Skip to main content

Home/ Internetni praktikum/ Group items tagged campaign

Rss Feed Group items tagged

sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Jan Majdič

Free speech on the internet | Technology | guardian.co.uk - 0 views

  • Freedom of expression has long been regarded as one of the fundamental principles of modern democracies, in which civil liberties are honoured and regarded as a prerequisite for individual development and fulfilment.
  • It is this classic liberal argument that is still used by civil liberties' campaigners on the internet, like Hatewatch, which argues that those "hate speak" groups, such as neo-Nazis, must still speak freely, if only to expose and discredit themselves
  • It is not simply a case of "same old issue, new technology" with free speech and the internet. With its low start-up costs and global reach, the internet enables almost anyone in the West, in theory, to speak and be heard around the world, as well as hear others' speech.
  • ...11 more annotations...
  • particularly when they originate from, and are hosted in, foreign countries.
  • China have successfully prevented their citizens from receiving a huge quantity of (pro-democratic) material on the internet.
  • seeking to regulate and control its immense, potential, power.
  • The anti-censorship pressure group, Campaign Against Censorship of the Internet in Britain, was created in response Scotland Yard's request to ISPs to censor their news feeds
  • Governments in the USA, Germany and France, have all taken significant steps to curtail free speech on the internet
  • US is several years ahead of Britain
  • industry self-regulation
  • Technology is used to censor and evade censorship, although it seems likely that censorship tools will grow in sophistication and use as legislators struggle to censor the internet.
  • In December 1997, a 200-strong internet industry group agreed to accept a common standard of labelling called PICS - the Platform for Internet Content Selection
  • Millions of internet users in big offices, cybercafés, education institutions and libraries will use machines or ISPs which have filters installed in them.
  • In 1999, the EU launched an action plan, "Promoting Safer Use of the Internet", which provides for a hotline, where people can report sites which have caused offence
Rok Urbancic

BBC News - Google must drop ivory adverts say campaigners - 0 views

  • Campaigners say Google are encouraging the poaching of elephants by running advertisements promoting ivory products.
  • more than 10,000 ads about ivory were running on Google's Japanese shopping site.
  • one of the world’s richest and successful technology companies with such incredible resources had taken no action to enforce their own policies
  • ...9 more annotations...
  • adverts relating to endangered species were not allowed on their sites.
  • They found more than 1,400 of these types of ads
  • ads on Google's wholly owned Japanese shopping site, they found more than 10,000.
  • They have written to the internet giant asking for their removal.
  • They say that the adverts are still up and running.
  • Dealing with the ivory issues is one of the key tasks for this meeting of Cites
  • The sale of elephant tusks was banned back in 1989.
  • around 30,000 elephants a year are still being killed to meet the demand for trinkets and carvings that are often sold to tourists
  • The internet has given a huge boost to the ivory business.
Kaja Horvat

BBC News - Internet shopping: What makes the online consumer tick? - 0 views

  • Data can be used at every stage of a marketing campaign from planning how it will run, to effective implementation, to measuring how successful the campaign was
  • data also shows us what really influences people online.
  • What does this mean? It means that today's savvy shoppers are taking their time when it comes to making a purchasing decision - often checking out online forums, blogs and social networks such as Facebook before they invest.
  • ...7 more annotations...
  • In March 2012, UK retail websites received an additional 8.5 million visits through social networks and forums compared to March 2011, representing a 2.3% increase year-on-year.
  • two in every five visits to online retailers now come from a search engine.
  • Recently, we conducted some anonymous research into the way that people engage with brands and social networks - specifically Facebook. We looked at the top 100 online retailers, and benchmarked that against the number of fans those retailers had on their Facebook page. The correlation showed that the more fans a retailer had on Facebook, the more visits the website received, to the extent that for every additional fan acquired a retailer could expect to see an additional 20 visits to their company website from Facebook over a 12-month period.
  • As Facebook has evolved, it has become more than a source of traffic for retail websites; in some cases it has also become the digital shop front.
  • 4% of the UK's Facebook population have purchased a product from a brand's Facebook page
  • social media in particular offers companies a huge opportunity to expand their brand equity and profile, engage with consumers and influence their customers.
  • A recent poll conducted by Experian showed that 5% of consumers have actively sought feedback on a purchase made in store on Facebook or Twitter, while 24% of people would be positively influenced to buy a product after seeing an advert on Facebook.
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Nuša Gregoršanec

BBC News - Five times more internet crime in the West Midlands - 0 views

  • Five times more internet crime in the West Midlands
  • In 2012 West Midlands Police received almost 500 reports of online crime compared to 100 in 2008.
  • Sgt Gregory said: "One of the first big cases was around indecent images of young children a decade ago and in the UK every police force got involved in that and it was a matter of playing catch-up and realising what the internet was being used for.
  • ...3 more annotations...
  • "Each force has now got its own child protection team and organisations are working together to try to protect young people, not just on sexual offending matters and grooming but also bullying."
  • For Safer Internet Day, the BBC has launched a "Share Take Care" campaign to highlight the risks of sharing information online.
  • The BBC has published a number of guides online, advising social media users to provide minimum information online and use privacy settings.
donnamariee

Better Policy Through Better Information | John O. McGinnis | Cato Unbound - 0 views

  • Can Internet activism work?
  • is importantly correct that the Internet can help redress the balance between special and more encompassing interests by reducing the cost of accessing information. Such reduction redounds to the advantage of diffuse groups more than concentrated groups because reduced costs can temper the former groups’ larger problems of coordination.
  • earing that more information may enable citizens to better organize to attack their privileges, they have tried to restrict emerging technologies of free communication as long as these technologies have been around.
  • ...4 more annotations...
  • In a democratic state like ours, the primary interest groups are not authoritarian cliques, but private actors, like public sector unions and trade associations, which have the leverage to pressure politicians to use public power on their behalf. And, like authoritarian leaders, such groups are desperate to avoid transparency to retain their benefits. A case in point is the opposition of teachers' unions to publishing evaluations of schools and teachers on the Internet. And many interest groups have tried to prevent laws requiring Internet disclosure of campaign contributions.
  • Yet the results of policies are contestable. And it is often hard for citizens who are distracted by many enterprises more interesting than politics to find good information about policies' likely outcomes. Most people also have a better intuitive sense of how policies will affect their short-term interests than the long-term interests of society, even if the long-term effects may be of great personal as well as social benefit.
  • The Internet provides an important mechanism of such social discovery. Because of the greater space and interconnections that the Internet makes available, web-based media, like blogs, can be dispersed and specialized and yet connected with the wider world. As a result of this more decentralized and competitive media, the web generates both more innovative policy ideas and better explanations of policy than were available when mainstream media dominated the flow of political discussion.
  • In short, over time the Internet and allied aspects of the computational revolution can create more focused and more accurate knowledge about the consequences of social policies. This knowledge in turn can help more citizens focus more on what they have in common—their shared goals and policies that may achieve them—rather than on the unsupported intuitions or personal circumstances that may divide them. Of course, some citizens will remain ideologues, impervious to updating on the facts. But democracy moves by changing the middle, not the extremes. Like other mechanisms that increase common knowledge, the Internet can give wing to the better angels of our nature.
  •  
    essaytheme 
1 - 8 of 8
Showing 20 items per page