Skip to main content

Home/ IB ITGS/ Group items tagged communication

Rss Feed Group items tagged

Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
Maliha Rahman

Rogue pharmacies still a problem for search engines | Health Tech - CNET News - 1 views

  • The study, conducted by LegitScript, an online pharmacy verification service, and KnujOn, an Internet compliance company, found that 90 percent of the reviewed Internet pharmacy advertisements were from fake or illegal Internet pharmacies.
    • Maliha Rahman
       
      (IT systems: communication system): the idea that 90% of the pharmacies advertising online through the internet are fake and illegal , and is providing people with a unreliable communication system.
  • "We were able to purchase potentially addictive drugs without a prescription or any age verification via Bing.com ads," LegitScript President John Horton told CNET News. "We also received counterfeit medication. Microsoft profits from these illegal ads, which put Internet users at risk."
    • Maliha Rahman
       
      fake unreliable advertisements selling addictive drugs without a prescription and giving out incorrect information in order to get money. (can cause serious health issues and creating an unreliable communicating environment)
  • "the Internet has become a haven for drug seekers and abusers, particularly (regarding) controlled substances. It is a much more serious and dangerous phase of the Internet."
    • Maliha Rahman
       
      unreliable, illegal communication system
  • ...2 more annotations...
  • Microsoft disputes LegitScript's claim that 90 percent of the sponsored Internet pharmacy ads on Bing are fake or illegal, adding that it is working to weed out the rogue advertisers that do slip through. The company uses an Internet pharmacy verification service called PharmacyChecker--a competitor of LegitScript--to ensure that its sponsored prescription drug advertisements are legitimate.
    • Maliha Rahman
       
      (social, integrity)getting fake internet pharmacy verification lacks intregity. in this case selling unprescribed drugs that can cause serious health issues heavy concequences
  • The authors took a closer look at 10 of the 69 online drugstores. None of the 10 required a valid prescription. Orders were placed with two of them. Of the two drugs received, both were tested and one was found to be counterfeit.
    • Maliha Rahman
       
      (Impact, Health) People all over the world are using unreliable sites and purchasing counterfeit drugs which is highly risky to one's health and can badly affect a person.
  •  
    The NABP's own analysis of search results from Google and Yahoo turned up many drug ads from sketchy purveyors.
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Rafae Wathra

BBC NEWS | Technology | Mobile data show friend networks - 0 views

  • "It's invisible to the user but logs everything: communication, users' locations, people's proximity by doing continuous Bluetooth scans."
    • Rafae Wathra
       
      This is a privacy issue (social) because these users don't know that so much information about them is being logged
    • Rafae Wathra
       
      This is also an integrity issue because the companies supplying these products don't tell the users that there is a chip in their phones.
  • Friendships can be inferred with 95% accuracy from call records and the proximity of users, says a new report.
    • Rafae Wathra
       
      This relates to communication systems because the phone companies are using communication systems in order to track the social activity of their users
  • but to carry on this "reality mining" in contexts ranging from the modelling of the spread of disease t
    • Rafae Wathra
       
      If gathering mobile data can help track the spread of disease, then its implications in improving the health of the target area (area of impact) have a lot of potential
Rafae Wathra

Twitter tweets are 40% 'babble' - 0 views

  • A short-term study of Twitter has found that 40% of the messages sent via it are "pointless babble."
    • Rafae Wathra
       
      Social: Privacy This shows how little privacy that Twitter users have sinced they are being judged by complete strangers based on how they tweet (who came to the conclusion that its a lot of pointless babble)
  • In total it grabbed 2,000 messages and then put each message it grabbed into one of six categories; news, spam, self-promotion, pointless babble, conversational and those with pass-along value
    • Rafae Wathra
       
      IT systems: Communication System This shows how Twitter is used as a communication system and what people communicate with it
  • This belief, it said, was driven by the growing number of firms starting to use Twitter as a tool to drum up sales.
    • Rafae Wathra
       
      Impact: Business This is an example of a way by which large businesses use technology to increase sales
shazad rouf

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • shazad rouf
       
      areas of impact: Arts, entertainment and leisure
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • At the end of 2008, there were an estimated 4 billion mobile phone subscriptions worldwide, according to the International Telecommunication Union, a United Nations agency. That's about two cell phone subscriptions for every three people.
    • shazad rouf
       
      Social and ethnical issues: Globalization and cultural diversity Now, almost everyone has a cell phone as it is the best way to communicate with others.
    • shazad rouf
       
      IT systems: Communication systems
    • shazad rouf
       
      IMPACT: Arts
iman mustafa

BBC NEWS | Technology | Downloading is not enough - 2 views

  • Kids, it seems, like unlicensed services because they are free. But the report also acknowledges their usefulness in finding more obscure music and letting them listen to a band before they buy
    • Alex David
       
      social & ethical issues- security, control & authenticity
  • They are willing to abandon p2p in favour of licensed services that they have to pay for, but they wouldn't pay for a streaming service like Spotify.
    • Alex David
       
      IT systems- application & communication systems
  • It might be that young people have no faith that the streaming services are going to stay around since they operate at the discretion of the record labels, which have clamped down on many services that are popular with young music fans in the past.
    • Alex David
       
      Area of Impact- Business & Arts, Entertainment & leisure
  •  
    Bill Thompson says young people's needs from online music may be too complex and transient for the industry to track.
Jeff Ratliff

DARPA launches balloons - 1 views

  •  
    To mark the 40th anniversary of the Internet, DARPA has announced the DARPA Network Challenge, a competition that will explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems. The challenge is to be the first to submit the locations of 10 moored, 8-foot, red, weather balloons at 10 fixed locations in the continental United States. The balloons will be in readily accessible locations and visible from nearby roads.
Elvira Russ

Assistive Technology and Learning Disabilities - 1 views

  •  
    The South Carolina Assistive Technology Program (SCATP) is a federally funded project concerned with getting technology into the hands of people with disabilities so that they might live, work, learn and be a more independent part of the community. This article describes what the technology makes people capable
Maliha Rahman

Teens 'sext' and post personal info (CNET News) Portfolio 1 - 1 views

  •  
    This article is about a survey that was taken to see the teen behavior online plus through cell phones. The whole article basically summarizes how much teens are engaged in activities through communicating systems that can be a huge risk.
anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
laila-hass

Smart Dust - Computerworld - 2 views

  • Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations. Thanks to recent breakthroughs in silicon and fabrication techniques, these "motes" could eventually be the size of a grain of sand, though each would contain sensors, computing circuits, bidirectional wireless communications technology and a power supply. Motes would gather scads of data, run computations and communicate that information using two-way band radio between motes at distances approaching 1,000 feet.
  • The goal for researchers is to get these chips down to 1mm on a side. Current motes are about 5mm, says Kristofer Pister, professor of electrical engineering at UC Berkeley, who's been working with smart dust since 1997.
  • The cost of motes has been dropping steadily. Prices range from $50 to $100 each today, and Pister anticipates that they will fall to $1 within five years.
  •  
    "Smart dust" devices are tiny wireless microelectromechanical sensors (MEMS) that can detect everything from light to vibrations."
  •  
    This is a great article and the smart dust devices have the potential to impact of so many industries and sectors of society. Thanks for sharing.
Maliha Rahman

Missouri woman charged with cyberbullying | Politics and Law - CNET News - 0 views

  • Thrasher is accused of posting a photo of a teenage girl, along with personal information about her, in the "Casual Encounters" section of Craigslist
    • Maliha Rahman
       
      using communicating system to violate privacy
shazad rouf

Online career matchmaker helps MBAs land jobs - CNN.com - 0 views

  • "Even though the economy is not as bad as it used to be, we are still seeing a good uptake. Our traffic is still going strong," Larizadeh says.
    • shazad rouf
       
      areas of impact: business and employment
  • Four years and a round of venture capital funding later, what started as a hobby designed to help friends share career information has turned into a network with approximately 600,000 members.
    • shazad rouf
       
      social and ethnic issues: security
  • Schools like The Wharton School of the University of Pennsylvania and Duke University's Fuqua School of Business have formed partnerships with Doostang that enable their students to access the network's premium job listings for free.
    • shazad rouf
       
      IT systems in a social sytem: Communication system
Andrew Beadle

A-Z of Programming Languages: Scala - a-z of programming languages, LinkedIn, programmi... - 0 views

  • Scala is not really a scripting language — that's not it's main characteristic. In fact, it can express everything that Java can and I believe there are a lot of things it can offer for large systems that go beyond the capabilities of Java
    • Andrew Beadle
       
      IT System: this is a form of digital communication that helps with developers developping programs.
Alex David

BBC NEWS | Technology | Green domain sparks war of words - 0 views

  • Both groups are hoping to win the right to sell .eco "top-level domain names", which are similar to .com or .uk.
    • Alex David
       
      Social & Ethical Issues- control & intellectual property
  • Big Room also would like to see companies use .eco sites to publish all of their green information.
    • Alex David
       
      IT Systems- Communication systems
  • Big Room, which is endorsed by WWF International and Green Cross, also plans to generate money from the sale of .eco domain names to fund "sustainability projects".
    • Alex David
       
      Areas of Impact- Environment & business
Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
1 - 20 of 41 Next › Last »
Showing 20 items per page