Skip to main content

Home/ IB ITGS/ Group items tagged Accounting

Rss Feed Group items tagged

Chalana Perera

Facebook privacy lawsuit & child protection - 1 views

  • a Facebook account that was opened without the knowledge or consent of his parents."
    • Chalana Perera
       
      SOCIAL --> Control & Privacy/Anonymity
  • the minor's medical information may have been stored
    • Chalana Perera
       
      IT SYSTEMS --> Comm. Systems/ SOCIAL --> Privacy & Control
  • Facebook makes reasonable efforts to remove accounts of children where there is evidence they are under 13,
    • Chalana Perera
       
      SOCIAL --> Equality
  • ...3 more annotations...
  • of an 11-year-old child because he disclosed that he had swine flu
    • Chalana Perera
       
      IMPACT --> Health / SOCIAL --> Privacy & Anonymity
  • Like all reputable social networking sites, Facebook complies with the Children's Online Privacy Protection Act (COPPA) by not allowing children under 13 to have accounts (COPPA does make provisions for accounts for children under 13 but imposes certain conditions including parental consent). The only way for this young man to obtain a Facebook account would be to lie about his date of birth.
    • Chalana Perera
       
      SOCIAL --> Policies
  • Once on Facebook, anything a person posts can, by default, be seen only by his friends or people in his network. If Xavier's profile was available to additional people, it was because he changed his default privacy settings.
    • Chalana Perera
       
      SOCIAL --.> Privacy & Control
anonymous

FDIC: End to Identity Theft/Account Hijacking - 0 views

  •  
    This article presents the study of technology used to commit account hijacking and the methods available to prevent it. It gives a clean example of a phishing as a fraud email from Citibank. "The fifth method of acquiring the information necessary to hijack accounts is by inserting malicious software (such as a keystroke logger26), often referred to as "spyware," on a consumer's personal computer at home or on a computer used by many consumers in a public facility like an Internet café"
iman mustafa

Twitter, Facebook attack targeted one user - 0 views

  • The blogger, who uses the account name "Cyxymu," (the name of a town in the Republic of Georgia) had accounts on all of the different sites that were attacked at the same time, Max Kelly, chief security officer at Facebook, told CNET New
  • A Georgian blogger with accounts on Twitter, Facebook, LiveJournal, and Google's Blogger and YouTube was targeted in a denial-of-service attack that led to the sitewide outage at Twitter and problems at the other sites on Thursday, according to a Facebook executive.
  • Kelly declined to speculate on who was behind the attack, but he said: "You have to ask who would benefit the most from doing this and think about what those people are doing and the disregard for the rest of the users and the Internet."
Shih-Chen Chiu

BBC NEWS | Technology | Facebook changes privacy policy - 0 views

  • be more transparent about what data it collects and why.
    • Farah Alam
       
      social and ethical issues- privacy the user will be able to know why facebook wants certain information and not give it to them if they think its not justified and maintain their privacy.
  • privacy settings and make it clear to users that they can delete or deactivate an account
    • Farah Alam
       
      IT systems- communication systems are involved ( internet)
  • The country is the first to complete a full investigation of Facebook's privacy practices.
    • Farah Alam
       
      IMPACT- science. through their investigation they are able to find out more(and also create more jobs)
  • ...4 more annotations...
  • There are around 950,000 developers in 180 countries who provide applications for the site.
  • social network
  • Facebook's Michael Richter said if a user chose to deactivate their account, the site would still store their information "even if it is for 10 years".
  • "Application developers have had virtually unrestricted access to Facebook users' personal information,"
    • Salman Rushdi
       
      Social and Ethical issue Impacting on privacy.-sharing information through an unclear privacy policy
Farah Alam

BBC NEWS | Business | Africa's mobile banking revolution - 0 views

  • Millions of Africans are using mobile phones to pay bills, move cash and buy basic everyday items.
  • Setting up a bank account on your phone is straightforward. All you do is register with an approved agent, provide your phone, along with an ID card, and then deposit some cash onto your account.
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
Omkar Naik

Hacking firms one click ahead of law - 0 views

  • For $US100, the website provided Cioni, then living in northern Virginia, with the password to her boyfriend's AOL email account. For another $100, she got her boyfriend's wife's password. And then the password of another girlfriend and the boyfriend's children.
  • Federal US law prohibited hacking into email, but without further illegal activity it was only a misdemeanour, said Orin Kerr, a law professor at George Washington University.
  • All the services advertise that they will email a screenshot of the target's inbox or even send an email from the target's account as proof that they've cracked the password. The customer then sends payment. One service then responds with the script of a scene from a Shakespeare play, with the stolen password hidden in the copy.
anonymous

Identity Theft and Fraud - 0 views

  •  
    Description of Identity theft, and that it is indeed a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In the US and Canada many poeple have reported that unauthorized persons have taken frauds out of their bank or finacial accounts, or the worst care, taken over their identity all together (another person who is using someone else's name/credit card).
Jeff Ratliff

Criminal hacker 'Iceman' gets 13 years (ComputerWorld) - 0 views

  •  
    A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. Max Ray Butler, who used the hacker pseudonym Iceman, was sentenced Friday morning in U.S. District Court in Pittsburgh on charges of wire fraud and identity theft. In addition to his 13-year sentence, Butler will face five years of supervised release and must pay US$27.5 million in restitution to his victims, according to Assistant U.S. Attorney Luke Dembosky, who prosecuted the case for the federal government. Dembosky believes the 13 year sentence is the longest-ever handed down for hacking charges.
anonymous

HowStuffWorks "How Credit Cards Work" - 1 views

  •  
    Credit card history, how it has come along since 1999. This is from How Stuff Works, and talks about the size of the credit card: "A credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8 inches in size, that contains identification information such as a signature or picture, and authorizes the person named on it to charge purchases or services to his account -- charges for which he will be billed periodically." he first universal credit card -- one that could be used at a variety of stores and businesses -- was introduced by Diners Club, Inc.
Jeff Ratliff

TypingMaster Online - 0 views

  •  
    Login page for AISD account
Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
anonymous

Facebook Protection Guides (Next Advisor) - 0 views

  •  
    A series of tips that help assist you on identifing doing right from wrong. Being able to identify fake accounts and to report them directley to facebook so further actions can be taken. 6 tips in total, Tip #1: Limit the amount of personal information available on your Facebook profile. Tip #6: Consider an identity theft protection service.
anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
Jeff Ratliff

Teen's Facebook update gets robbery charges dropped - 2 views

  •  
    A teenager accused of a robbery in New York had charges dropped after he argued that he was on Facebook and it was confirmed that a post was made from his account. However, anyone could have made the post.
  •  
    Yeah, I heard of this case. I could easily write a macro to update my Facebook status every X minutes for a specified amount of time.
anonymous

Gangs are stealing taxpayers' passwords and submitting claims for false tax returns them. - 0 views

  • Gangs are stealing taxpayers' passwords and submitting claims for tax refunds to be paid to them, HM Revenue and Customs has warned.
    • Salman Rushdi
       
      Impact: Politics- Stealing against the law
  • details via the internet.
    • Salman Rushdi
       
      Comm Sys: Via Internet
  • They then used these details to make fraudulent repayment claims, requesting funds be sent to other bank accounts.
    • Salman Rushdi
       
      Security. Authenticity.
  • ...1 more annotation...
  • ugh the self-assessment repayments system has been disc
Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
Kavita van der Loop

Privacy of Facebook - 0 views

  • limit application developers' access to user information,
    • Kavita van der Loop
       
      social impact - control/ privacy
  • deactivated account information should be deleted
    • Kavita van der Loop
       
      ongoing privacy issue - social impact
1 - 20 of 23 Next ›
Showing 20 items per page