Skip to main content

Home/ IB ITGS/ Group items tagged SYSTEMS

Rss Feed Group items tagged

Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
Shih-Chen Chiu

BBC NEWS | Technology | Facebook changes privacy policy - 0 views

  • be more transparent about what data it collects and why.
    • Farah Alam
       
      social and ethical issues- privacy the user will be able to know why facebook wants certain information and not give it to them if they think its not justified and maintain their privacy.
  • privacy settings and make it clear to users that they can delete or deactivate an account
    • Farah Alam
       
      IT systems- communication systems are involved ( internet)
  • The country is the first to complete a full investigation of Facebook's privacy practices.
    • Farah Alam
       
      IMPACT- science. through their investigation they are able to find out more(and also create more jobs)
  • ...4 more annotations...
  • There are around 950,000 developers in 180 countries who provide applications for the site.
  • social network
  • Facebook's Michael Richter said if a user chose to deactivate their account, the site would still store their information "even if it is for 10 years".
  • "Application developers have had virtually unrestricted access to Facebook users' personal information,"
    • Salman Rushdi
       
      Social and Ethical issue Impacting on privacy.-sharing information through an unclear privacy policy
Chalana Perera

Facebook privacy lawsuit & child protection - 1 views

  • a Facebook account that was opened without the knowledge or consent of his parents."
    • Chalana Perera
       
      SOCIAL --> Control & Privacy/Anonymity
  • the minor's medical information may have been stored
    • Chalana Perera
       
      IT SYSTEMS --> Comm. Systems/ SOCIAL --> Privacy & Control
  • Facebook makes reasonable efforts to remove accounts of children where there is evidence they are under 13,
    • Chalana Perera
       
      SOCIAL --> Equality
  • ...3 more annotations...
  • of an 11-year-old child because he disclosed that he had swine flu
    • Chalana Perera
       
      IMPACT --> Health / SOCIAL --> Privacy & Anonymity
  • Like all reputable social networking sites, Facebook complies with the Children's Online Privacy Protection Act (COPPA) by not allowing children under 13 to have accounts (COPPA does make provisions for accounts for children under 13 but imposes certain conditions including parental consent). The only way for this young man to obtain a Facebook account would be to lie about his date of birth.
    • Chalana Perera
       
      SOCIAL --> Policies
  • Once on Facebook, anything a person posts can, by default, be seen only by his friends or people in his network. If Xavier's profile was available to additional people, it was because he changed his default privacy settings.
    • Chalana Perera
       
      SOCIAL --.> Privacy & Control
iman mustafa

BBC NEWS | Technology | Downloading is not enough - 2 views

  • Kids, it seems, like unlicensed services because they are free. But the report also acknowledges their usefulness in finding more obscure music and letting them listen to a band before they buy
    • Alex David
       
      social & ethical issues- security, control & authenticity
  • They are willing to abandon p2p in favour of licensed services that they have to pay for, but they wouldn't pay for a streaming service like Spotify.
    • Alex David
       
      IT systems- application & communication systems
  • It might be that young people have no faith that the streaming services are going to stay around since they operate at the discretion of the record labels, which have clamped down on many services that are popular with young music fans in the past.
    • Alex David
       
      Area of Impact- Business & Arts, Entertainment & leisure
  •  
    Bill Thompson says young people's needs from online music may be too complex and transient for the industry to track.
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
ajay tambay

BBC NEWS | Technology | Battling swine flu in cyberspace - 1 views

  • battling swine flu
    • Sarwat Khan
       
      AREA OF IMPACT: HEALTH
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it,"
    • Sarwat Khan
       
      SOCIAL ISSUE - PEOPLE (AWARENESS) , POLICY (SPREAD INFORMATION VIA GAME)
  • The game is played online
    • Sarwat Khan
       
      IT SYSTEMS (COMMUNICATION SYSTEMS AND APPLICATIONS)
  • ...9 more annotations...
  • "Its purpose is simply to create another avenue of information."
    • Sarwat Khan
       
      AREAS OF IMPACT: EDUCATION (SPREADING INFORMATION)
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
Jeff Ratliff

130 million credit card numbers stolen. - 0 views

  • A cyber crime ring has set a new record for the number of credit cards it hacked and compromised -- 130 million.
  • It's a shared responsibility because the payment system is like a giant refinery, with tubes and pipes and valves everywhere.
    • Jeff Ratliff
       
      IT Systems: Internet
  • Because the same PIN you use to buy gas at a gas station you use to get cash out of a ATM.
Rafae Wathra

BBC NEWS | Technology | Mobile data show friend networks - 0 views

  • "It's invisible to the user but logs everything: communication, users' locations, people's proximity by doing continuous Bluetooth scans."
    • Rafae Wathra
       
      This is a privacy issue (social) because these users don't know that so much information about them is being logged
    • Rafae Wathra
       
      This is also an integrity issue because the companies supplying these products don't tell the users that there is a chip in their phones.
  • Friendships can be inferred with 95% accuracy from call records and the proximity of users, says a new report.
    • Rafae Wathra
       
      This relates to communication systems because the phone companies are using communication systems in order to track the social activity of their users
  • but to carry on this "reality mining" in contexts ranging from the modelling of the spread of disease t
    • Rafae Wathra
       
      If gathering mobile data can help track the spread of disease, then its implications in improving the health of the target area (area of impact) have a lot of potential
Sanchit Jain

Pirate Party launches UK poll bid - 1 views

  • non-commercial internet file-sharing
    • Sanchit Jain
       
      Social and Ethical Impact: Intellectual property
  • peer-to-peer networking
    • Sanchit Jain
       
      IT Systems in a Social Context: Software Applications Communications Systems --downloading illegally off other people through the internet
  • future government policy,
    • Sanchit Jain
       
      Areas of Impact: -Government
  • ...1 more annotation...
  • entertainment industry
    • Sanchit Jain
       
      Areas of Impact: Entertainment
Chalana Perera

The Guts of the Station Finder Map - Inside NPR.org Blog : NPR - 0 views

  • The system has several underlying database tables, including zip codes, cities and station data. The zip code and city tables, in addition to containing information about the locations, also include the latitude and longitude for the centroid each location.
  • At the core, the system works based on latitudes and longitudes.
  • Once we have the latitude and longitude, we perform a series of calculations based on the Great Circle Calcuation (GCC), which helps us to determine distances on a curved surface (ie. the Earth - and we are assuming that it is not flat). Using the GCC, we look for stations near the latitude and longitude, based on a 100 mile radius from that point. From that list of stations, which is too inclusive, we start our process of narrowing down the results to the actual stations that can be heard.
  • ...1 more annotation...
  • - a web-based service to inform our audience as to which NPR stations are available throughout the country. There are other more sophisticated, more precise ways to identify the station coverage maps which are really overkill for this type of service.
Jeff Ratliff

Linus Torvalds comments on Linux bloat - 0 views

  •  
    Read the article and then the comments. The comments will give you an idea of how people think about their operating systems as well as introduce some OS terminology.
Chalana Perera

Xtra Ordinary Operating System for XO Laptop - OLPC News - 0 views

  •  
    IT background of the issue
  •  
    IT background of the issue
Maliha Rahman

Teens 'sext' and post personal info (CNET News) Portfolio 1 - 1 views

  •  
    This article is about a survey that was taken to see the teen behavior online plus through cell phones. The whole article basically summarizes how much teens are engaged in activities through communicating systems that can be a huge risk.
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Jeff Ratliff

Why Apple banned Flash from the iPhone (cNet) - 7 views

  •  
    In a rare open letter published Thursday, Apple Chief Executive Steve Jobs has detailed the technological reasons behind his company's refusal to let Adobe Systems' Flash Player onto the iPhone: he thinks it's a relic, not the future.
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
‹ Previous 21 - 40 of 480 Next › Last »
Showing 20 items per page