Microsoft, maker of the Windows 8 operating system and the Internet Explorer web browser, has been fined €561m ($732m) by the European Union’s antitrust regulators for breaking a promise to offer its customers a choice of the browser they would like to use to surf the internet on their personal computers.
2More
6More
British internet users double in six years - Telegraph - 0 views
-
The number of British adults using the internet every day has doubled in the last six years, according to new data.
- ...3 more annotations...
-
Social networking activity is lower among older age groups, with just one in 10 over 65s saying that they use social networks.
3More
A truly world wide web? | Media | MediaGuardian - 0 views
-
In its early, idealistic days the web was heralded as a force for democratic change. According to the early web revolutionaries, the medium opened up the world of publishing to everyone, regardless of nationality, race or location.
-
the network continued to grow organically, expanding to take in an ISP, a shopping site and a small businesses portal.
-
The BBC also plays an important role. As with its wider new media activities, the corporation's public service role has increased in importance as commercial competitors have fallen by the wayside.
8More
BBC News - Mobile internet use nearing 50% - 0 views
-
Some 45% of people surveyed said they made use of the net while out and about, compared with 31% in 2010.
- ...5 more annotations...
-
Domestic internet use also rose. According to the ONS, 77% of households now have access to a net connection.
-
Older users, who the government is particularly keen to get connected, appeared to have been relatively untouched by the phenomenon.
-
While 71% of 16 to 24-year-old who went online said they used mobile broadband, just 8% of internet users aged over 65 made use of the newer technology.
-
The ONS survey also found a dramatic rise in the use of wifi hotspots - a seven-fold increase since 2011 - suggesting that the rise of 3G has done little to slow demand for free and paid-for wireless access.
10More
BBC News - Child safety measures to protect against internet threats - 0 views
-
In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.
-
Even more worryingly, 30% (39% worldwide) said they had suffered a "serious" negative experience. This included, among other things, invitations to meet online "friends" in real life and exposure to indecent pictures of someone they did not know.
- ...7 more annotations...
-
The ever-growing adoption of social networks, instant messages and mobile communication leaves the door open to more subtle attacks - both of a technological and psychological nature.
-
"Parents must realise that technology alone can't keep children safe online," Deborah Preston, the company's internet security advocate.
-
"To be truly safe it requires not only technology, but also a combination of open and ongoing dialogue and education between parents and children."
-
On social networks, account hijacking - where a child's account is accessed for a practical joke or more sinister purposes - can cause considerable distress.
-
A poll by Virgin Media suggests that 38% of parents whose children have suffered from cyberbullying feel unable to protect them due to a lack of knowledge and understanding of how the online world works.
-
This, Mr Abdul argued, could only be solved through greater education and a more honest understanding from parents about how real and damaging the effects of online bullying could be.
-
Mr Abdul added, the correct software, education and parental supervision means children can also be protected both at home and away.
9More
shared by Katja Saje on 06 Mar 13
- No Cached
Google Glass: is it a threat to our privacy? | Technology | The Guardian - 0 views
www.guardian.co.uk/...le-glass-threat-to-our-privacy
google glass privacy public misuse social deprivation

-
Google Glass is the most hotly anticipated new arrival in "wearable computing" – which experts predict will become pervasive.
-
The next stage is computers that fit on to your body, and Google's idea is that you need only speak to operate it.
-
(To activate Glass you need to tilt your head, or touch the side, and then say, "OK Glass, record a video" or "OK Glass take a picture".)
- ...6 more annotations...
-
Google has become the company which knows where you are and what you're looking for. Now it's going to be able to compute what it is you're looking at."
-
For Google, "privacy" means "what you've agreed to", and that is slightly different from the privacy we've become used to over time. So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
-
The first, and most obvious, is the question of privacy. The second is: how will we behave in groups when the distraction of the internet is only an eye movement away?
-
Google doesn't want to discuss these issues. "We are not making any comment," says a company spokesperson. But other sources suggest that Google's chiefs know that this is a live issue, and they're watching it develop.
2More
shared by Katja Saje on 06 Mar 13
- No Cached
The Facebook generation is in the grip of National Attention Deficit Disorder - Telegraph - 0 views
www.telegraph.co.uk/...ttention-Deficit-Disorder.html
facebook social networks young generation disorder attention

-
If you think your friends are online, you’re missing the human dynamic of a real relationship. You can’t see facial expressions; can’t hear the tone of voice – all you’re dealing with is digital messages, which are usually meaningless and never meaningful.
7More
Google's Eric Schmidt: drone wars, virtual kidnaps and privacy for kids | Technology | ... - 0 views
- ...4 more annotations...
-
However, he held out hopes that the rise of connectivity, especially through mobile phones with data services, would reduce corruption and undermine repressive regimes.
-
In each, he said, the need to be connected, first through a mobile phone and then to the internet, became apparent.
5More
shared by Katja Saje on 06 Mar 13
- No Cached
Readers' privacy is under threat in the digital age | Books | The Guardian - 1 views
www.guardian.co.uk/...readers-privacy-under-threat
privacy readers surveillance enforcement digital age

-
Every time you read a newspaper on your computer or buy an ebook, you can leave an electronic trail behind you. That trail is potentially lucrative for business, and is a new source of surveillance for government and law enforcement.
-
Retailers and search engines, most notably Amazon and Google, can now gather an astonishingly detailed portrait of our book-reading habits: what we buy, what we browse, the amount of time we spend on a page and even the annotations we make in an ebook.
-
Amazon also reserves the right to disclose information when it "believes release is appropriate to comply with the law". A stronger protection for our privacy should require a warrant before personal data is released.
- ...2 more annotations...
-
Awareness of the problem is growing, from Google's catastrophic launch of its social network Buzz in 2010, which shared users' contacts without their permission, to the revelation last year that Facebook was still tracking users' browsing information after they had logged out.
21More
Več kot polovica uporabnikov je na internetu večkrat dnevno | Dnevnik.si - 0 views
10More
Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views
-
TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
-
The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
-
a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
- ...7 more annotations...
-
No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
-
wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
-
the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
-
he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
-
o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
-
The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
7More
Internet pomembnejši od mehanika | Dnevnik.si - 1 views
-
Da, kupci postajajo vedno bolj »pismeni« tudi na tem področju, zato tudi zanje velja: če nimaš urejenih, enostavnih, preglednih in tako ali drugačne informativnih in privlačnih internetnih strani, je skorajda tako, kot da te ni.
-
Slovenci smo »internetni« narod, ki spada v evropsko povprečje, čeravno so trendi v zadnjem času vse manj spodbudni. Na Fakulteti za družbene vede so v okviru raziskave RIS (Raba interneta v Sloveniji) zaznali, da je bila Slovenija v začetnem obdobju interneta, sredi devetdesetih let, na tem področju pravzaprav še med vodilnimi državami v Evropi, v preteklem desetletju je skorajda v vseh pogledih zdrknila v povprečje, v tem desetletju pa drsi že v podpovprečje, in je nad povprečjem Evropske unije le še v redkih indikatorjih (predvsem v bolj splošnih vidikih informacijske pismenosti in infrastrukture).
- ...4 more annotations...
-
Tako je po njihovem mnenju internet pri avtomobilih postal najpomembnejši medij v informativno-nakupnem procesu in je že takrat prehitel vse druge medije
-
Če nam danes torej svet leži na dlani, je povsem logično, da brez njega ne morejo živeti in preživeti niti avtomobilske tovarne ter prodajalci in zastopniki, ki se vsak dan borijo za naklonjenost kupcev.
-
34 odstotkov voznikov, ki uporabljajo internet, želi, da jih prodajalec v procesu nakupa usmerja na informacije prek interneta, 33 odstotkov pa je načeloma že pripravljenih tudi na administrativni del nakupa prek interneta. 2,4 milijarde ljudi je sredi leta 2012 v svetovnem merilu uporabljalo internet, še konec leta 2000 pa jih je bilo po podatkih Internet World Stats le 361 milijonov. 518 milijonov je uporabnikov interneta v Evropi od skupno 821 milijonov prebivalcev, kar pomeni, da ga uporablja 63 odstotkov prebivalstva. Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe.Ksenija Hiti, Renault
-
Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe,
Who Owns Whom? Social Networking's Corporate Roots | The Nation - 0 views
www.thenation.com/...al-networkings-corporate-roots
social networking networking social nation roots

5More
shared by Katja Saje on 06 Mar 13
- No Cached
Arhiv | Delo - 0 views
www.delo.si/...iral-internetno-vohljanje.html
ITU nadzorovanje internetni promet internetne vsebine dpi pregledovanje

-
Mednarodna zveza za telekomunikacije (ITU) potrdila standard za podrobno pregledovanje internetnega prometa (deep packet inspection, dpi).
-
Internetni promet je sestavljen iz t. i. paketov. V vsakem je del vsebine (spletne strani, datoteke ali česa drugega), paket pa je opremljen še s kopico drugih podatkov, od glave (header) do opisa protokolov, storitev in še marsičesa. Glava je nekakšna kuverta, v njej so zapisani glavni podatki, da lahko brskalnik ali drug program iz več paketkov, ki lahko potujejo povsem neodvisno drug od drugega, sestavi pravo vsebino.
-
Z dpi pa vidijo tako vrsto internetnega prometa kot njegovo vsebino. Zakaj je to pomembno? Operaterji lahko tako »upravljajo« promet. Kar v praksi pomeni, da upočasnjujejo ali celo blokirajo posamezne vrste prometa, denimo torrente ali telefonijo IP (skype). Lahko pa bi tudi ponujali naročnino na hitrejši youtube, morda posebej prodajali dostop do facebooka.
- ...2 more annotations...
-
pojasnilo ITU, zakaj so sprejeli standard, gre v tej smeri. Češ, operaterji so doslej namenjali »preveliko« pasovno širino posameznim uporabnikom ali storitvam. Zdaj, ko vsebine postajajo vse bolj potratne glede količine podatkov, pa dpi po besedah ITU omogoča »natančno in vzdržno upravljanje prometa, ki raste eksponentno«.
-
Telekom, T-2 in Simobil zanikali uporabo dpi, medtem ko Amis ni odgovoril. Na Simobilu so dejali, da o tem »trenutno ne razmišljajo«, na T-2 pa, da »do zdaj niso delali tovrstnih pregledov«.
A tale of two webs: Google v the hyperlocal | openDemocracy - 0 views
5More
shared by Katja Saje on 06 Mar 13
- No Cached
Who Owns the Future? by Jaron Lanier; Big Data by Victor Mayer-Schönberger an... - 1 views
www.guardian.co.uk/...wns-future-jaron-lanier-review
manipulation privacy data intrusiveness malevolence benefit danger

-
Successful technologists are the new "ruling class". In this digital world order, money and power are concentrated in the hands of a few.
-
Each technological innovation produces the potential not just for cyber-crime, but for manipulating the way we lead our lives.
-
imagine you take a driverless taxi. Without explanation, it lingers in front of billboards during your journey or forces you to a particular convenience store if you need to pick up something. Is that very different to search engines reading your mind through your click-habits or Amazon telling you, often accurately, what you really want to read next?
- ...2 more annotations...
-
benefit and danger will depend on the use to which the information is put and the safeguards that protect us from technical malfunction and human malevolence.
After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 0 views
www.guardian.co.uk/...leveson-report-internet
internet needs regulation information terrorism media guardian

5More
Internet Marriages on Rise in Some Immigrant Communities - NYTimes.com - 0 views
-
With a red embroidered veil draped over her dark hair, Punam Chowdhury held her breath last month as her fiancé said the words that would make them husband and wife. After she echoed them, they were married.
-
Normally one of the most intimate moments two people can share, the marriage had taken place from opposite ends of the globe over the video chat program Skype
-
These are called proxy marriages, a legal arrangement that allows a couple to wed even in the absence of one or both spouses.
- ...2 more annotations...
-
Such convenience has also raised concerns that it will facilitate marriage fraud — already a challenge for immigration authorities — as well as make it easier to ensnare vulnerable women in trafficking networks.
-
All people applying for American citizenship through marriage must first be interviewed by officials from the Homeland Security or State Department who are charged with rooting out fraud. Officials said that if the spouses were to explain they had been married thousands of miles apart over the Internet, it would quite likely raise a red flag.
49More
Google Glass: is it a threat to our privacy? | Technology | The Guardian - 1 views
- ...46 more annotations...
-
So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
-
ou could inadvertently become part of somebody else's data collection – that could be quite alarming
View AllMost Active Members
View AllTop 10 Tags
- 103internet
- 32privacy
- 27google
- 23facebook
- 21technology
- 20Web
- 17ipraktikum
- 15social
- 13media
- 13bbc
- 12networking
- 11news
- 11online
- 11internetnipraktikum
- 10twitter
- 10children
- 8www
- 8piracy
- 7praktikum
- 7information