Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged government

Rss Feed Group items tagged

ino moreno

Timeline: Egypt's revolution - Middle East - Al Jazeera English - 1 views

    • ino moreno
       
      For the first time in 30 YEARS!
  • The man now second-in-command is Omar Suleiman, the country's former spy chief, who has been working closely with Mubarak during most of his reign
  • n a statement released in Berlin, the leaders of Britain, France and Germany say they are "deeply worried about the events in Egypt".
  • ...58 more annotations...
  • January 30: Thousands of protesters remain in Cairo's Tahrir Square.
  • "What we started can never be pushed back"
  • Turkey has announces that it is sending aircraft to evacuate its citizens, after the US embassy in Cairo has advised all Americans currently in Egypt to consider leaving as soon as possible.
  • January 31: Mubarak still refuses to step down, amid growing calls for his resignation. Protesters continue to defy the military-imposed curfew. About 250,000 people gather in Cairo's Tahrir Square and hundreds march through Alexandria.
  • Internet access across Egypt is still shoddy according to most reports.
  • Egypt's new vice-president promises dialogue with opposition parties in order to push through constitutional reforms
  • Protesters remain camped out in Tahrir Square from a variety of political and demographic groups.
  • The White House says the Egyptian government must engage with its people to resolve current unrest. Obama's spokesperson, Robert Gibbs, says the crisis in Egypt "is not about appointments, it's about actions ... They have to address freedoms that the people of Egypt seek".
  • Opposition groups continue to call for a "million man march" and a general strike on Tuesday to commemorate one week since the protests began. Meanwhile, the military reiterates that it will not attempt to hurt protesters.
  • Former US president Jimmy Carter calls the unrest in Egypt an "earth-shaking event", and says he guesses Hosni Mubarak "will have to leave", the US Ledger-Enquirer reports.
  • President Mubarak tells his new prime minister, Ahmad Shafiq, to keep government subsidies and cut prices.
  • February 1: Hosni Mubarak announces in a televised address that he will not run for re-election but refuses to step down from office - the central demand of the protesters.
  • S President Barack Obama praises the Egyptian military for their patriotism and for allowing peaceful demonstrations. He says only the Egyptian people can determine their leaders.
  • Number of protesters in Cairo's Tahrir Square are revised to more than a million people. Thousands more take to the streets throughout Egypt, including in Alexandria and Suez.
  • February 2: Preparations begin for another day of demonstrations against President Hosni Mubarak's regime. The army is still deployed with tanks throughout different positions in and around Tahrir Square.
  • Violent clashes rage for much of the day around Tahrir Square in central Cairo. Up to 1,500 people are injured, some of them seriously, and by the day's end at least three deaths are reported by the Reuters news agency quoting officials.
  • Pro-democracy protesters say the military allowed thousands of pro-Mubarak supporters, armed with sticks and knives, to enter the square.
  • ebruary 3: Bursts of heavy gunfire early aimed at anti-government demonstrators in Tahrir [Liberation] Square, leave at least five people dead and several more wounded, according to reports from Cairo.
  • Sustained bursts of automatic weapons fire and powerful single shots begin at around around 4am local time (02:00GMT) and continue for more than an hour.
  • February 4: Hundreds of thousands of anti-government protesters gather in Cairo's Tahrir Square for what they have termed the "Day of Departure".
  • February 5: Thousands who remain inside Tahrir Square fear an approaching attempt by the military to evacuate the square.
  • January 25:  On a national holiday to commemorate the police forces, Egyptians take to the streets in large numbers, calling it a "day of rage".
  • January 2011: Activists in Egypt call for an uprising in their own country, to protest against poverty, unemployment, government corruption and the rule of president Hosni Mubarak, who has been in power for three decades.
  • ours after the countrywide protests begin, the interior ministry issues a statement blaming the Muslim Brotherhood, Egypt's technically banned but largest opposition party, for fomenting the unrest - a claim that the Muslim Brotherhood denies.
  • Protest organisers heavily relied on social media outlets such as Facebook and Twitter.
    • ino moreno
       
      hosni mubarak in power for 3 decades, musilim brother hood is blamed for outrage in cairo but deny all accounts, protest organizers used social media sites such as facebook and twitter to rally up protestors!
  • January 27: Mohamed ElBaradei, the former head of the UN nuclear watchdog turned democracy advocate, arrives in Egypt to join the protests.
    • ino moreno
       
      Police uses teargas and fire hoses to disperse protesters, 55 protesters and 15 police injured as of january 27th. As protests continue, hundreds are arrested a 17 year old is killed in Cairo by exchange of police gunfire.
    • ino moreno
       
      social media sites and blackberry messenger is disrupted as country prepares for new waves of protest. Egypt warns of decisive measures, meanwhile 11 civilians are killed an 170 are injured. Troops are order to the streets but told not to interfere. jan 29th, mubarak refuses to step down, whereabouts are unknown.
    • ino moreno
       
      Britain, France, and Germany are worried about events taking place in Cairo. jan 31st, internet connections are still subpar. military reiderates they will not harm protesters.
    • David Bell
       
      Where did you find this piece of information?
  • The Egyptian health minister says 11 people have died, while the United Nations says 300 people may have been killed across the country since protests began. News agencies have counted more than 150 dead in morgues in Alexandria, Suez and Cairo.
  • Reuters quotes Egyptian state TV as saying "terrorists" have targeted an Israel-Egypt gas pipeline in northern Sinai.
  • Leaked US diplomatic cables suggest Omar Suleiman, the vice-president, long sought to demonise the opposition Muslim Brotherhood in his contacts with skeptical US officials.
  • February 6: The Muslim Brotherhood says in a statement that it "has decided to participate in a dialogue round in order to understand how serious the officials are in dealing with the demands of the people". Banks officially re-open for 3.5 hours, and traffic police are back on the streets in Cairo, in attempts to get the capital to start returning to normal.
    • ino moreno
       
      Feb 13th: heavy gunfire opened at protest administrators 5 killes several wounded, country enters its 11th day of unrest. death toll reaches about 300 countrywide. Egyptian state TV says "terrorists" targeted the gas pipeline in norther sinai. Muslim brotherhood decided to participate in order to understand how serious officials are dealing with demands of the people.  banks reopen for 3.5 hours in attempt to return state to normal.. Hilary Clinton states "harassment must stop".
  • February 7: Thousands are camping out in Tahrir Square, refusing to budge. While banks have reopened, schools and the stock exhange remain closed.
  • A symbolic funeral procession is held for journalist Ahmed Mahmoud, shot as he filmed the clashes between protesters and riot police from his Cairo office. Protesters are demanding an investigation into the cause of his death
  • Egypt's government approve a 15 per cent raise in salaries and pensions in a bid to appease the angry masses.
  • February 8: Protesters continue to gather at Tahrir Square, which now resembles a tented camp. Protesters in the capital also gather to protest outside parliament.
  • ebruary 9: Labour unions join protesters in the street, with some of them calling for Mubarak to step down while others simply call for better pay. Masssive strikes start rolling throughout the country.
  • Famous Arab pop star Tamer Hosni visits Tahrir Square, but protesters are unimpressed and angered. Hosni previously made statements telling the demonstrators to leave the square, saying that Mubarak had offered them concessions.
  • Thirty-four political prisoners, including members of the Muslim Brotherhood, were released on Tuesday, according to Egyptian state television.
  • Human Rights Watch says that 302 people have been killed since the start of Egypt's pro-democracy uprising. Based on visits to a number of hospitals in Egypt, the organisation says that records show the death toll has reached 232 in Cairo, 52 in Alexandria and 18 in Suez. 
  • Attributing the information to Egyptian security officials, Reuters reports that several protesters suffered gunshot wounds and one was killed when 3,000 protesters took to the streets in Wadi al-Jadid, where clashes from the previous nights carried over to the early hours.
  • Citing medics, AFP news agency reports five were dead and 100 are wounded in the clashes that have been going on for two days.
    • ino moreno
       
      feb.7th schools, banks and stock exchange have reopened. government approves 15 cent raise in salaries and pensions trying to please the mass. protesters still camping in Tahrir square. feb 9th-34 prisoners released, Human Rights Watch says 302 have been killed death toll is: 232 dead in Cairo, 52 in alexandria and 18 in suez.
  • ebruary 10: The newly appointed Culture Minister, Gaber Asfour, quits.  His family says it's due to health reasons but Egypt's main daily newspaper al-Ahram says Asfour, who is also a writer, was criticised by his literary colleagues for taking the post. He was the only new face in the new cabinet.
  • The criminal court in Egypt has endorsed the decision of banning three former ministers from leaving the country and the government has also frozen their assets.
  • rotesters in Tahrir Square react with fury when Mubarak says he's remaining in power until September. Protesters wave their shoes in the air, and demand the army join them in revolt.
  • February 12: People celebrate in Tahrir Square until early morning. Pro-democracy protesters start to clean the square.
  • February 13: Soldiers try to remove the remaining protesters in Tahrir Square and their tents are dismantled. Traffic flows through the square for the first time since the protests began.
  • The cabinet spokesman says the cabinet, appointed when Mubarak was still in office, will not undergo a major reshuffle and will stay to oversee a political transformation in the coming months.
  • About 2,000 policemen hold a protest outside the interior ministry, demanding better wages and trying to clear the bad reputation they have.
  • Some other public sector workers and bank employees are also protesting in Alexandria and other cities.
  • ebruary 14: Protesters leave Tahrir Square in the morning but a few thousands return later, most of them protesting against the police.
  • Police, ambulance drivers and other workers are holding separate demonstrations.
  • The military leadership issues "Communique No 5", calling for national solidarity and criticising strike action. it urges workers to play their role in reviving the economy.
    • ino moreno
       
      reuters reports several protesters with gunshot wounds,  1 was killed.  Feb 10th: Newly appointed culture minister quits due to health reasons stated by family. Mubarak gives another speach promising not to run for any new elections and plans for peaceful order in september, while protesters raise their shoes in outrage! Feb11th mubarak resigns as president and hands his power to the army. annoucement made by Omar Suleiman. peaople in Tahrir square celebrate. Feb 13th.- Soldiers remove the remaining protesters traffic begins to flow through the sqaure as usual. 200 policemen protestdemanding better wages.
Joseph Rhodes II

INTERNATIONAL IDENTITY THEFT: HOW THE INTERNET REVOLUTIONIZED IDENTITY THEF...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Regardless of this evidence showing that Rohn possessed many different forms of false identification, the court reversed Rohn's conviction because the government was unable to show that Rohn "knowingly possess[ed] with intent to use unlawfully or transfer unlawfully five or more identification documents"^'' as required by 18 U.S.C. § 1028(a)(3).^^ Note 2: n unlawful use because Rohn had not demonstrated a lawful one."^^ The court stated that the government tried to convict Rohn under a statute that Congress did not write, and that because the government did not technically meet all elements of the statute, the conviction had to be overturned. Thus, even though the government had charged an individual who had obviously stolen and used many different identities, the government was unable to convict this individual based on the technical language in the statute. Note 3: The U.S. Supreme Court agreed with the Petitioner, holding that the government must prove that a defendant knew that the "means of identification" he or she unlawfully transferred, possessed, or used did, in fact, belong to another person.'**^  Note 4: Thus, because the government could not prove that the petitioner technically knew that the identification numbers belonged to other people, the Supreme Court reversed the aggravated identity theft charges.'*'
Joey Martinez

Disinformation - 0 views

  • alse information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media.
    • Joey Martinez
       
      Misleading information.
    • Joey Martinez
       
      false information that is intended to mislead.[8 minutes ago] false information that is intended to mislead.[8 minutes ago]
  •  
    Disinformation:  False information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media. http://www.google.com/webhp?nord=1#nord=1&q=what+does+disinformation+mean Disinformation:  Deliberately misleading information announced publicly or leaked by a government or especially by an intelligence agency in order to influence public opinion or the government in another nation: http://www.thefreedictionary.com/disinformation  
  •  
    Disinformation:  False information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media. http://www.google.com/webhp?nord=1#nord=1&q=what+does+disinformation+mean
Joey Martinez

Digital Law - 0 views

  • Digital Law Digital law means the legal rights and restrictions governing technology use. Also digital law means electronic responsibility for actions and deeds. What Does Digital
  • restrictions
    • Joey Martinez
       
      These are the rules and laws that we must follow in the digital world.
  •  
    4. Digital Law: The legal rights and restrictions governing technology use. Digital Law means electronic responsibility for actions and deeds.  http://prezi.com/5t3qvlzbbhfv/digital-law/   Digital Law:  Are rules and laws that govern a person's legal right regarding his/her digital work, digital identity, and digital property. http://moodleshare.org/mod/page/view.php?id=15003&inpopup=1   
  •  
    Digital Law: The legal rights and restrictions governing technology use. Digital Law means electronic responsibility for actions and deeds.  http://prezi.com/5t3qvlzbbhfv/digital-law/  
Ryan ORourke

Disinformation - Wikipedia, the free encyclopedia - 0 views

    • ino moreno
       
      Interesting!
  • Another technique of concealing facts, or censorship, is also used if the group can affect such control. When channels of information cannot be completely closed, they can be rendered useless by filling them with disinformation, effectively lowering their signal-to-noise ratio and discrediting the opposition by association with many easily disproved false claims.
    • ino moreno
       
      Good examples!
  • ...6 more annotations...
  • Examples of disinformation
  • Disinformation may include distribution of forged documents, manuscripts, and photographs, or spreading malicious rumors and fabricated intelligence. Its techniques may also be found in commerce and government, used to try to undermine the position of a competitor.
  • A classic example of disinformation occurred during World War II, preceding the Normandy landings, in what would be known as Operation Fortitude. British intelligence convinced the German Armed Forces that a much larger invasion force was about to cross the English Channel from Kent, England.
  • The Cold War made disinformation a recognized military and political tactic. Military disinformation techniques were described by Vladimir Volkoff.
  • Conspiracy theorists often accuse governments of spreading disinformation in a "war for your mind", but also sometimes accuse each other of being "disinformation agents".
  • Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth.
    • Ryan ORourke
       
      Good info
  •  
    "Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth."
  •  
    "Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth."
deborahnolan74

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
Jon Lawson

Office of the U.S. Intellectual Property Enforcement Coordinator | The White House - 2 views

  •  
    This is the site for the IPEC. A regulatory and enforcement branch of the U.S. government that investigates intellectual property claims, violations and infringements. It also establishes regulations to protect and secure intellectual property through changing technologies and methods globally.
Jazz Hedrick

http://www.culturaldiplomacy.org/academy/content/pdf/participant-papers/2012-02-bifef/T... - 0 views

    • Jazz Hedrick
       
      They used social networks as organization tools. They were quick, easy and accurate.
    • Jazz Hedrick
       
      The government believed that once it had placed restrictions on technology that the uprising would slow or halt effectively allowing them to gain control of the situation, however, the protesters rallied together and gained even more support despite the greatest efforts of the Mubarak government
    • Jazz Hedrick
       
      They used social media as alternative press: reporting on events on the ground, uploading text and video directly to the internet or feeding the information and videos to media outlets. 
  • ...1 more annotation...
    • Jazz Hedrick
       
      Social media networks were the main source of on the ground information during the uprising. Journalists identified key bloggers from before the protests broke out and used them as a way to verify the information the were gathering from other sources.
Jason Loper

Digital citizen - Wikipedia, the free encyclopedia - 0 views

  • commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation.
  • People characterizing themselves as digital citizens often use IT extensively, creating blogs, using social networks, and participating in web journalism sites.[
  • A digital citizen commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation. K. Mossberger, et al.[1] define digital citizens as "those who use the Internet regularly and effectively."
  • ...1 more annotation...
  • Digital citizen
chris mackie

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Incredibly so. It not only had links to the web article but also links and information on the entire company. b. Does it answer your questions about the topic i. Not directly but through links to the company's press releases. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. The time stamp on the article is March 12, 2014. It doesn't appear to be revised after that date. b. Is there information that could be updated? i. Not really. This one is pretty good because it covers not only basic information about the company but also links to the content I was looking for directly. 3) Authority and Credibility a. Is the author identified? i. No but it does have the page it is from. b. Can we see their job title or description? i. Not for the person who wrote the article but the financial institution that it came from. c. Can you see where the article originates? i. Yes from Reuters Knowledge Direct. 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. This site is often updated. In this case mostly in a timely fashion. b. Can you rely on this source over time to provide up-to-date information? i. It still isn't real time but it is pretty close. This article was uploaded just a couple days ago. c. Does the internet site contain complete information as found in the comparable article? i. Yes. At least as it relates to the discussion of gay rights. This article has more information on the whole company. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. This article is factual instead of guiding towards a particular view. Because it focuses on the company as a whole and not the current debate it maintains its neutrality. b. Is there information included or not included that is found in the comparable article? i. Not within the scope of this article. Because this article just dic
  • March 12, 2014Heineken N.V. (ADR)Tweede Weteringplantsoen 21 AMSTERDAM 1017 ZD Netherlands
  • var myVar; function googleTranslateElementInit() { new google.translate.TranslateElement({ pageLanguage: 'auto' }, 'google_translate_element'); myVar=setInterval(function(){chkGoogle()},1000); } //Start: 4734642: SEC content seach causes screen to freeze: Nikhil function chkGoogle(){ var obj = $('.goog-te-combo')[0].value; if(obj!=null && obj!=""){ clearInterval(myVar); showHideOriginal(); obj.onchange = function(){showHideOriginal();} } } function showHideOriginal(){ var googleTranslateLang = $('.goog-te-combo')[0].value; if(googleTranslateLang!=null && googleTranslateLang!=""){ document.getElementById("showOrigBut").style.display = 'block'; } else{ document.getElementById("showOrigBut").style.display = 'none'; } } //End: 4734642: SEC content seach causes screen to freeze: Nikhil Copyright 2014 Thomson Financial, All Rights Reserved Reuters Knowledge Direct
  • ...3 more annotations...
  • TELEPHONE: Main Phone: 31-20-5239239, Contact Phone: 31-312-5239590 FAX: 31-20-6622640 URL: Home Page: http://www.theheinekencompany.com E-MAIL: investors@heineken.com OTHER URL:News Releases: http://www.theheinekencompany.com/media/media-releasesInvestor Relations: http://www.theheinekencompany.com/investorsFinancial Information: http://www.theheinekencompany.com/investors/reports-and-presentations?tab=financialsCorporate History/Profile: http://www.theheinekencompany.com/about-us/company-strategyExecutives: http://www.theheinekencompany.com/investors/governance/executive-boardProducts/Services: http://www.theheinekencompany.com/brandsEmployment Opportunities: http://www.theheinekencompany.com/careers
  • LOAD-DATE: March 12, 2014
  • Source [Reuters Knowledge Direct]
David Bell

Hurricane Sandy and Twitter | Project for Excellence in Journalism (PEJ) - 0 views

  • people sent more than 20 million tweets about the storm from October 27 through November 1. This was more than twice the usage from the two previous days
  • Crimson Hexagon technology The
  • largest share of this news and information, fully 34% of the Twitter discourse about the storm, involved news organizations providing content, government sources offering information, people sharing their own eyewitness accounts and still more passing along information posted by others
  • ...1 more annotation...
  • critical lifeline throughout the disaster that struck on October 29
  •  
    This article looks at how Twitter was utilized during Hurricane Sandy.
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Cassandra Lawver

Definition of disinformation in Oxford Dictionaries (British & World English) - 0 views

  • false information which is intended to mislead, especially propaganda issued by a government organization to a rival power or the media
Cassandra Lawver

Definition of ethics in Oxford Dictionaries (British & World English) - 0 views

  • moral principles that govern a person’s behaviour or the conducting of an activity
Jose Nieves

Definition of ethics | Collins English Dictionary - 0 views

  • functioning as singular the philosophical study of the moral value of human conduct and of the rules and principles that ought to govern it; moral philosophy
  • functioning as plural a social, religious, or civil code of behaviour considered correct, esp that of a particular group, profession, or individual
  • functioning as plural the moral fitness of a decision, course of action
Jose Nieves

Networking Rebellion: Digital Policing and Revolt in the Arab Uprisings | The Abolitionist - 0 views

  • Because Egyptian television and radio were state-controlled, the internet became a means to publicize the demonstrations and evade state censorship. As a result, the Egyptian and other Arab uprisings have largely been described as a series of “Twitter” or “Facebook” revolutions.
  • global democracy, allowing repressed peoples to find each other and network in ways which were previously impossible or too dangerous under authoritarian regimes.
  • nternet and cellphone services were cut in a desperate attempt to stop the escalating protests.
  • ...9 more annotations...
  • consequences of this action actually increased mobilizations.
  • The disruption of cellphone [sic] coverage and Internet on the 28th exacerbated the unrest in at least three major ways. It implicated many apolitical citizens unaware of or uninterested in the unrest; it forced more face-to-face communication, i.e., more physical presence in streets; and finally it effectively decentralized the rebellion on the 28th through new hybrid communication tactics, producing a quagmire much harder to control and repress than one massive gathering in Tahrir
  • While the Egyptian government attempted to use digital technologies as a way to repress the uprisings, networks of activists from around the world quickly mobilized in solidarity with the pro-democracy movement.
  • Telecomix, a decentralized organization of Internet activists, quickly organized to provide free fax numbers and dial-up internet access to activists in Egypt so they could publicize the events and demonstrations occurring across the country.
  • echnologies still remain an important tool in transmitting information and spreading news of repression.
  • The Tor Project, a free piece of software that allows users to anonymously connect to the internet and evade state surveillance, has been critically important in allowing activists to avoid identification and repression.
  • digital-information technologies both provide activists with opportunities to communicate and network while also enabling new modes of repression, censorship, and surveillance.
    • Jose Nieves
       
      gave me good insight on how technology helped them
  • Navid Hassanpour wrote in his study, “Media Disruption Exacerbates Revolutionary Unrest”:
  •  
    helps with how the used tec to fight back
Jose Nieves

World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
Jon Lawson

United States Patent and Trademark Office - 3 views

  •  
    The United States Patent and Trademark Office website. Not the Copyright Office website, this is a particular source for trademarking and patenting products and trademarking.  
  •  
    This is a great resource, Jon. Thank you for posting.
caprisunshine

Google Crisis Map - 0 views

    • caprisunshine
       
      Google is known as one of the most credible search engines and google maps is so credible that it is used by the U.S. government
  •  
    Google's Crisis Map combines information from the National Hurricane Center, American Red Cross and other trusted sources. It offers details about the storm's current and forecasted locations, emergency shelter locations, live webcam feeds, public safety alerts, traffic conditions and a wealth of other vital information.
1 - 20 of 29 Next ›
Showing 20 items per page