Skip to main content

Home/ ITGS News/ Group items tagged Political

Rss Feed Group items tagged

Madeline Brownstone

BBC News - Computer game gives taste of life as an MP - 0 views

  •  
    "Young people are to get a "virtual taste" of life as an MP, as Parliament launches its own computer game. Commons Speaker John Bercow is targeting MP for a Week at 11 to 14-year-olds interested in politics. Players experience the daily life of a backbencher and are scored according to the judgements they make. "
Jaymee C

TOPIC: In what ways is social networking used for serious business? - 35 views

The article I read was about the United States government using social networking sites like Facebook and Myspace to do investigation on people and catch criminals. Though it may be helpful for the...

politics and government social networking internet

Madeline Brownstone

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 1 views

  •  
    Interesting plan that GB has proposed. Monitoring ALL internet traffic. Whoa!!
Daniell S

'One app for all' effort launches - 1 views

  •  
    This is an article about a European team creating an app can be downloaded on to any internet connected communications device. However, even after being presented with 10m euros, this group of 22 organizations hasn't yet received help from companies such as Apple. Apple still wishes to be different from others.
  •  
    This meets the requirements for the IT triangle because within the article it refers to some companies not accepting this application. Within strand 1 the issue of The digital divide and equality of access comes up. Within the article i learned about the organizations who are trying to make this app for all people with internet connected devices. This shows that the Apple company is at a sort of disadvantage for being behind in this new "App for all" program. By staying out of they will not be allowing the app created to the devices the company has created. This also related to Strand 2. In this app it will created to work on what ever people desire the app to work on. This is expressed in the article through "The idea would enable a given app to work, for example, on a web-ready television, in a car and on a mobile, no matter the makers of the devices." It would work on all of these things listed. This is represented through "Home and Leisure" and "Political Process". It would relate to "Home and Leisure" because the app can connect to computers and cell phones. It can also relate to the political process, with Apple not really wanting to get involved with the project. The relation between this article and Strand 3 is that this article involves Personal and Public Communications. This app can be downloaded by just about anyone with a internet connected device. The stakeholders in this situation would be the people using the apps. Another stakeholder would be the 22 organizations creating the app. The other stakeholders would the Companies who are allowing this app into their device;.
Kim T

Obama Wades Into Internet Censorship in China Address - NYTimes.com - 3 views

  •  
    Obama went to China and talked in a Q&A session, mentioning and supporting the ability to use the internet freely. Although there are a lot of criticism and rumors, it helps to strengthen our democracy. It forces the leaders to hear their critics' opinions so that they can improve their leadership and power. The internet can be a source of information or changing point for political relations. One of the questions mentioned in the session was from a Taiwanese concerned about the views on "one-China" and weapon selling to Taiwanese by the Americans. He had found some of this information on the Internet.
Madeline Brownstone

The Florence Nightingales of the internet - World Politics, World - The Independent - 0 views

  •  
    "At his wits' end, the doctor in Baghdad dispatched his plea for help - an email detailing a patient with a particularly difficult case of uterine cancer. More than two thousand miles away, in the study of her Kent home, Pat Swinfen swiftly forwarded the request on to a British specialist. The man who received that email, Dr Philip Savage, replied: "Don't give up on this woman. Her life can be saved." And that, with the help of continued advice from the eminent oncologist from Imperial College, is exactly what the Iraqi doctor did. "
Madeline Brownstone

BBC News - Ministers offer concessions on copyright changes - 0 views

  •  
    "Critics said the proposed powers were disproportionate and would damage one of the UK's fast-growing industries. Section 17 of the bill, which has attracted the most anger, would give ministers "reserve powers" to draft fresh laws to tackle net-based copyright infringement without needing parliamentary approval. Ministers argued that such powers were needed to support copyright laws against future, more technically advanced forms of piracy. "
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
mesbah095

Guest Post Online - 0 views

  •  
    Article Writing & Guestpost You Can Join this Site for Your Article & guest post, Just Easy way to join this site & total free Article site. This site article post to totally free Way. Guest Post & Article Post live to Life time only for Current & this time new User. http://guestpostonline.com
Kristin O

Breaking News, Kenya, Africa, Politics, Business, Sports, Blogs, Photos, Vide... - 1 views

shared by Kristin O on 14 Sep 09 - Cached
  •  
    Here SMS text messaging is being taken advantage of by people when they are angry
Madeline Brownstone

BBC - BBC World Service Programmes - Digital Planet, 04/11/2008 - 0 views

  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
Madeline Brownstone

Center for Democracy & Technology - 0 views

  •  
    Keeping the Internet Open, Innovative and Free
  •  
    Keeping the Internet Open, Innovative and Free
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Saida K

Google: Internet freedom is declining - 1 views

  •  
    The Government censorship has expanded outside of China.
  •  
    This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
  •  
    This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
nicholas n

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...

1 - 20 of 62 Next › Last »
Showing 20 items per page