Skip to main content

Home/ IB ITGS/ Group items tagged and

Rss Feed Group items tagged

ajay tambay

BBC NEWS | Technology | Battling swine flu in cyberspace - 1 views

  • battling swine flu
    • Sarwat Khan
       
      AREA OF IMPACT: HEALTH
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it,"
    • Sarwat Khan
       
      SOCIAL ISSUE - PEOPLE (AWARENESS) , POLICY (SPREAD INFORMATION VIA GAME)
  • The game is played online
    • Sarwat Khan
       
      IT SYSTEMS (COMMUNICATION SYSTEMS AND APPLICATIONS)
  • ...9 more annotations...
  • "Its purpose is simply to create another avenue of information."
    • Sarwat Khan
       
      AREAS OF IMPACT: EDUCATION (SPREADING INFORMATION)
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
  • "The game is based on the need to increase public awareness to the threat posed by a pandemic and the measures in place to contain it," said Albert Osterhaus, head of virology at the Erasmus Medical Centre and one of the experts involved in creating the game.
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Jeff Ratliff

Understanding Computers and the Internet | Harvard Video Course - 0 views

  •  
    This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the Internet can be watched by others, and how your computer can become infected with a worm just by turning it on. In this course we demystify computers and the Internet, along with their jargon, so that students understand not only what they can do with each but also how it all works and why. Students leave this course armed with a new vocabulary and equipped for further exploration of computers and the Internet. Topics include hardware, software, the Internet, multimedia, security, website development, programming, and dotcoms. This course is designed both for those with little, if any, computer experience and for those who use a computer every day.
Jason Carlson

Lying - 48 views

In this situation, the man should be asked if he wants to hear straight away and the doctors should know and understand the immediate phycological impacts on sharing the truth straight away, and th...

Maliha Rahman

Rogue pharmacies still a problem for search engines | Health Tech - CNET News - 1 views

  • The study, conducted by LegitScript, an online pharmacy verification service, and KnujOn, an Internet compliance company, found that 90 percent of the reviewed Internet pharmacy advertisements were from fake or illegal Internet pharmacies.
    • Maliha Rahman
       
      (IT systems: communication system): the idea that 90% of the pharmacies advertising online through the internet are fake and illegal , and is providing people with a unreliable communication system.
  • "We were able to purchase potentially addictive drugs without a prescription or any age verification via Bing.com ads," LegitScript President John Horton told CNET News. "We also received counterfeit medication. Microsoft profits from these illegal ads, which put Internet users at risk."
    • Maliha Rahman
       
      fake unreliable advertisements selling addictive drugs without a prescription and giving out incorrect information in order to get money. (can cause serious health issues and creating an unreliable communicating environment)
  • "the Internet has become a haven for drug seekers and abusers, particularly (regarding) controlled substances. It is a much more serious and dangerous phase of the Internet."
    • Maliha Rahman
       
      unreliable, illegal communication system
  • ...2 more annotations...
  • Microsoft disputes LegitScript's claim that 90 percent of the sponsored Internet pharmacy ads on Bing are fake or illegal, adding that it is working to weed out the rogue advertisers that do slip through. The company uses an Internet pharmacy verification service called PharmacyChecker--a competitor of LegitScript--to ensure that its sponsored prescription drug advertisements are legitimate.
    • Maliha Rahman
       
      (social, integrity)getting fake internet pharmacy verification lacks intregity. in this case selling unprescribed drugs that can cause serious health issues heavy concequences
  • The authors took a closer look at 10 of the 69 online drugstores. None of the 10 required a valid prescription. Orders were placed with two of them. Of the two drugs received, both were tested and one was found to be counterfeit.
    • Maliha Rahman
       
      (Impact, Health) People all over the world are using unreliable sites and purchasing counterfeit drugs which is highly risky to one's health and can badly affect a person.
  •  
    The NABP's own analysis of search results from Google and Yahoo turned up many drug ads from sketchy purveyors.
Elvira Russ

BBC NEWS | Technology | A life recorded in bits and bytes - 0 views

  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • ...12 more annotations...
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
  • includes everything he has accumulated, written, photographed, presented, and owned.
    • Bhumika Regmi
       
      The plan is that one can include all of their information on to the programme like Gordon Bell. If the system is to fail or have some sort of error, one's privacy as well as security is at stake.
  • in the future we may all be able to offload our own memory into a comprehensive e-memory.
    • Bhumika Regmi
       
      Applications
  • Bell, a principle researcher at Microsoft Research, has now written a book about how
    • Bhumika Regmi
       
      education
  • "You basically have a great sense of freedom, because you are able to offload your bio-memory, and just commit all of the facts to an e-memory."
  • He said that the time is right for people to take e-memories seriously.
  • "I wouldn't have said this 20 years ago because of the difficulty and the cost to do it. The opportunity now is: it doesn't cost anything to do this."
  • For Mr Bell the benefit of his experiment is simple: it makes him feel better.
  • "I have a reasonably complicated life - so I wanted to find out just how many bits were coming and going, and how to deal with it."
  • His life is kept in a database for a project called MyLifeBits.
  •  
    Gordon Bell has digitised his entire life, from shopping receipts to phone calls.
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
shazad rouf

Designing an Internet for kids - CNN.com - 1 views

  • The goal is to be both educational and entertaining. So KidZui has mapped out 8,600 channels of what kids are interested in, ranging from photosynthesis to Miley Cyrus. And we relate all of those categories to each other so kids can independently and safely browse, search and share.
    • shazad rouf
       
      Social and ethnical issues: control; security Parents can easily control kids from going to bad sites.
  • Our goal with KidZui is to focus on the light, not the darkness. Of course, we keep all of the bad content and the bad people out of KidZui. But we focus on letting kids who want to discover, who want YouTube, to get YouTube videos that are fun and appropriate for them ... I think it is indicative of just how much kids want to be online.
  • Our goal with KidZui is to focus on the light, not the darkness. Of course, we keep all of the bad content and the bad people out of KidZui. But we focus on letting kids who want to discover, who want YouTube, to get YouTube videos that are fun and appropriate for them ... I think it is indicative of just how much kids want to be online.
    • shazad rouf
       
      Areas of impact: Health, Education, Arts, entertainment and leisure
Chalana Perera

Superior Quality Theatre Captioning (Theatre Captioning) - 0 views

  • substantial costs for displays screens and the onsite attendance of a skilled captioner at each show.
  •  
    This article is about an Australian Musical Company that offers services to the hearing impaired and deaf audiences members and describes some other theatres that do so and how it works.
  •  
    This article is about an Australian Musical Company that offers services to the hearing impaired and deaf audiences members and describes some other theatres that do so and how it works.
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
Farah Alam

Research shows that gamers are less healthy in many ways than non gamers - 1 views

  • A team from Centers for Disease Control and Prevention (CDC) also found gamers were less healthy, fatter, and more depressed than non-gamers.
    • anonymous
       
      This is where it shows that games impacts health of many people.
    • Farah Alam
       
      areas of impact- health
  • "Health risk factors, specifically a higher BMI and a larger number of poor mental-health days, differentiated adult video-game players from non gamers," he said.
    • anonymous
       
      The specific issues of health that is impacted.
  • Female video-game players reported greater depression and lower health status than female non-players, while male gamers reported a higher BMI and a greater reliance on the internet than non-gamers.
    • anonymous
       
      Talking about the different people that are shown as examples.
  • ...2 more annotations...
  • The team from CDC examined people's perception of their mood, personality, health status, physical and mental health, body mass index (BMI) and quality of life.
  • A UK survey from 2002, conducted by the Leisure Software Publishers Association, found the average gamer was aged between 25 and 34.
    • anonymous
       
      Applications, games are involved and the surey was conducted by the Leisure Software Publishers.
anonymous

Identity Theft and Fraud - 0 views

  •  
    Description of Identity theft, and that it is indeed a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In the US and Canada many poeple have reported that unauthorized persons have taken frauds out of their bank or finacial accounts, or the worst care, taken over their identity all together (another person who is using someone else's name/credit card).
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
funeral director

Professional UK Funeral Directors For You - 1 views

My friend's brother recently passed away and she wanted to give a good funeral for the beloved deceased. We thought of asking for professional help regarding this matter. We were able to find Funer...

funeral directors

started by funeral director on 16 Sep 11 no follow-up yet
Elvira Russ

BBC NEWS | Business | Is Google really flouting copyright law? - 0 views

  •  
    This article discusses mostly the copyright issue within the US and the UK and their deals with libraries. It gives an explanation of the scanning process and the problems with authors, different companies and libraries.
Maliha Rahman

Panic Button Sparks Rise In Facebook Reports (Classic FM) - 1 views

  •  
    This website discusses the panic button issue on facebook and how it impacted the society and also includes a bunch of quotes on what some of the stakeholders thought of the incident and their opinions. 
Chalana Perera

Why Subtitles may affect Theatre Set up (Electronic House) - 0 views

  • Constant Image Height' widescreen setup
  • There are three common subtitle placements for standard DVD and high-definition Blu-ray disc transfers that Hollywood has settled into: Within the film frame (like it would be if you were watching in a movie theater)Below the film frame in the bottom black bar spacePartially within and partially below the frame
  • Some disc players are capable of shifting the placement of subtitles on the screen
  •  
    This article analysizes the impacts of onscreen subtitles in theatre and screened shows, and how there are several disadvantages to having subtitles on the screen.
  •  
    This article analysizes the impacts of onscreen subtitles in theatre and screened shows, and how there are several disadvantages to having subtitles on the screen.
Elvira Russ

Indian woman and disabled kid (Indian times) - 0 views

  •  
    This is about an indian lady who got sick and she went to be vaccinated for her disease and the vaccine caused her kid that she was pregnant with to be disabled and she herself was paralyzed. She's getting better but she's still not well. Assistive technology has helped her.
shazad rouf

Dell turns netbooks into navigation devices - CNN.com - 1 views

  • Dell netbooks with the integrated GPS cards will allow consumers to pop open a netbook and get directions and also also make their netbook location aware. For instance, buyers can geo-tag photos on Flickr or check weather information customized to their current location. The Wireless 700 card combines Broadcom's GPS technology and Skyhook Wireless' Wi-Fi positioning solutions.
    • shazad rouf
       
      soical and ethnical issues: Control; Globalization and cultural diversity
    • shazad rouf
       
      IT systems in a social context: Applications
    • shazad rouf
       
      Arts, entertainment, and leisure
  • "Smartphones already have GPS capabilities," says Alan Sicher, senior wireless product manager at Dell. "We are now bringing it to netbooks so the devices know where you are and can help you where you want to go.
    • shazad rouf
       
      People can rely on the navigation devices for traveling purposes.
1 - 20 of 324 Next › Last »
Showing 20 items per page