Skip to main content

Home/ Groups/ Internetni praktikum
Neža Zidanič

Why doesn't everyone 'social media stalk' a potential date? - Telegraph - 0 views

  • A new study has found that two thirds of single people ‘social media stalk’ before agreeing to go a date.
  • There have also been countless accounts in recent years of people not being able to even get a job because of a negative online identity prejudicing the interviewer.
  • as digital communication can be easily misconstrued
  • ...7 more annotations...
  • Brilliantly the study also broke down what specific things during a good old social media stalk could break a date: an ugly mug shot, lack of humour, aggressive online behaviour, excessive flirting with others online and, my favourite one, oversharing
  • However, this light-hearted poll provides further proof of how we are increasingly judged every single day by our online personas.
  • Of those honest souls, 77 per cent claimed they had turned down a date as a result of something they found out about the said babe or hunk through social media.
  • However, while it’s important for both professional and increasingly personal reasons to be conscientious about what you post online, we do also need to remember that societal attitudes are still playing catch-up with the web.
  • All it takes is for one negative comment, or silly photo to be shared by someone else, and then a digital identity can be marred – giving a falsely negative impression of somebody.
  • The web can be unforgiving and is often out of our control.
  • he internet can do many things – but it simply cannot tell you whether you will get those unexplainable stomach butterflies when you meet your date in person.
Blaž Gobec

Internet pomembnejši od mehanika | Dnevnik.si - 1 views

  • Internet pomembnejši od mehanika
  • Da, kupci postajajo vedno bolj »pismeni« tudi na tem področju, zato tudi zanje velja: če nimaš urejenih, enostavnih, preglednih in tako ali drugačne informativnih in privlačnih internetnih strani, je skorajda tako, kot da te ni.
  • Slovenci smo »internetni« narod, ki spada v evropsko povprečje, čeravno so trendi v zadnjem času vse manj spodbudni. Na Fakulteti za družbene vede so v okviru raziskave RIS (Raba interneta v Sloveniji) zaznali, da je bila Slovenija v začetnem obdobju interneta, sredi devetdesetih let, na tem področju pravzaprav še med vodilnimi državami v Evropi, v preteklem desetletju je skorajda v vseh pogledih zdrknila v povprečje, v tem desetletju pa drsi že v podpovprečje, in je nad povprečjem Evropske unije le še v redkih indikatorjih (predvsem v bolj splošnih vidikih informacijske pismenosti in infrastrukture).
  • ...4 more annotations...
  • Tako je po njihovem mnenju internet pri avtomobilih postal najpomembnejši medij v informativno-nakupnem procesu in je že takrat prehitel vse druge medije
  • Če nam danes torej svet leži na dlani, je povsem logično, da brez njega ne morejo živeti in preživeti niti avtomobilske tovarne ter prodajalci in zastopniki, ki se vsak dan borijo za naklonjenost kupcev.
  • 34 odstotkov voznikov, ki uporabljajo internet, želi, da jih prodajalec v procesu nakupa usmerja na informacije prek interneta, 33 odstotkov pa je načeloma že pripravljenih tudi na administrativni del nakupa prek interneta. 2,4 milijarde ljudi je sredi leta 2012 v svetovnem merilu uporabljalo internet, še konec leta 2000 pa jih je bilo po podatkih Internet World Stats le 361 milijonov. 518 milijonov je uporabnikov interneta v Evropi od skupno 821 milijonov prebivalcev, kar pomeni, da ga uporablja 63 odstotkov prebivalstva. Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe.Ksenija Hiti, Renault
  • Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe,
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Jan Keček

Smartphone operating systems: Bright-eyed and bushy-tailed | The Economist - 0 views

  • IF YOU have a new smartphone, it is almost certainly either an Apple iPhone or one of the many devices that runs on Google’s Android operating system. According to IDC, a research firm, more than 90% of the 228m smartphones shipped in the last quarter of 2012 belonged to one of the two dominant species. Android is the bigger bea
  • st. Its share has grown as the smartphone market has boomed, to about 70%.
  • Mozilla, a non-profit organisation best known for Firefox, a web browser, unveiled plans to bring a smartphone operating system to market. Called Firefox OS, it has the backing of 18 mobile operators based in countries from Asia to Latin America.
  • ...4 more annotations...
  • Most Windows smartphones are made by Finland’s Nokia, which dropped its own plans for a new system when it threw in its lot with the American software giant. BlackBerry, a Canadian company formerly called Research In Motion, hopes to recover lost glories with BlackBerry 10, which appeared in January after much delay.
  • One reason for the challengers’ optimism is that a lot of ground is unoccupied.
  • BlackBerry and Microsoft have the advantage of familiarity; 80m people use BlackBerrys. Companies’ information-technology departments trust them as secure. Microsoft hopes that Windows’ dominance of personal computers can be transferred to mobiles. With that in mind, all new Windows devices, on desks, on laps or in hands, have the same look, with “tiles” for touching, not clicking.
  • Whereas most applications on Apple and Android devices have been written for those systems, Firefox OS uses open standards. In principle, apps based on it can run on any device connected to the web.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
Maj Krek

The Enduring Myth of the 'Free' Internet - Peter Osnos - The Atlantic - 3 views

  • The Enduring Myth of the 'Free' Internet
  • The mantra of a "free" Internet has shaped the prevailing view of how we access information and entertainment in the digital age.
  • the devices that connect us to search engines, countless websites, social media, and e-mail bring us vast amounts of content for which we do not pay separately.
  • ...8 more annotations...
  • But access to this "free" information on the Internet, as everyone acknowledges as soon as it is pointed out, is not gratis.
  • The leading beneficiaries of all these charges are the big multi-platform companies, the pipes for content and digital services
  • the role of the broadband Internet is reaching a stage where anything less than total availability at minimal prices is a matter that deserves far more attention than it is currently getting.
  • 100 million Americans do not have high speed Internet at home, largely because of high costs and the lack of available infrastructure.
  • the Internet is the key to economic growth in the 21st century
  • One promising initiative, at least as it applies to speed and access, comes from Google Fiber. This is a project the company is developing in Kansas City as a trial of what would be a far faster broadband network using fiber-optic communication.
  • No other company can match Google's projected speed, but the price it is planning to charge for that service so far is higher than slower providers
  • For all the progress in delivering information and entertainment in the Internet era, Americans deserve and should demand something closer to the ideal of what is possible with our technology.
Urška Cerar

BBC News - Court orders UK ISPs to block more piracy sites - 0 views

  • Opponents have argued that blocking sites in this way was ineffective.
  • Data seen by the BBC suggested that the blocking of The Pirate Bay had only had a short-term effect on the level of pirate activity online
  • there had been a large reduction in the number of users illegally downloading music
  • ...2 more annotations...
  • Blocking illegal sites helps ensure that the legal digital market can grow and labels can continue to sign and develop new talent.
  • The UK has now handed the power over what we see on the internet to corporate lobbyists
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • once a request has been deemed valid, Google will notify users when possible.
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Meta Arcon

On Facebook, Sharing Can Come at a Cost - NYTimes.com - 0 views

  • Facebook said in a statement that “the median amount of feedback on posts (likes, comments, shares) from people who have more than 10,000 subscribers is up 34 percent from a year ago.”
Mirna Čorak

BBC - Future - Technology - YouTube: The cult of web video - 0 views

  • With 72 hours of video uploaded to YouTube every minute, almost every moment of modern history is a cult waiting to happen. And it is becoming big business.
  • The billion dollar question is how: how to make your video “go viral”, spreading your particular slice of contemporary culture across the planet like a contagion.
  • Silliness is more important – but not vital, given that both the Kony documentary and the jump from space are entirely serious.
  • ...3 more annotations...
  • Similarly, although sex may remain the most powerful form of advertising, it barely features within this list. Visual excitement won’t do either, given that the year’s second-biggest hit features a single camera pointed at five people and a guitar.
  • irality isn’t actually a property of these videos at all. It’s a property of their audience: a description not of a particular object, but of the ways in which that object is used.
  • To pass on a video or link is to become an evangelist for an instant cult: to gain the status of an initiate, complete with social capital and mutual LOLs. Unlike a biological virus, which hijacks hapless cells no matter what their owners might want, these are infections you must decide to pass on.
ninicka17

Quitters Never Win: The Costs of Leaving Social Media - Woodrow Hartzog and Evan Seling... - 0 views

  •  
    "Quitters Never Win: The Costs of Leaving Social Media"
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
ninicka17

Machine-Made News | The Nation - 0 views

ninicka17

Google's Monopoly on the News | The Nation - 0 views

Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
« First ‹ Previous 161 - 180 Next › Last »
Showing 20 items per page