Skip to main content

Home/ IB ITGS/ Group items tagged int systems

Rss Feed Group items tagged

Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
Chalana Perera

YouTube Captions (BBC Technology) - 1 views

  • machine-generated captions
  • The translation is not always perfect
  • media industry
  • ...2 more annotations...
  • group of radio stations, newspapers and websites
  • YouTube offers a manual captioning service but video makers tend not to use it
  •  
    This article discusses the new automatic subtitles that appear on You Tube videos for deaf viewers, created by a deaf technician. They are found on 13 major channels and YouTube. It involves speech recognition technology & caption systems.
  •  
    This article discusses the new automatic subtitles that appear on You Tube videos for deaf viewers, created by a deaf technician. They are found on 13 major channels and YouTube. It involves speech recognition technology & caption systems.
Shih-Chen Chiu

Spider-Man, X-Men comics coming to PSP - Games - msnbc.com - 0 views

  • NEW YORK - Sony is adding a digital reader service that will allow owners of its handheld gaming system, the PlayStation Portable, to download comics.
    • Shih-Chen Chiu
       
      social & ethical issues---intellectual property
    • Shih-Chen Chiu
       
      IT systems in a social context----software & application
  • Users will be able to read classic and new comics page by page or frame by frame. Sony says PSP owners will be able to access a range of media through the digital reader service, but it gave no further details.
    • Shih-Chen Chiu
       
      areas of impact---art entertainment & leisure
Jeewon Yoon

New Nanolaser Key To Future Optical Computers And Technologies - 0 views

  • tiniest laser
    • Jeewon Yoon
       
      Areas of Impact Art
  • Nanophotonics may usher in a host of radical advances, including powerful "hyperlenses" resulting in sensors and microscopes 10 times more powerful than today's and able to see objects as small as DNA; computers and consumer electronics that use light instead of electronic signals to process information; and more efficient solar collectors.
    • Jeewon Yoon
       
      Social Globalization
  • new device, called a "spaser," is the first of its kind to emit visible light, it represents a critical component for possible future technologies based on "nanophotonic" circuitry,
    • Jeewon Yoon
       
      IT systems Integrated systems
anonymous

South Korea halts rocket launch - 0 views

  • Officials said an automatic abort system was triggered during the countdown when weak pressure was detected in a fuel tank.
    • anonymous
       
      Social > Relaiability
  • "The automatic launch sequence automatically turned off due to a problem that was detected in the countdown," said Lee Sang-mok, the deputy minister of science and technology policy.
    • anonymous
       
      IT systems > Hardware
  • The rocket, intended to place a satellite into orbit, has been developed with the help of Russia
    • anonymous
       
      Impact > Bussiness, Science.
YooJin Jung

BBC NEWS | Technology | Google books deal battle heats up - 0 views

  • The date for comments to the New York court overseeing the class action suit was extended from Friday to Tuesday, after the filing system went down. As time ticks away, supporters and critics have been manning both sides of the debate to win the public case.
    • Andrew Beadle
       
      SOCIAL: Policies- This article deals with policy between google and authors in sharing literary information.
  • digitise the world's books and create a vast online library
    • Andrew Beadle
       
      IMPACT: Arts, Education: By digitising out of print literature, Google will open up the accessabilty of the literature to everybody, which will have a boost on education. IT SYSTEMS: Int System This is an intellectual system that will hold online information accessible to anyone.
  •  
    The battle between critics and supporters of Google's effort to create the world's largest virtual library intensifies.
Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
Chalana Perera

US plans for cyber attacks (News24) - 1 views

  • disabled US cell phone networks, slowed internet traffic to a crawl and crippled America's power grid
  • stealth cyber attack and a pair of bombings, cutting electricity to tens of millions of homes.
  • has the authority to use the full powers at his disposal
  •  
    This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
anonymous

Gangs are stealing taxpayers' passwords and submitting claims for false tax returns them. - 0 views

  • Gangs are stealing taxpayers' passwords and submitting claims for tax refunds to be paid to them, HM Revenue and Customs has warned.
    • Salman Rushdi
       
      Impact: Politics- Stealing against the law
  • details via the internet.
    • Salman Rushdi
       
      Comm Sys: Via Internet
  • They then used these details to make fraudulent repayment claims, requesting funds be sent to other bank accounts.
    • Salman Rushdi
       
      Security. Authenticity.
  • ...1 more annotation...
  • ugh the self-assessment repayments system has been disc
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
Chalana Perera

The Guts of the Station Finder Map - Inside NPR.org Blog : NPR - 0 views

  • The system has several underlying database tables, including zip codes, cities and station data. The zip code and city tables, in addition to containing information about the locations, also include the latitude and longitude for the centroid each location.
  • At the core, the system works based on latitudes and longitudes.
  • Once we have the latitude and longitude, we perform a series of calculations based on the Great Circle Calcuation (GCC), which helps us to determine distances on a curved surface (ie. the Earth - and we are assuming that it is not flat). Using the GCC, we look for stations near the latitude and longitude, based on a 100 mile radius from that point. From that list of stations, which is too inclusive, we start our process of narrowing down the results to the actual stations that can be heard.
  • ...1 more annotation...
  • - a web-based service to inform our audience as to which NPR stations are available throughout the country. There are other more sophisticated, more precise ways to identify the station coverage maps which are really overkill for this type of service.
Chalana Perera

Xtra Ordinary Operating System for XO Laptop - OLPC News - 0 views

  •  
    IT background of the issue
  •  
    IT background of the issue
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
Zaheen Ahmad

BBC NEWS | Programmes | Click | Pirates look forward to business - 0 views

  • UK's Federation Against Copyright Theft (Fact).
  • "They have advertising on their sites and, as those sites attract more eyeballs, they are getting more advertising income.
  • Isohunt, Mininova and The Pirate Bay.
  • ...4 more annotations...
  • - links to TV, film and music files held on its users' computers.
  • Peer-to-peer (p2p) software connects users to one another and shares files through means such as so-called bit torrent, which chops up files into manageable bits.
  • No copyright content is hosted on the websites themselves - they simply do the indexing of the available content.
  • damages to entertainment companies such as Columbia Pictures, Warner Brothers, EMI and Sony Music Entertainment.
  •  
    For the Issue analysis
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • it also means that people can be illuminated without being aware of it.
    • anonymous
       
      What about privacy, of people who are not criminals?
  • The ability to provide real-time surveillance of large areas may be getting closer, as the Army launches a quest for a 2.3 gigapixel camera that could be packaged aboard a drone or a manned aircraft.
    • anonymous
       
      Social > Privacy
  • In terms of specifics, the Army is looking for 2.3 gigapixels running at two frames per second. By my reckoning, this suggests continuous coverage of area of around sixty-two square miles at 0.3m resolution with a single sensor
    • anonymous
       
      It systesms > harware & software
  • ...1 more annotation...
  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
1 - 20 of 122 Next › Last »
Showing 20 items per page