Skip to main content

Home/ IB ITGS/ Group items tagged OF

Rss Feed Group items tagged

Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Eunice Vincent

BBC NEWS | Technology | Sony to back open e-book format - 0 views

  • The electronics giant said it would stop using a proprietary standard in favour of the ePub open format.
    • Shih-Chen Chiu
       
      IT systems in a social context-software & application
  • Sony said it would have its store converted to the format by the end of 2009. Most Sony Readers can already handle books in the ePub format.
    • Shih-Chen Chiu
       
      areas of impact-science and the environment
  • This may not mean the end of all locks on books readable on Sony's device as the ePub format has an option to implement copyright controls.
    • Shih-Chen Chiu
       
      social & ethical issues-intellectual properties
  • ...2 more annotations...
  • The common format would give Sony Reader owners much more choice about where they get their e-books from.
    • Shih-Chen Chiu
       
      Areas of impact business
  • "Consumers should not have to worry about which device works with which store," said Steve Haber, president of Sony's digital reading business division, in a statement.
    • Shih-Chen Chiu
       
      social & ethical issues reliability areas of impact education
  •  
    Asia-Pacific\n
  •  
    Asia-Pacific
laila-hass

Smart Dust - Computerworld - 2 views

  • Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations. Thanks to recent breakthroughs in silicon and fabrication techniques, these "motes" could eventually be the size of a grain of sand, though each would contain sensors, computing circuits, bidirectional wireless communications technology and a power supply. Motes would gather scads of data, run computations and communicate that information using two-way band radio between motes at distances approaching 1,000 feet.
  • The goal for researchers is to get these chips down to 1mm on a side. Current motes are about 5mm, says Kristofer Pister, professor of electrical engineering at UC Berkeley, who's been working with smart dust since 1997.
  • The cost of motes has been dropping steadily. Prices range from $50 to $100 each today, and Pister anticipates that they will fall to $1 within five years.
  •  
    "Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations."
  •  
    This is a great article and the smart dust devices have the potential to impact of so many industries and sectors of society. Thanks for sharing.
Maliha Rahman

Sexting and Teens (Suite101) Portfolio 1 Criteria D - 1 views

  • Cell phones are now embedded with cameras and have the capability to send pictures to other phones and computers.
  • With sexting, sexually active kids can harass each other simply and quickly.
  • Because they can’t control who these pictures are subsequently sent to, they run the risk that they may wind up in the hands of a sexual predator or someone else who could harm them.
  • ...1 more annotation...
  • How Adults Can Prevent Sexting
  •  
    In this article we see a lot of ways of sexting, their reasoning's plus their consequences. We also see a few suggestions or examples of how to prevent your child from getting into and taking actions like this.
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • it also means that people can be illuminated without being aware of it.
    • anonymous
       
      What about privacy, of people who are not criminals?
  • The ability to provide real-time surveillance of large areas may be getting closer, as the Army launches a quest for a 2.3 gigapixel camera that could be packaged aboard a drone or a manned aircraft.
    • anonymous
       
      Social > Privacy
  • In terms of specifics, the Army is looking for 2.3 gigapixels running at two frames per second. By my reckoning, this suggests continuous coverage of area of around sixty-two square miles at 0.3m resolution with a single sensor
    • anonymous
       
      It systesms > harware & software
  • ...1 more annotation...
  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
Sarwat Khan

MP is named Labour 'Twitter tsar' - 0 views

  • and rather than replacing traditional ways of doing things, it is about making traditional campaigning methods even more effective."
    • Sarwat Khan
       
      social Policies
  • She will train MPs and candidates in the best use of the internet.
    • Sarwat Khan
       
      Social People
  • Labour MP Kerry McCarthy has been given the job of improving the party's use of social media sites such as Twitter and Facebook ahead of the next election.
    • Sarwat Khan
       
      Area Of Impact: Politics IT Systems : Communication systems:Internet Applications: facebook, twitter.
Sarwat Khan

BBC NEWS | UK | UK Politics | MP is named Labour 'Twitter tsar' - 0 views

  • Labour MP Kerry McCarthy has been given the job of improving the party's use of social media sites such as Twitter and Facebook ahead of the next election.
    • Sarwat Khan
       
      AREAS OF IMPACT : POLITICS AND GOVERNMENT, PEOPLE
  • She will train MPs and candidates in the best use of the internet.
    • Sarwat Khan
       
      IT SYSTEMS : COMMUNICATION SYSTEMS
  • Rather than being something completely new, campaigning using new media is simply doing what we've always done in a new setting - and rather than replacing traditional ways of doing things, it is about making traditional campaigning methods even more effective."
    • Sarwat Khan
       
      SOCIAL ISSUE: POLICY, PEOPLE
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
Elvira Russ

BBC NEWS | Technology | A life recorded in bits and bytes - 0 views

  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • ...12 more annotations...
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
    • Bhumika Regmi
       
      The plan is that one can include all of their information on to the programme like Gordon Bell. If the system is to fail or have some sort of error, one's privacy as well as security is at stake.
  • in the future we may all be able to offload our own memory into a comprehensive e-memory.
    • Bhumika Regmi
       
      Applications
  • Bell, a principle researcher at Microsoft Research, has now written a book about how
    • Bhumika Regmi
       
      education
  • "You basically have a great sense of freedom, because you are able to offload your bio-memory, and just commit all of the facts to an e-memory."
  • He said that the time is right for people to take e-memories seriously.
  • "I wouldn't have said this 20 years ago because of the difficulty and the cost to do it. The opportunity now is: it doesn't cost anything to do this."
  • For Mr Bell the benefit of his experiment is simple: it makes him feel better.
  • "I have a reasonably complicated life - so I wanted to find out just how many bits were coming and going, and how to deal with it."
  • His life is kept in a database for a project called MyLifeBits.
  •  
    Gordon Bell has digitised his entire life, from shopping receipts to phone calls.
Farah Alam

Research shows that gamers are less healthy in many ways than non gamers - 1 views

  • A team from Centers for Disease Control and Prevention (CDC) also found gamers were less healthy, fatter, and more depressed than non-gamers.
    • anonymous
       
      This is where it shows that games impacts health of many people.
    • Farah Alam
       
      areas of impact- health
  • "Health risk factors, specifically a higher BMI and a larger number of poor mental-health days, differentiated adult video-game players from non gamers," he said.
    • anonymous
       
      The specific issues of health that is impacted.
  • Female video-game players reported greater depression and lower health status than female non-players, while male gamers reported a higher BMI and a greater reliance on the internet than non-gamers.
    • anonymous
       
      Talking about the different people that are shown as examples.
  • ...2 more annotations...
  • The team from CDC examined people's perception of their mood, personality, health status, physical and mental health, body mass index (BMI) and quality of life.
  • A UK survey from 2002, conducted by the Leisure Software Publishers Association, found the average gamer was aged between 25 and 34.
    • anonymous
       
      Applications, games are involved and the surey was conducted by the Leisure Software Publishers.
Rafae Wathra

Twitter tweets are 40% 'babble' - 0 views

  • A short-term study of Twitter has found that 40% of the messages sent via it are "pointless babble."
    • Rafae Wathra
       
      Social: Privacy This shows how little privacy that Twitter users have sinced they are being judged by complete strangers based on how they tweet (who came to the conclusion that its a lot of pointless babble)
  • In total it grabbed 2,000 messages and then put each message it grabbed into one of six categories; news, spam, self-promotion, pointless babble, conversational and those with pass-along value
    • Rafae Wathra
       
      IT systems: Communication System This shows how Twitter is used as a communication system and what people communicate with it
  • This belief, it said, was driven by the growing number of firms starting to use Twitter as a tool to drum up sales.
    • Rafae Wathra
       
      Impact: Business This is an example of a way by which large businesses use technology to increase sales
Jeff Ratliff

BBC NEWS | Americas | Alarm bells ring over 'sexting' - 1 views

  •  
    A new teen phenomenon of sending sexually explicit images of themselves via text has led to calls for a change in the law as they face the threat of being classed as sex offenders.
iman mustafa

NewsBank Popular Periodicals: Document Display - 0 views

  • Facebook must also deal with persistent privacy concerns. When the company first rolled out the News Feed, and any change on a user's page suddenly began scrolling on the screens of anyone who'd added him or her as a friend, the social graph went bonkers: more than 700,000 people joined a user group called "Students Against Facebook News Feed." The company acted quickly to install privacy controls to let people opt out of the information flow, and the crisis cooled, though Marc Rotenberg of the Electronic Privacy Information Center says that setting privacy preferences is still too complicated. The company says that plenty of protections are built in. "Facebook is about replicating the social restrictions of the offline world," says its chief privacy officer, Chris Kelly. The problem is that Facebook is on the Internet, and it's all too easy to circumvent those and dig up private stuff. This is all too clear from the experience of political offspring who seem engaged in perpetual competition to embarrass their parents.
Ali Parrish

NewsBank Popular Periodicals: Copyrighting Laws - 0 views

  • ACCORDING TO THE U.S. Copyright Office, "copyright" refers to a form of protection provided by U.S. law to the authors of "original works of authorship" including literary, dramatic, musical, artistic and other intellectual rights. The owner of copyrighted material generally has the exclusive right to authorize such things as reproducing, distributing and displaying the work.
  • This means that as soon as you finish a poem, novel or article, you automatically own the copyright and it's yours until you sell or license it to someone else, or until the period of protection ends.
  • But by giving notice of your copyright--and registering your work on a regular basis--you'll help prevent it from being stolen or misappropriated in the future. Better yet, it will give you an effective weapon to use against violators if you need to.
Maliha Rahman

Panic Button Sparks Rise In Facebook Reports (Classic FM) - 1 views

  •  
    This website discusses the panic button issue on facebook and how it impacted the society and also includes a bunch of quotes on what some of the stakeholders thought of the incident and their opinions. 
anonymous

FDIC: End to Identity Theft/Account Hijacking - 0 views

  •  
    This article presents the study of technology used to commit account hijacking and the methods available to prevent it. It gives a clean example of a phishing as a fraud email from Citibank. "The fifth method of acquiring the information necessary to hijack accounts is by inserting malicious software (such as a keystroke logger26), often referred to as "spyware," on a consumer's personal computer at home or on a computer used by many consumers in a public facility like an Internet café"
‹ Previous 21 - 40 of 348 Next › Last »
Showing 20 items per page