion who cares”. However, to avoid legal issues, the company elsewhere points out Replika isn’t sentient and merely learns through millions of user interactions.</p> <p>Some AI companies overtly <a href="https://www.space.gov.au/news-and-media/akin-assistive-ai-improve-life-space-and-earth">claim</a> their AI assistants have empathy and can even anticipate human needs. Such claims are misleading and can take advantage of people seeking companionship. Users may become <a href="https://theconversation.com/i-tried-the-replika-ai-companion-and-can-see-why-users-are-falling-hard-the-app-raises-serious-ethical-questions-200257">deeply emotionally invested</a> if they believe their AI companion truly understands them.</p> <p>This raises serious ethical concerns. A user <a href="https://www.researchgate.net/publication/374505266_Ethical_Tensions_in_Human-AI_Companionship_A_Dialectical_Inquiry_into_Replika">will hesitate</a> to delete (that is, to “abandon” or “kill”) their AI companion once they’ve ascribed some kind of sentience to it.</p> <p>But what happens when said companion unexpectedly disappears, such as if the user can no longer afford it, or if the company that runs it shuts down? While the companion may not be real, the feelings attached to it are.</p> <h2>Empathy – more than a programmable output</h2> <p>By reducing empathy to a programmable output, do we risk diminishing its true essence? To answer this, let’s first think about what empathy really is.</p> <p>Empathy involves responding to other people with understanding and concern. It’s when you share your friend’s sorrow as they tell you about their heartache, or when you feel joy radiating from someone you care about. It’s a profound experience – rich and beyond simple forms of measurement.</p> <p>A fundamental difference between humans and AI is that humans genuinely feel emotions, while AI can only simulate them. This touches on the <a href="https://www.researchgate.net/publication/375086411_Feels_Like_Empathy_How_Emotional_AI_Challenges_Human_Essence">hard problem of consciousness</a>, which questions how subjective human experiences arise from physical processes in the brain.</p> <p>While AI can simulate understanding, any “empathy” it purports to have is a result of programming that mimics empathetic language patterns. Unfortunately, AI providers have a financial incentive to trick users into growing attached to their seemingly empathetic products.</p> <h2>The dehumanAIsation hypothesis</h2> <p>Our “dehumanAIsation hypothesis” highlights the ethical concerns that come with trying to reduce humans to some basic functions that can be replicated by a machine. The more we humanise AI, the more we risk dehumanising ourselves.</p> <p>For instance, depending on AI for emotional labour could make us less tolerant of the imperfections of real relationships. This could weaken our social bonds and even lead to emotional deskilling. Future generations may become less empathetic – losing their grasp on essential human qualities as emotional skills continue to be commodified and automated.</p> <p>Also, as AI companions become more common, people may use them to replace real human relationships. This would likely increase loneliness and alienation – the very issues these systems claim to help with.</p> <p>AI companies’ collection and analysis of emotional data also poses significant risks, as these data could be used to manipulate users and maximise profit. This would further erode our privacy and autonomy, taking <a href="https://theconversation.com/explainer-what-is-surveillance-capitalism-and-how-does-it-shape-our-economy-119158">surveillance capitalism</a> to the next level.</p> <h2>Holding providers accountable</h2> <p>Regulators need to do more to hold AI providers accountable. AI companies should be honest about what their AI can and can’t do, especially when they risk exploiting users’ emotional vulnerabilities.</p> <p>Exaggerated claims of “genuine empathy” should be made illegal. Companies making such claims should be fined – and repeat offenders shut down.</p> <p>Data privacy policies should also be clear, fair and without hidden terms that allow companies to exploit user-generated content.</p> <p>We must preserve the unique qualities that define the human experience. While AI can enhance certain aspects of life, it can’t – and shouldn’t – replace genuine human connection.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/240803/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/raffaele-f-ciriello-1079723">Raffaele F Ciriello</a>, Senior Lecturer in Business Information Systems, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a> and <a href="https://theconversation.com/profiles/angelina-ying-chen-2230113">Angelina Ying Chen</a>, PhD student , <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/humanising-ai-could-lead-us-to-dehumanise-ourselves-240803">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

How can we improve public health communication for the next pandemic? Tackling distrust and misinformation is key

<div class="theconversation-article-body"> <p><em><a href="https://theconversation.com/profiles/shauna-hurley-203140">Shauna Hurley</a>, <a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a> and <a href="https://theconversation.com/profiles/rebecca-ryan-1522824">Rebecca Ryan</a>, <a href="https://theconversation.com/institutions/la-trobe-university-842">La Trobe University</a></em></p> <p>There’s a common thread linking our <a href="https://www.visualcapitalist.com/history-of-pandemics-deadliest/">experience of pandemics</a> over the past 700 years. From the black death in the 14th century to COVID in the 21st, public health authorities have put emergency measures such as isolation and quarantine in place to stop infectious diseases spreading.</p> <p>As we know from COVID, these measures upend lives in an effort to save them. In both the <a href="https://www.thinkglobalhealth.org/article/pandemic-protests-when-unrest-and-instability-go-viral">recent</a> and <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3559034/">distant past</a> they’ve also given rise to collective unrest, confusion and resistance.</p> <p>So after all this time, what do we know about the role public health communication plays in helping people understand and adhere to protective measures in a crisis? And more importantly, in an age of misinformation and distrust, how can we improve public health messaging for any future pandemics?</p> <p>Last year, we published a <a href="https://www.cochranelibrary.com/cdsr/doi/10.1002/14651858.CD015144/full">Cochrane review</a> exploring the global evidence on public health communication during COVID and other infectious disease outbreaks including SARS, MERS, influenza and Ebola. Here’s a snapshot of what we found.</p> <h2>The importance of public trust</h2> <p>A key theme emerging in analysis of the COVID pandemic globally is public trust – or lack thereof – in governments, public institutions and science.</p> <p>Mounting evidence suggests <a href="https://www.washingtonpost.com/world/2022/02/01/trust-lancet-covid-study/">levels of trust in government</a> were <a href="https://www.thelancet.com/journals/lancet/article/PIIS0140-6736(22)00172-6/fulltext">directly proportional</a> to fewer COVID infections and higher vaccination rates across the world. It was a crucial factor in people’s willingness to follow public health directives, and is now a key focus for future pandemic preparedness.</p> <p>Here in Australia, public trust in governments and health authorities steadily eroded over time.</p> <p>Initial information from governments and health authorities about the unfolding COVID crisis, personal risk and mandated protective measures was generally clear and consistent across the country. The establishment of the <a href="https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/rp/rp1920/Quick_Guides/AustralianCovid-19ResponseManagement#_Toc38973752">National Cabinet</a> in 2020 signalled a commitment from state, territory and federal governments to consensus-based policy and public health messaging.</p> <p>During this early phase of relative unity, <a href="https://theconversation.com/inflation-covid-inequality-new-report-shows-australias-social-cohesion-is-at-crossroads-195198">Australians reported</a> higher levels of belonging and trust in government.</p> <p>But as the pandemic wore on, public trust and confidence fell on the back of conflicting state-federal pandemic strategies, blame games and the <a href="https://theconversation.com/we-lost-the-plot-on-covid-messaging-now-governments-will-have-to-be-bold-to-get-us-back-on-track-186732">confusing fragmentation</a> of public health messaging. The divergence between <a href="https://www.theaustralian.com.au/nation/tale-of-two-cities-gripped-by-covid-fear-outbreak/news-story/cf1b922610aeb0b0ee9b0b53486bf640">lockdown policies and public health messaging</a> adopted by <a href="https://www.theage.com.au/national/victoria/a-tale-of-two-cities-that-doesn-t-seem-fair-20211012-p58z79.html">Victoria and New South Wales</a> is one example, but there are plenty of others.</p> <p>When state, territory and federal governments have conflicting policies on protective measures, people are easily confused, lose trust and become harder to engage with or persuade. Many tune out from partisan politics. Adherence to mandated public health measures falls.</p> <p>Our research found clarity and consistency of information were key features of effective public health communication throughout the COVID pandemic.</p> <p>We also found public health communication is most effective when authorities work in partnership with different target audiences. In Victoria, the case brought against the state government for the <a href="https://www.abc.net.au/news/2023-07-24/melbourne-public-housing-tower-covid-lockdown-compensation/102640898">snap public housing tower lockdowns</a> is a cautionary tale underscoring how essential considered, tailored and two-way communication is with diverse communities.</p> <h2>Countering misinformation</h2> <p>Misinformation is <a href="https://reutersinstitute.politics.ox.ac.uk/hydroxychloroquine-australia-cautionary-tale-journalists-and-scientists">not a new problem</a>, but has been supercharged by the advent of <a href="https://theconversation.com/health-misinformation-is-rampant-on-social-media-heres-what-it-does-why-it-spreads-and-what-people-can-do-about-it-217059">social media</a>.</p> <p>The much-touted “miracle” drug <a href="https://www.vox.com/future-perfect/22663127/ivermectin-covid-treatments-vaccines-evidence">ivermectin</a> typifies the extraordinary traction unproven treatments gained locally and globally. Ivermectin is an anti-parasitic drug, lacking evidence for viruses like COVID.</p> <p>Australia’s drug regulator was forced to <a href="https://www.theguardian.com/australia-news/2021/sep/10/australian-drug-regulator-bans-ivermectin-as-covid-treatment-after-sharp-rise-in-prescriptions">ban ivermectin presciptions</a> for anything other than its intended use after a <a href="https://www.theguardian.com/world/2021/aug/30/australian-imports-of-ivermectin-increase-10-fold-prompting-warning-from-tga">sharp increase</a> in people seeking the drug sparked national shortages. Hospitals also reported patients <a href="https://www.theguardian.com/australia-news/2021/sep/02/sydney-covid-patient-in-westmead-hospital-after-overdosing-on-ivermectin-and-other-online-cures">overdosing on ivermectin</a> and cocktails of COVID “cures” promoted online.</p> <p>The <a href="https://www.thelancet.com/journals/lancet/article/PIIS0140-6736(22)01585-9/fulltext">Lancet Commission</a> on lessons from the COVID pandemic has called for a coordinated international response to countering misinformation.</p> <p>As part of this, it has called for more accessible, accurate information and investment in scientific literacy to protect against misinformation, including that shared across social media platforms. The World Health Organization is developing resources and recommendations for health authorities to address this “<a href="https://www.who.int/health-topics/infodemic#tab=tab_1">infodemic</a>”.</p> <p>National efforts to directly tackle misinformation are vital, in combination with concerted efforts to raise health literacy. The Australian Medical Association has <a href="https://www.ama.com.au/media/action-needed-tackle-health-misinformation-internet-social-media">called on the federal government</a> to invest in long-term online advertising to counter health misinformation and boost health literacy.</p> <p>People of all ages need to be equipped to think critically about who and where their health information comes from. With the rise of AI, this is an increasingly urgent priority.</p> <h2>Looking ahead</h2> <p>Australian health ministers recently <a href="https://www.cdc.gov.au/newsroom/news-and-articles/australian-health-ministers-reaffirm-commitment-australian-cdc">reaffirmed their commitment</a> to the new Australian Centre for Disease Control (CDC).</p> <p>From a science communications perspective, the Australian CDC could provide an independent voice of evidence and consensus-based information. This is exactly what’s needed during a pandemic. But full details about the CDC’s funding and remit have been the subject of <a href="https://www.croakey.org/federal-budget-must-deliver-on-climate-health-and-the-centre-for-disease-control-sector-leaders-warn/">some conjecture</a>.</p> <p>Many of our <a href="https://www.cochraneaustralia.org/articles/covidandcommunications">key findings</a> on effective public health communication during COVID are not new or surprising. They reinforce what we know works from previous disease outbreaks across different places and points in time: tailored, timely, clear, consistent and accurate information.</p> <p>The rapid rise, reach and influence of misinformation and distrust in public authorities bring a new level of complexity to this picture. Countering both must become a central focus of all public health crisis communication, now and in the future.</p> <p><em>This article is part of a <a href="https://theconversation.com/au/topics/the-next-pandemic-160343">series on the next pandemic</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/226718/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/shauna-hurley-203140">Shauna Hurley</a>, PhD candidate, School of Public Health, <a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a> and <a href="https://theconversation.com/profiles/rebecca-ryan-1522824">Rebecca Ryan</a>, Senior Research Fellow, Health Practice and Management; Head, Centre for Health Communication and Participation, <a href="https://theconversation.com/institutions/la-trobe-university-842">La Trobe University</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-can-we-improve-public-health-communication-for-the-next-pandemic-tackling-distrust-and-misinformation-is-key-226718">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

The internet is worse than it used to be. How did we get here, and can we go back?

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/wonsun-shin-1300054">Wonsun Shin</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722"><em>The University of Melbourne</em></a></em></p> <p>When it comes to our experience of the internet, “the times, <a href="https://en.wikipedia.org/wiki/The_Times_They_Are_a-Changin%27_(song)">they are a-changin’</a>”, as Bob Dylan would say. You can’t quite recall how, but the internet certainly feels different these days.</p> <p>To some, it is “<a href="https://www.npr.org/2024/01/16/1224878097/everyday-users-are-complaining-that-the-internet-is-more-chaotic-than-ever">less fun and less informative</a>” than it used to be. To others, online searches are made up of “<a href="https://www.theverge.com/c/23998379/google-search-seo-algorithm-webpage-optimization?src=longreads">cookie cutter</a>” pages that drown out useful information and are saturated with scams, spam and content generated by artificial intelligence (AI).</p> <p>Your social media feeds are full of eye-catching, provocative, hyper-targeted, or anger-inducing content, from <a href="https://theconversation.com/the-dead-internet-theory-makes-eerie-claims-about-an-ai-run-web-the-truth-is-more-sinister-229609">bizarre AI-generated imagery</a> to robot-like comments. You’re lucky if your video feeds are not solely made up of exhortations to “subscribe”.</p> <p>How did we get here? And can we claw our way back?</p> <h2>Commercial interests rule</h2> <p>One major factor contributing to the current state of the internet is its over-commercialisation: financial motives drive much of the content. This has arguably led to the prevalence of sensationalism, prioritising virality over information quality.</p> <p>Covert and deceptive advertising is widespread, blurring the line between commercial and non-commercial content to attract more attention and engagement.</p> <p>Another driving force is the dominance of tech giants like Google, Meta and Amazon. They reach billions worldwide and wield immense power over the content we consume.</p> <p>Their platforms use advanced tracking technologies and opaque algorithms to generate hyper-targeted media content, powered by extensive user data. This creates <a href="https://www.campaignasia.com/article/the-echo-chamber-effect-how-algorithms-shape-our-worldview/491762">filter bubbles</a>, where users are exposed to limited content that reinforces their existing beliefs and biases, and <a href="https://philarchive.org/archive/NGUECA">echo chambers</a> where other viewpoints are actively discredited.</p> <p>Bad actors like <a href="https://abcnews.go.com/Technology/ai-fuel-financial-scams-online-industry-experts/story?id=103732051">cyber criminals and scammers</a> have been an enduring problem online. However, evolving technology like generative AI has further empowered them, enabling them to create highly realistic fake images, deepfake videos and <a href="https://www.newyorker.com/science/annals-of-artificial-intelligence/the-terrifying-ai-scam-that-uses-your-loved-ones-voice">voice cloning</a>.</p> <p>AI’s ability to automate content creation has also flooded the internet with low-quality, misleading and harmful material at an unprecedented scale.</p> <p>In sum, the accelerated commercialisation of the internet, the dominance of media tech giants and the presence of bad actors have infiltrated content on the internet. The rise of AI further intensifies this, making the internet more chaotic than ever.</p> <h2>Some of the ‘good’ internet remains</h2> <p>So, what was the “good internet” some of us long for with nostalgia?</p> <p>At the outset, the internet was meant to be a free egalitarian space people were meant to “surf” and “browse”. Knowledge was meant to be shared: sites such as Wikipedia and The Internet Archive are continuing bastions of knowledge.</p> <p>Before the advent of filter bubbles, the internet was a creative playground where people explored different ideas, discussed varying perspectives, and collaborated with individuals from “outgroups” – those outside their social circles who may hold opposing views.</p> <p>Early social media platforms were built on the ethos of reconnecting with long-lost classmates and family members. Many of us have community groups, acquaintances and family we reach out to via the internet. The “connection” aspect of the internet remains as important as ever – as we all saw during the COVID pandemic.</p> <p>What else do we want to preserve? Privacy. A New Yorker cartoon joke in 1993 stated that “<a href="https://web.archive.org/web/20051029045942/http://www.unc.edu/depts/jomc/academics/dri/idog.html">on the internet, nobody knows you’re a dog</a>”. Now everyone – especially advertisers – wants to know who you are. To quote the <a href="https://www.oaic.gov.au/privacy/your-privacy-rights/your-personal-information/what-is-privacy">Office of the Australian Information Commissioner</a>, one of the tenets of privacy is “to be able to control who can see or use information about you”.</p> <p>At the very least, we want to control what big tech knows about us, especially if they could stand to profit from it.</p> <h2>Can we ever go back?</h2> <p>We can’t control “a changin’” times, but we can keep as much of the good parts as we can.</p> <p>For starters, we can vote with our feet. Users can enact change and bring awareness to problems on existing platforms. In recent times, we have seen this with the <a href="https://theconversation.com/thinking-of-breaking-up-with-twitter-heres-the-right-way-to-do-it-195002">exodus of users</a> from X (formerly Twitter) to other platforms, and the <a href="https://www.economist.com/the-economist-explains/2023/06/26/why-reddit-users-are-protesting-against-the-sites-leadership">platform-wide protest against Reddit</a> for changing its third-party data access policies.</p> <p>However, voting with our feet is only possible when there’s competition. In the case of X, various other platforms – from Mastodon to Threads to Bluesky – enable users to pick one that aligns with their preferences, values and social circles. Search engines have alternatives, too, such as DuckDuckGo or Ecosia.</p> <p>But competition can only be created by moving to decentralised systems and removing monopolies. This actually happened in the early days of the internet during the 1990s “<a href="https://thehistoryoftheweb.com/browser-wars/">browser wars</a>”, when Microsoft was eventually accused of illegally monopolising the web browser market in <a href="https://en.wikipedia.org/wiki/United_States_v._Microsoft_Corp.">a landmark court case</a>.</p> <p>As users of technology, all of us must remain vigilant about threats to our privacy and knowledge. With cheap and ubiquitous generative AI, misleading content and scams are more realistic as ever.</p> <p>We must exercise healthy scepticism and ensure those most at risk from online threats – such as children and older people – are educated about potential harms.</p> <p>Remember, the internet is not optimised for your best interests. It’s up to you to decide how much power you give to the tech giants who are fuelling theirs.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/236513/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, Senior Lecturer of Information Systems, School of Computing and Information Systems; and (Honorary) Senior Fellow, Melbourne Law School, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/wonsun-shin-1300054">Wonsun Shin</a>, Associate Professor in Media and Communications, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/the-internet-is-worse-than-it-used-to-be-how-did-we-get-here-and-can-we-go-back-236513">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

Daughter stunned by little-known iPhone feature after father's sudden death

<p>Queensland woman Carrie Payne was unable to access her father's phone after he died unexpectedly last month due to Apple's policy. </p> <p>The policy is that devices locked with a passcode and therefore protected by passcode encryption, cannot be accessed without erasing the contents on the device. </p> <p>Apple has refused to create software to hack into the iPhone for security reasons, and for grieving families who don't have access to their loved one's phones, this could mean that hundreds of photos and memories could be lost. </p> <p>After losing her father unexpectedly from intracranial haemorrhage, Payne did not have access to his phone, which made it difficult for her to contact his friends and colleagues to inform them of his death. </p> <p>“We also then couldn’t use any of the family photos he may have had on there in his funeral service,” she said.</p> <p>“In the end, we are at peace with things now and haven’t pursued anything. We may still investigate this once we have all the legal documents to confirm his passing/the terms of his estate, but we are weighing this up with his right to privacy in death. The immediacy of needing access has gone, so we are instead focusing on remembering him.”</p> <p>While she has tried almost everything to gain access to the phone, she has had no luck, and now she wants to prevent the same thing from happening to someone else. </p> <p>Payne, an estate planning lawyer, shared the little-known iPhone feature, called a Legacy Contact. </p> <p>This can be set for your Apple ID on an iPhone (starting from iOS 15.2), iPad (iPadOS 15.2) and Mac (macOS 12.1). </p> <p>The Legacy Contact gets access to data stored in your Apple account after your death including  iCloud photos, contacts, calendars, messages, mail, voice memos, notes, files stored in iCloud drive, apps you have downloaded and device backups.</p> <p>But, data like payment information and passwords remain off limits. </p> <p>To add a Legacy Contact on your iPhone or iPad, you go to settings, tap your name, tap sign-in &amp; security, and then tap legacy contact.</p> <p>On a Mac, click the Apple menu, then system settings, then Apple ID, then sign-in &amp; security, and legacy contact.</p> <p>After your death, your Legacy Contact will need the access key that you generate when you choose them as your contact and your death certificate.</p> <p>The Legacy Contact will have access to your data for three years from when the first legacy account request has been approved. </p> <p>In Australia, next of kin can request access to an account with the right legal documentation if they don't have a Legacy Contact access key. </p> <p><em>Images: Carrie Payne</em></p>

Technology

Placeholder Content Image

Spending too much time on social media and doomscrolling? The problem might be FOMO

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/kim-m-caudwell-1258935">Kim M Caudwell</a>, <a href="https://theconversation.com/institutions/charles-darwin-university-1066">Charles Darwin University</a></em></p> <p>For as long as we have used the internet to <a href="https://www.theguardian.com/technology/2016/mar/07/email-ray-tomlinson-history">communicate and connect with each other</a>, it has influenced how we think, feel and behave.</p> <p>During the COVID pandemic, many of us were <a href="https://www.sciencedirect.com/science/article/pii/S0277953622007985">“cut off” from our social worlds</a> through restrictions, lockdowns and mandates. Understandably, many of us tried to <a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0258344">find ways to connect online</a>.</p> <p>Now, as pandemic restrictions have lifted, some of the ways we use the internet have become concerning. Part of what drives problematic internet use may be something most of us are familiar with – the fear of missing out, or FOMO.</p> <p>In <a href="https://link.springer.com/article/10.1186/s12888-024-05834-9">our latest research</a>, my colleagues and I investigated the role FOMO plays in two kinds of internet use: problematic social media use and “doomscrolling”.</p> <h2>What are FOMO, problematic social media use and doomscrolling?</h2> <p>FOMO is the fear some of us experience when we get a sense of “missing out” on things happening in our social scene. Psychology researchers have been studying FOMO for <a href="https://doi.org/10.1016/j.chb.2013.02.014">more than a decade</a>, and it has consistently been linked to <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8283615/">mental health and wellbeing</a>, <a href="https://www.sciencedirect.com/science/article/pii/S0376871624001947">alcohol use</a> and <a href="https://doi.org/10.1016/j.chb.2021.106839">problematic social media use</a>.</p> <p>Social media use becomes a problem for people when they have difficulty controlling urges to use social media, have difficulty cutting back on use, and where the use has a negative impact on their everyday life.</p> <p>Doomscrolling is characterised by a need to constantly look at and <a href="https://www.bbc.com/worklife/article/20210226-the-darkly-soothing-compulsion-of-doomscrolling">seek out “bad” news</a>. Doomscrollers may constantly refresh their news feeds or stay up late to read bad news.</p> <p>While problematic social media use has been around for a while, doomscrolling seems to be a more recent phenomenon – <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7735659/">attracting research attention</a> during and following the pandemic.</p> <h2>What we tried to find out</h2> <p>In our study, we wanted to test the idea that FOMO leads individuals to engage in problematic use behaviours due to their difficulty in managing the “fear” in FOMO.</p> <p>The key factor, we thought, was <a href="https://link.springer.com/article/10.1023/b:joba.0000007455.08539.94">emotion regulation</a> – our ability to deal with our emotions. We know some people tend to be good at this, while others find it difficult. In fact, greater difficulties with emotion regulation was linked to experiencing <a href="https://www.sciencedirect.com/science/article/pii/S088761852100058X">greater acute stress related to COVID</a>.</p> <p>However, an idea that has been gaining attention recently is <a href="https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2021.636919/full">interpersonal emotion regulation</a>. This means looking to others to help us regulate our emotions.</p> <p>Interpersonal emotion regulation can be helpful (such as “<a href="https://link.springer.com/article/10.1007/s11031-016-9569-3">affective engagement</a>”, where someone might listen and talk about your feelings) or unhelpful (such as “<a href="https://psycnet.apa.org/doiLanding?doi=10.1037%2F0012-1649.43.4.1019">co-rumination</a>” or rehashing problems together), depending on the context.</p> <p>In our analyses, we sought to uncover how both <em>intrapersonal</em> emotion regulation (ability to self-manage our own emotional states) and <em>interpersonal</em> emotion regulation (relying on others to help manage our emotions) accounted for the link between FOMO and problematic social media use, and FOMO and doomscrolling, respectively.</p> <h2>What we found – and what it might mean for the future of internet use</h2> <p>Our findings indicated that people who report stronger FOMO engage in problematic social media use because of difficulty regulating their emotions (intrapersonally), and they look to others for help (interpersonally).</p> <p>Similarly, people who report stronger FOMO are drawn to doomscrolling because of difficulty regulating their emotions intrapersonally (within themselves). However, we found no link between FOMO and doomscrolling through interpersonal emotion regulation.</p> <p>We suspect this difference may be due to doomscrolling being more of a solitary activity, occurring outside more social contexts that facilitate interpersonal regulation. For instance, there are probably fewer people with whom to share your emotions while staying up trawling through bad news.</p> <p>While links between FOMO and doomscrolling have been observed before, our study is among the first to try and account for this theoretically.</p> <p>We suspect the link between FOMO and doomscrolling may be more about having more of an online presence <em>while things are happening</em>. This would account for intrapersonal emotion regulation failing to help manage our reactions to “bad news” stories as they unfold, leading to doomscrolling.</p> <p>Problematic social media use, on the other hand, involves a more complex interpersonal context. If someone is feeling the fear of being “left out” and has difficulty managing that feeling, they may be drawn to social media platforms in part to try and elicit help from others in their network.</p> <h2>Getting the balance right</h2> <p>Our findings suggest the current discussions around <a href="https://www.nbcnews.com/news/us-news/psychology-group-says-infinite-scrolling-social-media-features-are-par-rcna147876">restricting social media use for young people</a>, while controversial, are important. We need to balance our need for social connection – which is happening increasingly online – with the <a href="https://www.biomedcentral.com/collections/spia#tab-3">detrimental consequences </a> associated with problematic internet use behaviours.</p> <p>It is important to also consider the nature of social media platforms and how they have changed over time. For example, adolescent social media use patterns across various platforms are <a href="https://link.springer.com/article/10.1007/s10964-019-01060-9">associated with</a> different mental health and socialisation outcomes.</p> <p>Public health policy experts and legislators have quite the challenge ahead of them here. Recent work has shown how loneliness is <a href="https://doi.org/10.1371/journal.pone.0190033">a contributing factor</a> to all-cause mortality (death from any cause).</p> <p>We have long known, too, that social connectedness is <a href="https://doi.org/10.1371/journal.pone.0190033">good for our mental health</a>. In fact, last year, the World Health Organization established a <a href="https://www.who.int/news/item/15-11-2023-who-launches-commission-to-foster-social-connection">Commission on Social Connection</a> to help promote the importance of socialisation to our lives.</p> <p>The recent controversy in the United States around the ownership of TikTok illustrates how central social media platforms are to our lives and ways of interacting with one another. We need to <a href="https://www.theguardian.com/commentisfree/article/2024/may/27/dominic-andre-tiktok-ban">consider the rights of individuals</a> to use them as they please, but understand that governments carry the responsibility of <a href="https://www.theguardian.com/technology/2023/apr/04/what-does-tiktoks-ban-on-australian-government-devices-mean-for-its-future">protecting users from harm</a> and safeguarding their privacy.</p> <hr /> <p><em>If you feel concerned about problematic social media use or doomscrolling, you can speak to a healthcare or mental health professional. You can also call <a href="https://www.lifeline.org.au/">Lifeline</a> on 13 11 14, or <a href="https://www.13yarn.org.au/">13 YARN</a> (13 92 76) to yarn with Aboriginal or Torres Strait Islander crisis supporters.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/230980/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/kim-m-caudwell-1258935">Kim M Caudwell</a>, Senior Lecturer - Psychology | Chair, Researchers in Behavioural Addictions, Alcohol and Drugs (BAAD), <a href="https://theconversation.com/institutions/charles-darwin-university-1066">Charles Darwin University</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/spending-too-much-time-on-social-media-and-doomscrolling-the-problem-might-be-fomo-230980">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

Technology is alienating people – and it’s not just those who are older

<div class="theconversation-article-body"> <p><em><a href="https://theconversation.com/profiles/carolyn-wilson-nash-1255329">Carolyn Wilson-Nash</a>, <a href="https://theconversation.com/institutions/university-of-stirling-1697">University of Stirling</a> and <a href="https://theconversation.com/profiles/julie-tinson-277507">Julie Tinson</a>, <a href="https://theconversation.com/institutions/university-of-stirling-1697">University of Stirling</a></em></p> <p>We take it for granted that technology brings people closer together and improves our access to essential products and services. If you can’t imagine life without your smartphone, it’s easy to forget that people who can’t or don’t want to engage with the latest technology are being left behind.</p> <p>For example, there have recently been reports that <a href="https://www.express.co.uk/life-style/cars/1618497/parking-poll-results-cashless-car-parks-card-smartphone-app-only-elderly-drivers-spt">cashless payment systems</a> for car parking in the UK are seeing older drivers unfairly hit with fines. This has led to calls for the <a href="https://www.dailymail.co.uk/news/article-10851103/Esther-Rantzen-tells-ministers-pensioners-not-use-apps-pay-parking.html">government to intervene</a>.</p> <p>Age is one of the biggest predictors of <a href="https://ageing-better.org.uk/sites/default/files/2020-08/landscape-covid-19-digital.pdf">digital exclusion</a>. Only 47% of those aged <a href="https://www.ons.gov.uk/businessindustryandtrade/itandinternetindustry/bulletins/internetusers/2019">75 and over</a> use the internet regularly. And out of the 4 million who have never used the internet in the UK, only 300,000 people are <a href="https://ageing-better.org.uk/sites/default/files/2020-08/landscape-covid-19-digital.pdf">under 55</a>.</p> <p>But older people are not the only ones who feel shut out by new technology. For example, research shows vulnerable people, such as those with disabilities, are also disengaging with e-services and being <a href="https://www.tandfonline.com/doi/full/10.1080/0267257X.2012.691526">“locked out” of society</a>.</p> <h2>The digital transition</h2> <p>From train tickets to vaccine passports, there is a growing expectation that consumers should embrace technology to participate in everyday life. This is a global phenomenon. Out in front, Sweden predicts its economy will be <a href="https://sweden.se/life/society/a-cashless-society">fully cashless</a> by March 2023.</p> <p>Shops increasingly use QR codes, virtual reality window displays and self-service checkouts. Many of these systems require a smart device, and momentum is building for QR codes to be integrated into <a href="https://www.thegrocer.co.uk/technology-and-supply-chain/the-time-has-finally-arrived-for-electronic-shelf-labels-heres-why/661068.article">digital price tags</a> as they can give customers extra information such as nutritional content of food. Changing paper labels is a labour intensive process.</p> <p>Technology pervades all aspects of consumer life. Going on holiday, enjoying the cinema or theatre, and joining sport and social clubs all make people feel part of society. But many popular artists now use online queues to sell tickets to their shows. Social groups use WhatsApp and Facebook to keep their members updated.</p> <p>When it comes to booking a holiday, there is a <a href="https://www.statista.com/statistics/919811/number-of-travel-agents-united-kingdom-uk/#:%7E:text=Overall%2C%20there%20were%203%2C710%20retail,as%20TUI%20and%20Hays%20Travel.">decreasing number</a> of in-person travel agents. This limits the social support to make the best choice, which is particularly important for those with specific needs such as people with health issues. And once travelling, aircrew expect flight boarding passes and COVID passports to be available on smartphones.</p> <p>Essential services such as healthcare, which can already <a href="https://www.tandfonline.com/doi/full/10.1080/0267257X.2022.2078861">be difficult</a> for older and other people to navigate, are also moving online. Patients are increasingly expected to use the GP website or email to request to see a doctor. Ordering prescriptions online is encouraged.</p> <h2>Not just older people</h2> <p><a href="https://www.gov.uk/government/publications/digital-lifeline-a-qualitative-evaluation/digital-lifeline-a-qualitative-evaluation">Not everyone can afford</a> an internet connection or smart technology. Some regions, particularly rural ones, struggle for phone signal. The UK phone network’s plans for a <a href="https://www.bbc.co.uk/news/uk-england-shropshire-61377944">digital switchover</a> by 2025, which would render traditional landlines redundant, could cut off people who rely on their landlines.</p> <p>Concerns about privacy can also stop people using technology. Data collection and security breaches impact people’s confidence in organisations. A 2020 survey into <a href="https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/the-consumer-data-opportunity-and-the-privacy-imperative">consumers’ trust</a> in businesses showed no industry reached a trust rating of 50% for data protection. The majority of respondents (87%) said they would not do business with a company if they had concerns about its security practices.</p> <p>Some people view “forced” digitisation as a symbol of consumer culture and will limit their technology use. Followers of the <a href="https://www.researchgate.net/publication/228310981_The_Voluntary_Simplicity_Movement_Reimagining_the_Good_Life_Beyond_Consumer_Culture">simple living movement</a>, which gained momentum in the 1980s, try to minimise their use of technology. Many people take a “less is more” <a href="https://www.emerald.com/insight/content/doi/10.1108/JCM-04-2020-3749/full/html">approach to technology</a> simply because they feel it offers a more meaningful existence.</p> <p>One of the most common reasons for digital exclusion, however, <a href="https://www.iriss.org.uk/resources/esss-outlines/digital-inclusion-exclusion-and-participation">is poverty</a>. When the <a href="https://www.local.gov.uk/parliament/briefings-and-responses/tackling-digital-divide-house-commons-4-november-2021">pandemic hit in March 2020</a>, 51% of households earning between £6,000 to £10,000 had home internet access, compared with 99% of households with an income over £40,000.</p> <p>Limited access to tablets, smartphones and laptops can result in feelings of isolation. Many older consumers have developed strategies to manage and overcome the <a href="https://www.tandfonline.com/doi/full/10.1080/0267257X.2021.1945662">digital challenges</a> presented by these devices. But those unable to <a href="https://theconversation.com/how-older-people-are-mastering-technology-to-stay-connected-after-lockdown-165562">engage with technology</a> remain excluded if their family and friends don’t live close by.</p> <h2>Smart change</h2> <p>The solution is not simply to give devices to those without smart technology. While there is a need to provide affordable internet access and technology, and offer support in learning new skills, we need to recognise diversity in society.</p> <p>Services should provide non-digital options that embrace equality. For example, cash systems should not be abolished. There might be a demand for services to become digital, but service providers need to be aware of the people who will be isolated by this transition.</p> <p>Retailers, local councils, health providers and businesses in tourism, entertainment and leisure should try to understand more about the diversity of their consumers. They need to develop services that cater for the needs of all people, especially those without access to technology.</p> <p>We live in a diverse world and diverse consumers need choice. After all, access to and inclusion in society is a human right.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/184095/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/carolyn-wilson-nash-1255329">Carolyn Wilson-Nash</a>, Lecturer, Marketing and Retail, Stirling Management School, <a href="https://theconversation.com/institutions/university-of-stirling-1697">University of Stirling</a> and <a href="https://theconversation.com/profiles/julie-tinson-277507">Julie Tinson</a>, Professor of Marketing, <a href="https://theconversation.com/institutions/university-of-stirling-1697">University of Stirling</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/technology-is-alienating-people-and-its-not-just-those-who-are-older-184095">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

The alarmingly accurate predictions made 100 years ago

<p>A university researcher has uncovered predictions made in 1924 about what the world would look like 100 years in the future, with some of the predictions proving to be scarily accurate. </p> <p>The Canadian professor Paul Fairie shared a selection of headlines and articles made by newspapers in the 1920s on his X account, showing in what ways the world has changed and how it has remained the same.</p> <p>While some predictions made in 1924 hit the nail on the head, others couldn't be further from reality. </p> <p><strong>Accurate predictions </strong></p> <p><span style="text-decoration: underline;"><em>Car speedways</em></span></p> <p>One newspaper clipping claimed that in the future, cars would be travelling on super "speedways" that allowed them to travel faster. </p> <p>While cars first hit the roads in the 1880s, it wasn't until the 1920s that vehicles became more common, with cities quickly trying to build safe roads to accommodate the growth in motor vehicles. </p> <p>“In the city of 2024, this authority predicts there will be three-deck roads; speedways through the heart of town,” the newspaper article predicted.</p> <p>The article also envisaged monorail express services to the suburbs replacing cars and buses and moving sidewalks (similar to airport travelators) that moved people in all directions, “serving all railroad stations and business districts”.</p> <p><span style="text-decoration: underline;"><em>Women getting tattooed and dyeing their hair</em></span></p> <p>In the 1920s, tattoos were exclusively reserved for sailors, criminals and gangland figures until they became more commonplace. </p> <p>But one 1924 article predicted, incredibly accurately, that by 2024 women would be getting tattoos and dyeing their hair “all the colours of the rainbow”.</p> <p>“Debutantes of 1924 are shingle-haired, sleek-looking maidens with delicately rouged cheeks and provocative red lips,” the article stated.</p> <p>“The 1924 debutante successfully conceals her personality under paint and power."</p> <p>“The debutante of 100 years hence may revert to type and frankly copy her ancestors, who dyed their skins with woad; only, with the modern instinct for progress."</p> <p>“She may go still further and dye her complexion and hair all the colours of the rainbow.”</p> <p><span style="text-decoration: underline;"><em>Women becoming stronger</em></span></p> <p>The newspapers of 1924 also predicted that women of the future would be “physically strong, vital and alert.”</p> <p>One article predicted that women would spend more time in the outdoors, participate in sports, and would be “engaging by choice” in activities that were historically restricted to men.</p> <p>Intellectually, women would be “quick at wit and keen of judgment,” while spiritually, she would “radiate love and good will”.</p> <p><span style="text-decoration: underline;"><em>Remote viewing </em></span></p> <p>One of the most accurate predictions from 1924 was the invention of technology that would allow people to view entertainment "remotely". </p> <p>“Many inconveniences which the touring artist now has to suffer will no doubt be eliminated,” one prediction read.</p> <p>“It will not be necessary to travel great distances. The strain of the concert tour will be dispensed with. Artists may not even have to leave their homes (to perform).”</p> <p><strong>Not so accurate predictions</strong></p> <p><span style="text-decoration: underline;"><em>Horses becoming extinct </em></span></p> <p>One prediction from a 1924 newspaper believed that as cars took over as the main form of transportation, there would be no more use for horses and they would soon becoming extinct. </p> <p>“If a house would decrease in the same ratio as in the last ten or twenty years, it might be easy to tell when the last horse would give up his stall to an automobile,” the prediction read.</p> <p><span style="text-decoration: underline;"><em>Self-launching beds</em></span></p> <p>Another not-so accurate prediction claimed that beds would soon come with a feature that would override the use for an alarm clock, but would come with a mechanism to launch you out of bed in the morning. </p> <p>Describing this futuristic scenario, the reporter wrote: “My bed turns over automatically and I am deposited on the floor”.</p> <p>“Eight o’clock and the switch operating above the fiendish substitute for an alarm clock is operated from school, so at the moment, I am in the same predicament as the rest of the 450 scholars.”</p> <p><em>Image credits: Shutterstock </em></p>

Technology

Placeholder Content Image

Photos are everywhere. What makes a good one?

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, <a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p>We upload some <a href="https://theconversation.com/3-2-billion-images-and-720-000-hours-of-video-are-shared-online-daily-can-you-sort-real-from-fake-148630">3 billion images online each day</a>. We make <a href="https://www.tandfonline.com/doi/full/10.1080/1051144X.2023.2281163">most of these photos on smartphones</a> and use these devices to document everything from gym progress and our loved ones to a memorable meal.</p> <p>But what makes a “quality” photo? Many people, even those who make images for work, struggle to answer. They often say something along the lines of “I know it when I see it”. But knowing some dimensions of a quality photograph can help make your images stand out and make you a <a href="https://medialiteracy.org.au/media-literacy-framework/">more literate</a> media maker and consumer.</p> <p>Quality can be relative, but knowing the various dimensions at play can help you draw on those that are most relevant for your particular audience, context and purpose.</p> <p>I identified <a href="https://doi.org/10.1177/14648849241253136">six dimensions</a> which will impact the quality of photographs. Here’s what I learnt – and what you can apply to your own photographs.</p> <h2>1. Production and presentation</h2> <p>Think of the factors <a href="https://journals.sagepub.com/doi/full/10.1177/1522637918823261">in front of and behind the lens</a>.</p> <p>If you know you’re being recorded, this can affect your behaviour compared to a candid depiction.</p> <p>You might be more or less comfortable posing for a friend or family member than for a stranger. This comfort, or its lack, can lead to more stiff and awkward poses, or ones that look more natural and confident.</p> <p>Presentation circumstances, like the viewing size and context, also matter.</p> <p>A group shot can make a nice statement piece above a fireplace, but it wouldn’t have the same effect as a profile photo. Be aware of how “busy” your image is, and whether the viewing conditions are well-suited for the nature of your photo.</p> <p>Images with lots of elements, fine textures or other details need to be viewed large to be fully appreciated. Images with fewer, larger and simpler elements can usually be appreciated at smaller sizes.</p> <h2>2. Technical aspects</h2> <p>Technical aspects include proper exposure – meaning the image isn’t too dark or too bright – adequate focus, and appropriate camera settings.</p> <p>Some of these camera settings, like shutter speed, affect whether motion is seen as frozen or blurred.</p> <p>If the image is too blurry, too pixelated, or too light or dark, these technical aspects will negatively impact the photograph’s quality. But some motion blur, as distinct from camera shake, can make more dynamic an otherwise static composition.</p> <h2>3. Who or what is shown</h2> <p>Who or what is shown in the photographs we see is affected, in part, by access and novelty. That’s why we often make more photos during our holidays compared to documenting familiar settings.</p> <p>Some people or locations can be <a href="https://journals.sagepub.com/doi/full/10.1177/1329878X221094374">under-represented</a> and photographing them can lead to more visibility, and, depending on the context, a more empowering framing.</p> <p>Consider in your photography if you’re including people who are typically under-represented, such as older individuals, people of colour, people living with disabilities and queer people. Also consider whether you’re representing them in stereotypical or disempowering ways.</p> <p>As examples, <a href="https://www.tandfonline.com/doi/abs/10.1080/22041451.2022.2137237">when photographing older people</a>, consider whether you’re showing them as lonely, isolated, passive, or in need of mobility aids.</p> <h2>4. Composition</h2> <p>Composition includes positioning of elements in the frame, the balance between positive and negative space, and depth, among others.</p> <p>Generally, images that centre the subject of interest aren’t as visually engaging as images that offset the subject of interest. This is what’s known as the <a href="https://www.adobe.com/au/creativecloud/photography/discover/rule-of-thirds.html">rule-of-thirds</a> approach.</p> <p>Likewise, images that have no depth are generally not as interesting as images with a clear foreground, midground and background. “Seeing through things” with your compositions can help increase the visual depth of your photos alongside their visual appeal.</p> <h2>5. The psycho-physiological</h2> <p>The psycho-physiological concerns how the viewer reacts to what is shown.</p> <p>This includes the <a href="https://psycnet.apa.org/record/2011-07236-024">biological reaction</a> we have to seeing certain colours, for example the way the colour red can increase our heart rate. It also can include the feeling we have when seeing a photo of someone we know.</p> <p>The most powerful photos use colour and other elements of visual language strategically for a specific effect. Looking at these images might evoke a specific emotion, such as empathy or fear, and influence how the viewer responds.</p> <h2>6. Narrative</h2> <p>Narrative concerns the storytelling quality of the image.</p> <p>Images can show something in a literal way (think a photograph from a real estate listing) or they can tell a bigger story about the content represented or about the human condition (think about some of the iconic photos that emerged during Australia’s <a href="https://journals.sagepub.com/doi/abs/10.1177/1329878X211008181">black summer bushfire season</a>).</p> <p>Literal photos help us see what something or someone looks like but they might not have as much of an impact as iconic photos. For example, the well-known photo of three-year-old Syrian boy Aylan Kurdi’s lifeless body on a beach in Turkey <a href="https://www.reuters.com/article/idUSKBN14V2MG/">boosted fundraising for refugees</a> 100-fold.</p> <h2>A more thoughtful process</h2> <p>Next time you pull out your smartphone to make an image, don’t just “<a href="https://www.digitalphotomentor.com/do-you-wait-for-the-decisive-moment-or-do-you-spray-and-pray/">spray and pray</a>”. Try to pre-visualise the story you want to tell and wait for the elements to line up into place.</p> <p>Being aware of aesthetic and ethical considerations alongisde technical ones and emotional resonance can all help engage viewers and lead to more standout imagery.</p> <p>To challenge yourself further, consider taking your phone off full-auto mode and play with camera settings to see how they impact the resulting photos.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/229011/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, Senior Lecturer in Visual Communication &amp; Digital Media, <a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/photos-are-everywhere-what-makes-a-good-one-229011">original article</a>.</em></p> </div>

Technology

Placeholder Content Image

Fresh signs that ANOTHER royal pic was manipulated

<p>Ah, the royal family – the gift that keeps on giving, especially when it comes to Photoshop mishaps. It seems like they've developed a knack for stirring up a digital storm every time they release a photo.</p> <p>The latest kerfuffle involves a seemingly innocent snapshot released to celebrate what would have been Queen Elizabeth II's 97th birthday. But oh, what a tangled web of pixels it turned out to be!</p> <p>The photo, featuring a gaggle of royal offspring including the adorable trio of Prince George, Princess Charlotte and Prince Louis, quickly became the centre of attention, and not for the right reasons.</p> <p>According to the eagle-eyed sleuths at <a href="https://www.theguardian.com/uk-news/2024/mar/17/people-question-everything-now-how-kates-photo-scandal-rips-up-the-rules-for-royals-and-the-media" target="_blank" rel="noopener"><em>The Guardian</em></a>, the photo looked more like a game of digital whack-a-mole than a family portrait. Prince Louis apparently decided to play hide-and-seek within the frame, magically teleporting to a new position. And let's not forget the hair-raising revelation that some locks on one of the granddaughters seemed to have been copy-pasted with reckless abandon. Maybe they were going for a stylish asymmetrical look?</p> <p>"The photograph taken by Catherine at Balmoral and released last year to mark what would have been the 97th birthday of the late Queen bears similar signs of digital alteration," reported <em>The Guardian</em>. "Prince Louis appears to have been moved back into the frame, while locks of a great granddaughter’s hair show telltale repetitions. Back then, though, the image was not urgently 'killed' by the leading international photo agencies, like the latest one, because it didn’t matter so much."</p> <p>But the fun didn't stop there. Oh no, Twitter had a field day with this one too. Allegations flew left and right faster than a royal corgi chasing a squirrel. The Queen's skirt? Edited. The green sofa? Definitely edited. Heck, there were probably bets being placed on whether the corgis were even real or just digital creations.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Did the late Queen ever pose with her grandchildren and great-grandchildren? Seems like no. 🤔 This photo, taken by Kate Middleton, was edited at least in 9 places. Now the mass media are reporting about it too.<br />A little thread👇 <a href="https://t.co/Sx9XjOBr1J">pic.twitter.com/Sx9XjOBr1J</a></p> <p>— Katerina 🇺🇦 (@Le__Katerina) <a href="https://twitter.com/Le__Katerina/status/1769399269365088335?ref_src=twsrc%5Etfw">March 17, 2024</a></p></blockquote> <p><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;">"People need to understand that it's not 'just a family photo'," wrote Twitter sleuth Katerina. "It's made for historical record. I don't think you'd want to see doctored photos in your history books."</span></p> <p>Meanwhile, in the land of hashtags and filters, speculation about the health of the Princess of Wales, Kate, reached a fever pitch, with <a href="https://www.oversixty.com.au/health/caring/princess-kate-s-post-surgery-pic-ignites-even-wilder-conspiracy-theories" target="_blank" rel="noopener">a Mother's Day photo</a> that looked like it had been through more edits than a celebrity's Instagram post. Kate, surrounded by her adorable brood, found herself at the centre of yet another digital debacle. Who knew a simple family photo could cause such a stir?</p> <p>In a rare move, <a href="https://www.oversixty.com.au/lifestyle/family-pets/princess-kate-sensationally-speaks-out-over-photo-fiasco" target="_blank" rel="noopener">Kate herself stepped forward</a> to offer an apology, blaming her newfound love for amateur photography. Note to self: stick to selfies, Kate.</p> <p>But fear not, royal watchers, for this tale of Photoshop folly is far from over. With a family as unpredictable as the British weather, who knows what digital delights await us in the next instalment?</p> <p><em>Image: Twitter (X)</em></p>

Technology

Placeholder Content Image

Yes, Kate Middleton’s photo was doctored. But so are a lot of images we see today

<p><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, <em><a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p>Rumours and conspiracies have been <a href="https://www.nytimes.com/2024/02/28/style/princess-kate-middleton-health.html">swirling</a> following the abdominal surgery and long recovery period of Catherine, Princess of Wales, earlier this year. They intensified on Monday when Kensington Palace released a photo of the princess with her three children.</p> <blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/C4U_IqTNaqU/?utm_source=ig_embed&utm_campaign=loading" data-instgrm-version="14"> <div style="padding: 16px;"> <div style="display: flex; flex-direction: row; align-items: center;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"> </div> </div> </div> <div style="padding: 19% 0;"> </div> <div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"> </div> <div style="padding-top: 8px;"> <div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div> </div> <div style="padding: 12.5% 0;"> </div> <div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"> <div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"> </div> <div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"> </div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"> </div> </div> <div style="margin-left: 8px;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"> </div> <div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"> </div> </div> <div style="margin-left: auto;"> <div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"> </div> <div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"> </div> <div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"> </div> </div> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"> </div> </div> <p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/p/C4U_IqTNaqU/?utm_source=ig_embed&utm_campaign=loading" target="_blank" rel="noopener">A post shared by The Prince and Princess of Wales (@princeandprincessofwales)</a></p> </div> </blockquote> <p>The photo had clear signs of tampering, and international wire services <a href="https://apnews.com/article/kate-princess-photo-surgery-ca91acf667c87c6c70a7838347d6d4fb">withdrew the image</a> amid concerns around manipulation. The princess later <a href="https://twitter.com/KensingtonRoyal/status/1767135566645092616">apologised for any confusion</a> and said she had “experimented with editing” as many amateur photographers do.</p> <p>Image editing is extremely common these days, and not all of it is for nefarious purposes. However, in an age of rampant misinformation, how can we stay vigilant around suspicious images?</p> <h2>What happened with the royal photo?</h2> <p>A close look reveals at least eight inconsistencies with the image.</p> <p>Two of these relate to unnatural blur. Catherine’s right hand is unnaturally blurred, even though her left hand is sharp and at the same distance from the camera. The left side of Catherine’s hair is also unnaturally blurred, while the right side of her hair is sharp.</p> <p>These types of edits are usually made with a blur tool that softens pixels. It is often used to make the background of an image less distracting or to smooth rough patches of texture.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img src="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=358&fit=crop&dpr=1 600w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=358&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=358&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=450&fit=crop&dpr=1 754w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=450&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=450&fit=crop&dpr=3 2262w" alt="" /></a><figcaption><span class="caption">At least eight logical inconsistencies exist in the doctored image the Prince and Princess of Wales posted on social media.</span> <span class="attribution"><a class="source" href="https://www.instagram.com/p/C4U_IqTNaqU/">Photo by the Prince of Wales/Chart by T.J. Thomson</a></span></figcaption></figure> <p>Five of the edits appear to use the “clone stamp” tool. This is a Photoshop tool that takes part of the same or a different image and “stamps” it onto another part.</p> <p>You can see this with the repeated pattern on Louis’s (on the left) sweater and the tile on the ground. You can also see it with the step behind Louis’s legs and on Charlotte’s hair and sleeve. The zipper on Catherine’s jacket also doesn’t line up.</p> <p>The most charitable interpretation is that the princess was trying to remove distracting or unflattering elements. But the artefacts could also point to multiple images being blended together. This could either be to try to show the best version of each person (for example, with a smiling face and open eyes), or for another purpose.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Like many amateur photographers, I do occasionally experiment with editing. I wanted to express my apologies for any confusion the family photograph we shared yesterday caused. I hope everyone celebrating had a very happy Mother’s Day. C</p> <p>— The Prince and Princess of Wales (@KensingtonRoyal) <a href="https://twitter.com/KensingtonRoyal/status/1767135566645092616?ref_src=twsrc%5Etfw">March 11, 2024</a></p></blockquote> <h2>How common are image edits?</h2> <p>Image editing is increasingly common as both photography and editing are increasingly becoming more automated.</p> <p>This sometimes happens without you even knowing.</p> <p>Take HDR (high dynamic range) images, for example. Point your iPhone or equivalent at a beautiful sunset and watch it capture the scene from the brightest highlights to the darkest shadows. What happens here is your camera makes multiple images and automatically stitches them together to make an image <a href="https://www.adobe.com/creativecloud/photography/hub/guides/what-is-hdr-photography.html">with a wider range of contrast</a>.</p> <p>While face-smoothing or teeth-whitening filters are nothing new, some smartphone camera apps apply them without being prompted. Newer technology like Google’s “Best Take” <a href="https://blog.google/products/photos/how-google-photos-best-take-works/">feature</a> can even combine the best attributes of multiple images to ensure everyone’s eyes are open and faces are smiling in group shots.</p> <p>On social media, it seems everyone tries to show themselves in their best light, which is partially why so few of the photos on our <a href="https://www.tandfonline.com/doi/abs/10.1080/15551393.2020.1862663">camera rolls</a> make it onto our social media feeds. It is also why we often edit our photos to show our best sides.</p> <p>But in other contexts, such as press photography, the <a href="https://www.ap.org/about/news-values-and-principles/telling-the-story/visuals">rules are much stricter</a>. The Associated Press, for example, bans all edits beyond simple crops, colour adjustments, and “minor adjustments” that “restore the authentic nature of the photograph”.</p> <p>Professional photojournalists haven’t always gotten it right, though. While the majority of lens-based news workers adhere to ethical guidelines like those published by the <a href="https://nppa.org/resources/code-ethics">National Press Photographers Association</a>, others have let deadline pressures, competition and the desire for exceptional imagery cloud their judgement.</p> <p>One such example was in 2017, when British photojournalist Souvid Datta admitted to <a href="https://time.com/4766312/souvid-datta/">visually plagiarising</a> another photographer’s work within his own composition.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Photographer Souvid Datta appears to have plagiarized Mary Ellen Mark: <a href="https://t.co/iO1Lm8CowU">https://t.co/iO1Lm8CowU</a> <a href="https://t.co/jswHyApGNj">pic.twitter.com/jswHyApGNj</a></p> <p>— PetaPixel (@petapixel) <a href="https://twitter.com/petapixel/status/859824132258537472?ref_src=twsrc%5Etfw">May 3, 2017</a></p></blockquote> <p>Concerns around false or misleading visual information are at an all-time high, given advances in <a href="https://theconversation.com/nine-was-slammed-for-ai-editing-a-victorian-mps-dress-how-can-news-media-use-ai-responsibly-222382">generative artificial intelligence (AI)</a>. In fact, this year the World Economic Forum named the risk of misinformation and disinformation as the world’s greatest <a href="https://www.weforum.org/agenda/2024/01/ai-disinformation-global-risks/">short-term threat</a>. It placed this above armed conflict and natural disasters.</p> <h2>What to do if you’re unsure about an image you’ve found online</h2> <p>It can be hard to keep up with the more than <a href="https://theconversation.com/3-2-billion-images-and-720-000-hours-of-video-are-shared-online-daily-can-you-sort-real-from-fake-148630">3 billion photos</a> that are shared each day.</p> <p>But, for the ones that matter, we owe it to ourselves to slow down, zoom in and ask ourselves a few simple <a href="https://www.aap.com.au/factcheck-resources/how-we-check-the-facts/">questions</a>:</p> <p>1. Who made or shared the image? This can give clues about reliability and the purpose of making or sharing the image.</p> <p>2. What’s the evidence? Can you find another version of the image, for example, using a <a href="https://tineye.com/">reverse-image search engine</a>?</p> <p>3. What do trusted sources say? Consult resources like <a href="https://www.aap.com.au/factcheck/">AAP FactCheck</a> or <a href="https://factcheck.afp.com/">AFP Fact Check</a> to see if authoritative sources have already weighed in.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/225553/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, Senior Lecturer in Visual Communication & Digital Media, <em><a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/yes-kate-middletons-photo-was-doctored-but-so-are-a-lot-of-images-we-see-today-225553">original article</a>.</p> <p><em>Hero image: The Conversation / X / Instagram</em></p>

Technology

Placeholder Content Image

Leap of imagination: how February 29 reminds us of our mysterious relationship with time and space

<p><em><a href="https://theconversation.com/profiles/emily-ohara-874665">Emily O'Hara</a>, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137">Auckland University of Technology</a></em></p> <p>If you find it intriguing that February 28 will be followed this week by February 29, rather than March 1 as it usually is, spare a thought for those alive in 1582. Back then, Thursday October 4 was followed by Friday October 15.</p> <p>Ten whole days were snatched from the present when Pope Gregory XIII issued a papal bull to “restore” the calendar from discrepancies that had crept into the Julian calendar, introduced by Julius Caesar in 45 BCE.</p> <p>The new Gregorian calendar returned the northern hemisphere’s vernal equinox to its “proper” place, around March 21. (The equinox is when the Earth’s axis is tilted neither toward nor away from the sun, and is used to determine the date of Easter.)</p> <p>The Julian calendar had observed a leap year every four years, but this meant time had drifted out of alignment with the dates of celestial events and astronomical seasons.</p> <p>In the Gregorian calendar, leap days were added only to years that were a multiple of four – like 2024 – with an exception for years that were evenly divisible by 100, but not 400 – like 1700.</p> <p>Simply put, leap days exist because it doesn’t take a neat 365 days for Earth to orbit the Sun. It takes 365.2422 days. Tracking the movement of celestial objects through space in an orderly pattern doesn’t quite work, which is why we have February – time’s great mop.</p> <h2>Time and space</h2> <p>This is just part of the history of how February – the shortest month, and originally the last month in the Roman calendar – came to have the job of absorbing those inconsistencies in the temporal calculations of the world’s most commonly used calendar.</p> <p>There is plenty of <a href="https://theconversation.com/leap-day-fixing-the-faults-in-our-stars-54032">science</a>, <a href="https://theconversation.com/explainer-the-science-behind-leap-years-and-how-they-work-54788">maths</a> and <a href="https://theconversation.com/how-a-seasonal-snarl-up-in-the-mid-1500s-gave-us-our-strange-rules-for-leap-years-132659">astrophysics</a> explaining the relationship between time and the planet we live on. But I like to think leap years and days offer something even more interesting to consider: why do we have calendars anyway?</p> <p>And what have they got to do with how we understand the wonder and strangeness of our existence in the universe? Because calendars tell a story, not just about time, but also about space.</p> <p>Our reckoning of time on Earth is through our spatial relationship to the Sun, Moon and stars. Time, and its place in our lives, sits somewhere between the scientific, the celestial and the spiritual.</p> <p>It is <a href="https://shop.whitechapelgallery.org/products/time">notoriously slippery, subjective and experiential</a>. It is also marked, tracked and determined in myriad ways across different cultures, from tropical to solar to <a href="https://www.stuff.co.nz/pou-tiaki/300062097/matariki-and-the-maramataka-the-mori-lunar-calendar">lunar</a> calendars.</p> <p>It is the Sun that measures a day and gives us our first reference point for understanding time. But it is the <a href="https://librarysearch.aut.ac.nz/vufind/Record/1145999?sid=25214690">Moon</a>, as a major celestial body, that extends our perception of time. By stretching a span of one day into something longer, it offers us a chance for philosophical reflection.</p> <p>The Sun (or its effect at least) is either present or not present. The Moon, however, goes through phases of transformation. It appears and disappears, changing shape and hinting that one night is not exactly like the one before or after.</p> <p>The Moon also has a distinct rhythm that can be tracked and understood as a pattern, giving us another sense of duration. Time is just that – overlapping durations: instants, seconds, minutes, hours, days, weeks, months, years, decades, lifetimes, centuries, ages.</p> <h2>The elusive Moon</h2> <p>It is almost impossible to imagine how time might feel in the absence of all the tools and gadgets we use to track, control and corral it. But it’s also hard to know what we might do in the absence of time as a unit of productivity – a measurable, dispensable resource.</p> <p>The closest we might come is simply to imagine what life might feel like in the absence of the Moon. Each day would rise and fall, in a rhythm of its own, but without visible reference to anything else. Just endless shifts from light to dark.</p> <p>Nights would be almost completely dark without the light of the Moon. Only stars at a much further distance would puncture the inky sky. The world around us would change – trees would grow, mammals would age and die, land masses would shift and change – but all would happen in an endless cycle of sunrise to sunset.</p> <p>The light from the Sun takes <a href="https://www.skyatnightmagazine.com/space-science/how-take-light-from-sun-reach-earth">eight minutes</a> to reach Earth, so the sunlight we see is always eight minutes in the past.</p> <p>I remember sitting outside when I first learned this, and wondering what the temporal delay might be between me and other objects: a plum tree, trees at the end of the street, hills in the distance, light on the horizon when looking out over the ocean, stars in the night sky.</p> <p>Moonlight, for reference, takes about <a href="https://www.pbs.org/seeinginthedark/astronomy-topics/light-as-a-cosmic-time-machine.html">1.3 seconds</a> to get to Earth. Light always travels at the same speed, it is entirely constant. The differing duration between how long it takes for sunlight or moonlight to reach the Earth is determined by the space in between.</p> <p>Time on the other hand, is anything but constant. There are countless ways we characterise it. The mere fact we have so many calendars and ways of describing perceptual time hints at our inability to pin it down.</p> <p>Calendars give us the impression we can, and have, made time predictable and understandable. Leap years, days and seconds serve as a periodic reminder that we haven’t.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/224503/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/emily-ohara-874665"><em>Emily O'Hara</em></a><em>, Senior Lecturer, Spatial Design + Temporary Practices, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137">Auckland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/leap-of-imagination-how-february-29-reminds-us-of-our-mysterious-relationship-with-time-and-space-224503">original article</a>.</em></p>

Technology

Placeholder Content Image

8 places you should never keep your phone

<p><strong>In your pocket</strong></p> <p>Keeping your phone in your pocket seems logical, but you could be doing more harm than good. According to Dr Lilly Friedman, this is actually the worst place to store your phone. “When phones are on, connected to a wireless network, and placed in a pocket, the radiation is two to seven times higher than if it were placed in a purse or holster,” she says.</p> <p>There is a correlation between radiation from a mobile phone and tumour growth, she adds. Plus, radiation can change the structure of DNA and affect male fertility, according to Dr Friedman. The World Health Organization’s International Agency for Research on Cancer also found that mobile phone radiation is additionally carcinogenic to humans. Merely sitting on your phone could cause health issues such as sciatica or back problems.</p> <p><strong>In your bra</strong></p> <p>Some research and case studies show that keeping your phone in your bra could be linked to breast cancer due to the radiations and vibrations from the phone. That said, there is not enough evidence to establish a definite relationship between the two. Still, keeping your phone in your bra, especially a sports bra, is a bad idea due to the skin-irritating bacteria it could harbour, Muscle &amp; Fitness reports.</p> <p><strong>In your bed or under your pillow</strong></p> <p>Sleeping with your phone is a bad idea for a few reasons. First, keeping your phone under your pillow could build up heat and present a potential fire hazard, especially if your phone is charging or has a defect. It’s also known that the LED light from phone screens can disrupt melatonin production and circadian rhythms, hurting your sleep quality, according to the National Sleep Foundation.</p> <p>And, of course, there’s also radiation to consider. The amounts of radio frequency radiation mobile phones give off are the same ones emitted from microwaves. There is also concern about the safety of mobile phone use with respect to cancer and brain tumours, per the American Cancer Society.</p> <p><strong>Plugged in</strong></p> <p>Keeping your phone plugged in when it has a full battery causes damage to the battery itself, according to pcmag.com. It’s not that your phone ‘overloads’ with power, but heat build-ups from stacking things on top of your phone or keeping it under your pillow, making your phone hotter and damaging your battery.</p> <p><strong>Close to your face</strong></p> <p>Keeping your phone close to your face means bacteria transfers to and from your phone, making your skin and phone dirtier. This combination leads to more acne, skin irritation and even wrinkles, according to Allure. Try using ear pods instead to keep the surface of your phone at a distance from your face.</p> <p><strong>In your glovebox</strong></p> <p>Extreme temperatures are the worst conditions for your phone. So keeping your device in your car’s glovebox during the extremely hot or cold months of the year could lead to problems. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. The cold weather presents just as many issues for your device. In cold temperatures, many smartphones shut off, have display problems, shortened battery life and in rare cases screen shattering.</p> <p><strong>On your beach towel </strong></p> <p>Notice a theme here? The extreme sun and heat at the beach is a recipe for phone disaster. Protect your device after you finish taking beautiful beach pictures. Hot and sunny conditions could, again, cause your phone to overheat – and getting sand in your phone won’t help either.</p> <p><strong>Anywhere in the bathroom</strong></p> <p>Although phones could arguably be the new newspaper, it’s not a good idea to take yours into the bathroom. Even if you keep your device on a counter or away from the toilet, anything within a metre of a flushing toilet could mean bacteria or viruses in the air end up on your phone, according to a study published in Applied and Environmental Microbiology.</p> <p>“The detection of bacteria and viruses falling out onto surfaces in bathrooms after flushing indicated that they remain airborne long enough to settle on surfaces throughout the bathroom,” wrote the study authors.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.com.au/healthsmart/8-places-you-should-never-keep-your-phone" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?

<p><em><a href="https://theconversation.com/profiles/kayleen-manwaring-8735">Kayleen Manwaring</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Spam might not have brought an end to the internet or email, as some dire predictions <a href="https://www.zdnet.com/article/why-spam-could-destroy-the-internet/">in the early 2000s</a> claimed it could – but it’s still a massive pain.</p> <p>Despite all the spam being removed by spam-filtering technologies, most people still receive spam every day. How do these messages end up flooding our inboxes? And are there any legal consequences for the senders?</p> <h2>What is spam?</h2> <p>The Organisation for Economic Co-operation and Development (OECD) noted in 2004 “there does not appear to be a widely agreed and workable definition for spam” across jurisdictions – and this remains true today.</p> <p>That said, “spam” generally <a href="https://www.oecd-ilibrary.org/docserver/232784860063.pdf?expires=1693541947&amp;id=id&amp;accname=ocid177499&amp;checksum=D0C5BDAC49951DF353618B8E38483253">refers to</a> unsolicited electronic messages. These are often sent in bulk and frequently advertise goods or services. It also includes scamming and phishing messages, according to the OECD.</p> <p>Most people think of spam in the form of emails or SMS messages. However, what we now call spam actually predates the internet. In 1854, a spam telegram was sent to British politicians advertising the opening hours of dentists who <a href="https://www.theguardian.com/technology/2013/aug/09/why-spammers-are-winning-junk-mail">sold tooth-whitening powder</a>.</p> <p>The first spam email came more than 100 years later. It was reportedly sent to 600 people on May 3 1978 <a href="https://web.archive.org/web/20080628205216/http://www.latimes.com/technology/la-fi-spam11may11001420,1,5168218,full.story">through ARPAnet</a> – a precursor to the modern internet.</p> <p>As for how much spam is out there, the figures vary, possibly due to the various <a href="https://www.spamhaus.org/consumer/definition/">definitions of “spam”</a>. One source reports the average number of spam emails sent daily in 2022 was about <a href="https://dataprot.net/statistics/spam-statistics/">122.33 billion</a> (which would mean more than half of all emails were spam). As for text messages, another source reports a daily average of 1.6 billion <a href="https://thesmallbusinessblog.net/spam-text-statistics/">spam texts</a>.</p> <h2>Where do spammers get my details?</h2> <p>Each time you enter your email address or phone number into an e-commerce website, you may be handing it to spammers.</p> <p>But sometimes you may even receive spam from entities you don’t recognise. That’s because businesses will often transfer customers’ contact information to related companies, or sell their data to third parties such as data brokers.</p> <p>Australia’s Privacy Act 1988 somewhat limits the transfer of personal information to third parties. However, these laws <a href="https://theconversation.com/accc-says-consumers-need-more-choices-about-what-online-marketplaces-are-doing-with-their-data-182134">are weak</a> – and <a href="http://handle.unsw.edu.au/1959.4/unsworks_75600">weakly enforced</a>.</p> <p>Some entities also use “address-harvesting” software to search the internet for electronic addresses that are captured in a database. The collector then uses these addresses directly, or sells them to others looking to send spam.</p> <p>Many jurisdictions (including <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s19.html">Australia</a>) prohibit these harvesting activities, but they are still <a href="https://www.projecthoneypot.org/statistics.php">common</a>.</p> <h2>Is spamming against the law?</h2> <p>Australia has had legislation regulating spam messaging since 2003. But the <a href="https://www.legislation.gov.au/Details/C2016C00614">Spam Act</a> surprisingly does not define the word “spam”. It tackles spam by prohibiting the sending of <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s15.html">unsolicited commercial electronic messages</a> containing offers, ads or other promotions of goods, services or land.</p> <p>However, if the receiver <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">consented</a> to these types of messages, the prohibition does not apply. When you buy goods or services from a company, you will often see a request to click on a “yes” button to receive marketing promotions. Doing so means you have consented.</p> <p>On the other hand, if your phone or inbox are hit by commercial messages you haven’t agreed to receive, that is a breach of the <a href="https://austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/sa200366/">Spam Act</a> by the sender. If you originally signed up to receive the messages, but then unsubscribed and the messages kept coming after <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">five business days</a>, that is also illegal. Senders must also include a <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s18.html">functioning unsubscribe facility</a> in every commercial message they send.</p> <p>Spammers can be penalised for breaches of the Spam Act. In the past few months alone, <a href="https://www.acma.gov.au/articles/2023-06/commonwealth-bank-penalised-355-million-spam-breaches">Commonwealth Bank</a>, <a href="https://www.acma.gov.au/articles/2023-08/doordash-penalised-2-million-spam-breaches">DoorDash</a> and <a href="https://www.acma.gov.au/articles/2023-06/mycar-tyre-auto-penalised-1m-spam-breaches">mycar Tyre &amp; Auto</a> were fined more than A$6 million in total for breaches.</p> <p>However, most spam comes from outside Australia where the laws aren’t the same. In the United States spam is legal under the <a href="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business">CAN-SPAM Act</a> until you opt out. Unsurprisingly, the US <a href="https://talosintelligence.com/reputation_center/email_rep#spam-country-senders">tops the list</a> of countries where the most spam originates.</p> <p>Although spam sent to Australia from overseas <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s16.html">can still breach</a> the Spam Act – and the Australian Communications and Media Authority (ACMA) co-operates with overseas regulators – overseas enforcement actions are difficult and expensive, especially if the spammer has disguised their true identity and location.</p> <p>It’s worth noting that messages from political parties, registered charities and government bodies aren’t prohibited – nor are messages from educational institutions to students and former students. So while you might consider these messages as “spam”, they can legally be <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch1.html">sent freely without consent</a>. Factual messages (without marketing content) from businesses are also legal as long as they include accurate sender details and contact information.</p> <p>Moreover, the Spam Act generally only covers spam sent via email, SMS/MMS or instant messaging services, such as WhatsApp. Voice calls and faxes aren’t covered (although you can use the <a href="https://www.donotcall.gov.au/">Do Not Call Register</a> to block some commercial calls).</p> <h2>Staying safe from spam (and cyberattacks)</h2> <p>Spam isn’t only annoying, it can also be dangerous. Spam messages can contain indecent images, scams and <a href="https://www.cyber.gov.au/learn-basics/explore-basics/watch-out-threats/phishing-emails-and-texts">phishing attempts</a>. Some have <a href="https://www.cyber.gov.au/threats/types-threats/malware">malware</a> (malicious software) designed to break into computer networks and cause harm, such as by stealing data or money, or shutting down systems.</p> <p>The <a href="https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/protect-yourself-malicious-email">Australian Cyber Security Centre</a> and <a href="https://www.acma.gov.au/dealing-with-spam">ACMA</a> provide useful tips for reducing the spam you get and your risk of being hit by cyberattacks. They suggest to:</p> <ol> <li> <p>use a spam filter and block spammers – email and telecommunications providers often supply useful tools as part of their services</p> </li> <li> <p>unsubscribe from any emails you no longer want to receive – even if you originally agreed to receive them</p> </li> <li> <p>remove as much of your contact details from websites as you can and always restrict the sharing of your personal information (such as name, birth date, email address and mobile number) when you can – beware of pre-ticked boxes asking for your consent to receive marketing emails</p> </li> <li> <p>install cybersecurity updates for your devices and software as you get them</p> </li> <li> <p>always think twice about opening emails or clicking on links, especially for messages promising rewards or asking for personal information – if it looks too good to be true, it probably is</p> </li> <li> <p>use <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a> to access online services so even if a scam compromises your login details, it will still be difficult for hackers to break into your accounts</p> </li> <li> <p>report spam to your email and telecommunications providers, and to <a href="https://www.acma.gov.au/dealing-with-spam#complain-or-forward-spam-to-the-acma">ACMA</a>. <!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208665/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> </li> </ol> <p><a href="https://theconversation.com/profiles/kayleen-manwaring-8735"><em>Kayleen Manwaring</em></a><em>, Senior Research Fellow, UNSW Allens Hub for Technology, Law &amp; Innovation and Senior Lecturer, School of Private &amp; Commercial Law, UNSW Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-i-get-so-much-spam-and-unwanted-email-in-my-inbox-and-how-can-i-get-rid-of-it-208665">original article</a>.</em></p>

Technology

Placeholder Content Image

Why you need to stop charging your phone overnight

<p><strong>You charge your phone all night </strong></p> <p>Waking up to a fully charged phone may seem like a great way to start the day, but leaving your device plugged in overnight is a bad idea. When a phone has reached 100 per cent charge, it will continue to get trickle charges to keep it topped up at 100 percent.</p> <p>These extra charges keep the battery working non-stop. In fact, it’s better not to fully charge lithium-ion batteries because high voltage stresses the battery and wears it out over time, according to technology company Cadex.</p> <p><strong>You use vibrations for notifications</strong></p> <p>Your phone, like any other tool or device, ages and loses effectiveness the more you use it, says David Steele, the Director of Business Development for EverydayPhone. So little extras, like vibrating notifications, are habits that make your phone’s job harder. </p> <p>“The issue with these habits essentially boils down to having your phone constantly running at full capacity when it’s unnecessary,” Steele says. “Just like us, a phone needs a break to avoid burning out.”</p> <p><strong>You keep apps open that you're not using</strong></p> <p>Unused apps can eat up the battery life of smartphones, according to Andrew Moore-Crispin, the Director of Content at Ting Mobile. “If you open an app once and never use it again, the app might still run in the background,” he says.</p> <p>Swiping out of apps you aren’t using or no longer need is an easy solution. Moore-Crispin says doing so extends the battery life of your phone while also freeing up valuable storage space, too.</p> <p><strong>You allow unnecessary permissions</strong></p> <p>Ride-sharing apps need your location to pick you up, but other apps might not need this permission. Moore-Crispin suggests you be picky about which apps you grant such permissions to and take away permissions you deem unnecessary.</p> <p><strong>You have one of these apps</strong></p> <p>The apps that drain your battery the most are Snapchat, Google Maps, Netflix, Amazon, and Facebook, according to AdWeek. The Guardian found that uninstalling the Facebook mobile app from Android phones saves people up to 20 percent of their battery life.</p> <p>If you also get rid of the FB Messenger app, other app load times could speed up by 15 per cent, per the Guardian. The reason Facebook particularly kills battery life is because it keeps running in the background – even when you’re not using it, Business Insider reports.</p> <p><strong>Your screen is always extremely bright </strong></p> <p>Gone are the days of tiny phone screens, but before you give the thumbs up emoji, understand how the bigger screens of today can be a phone battery’s worst enemy, according to Moore-Crispin. Make sure you turn on adaptive brightness in the display menu.</p> <p>This change means your phone will automatically adjust the screen brightness to match your environment. As a bonus, set the brightness level to the lowest possible and lower your screen’s timeout, which is what determines how long it stays lit before fading when it goes idle.</p> <p><strong>You keep your phone out at the beach</strong></p> <p>Extreme heat or extreme cold temperatures and other weather conditions can shorten the life of your phone. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. Cold weather presents just as many issues. In cold temperatures, some smartphones shut off, have display problems, or run out of battery; in rare cases screens may shatter.</p> <p><strong>You keep your phone in your bed or under your pillow </strong></p> <p>Tucking your phone under your pillow when you sleep is another way to shorten its life, thanks to heat build-up.</p> <p><strong>You don't keep your software up to date</strong></p> <p>utting off device updates does more harm than good for your phone. iPhone and Android makers push updates to make your user experience better and so that your phone functions properly. These updates come with extra benefits, too. In fact, if your device has a weak battery or other issues, these software updates could remedy them, Popular Science reports. Make sure to keep up with app-specific updates as well.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.com.au/home-tipsscience-technology/why-you-need-to-stop-charging-your-phone-overnight" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safe

<p><em><a href="https://theconversation.com/profiles/rob-nicholls-91073">Rob Nicholls</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>The Australian Tax Office (ATO) paid out more than half a billion dollars to cyber criminals between July 2021 and February 2023, according to an <a href="https://www.abc.net.au/news/2023-07-26/ato-reveals-cost-of-mygov-tax-identity-crime-fraud/102632572">ABC report</a>.</p> <p>Most of the payments were for small amounts (less than A$5,000) and were not flagged by the ATO’s own monitoring systems.</p> <p>The fraudsters exploited a weakness in the identification system used by the myGov online portal to redirect other people’s tax refunds to their own bank accounts.</p> <p>The good news is there’s plenty the federal government can do to crack down on this kind of fraud – and that you can do to keep your own payments secure.</p> <h2>How these scams work</h2> <p>Setting up a myGov account or a myGov ID requires proof of identity in the form of “<a href="https://www.afp.gov.au/sites/default/files/PDF/NPC-100PointChecklist-18042019.pdf">100 points of ID</a>”. It usually means either a passport and a driver’s licence or a driver’s licence, a Medicare card, and a bank statement.</p> <p>Once a myGov account is created, linking it to your tax records requires two of the following: an ATO assessment, bank account details, a payslip, a Centrelink payment, or a super account.</p> <p>These documents were precisely the ones targeted in three large data breaches in the past year: at <a href="https://theconversation.com/what-does-the-optus-data-breach-mean-for-you-and-how-can-you-protect-yourself-a-step-by-step-guide-191332">Optus</a>, at <a href="https://theconversation.com/medibank-hackers-are-now-releasing-stolen-data-on-the-dark-web-if-youre-affected-heres-what-you-need-to-know-194340">Medibank</a>, and at <a href="https://asic.gov.au/about-asic/news-centre/news-items/guidance-for-consumers-impacted-by-the-latitude-financial-services-data-breach/">Latitude Financial</a>.</p> <p>In this scam, the cyber criminal creates a fake myGov account using the stolen documents. If they can also get enough information to link to the ATO or your Tax File Number, they can then change bank account details to have your tax rebate paid to their account.</p> <p>It is a sadly simple scam.</p> <h2>How government can improve</h2> <p>One of the issues here is quite astounding. The ATO knows where salaries are paid, via the “<a href="https://www.ato.gov.au/business/single-touch-payroll/what-is-stp-/">single touch</a>” payroll system. This ensures salaries, tax and superannuation contributions are all paid at once.</p> <p>Most people who have received a tax refund will have provided bank account details where that payment can be made. Indeed, many people use precisely those bank account details to identify themselves to myGov.</p> <p>At present, those bank details can be changed within myGov without any further ado. If the ATO simply checked with the individual via another channel when bank account details are changed, this fraud could be prevented. It might be sensible to check with the individual’s employer as well.</p> <p>Part of the problem is the ATO has not been very transparent about the risks. If these risks were clearly set out, then calls for changes to ATO procedures would have been loud and clear from the cyber security community.</p> <p>The ATO is usually good at identifying when a cyber security incident may lead to fraud. For example, when the recruitment software company <a href="https://www.abc.net.au/news/2018-06-06/australian-data-may-be-compromised-in-pageup-security-breach/9840048?itm_campaign=newsapp">PageUp was hacked in 2018</a>, the ATO required people who may have been affected to reconfirm their identities. This was done without public commentary and represents sound practice.</p> <p>Sadly, the millions of records stolen in the Optus, Medibank and Latitude Financial breaches have not led to a similar level of vigilance.</p> <p>Another action the ATO could take would be to check when a single set of bank account details is associated with more than one myGov account.</p> <p>A national digital identity would also help. However, this system has been in development for years, is not universally popular, and may well be <a href="https://www.themandarin.com.au/226280-gallagher-warns-community-support-for-digital-identity-not-ubiquitous/">delayed</a> until after the federal election due in 2024.</p> <h2>Protecting yourself</h2> <p>The most important thing to do is make sure the ATO does not use a bank account number other than yours. As long as the ATO only has your bank account number to transfer your tax rebate, this scam does not work.</p> <p>It also helps to protect your Tax File Number. There are only four groups that ever need this number.</p> <p>The first is the ATO itself. The second is your employer. However, remember you do not need to give your TFN to a prospective employer, and your employer only needs your TFN <em>after</em> you have started work.</p> <p>Your super fund and your bank may ask for your TFN. However, providing your TFN to your super fund or bank is optional – it just makes things easier, as otherwise they will withhold tax which you will need to claim back later.</p> <p>Of course, all the usual data safety issues still apply. Don’t share your driver’s licence details without good reason. Take similar care with your passport. Your Medicare card is for health services and does not need to be shared widely.</p> <p>Don’t open emails from people you do not know. Never click links in messages unless you are sure they are safe. Most importantly, know your bank will not send you emails containing links, nor will the ATO.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/210459/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/rob-nicholls-91073">Rob Nicholls</a>, Associate professor of regulation and governance, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image </em><em>credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/the-500-million-ato-fraud-highlights-flaws-in-the-mygov-id-system-heres-how-to-keep-your-data-safe-210459">original article</a>.</em></p>

Technology

Placeholder Content Image

Why am I online? Research shows it’s often about managing emotions

<p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Most of us <a href="https://wearesocial.com/au/blog/2022/02/digital-2022-australia-online-like-never-before/">go online</a> multiple times a day. About half of 18–29 year olds surveyed in a 2021 <a href="https://www.pewresearch.org/short-reads/2021/03/26/about-three-in-ten-u-s-adults-say-they-are-almost-constantly-online/">Pew Research Study</a> said they are “almost constantly” connected.</p> <p>How are we to make sense of this significant digital dimension of modern life?</p> <p>Many questions have rightly been asked about its broader consequences for society and the economy. But there remains a simpler question about what motivates people across a range of ages, occupations and cultures to be so absorbed in digital connection.</p> <p>And we can turn this question on ourselves: <em>why am I online?</em></p> <h2>What are we doing when we go online?</h2> <p>As the American sociologist Erving Goffman <a href="https://www.nytimes.com/1975/02/16/archives/frame-analysis.html">pointed out</a>, asking “What is it that’s going on here?” about human behaviour can yield answers framed at different levels. These range from our superficial motives to a deeper understanding of what we are “really” doing.</p> <p>Sometimes we might be content to explain our online behaviour in purely practical terms, like checking traffic routes or paying a bill. Other times we might struggle to articulate our reasons for going or remaining online.</p> <p>Why are we continually looking at our phones or computers, when we could be getting on with physical tasks, or exercising, or meditating, or engaging more fully with the people who are physically around us?</p> <h2>The ever-present need to manage our emotions</h2> <p>As researchers of human-computer interaction, we are exploring answers in terms of the ever-present need to manage our emotions. Psychologists refer to this activity as <a href="https://www.guilford.com/books/Handbook-of-Emotion-Regulation/James-Gross/9781462520732">emotion regulation</a>.</p> <p>Theories of the nature and function of emotions are complex and contested. However, it is safe to say they are expressions of felt needs and motivations that arise in us through some fusion of physiology and culture.</p> <p>During a typical day, we often feel a need to <a href="https://journals.sagepub.com/doi/abs/10.1037/1089-2680.2.3.271">alter our emotional state</a>. We may wish to feel more serious about a competitive task or more sad at a funeral. Perhaps we would like to be less sad about events of the past, less angry when meeting an errant family member, or more angry about something we know in our heart is wrong.</p> <figure><iframe src="https://www.youtube.com/embed/PQkNb4CLjJ8?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Digital emotion regulation is becoming increasingly common in our everyday lives.</span></figcaption></figure> <p>One way to understand our frequent immersions into online experience is to see them as acts within a broader scheme of managing such daily emotional demands. Indeed, in <a href="https://www.sciencedirect.com/science/article/abs/pii/S1071581922001732">earlier research</a> we found up to half of all smartphone use may be for the purpose of emotional regulation.</p> <h2>Digital technologies are becoming key tools of emotion regulation</h2> <p>Over the pandemic lockdowns of 2020–21 in Melbourne, Australia, we investigated how digital technologies are becoming <a href="https://dl.acm.org/doi/10.1145/3491102.3517573">key tools of emotion regulation</a>. We were surprised to find that people readily talked of their technology use in these emotion-managing terms.</p> <p>Occasionally, this involved specially designed apps, for mindfulness and so on. But more often people relied on mundane tools, such as using social media alongside Zoom to combat feelings of boredom or isolation, browsing for “retail therapy”, playing phone games to de-stress, and searching online to alleviate anxiety about world events.</p> <p>To some extent, these uses of digital technology can be seen as re-packaging <a href="https://www.tandfonline.com/doi/abs/10.1080/026999399379285">traditional methods</a> of emotion management, such as listening to music, strengthening social connections, or enjoying the company of adorable animals. Indeed, people in our study used digital technologies to enact familiar strategies, such as immersion in selected situations, seeking distractions, and reappraising what a situation means.</p> <p>However, we also found indications that digital tools are changing the intensity and nature of how we regulate emotions. They provide emotional resources that are <a href="https://en.wikipedia.org/wiki/Ubiquitous_computing">nearly always available</a>, and virtual situations can be accessed, juxtaposed and navigated more deftly than their physical counterparts.</p> <p>Some participants in our study described how they built what we called “emotional toolkits”. These are collections of digital resources ready to be deployed when needed, each for a particular emotional effect.</p> <h2>A new kind of digital emotional intelligence</h2> <p>None of this is to say emotion regulation is automatically and always a good thing. It can be a means of avoiding important and meaningful endeavours and it can itself become dysfunctional.</p> <p>In our study of a small sample of Melburnians, we found that although digital applications appeared to be generally effective in this role, they are volatile and can lead to <a href="https://www.theguardian.com/commentisfree/2020/sep/27/social-dilemma-media-facebook-twitter-society">unpredictable emotional outcomes</a>. A search for energising music or reassuring social contact, for example, can produce random or unwanted results.</p> <p>A new kind of <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10187756/">digital emotional intelligence</a> might be needed to effectively navigate digital emotional landscapes.</p> <h2>An historic shift in everyday life</h2> <p>Returning to the question: <em>what am I doing online?</em> Emotion regulation may well be the part of the answer.</p> <p>You may be online for valid instrumental reasons. But equally, you are likely to be enacting your own strategies of <a href="https://cis.unimelb.edu.au/hci/projects/digitalemotionregulation">emotion regulation through digital means</a>.</p> <p>It is part of an historic shift playing out in how people negotiate the demands of everyday life. <!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208483/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, Professor, School of Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, Senior Lecturer, Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-am-i-online-research-shows-its-often-about-managing-emotions-208483">original article</a>.</em></p>

Technology

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

“Turn your phone off”: The simple reason behind Albanese’s warning

<p>Prime Minister Anthony Albanese has issued a clear warning to the public, advising them to "turn their phones off" as a safety measure to avoid potential dangers.</p> <p>Albanese delivered this cautionary message last week while announcing the appointment of Australia's first national cybersecurity coordinator, Air Commander Darren Goldie of the Royal Australian Air Force.</p> <p>Goldie was quick to echo the Prime Minister's sentiments, emphasising the importance of mobilising both the private sector and consumers in the fight against cyber threats.</p> <p>"We all bear responsibility in this matter. Simple actions, such as turning off your phone every night for five minutes, can make a significant difference.</p> <p>"I encourage everyone watching to adopt this practice once every 24 hours, perhaps while engaging in daily routines like brushing your teeth," stated Albanese during the press conference.</p> <p>While rebooting your device on a daily basis may seem like a basic precaution, it can greatly enhance your protection against cybercriminals. Often, various applications and processes continue running in the background of your phone or computer, even when you're not actively using them.</p> <p>If unauthorised individuals gain access to these apps and processes, they can monitor your activities and collect your data, including financial information and identification documents, and even hijack your webcam or phone camera.</p> <p>By rebooting your phone, you force the closure of all background applications and processes, effectively evicting anyone attempting to track your virtual movements.</p> <p>Priyadarsi Nanda, a cybersecurity expert at the University of Technology Sydney, supported Albanese's advice, emphasising the importance of periodically turning off one's phone.</p> <p>"Considering how extensively we use smartphones in our daily lives, there have been cases where individuals haven't turned off their phones for an entire year," Dr. Nanda told <em>The Guardian</em>.</p> <p>"If there is a malicious process running, switching off the phone breaks the chain. While it may only provide protection while the phone is off, it undoubtedly frustrates potential hackers. Although not foolproof, rebooting can make it more challenging for hackers to compromise your device."</p> <p>It is crucial to note that this measure does not safeguard against all forms of cybercrime. If your password has been stolen or you are being repeatedly and strategically targeted, for example, a simple reboot is unlikely to deter the most persistent hackers.</p> <p><em>Image: Wikimedia / Australian Government</em></p>

Technology

Placeholder Content Image

How scammers use psychology to create some of the most convincing internet cons – and what to watch out for

<p><a href="https://theconversation.com/profiles/stacey-wood-473147"><em>Stacey Wood</em></a><em>, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><a href="https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/cybercrime-fraud-most-common-crime-uk/">Online fraud is today’s most common crime</a>. Victims are often told they are foolish for falling for it, but fraudsters use psychological mechanisms to infiltrate the defences of their targets, regardless of how intelligent they are.</p> <p>So it’s important to keep up with the latest scams and understand how they work.</p> <p>Recently, consumer protection magazine Which? <a href="https://www.which.co.uk/news/article/the-4-most-convincing-scams-weve-seen-in-2023-so-far-a7bRP9s0KJvG">identified some of the most convincing scams of 2023</a>. These scams all have one thing in common – they insidiously take advantage of people’s cognitive biases and psychological blind spots.</p> <p>They included “pig butchering” a way of fattening up victims with affection, the missing person scam which involves posting fake content on social media pages, the traditional PayPal scam, and a new scam called the “fake app alert” in which malware is hidden on apps that look legitimate.</p> <h2>Pig butchering</h2> <p>In our work as fraud psychology researchers we have noticed a trend towards hybrid scams, which combine different types of fraud. Hybrid scams often involve crypto investments and <a href="https://www.psychologytoday.com/us/blog/the-fraud-crisis/202210/new-scams-committed-forced-trafficked-labor">sometimes use trafficked labour</a> In the US alone, <a href="https://www.fbi.gov/contact-us/field-offices/springfield/news/internet-crime-complaint-center-releases-2022-statistics">the FBI recently reported</a> that people lost US $3.3 billion (£2.6 billion) in 2023 to investment fraud.</p> <p>Pig butchering is a long-term deception. <a href="https://www.cnbc.com/2023/05/02/pig-butchering-scammers-make-billions-convincing-victims-of-love.html">This type of scam</a> combines elements of <a href="https://www.actionfraud.police.uk/a-z-of-fraud/romance-scams">romance scams</a> with an investment con. The name comes from the strategy of <a href="https://www.theguardian.com/money/2023/may/22/dating-cons-and-dodgy-apps-among-most-common-scams-says-uk-watchdog">“fattening up” a victim with affection before slaughter</a>.</p> <p>It will usually begin with <a href="https://www.which.co.uk/policy-and-insight/article/pig-butchering-among-most-convincing-scams-of-2023-so-far-which-warns-aDRtr4I1UT1R">standard scam approach like a text</a>, social media message, or an introduction at a job board site.</p> <p>Victims may have their guard up at first. However, these scams can unfold over months, with the scammer slowly gaining the victims’ trust and initiating a romantic relationship all the while learning about their vulnerabilities.</p> <p>For example, details of their financial situation, job stresses, and dreams about the life they want. Romance scammers often saturate their targets with affection and almost constant contact. Pig butchering sometimes involves several trafficked people working as a team to create a single persona.</p> <p>Once the victim depends on the scammer for their emotional connection, the scammer introduces the idea of making an investment and uses fake crypto platforms to demonstrate returns. The scammers may use legitimate sounding cryptocoins and platforms. Victims can invest and “see” strong returns online. In reality, their money is going directly to the scammer.</p> <p>Once a victim transfers a substantial amount of money to the con artist, they are less likely to pull out. This phenomenon is known as the <a href="https://www.sciencedirect.com/science/article/abs/pii/0749597885900494">“sunk cost fallacy”</a>. Research has shown people are likely to carry on investing money, time and effort in activities they have already invested in and ignore signs the endeavour isn’t in their best interests.</p> <p>When the victim runs out of money or tries to withdraw funds, they are blocked.</p> <p>The victim is left with not only financial devastation, but also the loss of what they may imagine to be their most intimate partnership. They are often <a href="https://cloud-platform-e218f50a4812967ba1215eaecede923f.s3.amazonaws.com/uploads/sites/6/2021/12/VC-Who-Suffers-Fraud-Report-1.pdf">too embarrassed to discuss the experience</a> with friends and family or to report to the police.</p> <h2>PayPal scams</h2> <p>Fake payment requests are a common attack that works by volume rather than playing the long game. Payment requests appear to come from a genuine PayPal address. Fraudulent messages typically begin with a generic greeting, an urgent request and a fake link.</p> <p>For example, Dear User: You’ve received a payment, or you have paid too much. Please click link below for details. Users are directed to a spoofed website with a legitimate sounding name such as www.paypal.com/SpecialOffers and asked to enter their account information and password.</p> <p>Both of us have received these scam requests – and even we found them difficult to discern from legitimate PayPal request emails. These scams work through mimicry and play on the human tendency to trust authority. Legitimate PayPal correspondence is usually automatic bot language, so it is not difficult to imitate.</p> <p>But remember, genuine messages from PayPal <a href="https://www.paypal.com/ca/for-you/account/security/fraud-dangers#:%7E:text=Any%20email%20from%20PayPal%20will,bank%20account%2C%20or%20credit%20card.">will use your first and last name</a>.</p> <h2>The missing person scam</h2> <p>This seems to be a new scam that exploits a person’s kindness. In the past, charity scams involved posing as charitable organisation responding to a <a href="https://www.aarp.org/money/scams-fraud/info-2019/charity.html">recent, real calamity</a>.</p> <p>The new missing person scam is more sophisticated. The initial plea is a <a href="https://www.thesun.co.uk/tech/20875699/facebook-fake-missing-child-scam-warning/">fake missing person post</a> that generates likes and shares, increasing its credibility and exposure. Then the fraudster edits the content to create an investment scheme which now has the veneer of legitimacy.</p> <p>This scam may work because the initial consumers are unaware that the content is fraudulent, and there is no obvious request. In psychology, this type of persuasion is known as “<a href="https://thedecisionlab.com/reference-guide/psychology/social-proof">social proof</a>” – the tendency of individuals to follow and copy behaviour of others.</p> <h2>Fake app alerts</h2> <p>People post mobile apps, designed to steal users’ personal information, on the Google Play or Apple app store.</p> <p>The app often has a <a href="https://www.edinburghnews.scotsman.com/news/crime/another-person-comes-forward-after-banking-app-scam-3584340">legitimate function</a>, which gives it a cover. Consumers unknowingly jeopardise their private information by downloading these apps which use malware to access additional information.</p> <p>Although there has been <a href="https://tech.co/news/fake-android-apps-delete">media coverage of Android security issues</a>, many users assume malware <a href="https://www.ben-evans.com/benedictevans/2020/8/18/app-stores">cannot bypass app store screening</a>. Again, this scam plays on people’s <a href="https://psycnet.apa.org/doiLanding?doi=10.1037%2F0021-9010.92.3.639">trust in authority figures</a> to keep tjem safe.</p> <p>Discuss any investment opportunities with friends, family members or professionals. It’s much easier said than done, but exercising caution one of the best strategies to reduce the chance of becoming a fraud victim.</p> <p>Scammers count on people paying little to no attention to their emails or messages before clicking on them or providing valuable information. When it comes to scams, the devil is in the missing details.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/207759/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/stacey-wood-473147">Stacey Wood</a>, Professor of Psychology, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, Professor in Decision Science, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-scammers-use-psychology-to-create-some-of-the-most-convincing-internet-cons-and-what-to-watch-out-for-207759">original article</a>.</em></p>

Technology

Our Partners