Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged general

Rss Feed Group items tagged

Andra Keay

Web Use Project - 0 views

  •  
    danah boyd recommends Eszter Hargittai's paper "Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the 'Net Generation'". This collection looks particularly interesting for discussions about the Digital Divide and Gender &Technology.
  •  
    danah boyd recommends Eszter Hargittai's paper "Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the 'Net Generation'". This collection looks particularly interesting for discussions about the Digital Divide and Gender &Technology.
César Albarrán Torres

Pennsylvania Attorney General Tries to Unmask Twitter Critics | Threat Level | Wired.com - 0 views

  • An anonymous blogger critical of Pennsylvania Attorney General Tom Corbett plans to challenge a grand jury subpoena ordering Twitter to reveal the blogger’s identity.
  • The bloggers received an e-mail from Twitter on Tuesday evening saying the micro-blogging service would respond to the subpoena (.pdf) in a week “unless we receive notice from you that a motion to quash the subpoena has been filed or that this matter has been otherwise resolved.”
  • In August, however, Google unmasked the operator of the “Skanks in NYC” blog after being subpoenaed by an Australian model who claimed the site defamed her. And on Monday, a federal judge prevented Yahoo from revealing the identity of a message-board poster critical of USA Technologies.
  •  
    Twitter users have been issued subpoenas from Pennsylvania Attorney General Tom Corbett due to the critical comments they've made about the politician. It's interesting how much anonymous comments can make an impact on a public figure's reputation that it forces him to take legal action.  
  •  
    Twitter receives a grand jury subpoena forcing the company to reveal a user's identity. Interesting how this can be done when the stakes are high, when there is a a political subtext under it. Could this set a precedent for defamation cases?
Tiana Stefanic

Digital Natives Explore Uncharted Terrain « Virtual Light - 1 views

  •  
    My most recent blog entry, looking at the implications of the increasing digital literacy among younger generations.
Sarah Manson

FOXNews.com - Terrorists Targeting Children Via Facebook, Twitter - 0 views

  •  
    The findings of this article definitely portrays an extremist view of the internet. It shows the internet to be extremely dangerous which would add to the already growing nervousness which I think many parents experience in letting their children surf the web. While cybersecurity is an increasingly prominent issue I don't see how producing a bubble of fear around the online world can improve the situation. You generally cannot function without the internet and being fed these alarmist ideas only furthers the notion that people should be fearful and avoid the internet rather than be engaging with it and appreciating it for being an amazing tool to communicate and learn.
  •  
    Well, Fox News is just unbelievable... guess who they consider their competitor, CNN or Comedy Central.
  •  
    yayy for fear-mongering....
Andra Keay

Women of Vision » Anita Borg Institute for Women and Technology - 1 views

  •  
    The Anita Borg Institute has several initiatives to promote and celebrate women in technology. The 2010 Women of Vision awards celebrate women who have made significant achievements in 3 areas. For Innovation: Kathleen McKeown, Henry and Gertrude Rothschild Professor of Computer Science, Columbia University For Social Impact: Lila Ibrahim, General Manager, Emerging Markets Platform Group, Intel Corporation For Leadership: Kristina Johnson, Ph.D., Under Secretary for Energy at the Department of Energy This excerpt of a post from Katy Dickinson at SanJose.MetBlogs.com shows why this is important! "I have referred dozens of young women to the 2008 WOV talk by Helen Greiner. Any girl geek who feels too alone in her love of technology will be encouraged by the amazing founder of iRobot saying that when she was young "not one person told me I should be an Engineer" and "we need diversity of perspectives … more women's life experiences influencing our directions and designs".
Andra Keay

PJF's Pages - Journal - Dark Stalking on Facebook - 0 views

  •  
    PJFenwick is doing a PhD on facebook privacy and his explorations have shown that even when you lock up your settings, your friends (and friends of) can leak your information all over the place. "But by far the most interesting part of all of this have been dark users. Like dark matter, these users are not directly observable, usually because they've completely disabled API access. In fact, some of these users are completely dark unless you're a friend. They don't show up in search results. They don't show up on friends' lists. You can't send them messages. If you try to navigate to their user page (assuming you know it exists), you get redirected back to your homepage. These users have their privacy settings turned up real high, and are supposed to be hard to find. However like dark matter, dark users are observable due to their effects on the rest of the universe. If a dark user comments on a stream entry, I can see that comment. More importantly, I can see their user-ID, and I can generate a URL to a page that will contain their name. I can then watch for their activities elsewhere. Granted, I can't directly search for their activity, but I can observe their effects on my friends. For want of a better term, I've been calling this "dark stalking". What makes this all rather chilling is that I'm doing all of this via the application API. If your friend has installed an application, then it can access quite a lot of information about you, unless you turn it off. If your friend has granted the application the read_stream privilege, then it can read your status stream. Even if a friend of a friend has done this, and you comment on your friend's status entries, it's possible to infer your existence and retrieve those discussions through dark stalking."
Louise McClean

"Fair use" generates trillions in the US alone - 1 views

  •  
    The Computer and Communications Industry Association disclosed a report revealing the value of industries dependent on copyright limitations. The report claims that it accounts for US$4.7 trillion and 23% of the US' real economic growth from 2002-2007.
Castillo Rocas

Generation Y » Twitter: That Wild Beast - 0 views

  •  
    From Cuban dissident blogger Yoani Sanchez's blog. A short post that describes how the Cuban communist intelligentsia deals with Twitter. Interesting to see how some dissidents have contacts outside Cuba who are in charge of maintaining their twitter accounts. 
David Sams

Facebook | Open Internet for Australia: Tonight on your ABC … the Internet fi... - 0 views

  •  
    Four Corners and Q&A are covering the mandatory ISP filter debate tonight, should be a great double bill. Now its off the agenda till after the election, so the Government clearly misjudged the public reaction. Thanks to widespread media coverage on the inherent flaws of the MISP, coupled with the activism of protest movements such as Electronic Frontiers Australia and the Pirate Party, its fair to say that the general public have moved beyond the Government's black and white positioning of the proposal.
  •  
    Thanks for the reminder!
Aarna Hanley

Censorship in Cyberspace | Q&A | ABC TV - 0 views

  •  
    The conversation first looked at internet censorship from an international perspective covering issues of internet governance from and internet freedom. Unfortunately one or two members of the panel were prone to regurgitating policy rather than engaging in an actual debate. Towards the end inevitably the discussion was drawn to the proposed filtering laws within Australia. The general consensus from the panel members was that education had to be an essential part of policy when addressing online safety. Interestingly the government representative, the Minister for Home Affairs, was a keen supporter of this policy stance.
M M

University to Provide Online Reputation Management to Graduates - 0 views

  •  
    A university in the U.S. has provided an online reputation management program for all its graduating seniors. Since majority of companies are performing background checks on job applicants, this will allow students to clean up their Facebook and Twitter profiles. This step made by the university seems very beneficial, since for majority of the younger generation who don't know how it is not to have the Internet, the separation between online and real-life identities is a fine line. 
Allison Jones

http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general - 1 views

  •  
    Increasing "probes" on US military networks has led to the appointment of a senior general to Cyber Command operations and approximately 30,000 troops have been re-assigned from IT support to "the frontlines of cyberwarfare". The US is increasingly anxious about the vulnerability of its networks to attack. Chinese, Russian and Korean hackers have been targeted as alleged attackers so far. There is concern that cyberwarfare techniques being used by the US are outpacing the ability to develop policy surrounding their use.
Tiana Stefanic

Digital Education Revolution - Overview - 0 views

  •  
    This is a source for one of my previous blog posts that I haven't yet bookmarked on Diigo. It outlines the Digital Education Revolution that will be implemented by the Department of Education as a response to the policy imperative of decreasing the digital divide in the younger generation of Australians.
Amit Kelkar

Will Congress Take Sides on Net Neutrality? | Project for Excellence in Journalism (PEJ) - 1 views

  •  
    A fair amount has been written about the politics of net neutrality, but its technical aspects have generally pushed the debate to the fringes of the mainstream press.
Amit Kelkar

China's censorship 2.0: How companies censor bloggers - 2 views

  •  
    This study explores an under-studied layer of Chinese Internet censorship: how Chinese Internet companies censor user-generated content, usually by deleting it or preventing its publication. Systematic testing of Chinese blog service providers reveals that domestic censorship is very decentralized with wide variation from company to company. Test results also showed that a great deal of politically sensitive material survives in the Chinese blogosphere, and that chances for its survival can likely be improved with knowledge and strategy. The study concludes that choices and actions by private individuals and companies can have a significant impact on the overall balance of freedom and control in the Chinese blogosphere.
Felipp Crawly

Thank You OPS - 1 views

I would like to thank Onward Process Solutions for providing me with a highly dedicated Virtual Sales Assistant who is friendly and highly skilled. Hence, I do not have to micromanage Anna because...

started by Felipp Crawly on 03 Jan 13 no follow-up yet
Tom Champion

WWF launches fantasy corporate social responsibility game - 0 views

  •  
    And I thought the 'Fusion Powerplant" in Sim City 2000 being a peak accomplishment of the game was enough of a green message. Choose your industry and try to be a 'good' CEO. It seems like a kind of layman's e-learning on social responsibility for managers, or perhaps is the ideal way to train us MTV-generation managers of the future.
Rachael Bolton

MySpace invaders - 0 views

  •  
    The internet: a land without "social or cultural or primitive race memory". What are the implications when entire generations voluntarily forfeit their right to privacy?
1 - 20 of 29 Next ›
Showing 20 items per page