Skip to main content

Home/ IB ITGS/ Group items tagged privacy

Rss Feed Group items tagged

Maliha Rahman

Missouri woman charged with cyberbullying | Politics and Law - CNET News - 0 views

  • Thrasher is accused of posting a photo of a teenage girl, along with personal information about her, in the "Casual Encounters" section of Craigslist
    • Maliha Rahman
       
      using communicating system to violate privacy
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
ajay tambay

Meet Bustadrive, a home-made hard disk destroyer | PC Pro blog - 0 views

  • If your job involves having to destroy hard disks and make sure that their data is impossible to recover, you’ll know that it can be an expensive business: properly disposing of each hard disk can cost between £5 and £10 and, when you’re managing the IT affairs of potentially large businesses, these costs can mount up.
    • ajay tambay
       
      IT Systems - basics Impact - business
  • simply chopping the platter in half wouldn’t remove the data” and confirmed that it could be recovered – but the costs of retrieving any remaining information “would be prohibitive”. That’s because you’d need “something along the lines of an electron scanning microscope” to read the data from the remains of the platter – and those currently sell second-hand for at least £40,000. Tanfield-Johnson also confirmed that, once you’d cracked open a hard disk to extract the platters within, recovering any data would become even more difficult, because you’d need “the same model and make of [circuit] board” to access each track of data on the disk. So, unless you’re willing to spend tens of thousands of pounds, it looks like your data is safe.
    • ajay tambay
       
      Social - privacy
Rafae Wathra

BBC NEWS | Technology | Mobile data show friend networks - 0 views

  • "It's invisible to the user but logs everything: communication, users' locations, people's proximity by doing continuous Bluetooth scans."
    • Rafae Wathra
       
      This is a privacy issue (social) because these users don't know that so much information about them is being logged
    • Rafae Wathra
       
      This is also an integrity issue because the companies supplying these products don't tell the users that there is a chip in their phones.
  • Friendships can be inferred with 95% accuracy from call records and the proximity of users, says a new report.
    • Rafae Wathra
       
      This relates to communication systems because the phone companies are using communication systems in order to track the social activity of their users
  • but to carry on this "reality mining" in contexts ranging from the modelling of the spread of disease t
    • Rafae Wathra
       
      If gathering mobile data can help track the spread of disease, then its implications in improving the health of the target area (area of impact) have a lot of potential
Bassel Kanj

Monitoring web use at school - 19 views

I disagree, The teacher only has the right to view his history, or view the page he is currently on. Not continue viewing his Facebook, because they are taking advantage of him/her being logged i...

SOCIAL privacy anonymity

anonymous

Facebook, Fake ID, Effects (Info World) - 0 views

  •  
    Talks about the security implications of web 2.0, including identity management and privacy concerns. The legal effects of faking an account in web 2.0 has been adressed as "the dark side," due to the seriousness, and immediate effects if someone is caught doing it.  The Internet is just another form of human expression, so it's subject to human imperfection like any other conduit," said Chris Alden, CEO of blogging company Six Apart, who was on the panel with executives from Facebook and the South Korean Internet giant Daum Communications.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
‹ Previous 21 - 40 of 166 Next › Last »
Showing 20 items per page