Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged US government

Rss Feed Group items tagged

Ariezal Afzan Bin Hassan

Am I being sued? - 0 views

  •  
    Am I being sued? that's the first thing that comes across our minds upon noticing legal notices or letters..This article tells us not to panic but thoroughly analyze what the document says and have an in depth understanding out of the doc. If the situations seems like you are really getting a lawsuit, the next step is to seek immediate assistance from a legal advisor or lawyers. The most important thing to bear in mind is that to ensure our rights are not infringed. I find the article sound and most useful.
César Albarrán Torres

Red virtual, banco de datos para plagiarios | Ediciones Impresas Milenio - 0 views

  • Estas páginas no sólo están exhibiendo a una persona, sino que dan información de quién compone la familia, dónde y cómo vive y dónde estudia. Esto crea la posibilidad de un secuestro”, aseguró Eduardo Muriel, investigador privado con más de 40 años de experiencia en el negocio de la seguridad.
  • ¿Fotografías de viaje esquiando en Valle de Bravo, Tequesquitengo o de fiesta en París o Disneylandia?
  • En Venezuela, otro país que atraviesa una crisis de secuestros, la consultora Informática Forense admite que estas redes son un claro riesgo para sus usuarios.
  •  
    In Mexico and other Latin American countries there have been some questions raised on how kidnappers can get precise information of potential victims and their spending power: friends, lifestyle, travels. If social networks like Facebook are a potential tool for criminals, should they be regulated by the government? Is it the media or the government's fault if such a use is being made? I am looking for references in English regarding this problem. 
Erin Riley

Is Obama's Grass Roots movement failing? - 0 views

  •  
    Obama's "Organizing for America" was an attempt to channel digital political organizing toward an established candidate. It was the first time a mainstream candidate used the internet effectively to organize. But now they're using it to organize while in government... will it continue to work? Perhaps the fact this year's election is still 9 months away is the problem.
Rachael Bolton

The US Safe Harbor - Fact or Fiction? - 1 views

  •  
    Study into the US Safe Harbor is an agreement between the European Commission and the United States Department of Commerce that enables organisations to join a Safe Harbor List to demonstrate their compliance with the European Union Data Protection Directive.
César Albarrán Torres

Little fanfare for 7th anniversary of war in Iraq - Sacramento News - Local and Breakin... - 1 views

  • Iraqi journalists look at screens Tuesday, March 16, 2010, showing the partial preliminary results in Baghdad, Iraq. Dozens of Iraqi journalists waited hours for results in Iraq's election. What they got Thursday, March 18, 2010 was a single CD containing the information and instructions to make copies themselves, prompting a mad dash to the nearest Internet cafe where they paid $1.20 each to find out who was ahead in the ballot coun
  •  
    This is a clear example of a government trying to control the information flow with old techniques (only one CD for all journalists) and how the Internet comes into play to provide electoral information. Interesting to compare vs the 2008 US elections, where pundits and commentators could get info from various sites. Can the Internet change results?
Amit Kelkar

Research Online - M. J. McLelland: Australia's proposed internet filtering system : its... - 4 views

  •  
    A new paper on Australia's proposed mandatory filtering plan in context of Australia's broader stance on child pornography. It uses the example the consumption of "Japanese Boys Love" manga by people (mainly girls) underage to explore issues around censorship and governance
anonymous

The Development of Epistemological Theories: Beliefs About Knowledge and Knowing and Th... - 0 views

  •  
    There have been a number of research programs that have investigated students' thinking and beliefs about the nature of knowledge and knowing, including definitions of knowledge, how knowledge is constructed, and how knowledge is evaluated. However, these different research programs have pursued varying definitions and conceptual frameworks and used quite different methodologies to examine students' epistemological beliefs and thinking. In the first section of this article, we provide a critical and comprehensive review of these different research programs. In the second part of this article, we identify nine crucial theoretical and methodological issues that need to be resolved in future research on epistemological theories. As these issues are addressed in future research, there will be more consensus regarding the nature of epistemological theories, and their relation to cognition, motivation, and learning will be made more explicit.
yunju wang

Google Rolls Out Encrypted Web Search - 0 views

  •  
    Google announced to use SSL to secure user's data, keep it hard for hackers and government to spy on users' searches.
Andra Keay

Discovery of GPS tracker becomes privacy issue - 2 views

  •  
    US court rules that tracking once in public is public information but tracking over time in public is accumulating information usually unavailable to 'the public' therefore requiring a search warrant.
Ariezal Afzan Bin Hassan

Australia: The Mantra Decision: Strata Titled Properties: Registered Trade Marks When U... - 0 views

  •  
    A dispute between two letting agencies "Mantra Group Pty Ltd (Mantra) VS Tailly Pty Ltd (Tailly)" over a domain name of an apartment complex at Surfers Paradise. Mantra had alleged Tailly of breaching its registered domain in gaining commercial advantage since Mantra is a letting company that run on a bigger scale. The court is till in the midst of deliberation.
Stephanie Hawkins

UK copyright law for the trifecta - 0 views

  •  
    The Digital economy Act in all its glory. There was a LOT of debate over this Act. It was introduced by Lord Mandelson of the Labour party, tossed back and forth between houses with amendments that were argued to the minutest detail, then finally spat out for the public to revile. All ISPs are now required to monitor their subscibers use of listed sites and warn them when they enter a site that enables pirating. They must then record every such warning, giving every subscriber a number, then make the list available to the government when they get a warrant to look for excessive downloaders. Only the government like this idea, because it makes their job easier. I wandered onto one of the listed sites recently in my quest to find Dr Who episodes before they aired in Australia. The message was like driving down the highway and suddenly seeing a police car parked on the side of the road. You might know you haven't done anything wrong (yet) but you still get a scare ...
marinecf

The Digital Divide Will Ensure a Broadband Ghetto - 0 views

  •  
    This article is a case against the FCC and the broadband plan as it doesn't support the building of an extensive network accessible to all. The author however shows how the private sector could come up with solutions to that problem. It is a very interesting point of view on the digital divide as well as on internet governance issues.
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
Elizabeth Gan

With laws lacking on cyberbullying and texting, ISU conference guides educators - 0 views

  •  
    This article discusses the difficulties of ensuring that cyberbullying is prevented, or monitored. It also discusses how the technology appears to supersede the school's governance of the appropriate use of technology with respect to the Internet. The article mentions an analogy to the Lord of the Flies, as children become savages when unsupervised, which contradicts the article "Cyberbullying is focus of conference," which states that children are unaware of their actions. This is a bit ironic, as the book was an actual microcosm of world war 2, and therefore the story is symbolic of war very much induced by adults.
Javier Velandia

Bombard Iran ... with broadband - 0 views

  •  
    This article argues that the best alternative to fight against the Iranian Government, is providing the country with free satellite internet access. The flow of information and the use of Internet like a democratic tool will allow the own citizens to defeat the regime
Ace Dee

Make Your Website Design SEO-Friendly with Oracle Digital - 3 views

Our company has realised that our website design should be more than just how it looks. Oracle Digital's SEO services have helped us in optimising our website design that appeals to our customers, ...

SEO internet governance #ARIN6902 censorship governance government Internet

started by Ace Dee on 30 May 11 no follow-up yet
paul silmonet

Instant Fix Slow Computer Solutions - 0 views

I bought a brand new PC with good specifications just last month. But only three weeks of use, I noticed that my PC froze and slowed down a bit. For the next three days, it continued to slow down. ...

Fix Slow Computer internet governance Internet #ARIN6902 censorship government privacy governance google Facebook australia

started by paul silmonet on 08 Jun 11 no follow-up yet
Eliza Hansell

Iran arrests 30 for involvement in US-led 'cyber war' - 2 views

  •  
    This is the Iranian government's answer to US anti-internet censorship groups who aim to undermine the regime's strict filtering rules through funding from the CIA. It brings up questions of international involvement in extreme national governance of the internet.
César Albarrán Torres

Web 2.0: the new election superweapon | Politics | The Observer - 2 views

  • From Twitter and Facebook to viral ads and crowdsourcing, technology appears to offer parties powerful new ways to engage voters
  • All three mainstream parties are adopting similar techniques, but with very different aims.
  • Social media matters precisely because it is social, creating networks and building intimacy between strangers quickly – even if some of them are politicians.
  • ...2 more annotations...
  • Once the novelty of politicians in virtual life passes, social media users may return to ignoring them.
  • Perhaps the challenge for politicians online remains the same as in the days of soapbox and megaphone: just being heard.
  •  
    Interesting article on The Guardian on how the main British parties use social media. The article, though, treats social media as a fad that may eventually dissolve. The question, though, remains: do political parties know how to use social media?
‹ Previous 21 - 40 of 137 Next › Last »
Showing 20 items per page