Skip to main content

Home/ ITGS News/ Group items tagged 1.2

Rss Feed Group items tagged

Jialin C

Google Reports on Government Requests and Censorship - NYTimes.com - 2 views

  •  
    Google has came up with a tool in which people can view the government's censorships. It keeps track of how many times the government has requested for Google to take down certain information due to privacy.
  •  
    Strand 1: 1.2: Security: Google isn't secure if they put statistics and a counter on how many times they were asked to take information down. 1.7 surveillance: Governments don't want to be monitored and therefore, many of them refuse to share whether or not their censorship demands. 1.3 Privacy and anonymity: Google created this tool which keeps track of how many different countries would want their government "secrets" and policies to be taken down; there fore, google does respect that to a certain extent. Although, many countries do make a huge number of requests for their data to be taken down. Strand 2: 2.6:This Google transparency tool can be used to view the demands and requests of data been removed by specific countries and their governments. Stakeholders: Google is the organization that created such a tool. And it's main purpose was to show the world that censorship and privacy is asked for by many. The governments around the world are asking for either data requests to be taken off, or data requests based on their country from the transparency tool. Strand 3: 3.4 Internet: it plays the main role of how Google puts up too much information and due to privacy and surveillance issues, the IT system is shown as a map that organizes the lack of information that can be seen by viewers and the amount of information that are taken off due to requests.
  •  
    Please go back and "cache" this page. I see by the URL that this is a blog. Although the lines between bloggers and journalists are somewhat blurred these days, blogs are usually opinion pieces and not considered journalism in the same way as edited news items. For example, this summer, you blogged on the NY Times site. That wasn't "news" it was your opinion about what you read about what was happening.
Rubayeth M

New Hospital Tagging System Should End Patient Mixups - 0 views

  •  
    At the NHS in England, hospitals are using these new "IT programme" telling them to start labeling their patients. In 2006 approximately 25,000 patients were saying that they they weren't given the right treatment. These were cases due to the misreading of the patient's tags, papers and other identification papers.(These misreadings were due to the legibility of the handwriting. Then the idea of barcodes and RFID were introduced this February by the UK healthcare manager, Roger Lamb who is now using this NHS 10 digit patient ID number and RFID tags which will modernize the NHS hospital in England. RFID's will be upon their wristband which will contain all their personal records (there will also be a photograph if the patient is unable to speak). This can only be accessed by the doctors from his/her PDA. 2.4_health 3.1_hardware: RFID and 10 digit barcodes 3.7_databases: that holds patient's records (Keep in mind this article was written in 2007.)
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
1 - 3 of 3
Showing 20 items per page