Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged networks

Rss Feed Group items tagged

Tamsin Lloyd

Where does privacy fit in the online video revolution? | Victor Keegan | Technology | g... - 1 views

  •  
    We all know video content is one of the most popular types of content on the web, driving some of the most innovative and popular web based applications (for example Skype, ChatRoulette, YouTube). However, new video-centric applications, which combine real-time, social networking and broadcasting are putting an even more intense spotlight on questions of privacy than ever before. This particular article profiles examples that are surely just web minutes away from the tipping point, giving users the chance to broadcast their lives in ways Twitter can only dream of. Surprisingly, the article only touches on privacy issues, suggesting that we are too willing to post personal information about ourselves. Reader comments rightly point out we are moving into very murky territory where the attitude seems to be that anything posted on the web is fair game and can be used against the person who posted it.
  •  
    What does it mean for both your privacy and personal reputation if you are putting everything online? If governments/corporations/employers etc can access so much personal information about you, how will this affect your life and the 'control' that such organisations have?
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
anonymous

ACMA 2008-2009 Report - Mobile broadband and internet services take off - Jan 2010 - 0 views

  •  
    This articles mentions the major highlights of the Australian Communications and Media Authority's Communications Report 2008-2009. Among the differents findings, are available some data about mobile service, mobile network, suscribers, wireless broadband, dowloadings, online advertising , expenditures, revenue, etc. It's all about the digital convergence, the Digital Economy and a demand for flexibility.
Eliza Hansell

Iran blocks news website: French broadcaster - 0 views

  •  
    The Iranian government has allegedly blocked a popular French broadcaster website because of its reliance on social networking sites and other amateur techniques of online journalism.
César Albarrán Torres

Web 2.0: the new election superweapon | Politics | The Observer - 2 views

  • From Twitter and Facebook to viral ads and crowdsourcing, technology appears to offer parties powerful new ways to engage voters
  • All three mainstream parties are adopting similar techniques, but with very different aims.
  • Social media matters precisely because it is social, creating networks and building intimacy between strangers quickly – even if some of them are politicians.
  • ...2 more annotations...
  • Once the novelty of politicians in virtual life passes, social media users may return to ignoring them.
  • Perhaps the challenge for politicians online remains the same as in the days of soapbox and megaphone: just being heard.
  •  
    Interesting article on The Guardian on how the main British parties use social media. The article, though, treats social media as a fad that may eventually dissolve. The question, though, remains: do political parties know how to use social media?
Gina Spithakis

Blog post: Online child encounters: Is it time to hit the panic button? - 1 views

  •  
    As Facebook is criticised for refusing to allow a child safety button on its network, we look at some of the online dangers kids face and measures being taken to educate kids about those dangers.
anonymous

Net neutrality: Do the numbers add up? 27 April 2010 - 1 views

  •  
    This article gives a closer look at the controversial study that suggests regulating the Net will cost millions. You can even dowload the 23-page of PDF report In interested in Net neutrality the following reading titled "Net Neutrality rules would damage business, says industry-funded study" (26 April 2010) provides complementary information: http://news.techworld.com/sme/3221610/net-neutrality-rules-would-damage-business-says-industry-funded-study/
Gina Spithakis

Facebook unveils new 'Like' button - 0 views

  •  
    Looks like Facebook has figured out a way to tell other companies more about us at the click of a 'Like' button. On the one hand, it's personalisation at its best, having content served up to a user based on what they like on the sites they visit. But on the other hand, users are unknowingly sharing a lot of personal information about themselves to their networks on Facebook and, inadvertently, the company they just visited via a website.
Gina Spithakis

Coles closes stores due to McAfee bug - 1 views

  •  
    This is a story not so much about hackers bringing down an organisation's network, but about a virus software breaking down and attacking its own operating system. Just thought it would be interesting to share a story about what could go wrong even when you're trying to protect yourself against viruses. In this case, Coles was affected, with point of sale terminals shutting down as a result of the software bug.
César Albarrán Torres

Women and boobs take on Iran cleric | Technology | BigPond News - 0 views

  • Breasts were big on Facebook on Monday as a female blogger called on women to prove wrong an Iranian cleric who preached that cleavage causes earthquakes.
  • McCreight, who lives in the US state of Indiana, used the world's leading social network and microblogging service Twitter to enlist women worldwide to test the cleric's assertion that sexy women can make the ground shake.
anonymous

New post on my blog : Byron Report - UK - Safer Childre in a Digital World - 2 views

  •  
    First topic: « Early Adolescents' Use of Social Networking Sites to Maintain Friendship and Explore Identity: Implications for Policy »
Amanda Lansdowne

10 reasons to delete your Facebook account - Crikey - 2 views

  •  
    This blog by Dan Yoder counts 10 reasons why you should can your Facebook account. The main reasons for this boycott are related issues of privacy and how they treat the information of members, for example not providing complete information on how they use your information.
César Albarrán Torres

In Indonesia, the Internet Emerges as a (Too?) Powerful Tool - NYTimes.com - 0 views

  • Displeased that a statue of a 10-year-old Barack Obama was installed in a park here, Indonesians took their protest not to this capital’s most famous traffic circle but to Facebook. More than 56,000 online protesters later, city officials gave in to arguments that the park should be reserved to honor an Indonesian.
  • But the boom is prompting a fierce debate over the limits of free expression in a newly democratic Indonesia, with the government trying to regulate content on the Internet and a recently emboldened news media pushing back.
  • Skeptics, especially among politicians and religious leaders, worry about mob rule and the loss of traditional values.
  • ...4 more annotations...
  • Thanks to relatively cheap cellphones that offer Internet access, Facebook, Twitter and local social networking media have rapidly spread from cities to villages throughout Southeast Asia, especially in Indonesia and the Philippines
  • In another cause célèbre, online support was critical in freeing a 32-year-old mother who was jailed after complaining about the poor service at a suburban Jakarta hospital.
  • According to data from Facebook, Indonesia trails only the United States, with 116 million users, and Britain, with 24 million.
  • “I think we are between China and the United States,” he said. “Yes, we are free. But with freedom comes responsibility.”
  •  
    Good article on the social and political uses of social media (sic.) in Indonesia. There have been attempts to filter/censor content, but so far they have been avoided. Uses of Twitter, Facebook by politicians is also described. 
Tiana Stefanic

T.M.I? Not for Sites Focused on Sharing - NYTimes.com - 0 views

  •  
    This looks at the new atmosphere of sharing all the mundane details about our lives, facilitated by sites such as Blippy, which broadcasts details about shopping habits, and Foursquare, that uses GPS to alert contacts to your location. A fellow at the American Civil Liberties Union said, "People are not necessarily thinking about how long this information will stick around, or how it could be used and exploited by marketers." Concerns are also raised about potential identity theft and whether accessing every scrap of data left behind by users is actually valuable.
anonymous

WiGig Alliance promotes faster short range WiFi - 10 May 2010 - 0 views

  •  
    WiFi Alliance including Intel and Microsoft backs standard. The two international short-range wireless industry groups announced an agreement to promote faster Wi-Fi in the 60 GHz frequency band, as well as the two bands where Wi-Fi now operates. With the new standard, a user could send a high definition video across a living room wirelessly from an HD player to an HD television, eliminating the need for a cabled connection.
Sandra Rivera

What is code? A conversation with Deleuze, Guattari and code by David M. Berry and Jo P... - 2 views

  • So, we ask what is code? Not expecting to find answers, but rather to raise questions. To survey and map realms that are yet to come (AO:5). The key for us lies in code's connectivity, it is a semiotic-chain, rhizomatic (rather like a non-hierarchical network of nodes) and hence our map must allow for it to be interconnected from anything to anything.
  • code is pure concept instantiated into the  languages of machines. Coding is the art of forming, inventing and fabricating structures based on these languages. Structures that constrain use as well as free. The coder is the friend of the code, the potentiality of the code, not merely forming, inventing and fabricating code but also desiring. The electric hymn book that Happolati invented. With electric letters that shine in the dark?
Elizabeth Gan

Teachers live in fear of cyberbully pupils - 0 views

  •  
    This article discusses how cyberbullying is not limited to strictly school children, or students rather teachers are also victims of cyberbullying. As students create social network hate groups, secretly film or photograph their teachers, and post embarassing moments online. identities of the victims are stolen, and then are used for either harassment, or illegal activity online. Though Facebook has mentioned that they will remove any content regarding teachers if reported, it brings to light a new issue. If laws need to address how we conduct ourselves online, should we compromise our freedom of speech (any jurisdiction that has constituted it) because the content is online?
renae englert

New Cyber Guardian software challenging internet filter - 0 views

  •  
    A Brisbane based software company's CEO created a solution to manage his son's internet access which includes time limits and blocks chat and some social network applications. Although it's unlikely to stop the ban, it's great to see people advertising their disdain for the potential legislation and what can be done to protect children in a more efficient way.
Tiana Stefanic

Thailand: A Country Divided « Virtual Light - 0 views

  •  
    This is my third blog entry on the theme of the Digital Divide. I've looked at the situation in Thailand in terms of the class divide, political divide, and digital divide that characterise the conflict.
Anne Zozo

Post Tech - Internet privacy comes to head; Facebook to change tools, Google accused o... - 0 views

  • "Thanks to both Google and Facebook, we have all the elements of a perfect privacy storm," said Jeffrey Chester, executive director of privacy group, the Center for Digital Democracy. "There are organized and spontaneous consumer protests; investigations by officials on both sides of the Atlantic, and a Congress finally waking up to this issue.
  • He has complained that regulators and lawmakers haven't been tough enough on Internet search engines, social networks and publishers for scarfing up user information to monetize into ads.
  •  
    Article sums up the news around Facebook and Google Street View of the last weeks. The sleeping issue of privacy is said to have woken up. The U.S. Congress as well as the Federal Communications Commission and a Federal Trade Commission are asked to take action.
« First ‹ Previous 81 - 100 of 108 Next ›
Showing 20 items per page