Skip to main content

Home/ ITGS News/ Group items tagged Political

Rss Feed Group items tagged

Madeline Brownstone

Clinton Urges Global Response to Internet Attacks - NYTimes.com - 0 views

  •  
    "Mrs. Clinton also identified Saudi Arabia, Egypt, Tunisia, Vietnam and Uzbekistan as countries that constrain Internet freedom or persecute those who use the Web to circulate unpopular ideas. She pointed to an Egyptian blogger, Bassem Samir, who was in the audience at the Newseum in Washington for Mrs. Clinton's speech and had been imprisoned by Egyptian authorities."
  •  
    How far can a nation go to block information the Internet? What methods are being used? Is it working? What are the consequences?
Madeline Brownstone

BBC News - Scottish crimes to be reconstructed in 3D - 0 views

  •  
    "Technology found in computer games and the film industry will be used in the investigation and prosecution of serious crimes, it has emerged. A unit launched this month will allow police and juries to visualise crime scenes without having to go there. The Scottish Police Services Authority will explain how a crime took place using animation and 3D reconstructions. "
Madeline Brownstone

BBC News - Poorer pupils to be given free laptops - 0 views

  •  
    "A scheme to give free laptops to pupils from poor backgrounds is being rolled out to 270,000 families in England."
Madeline Brownstone

BBC News - Data losses to incur fines of up to £500,000 - 0 views

  •  
    "The Information Commissioner's Office will be able to issue fines of up to £500,000 for serious data security breaches. The new rule is expected to come into force in the UK on 6 April 2010. It has been approved by Jack Straw MP, Secretary of State for Justice. "
Madeline Brownstone

Text Messages in China to Be Scanned for 'Illegal Content' - NYTimes.com - 2 views

  •  
    ""It really is quite a program to seize control of all the new forms of media, one by one," said Jeremy Goldkorn, editor and publisher of Danwei.org, an English-language Web site about the Chinese media and Internet that is currently blocked in China. "It has been a bad half year for censorship.""
Madeline Brownstone

Why no one cares about privacy anymore | Politics and Law - CNET News - 0 views

  •  
    "The truth about privacy is counter-intuitive: less of it can lead to a more virtuous society. "
Madeline Brownstone

Hacking For Good Reasons - Articles - Educational Technology - ICT in Education - 0 views

  •  
    "We tend to think of hacking as bad, and hackers as evil. But as well as the ones wearing white hats, ie the ones who are on our side and checking out vulnerabilities that others might exploit, there are the techno-geeks who are all dressed up and with nowhere to go. Until now. On the 11th March, the UK's Home Office, Cabinet Office and Ministry of Justice opened their doors to 10 technical experts from http://www.rewiredstate.com who used data.gov.uk and the web to develop tools and services that help people."
Madeline Brownstone

Rewired State - 0 views

  •  
    "Rewired State runs hackdays to let developers show government what is possible and government to show developers what is needed. "
Madeline Brownstone

BBC News - South Korean children face gaming curfew - 6 views

  •  
    I claim this article.
Olivia M

Brainy Robots Start Stepping Into Daily Life - 4 views

  •  
    Many companies are building robots to do simple human tasks. These tasks include lifeguarding, taking out the trash, building a bookcase and much more.
  •  
    Quicker and quicker progress into the field of artificial intelligence without corresponding advancements in politics and standards
Madeline Brownstone

Turn Off GPS. Drive Toward Serendipity. - NYTimes.com - 1 views

  •  
    "Last month in Germany, a 45-year-old Bavarian man followed the directions of his GPS device onto the wrong end of a highway off-ramp near the city of Osnabrück, in what the newspaper Die Welt called a case of "blind trust" in his gadget. "
Arafat Chowdhury

Outsourcing to India Draws Western Lawyers - 0 views

  •  
    This article is about the outsourcing of lawyers in India as the title says. By "draws western lawyers", its says how the cost has become cheaper for many lawyers to use Indians to do the small tasks that require a lot of time. The Western lawyers can use the Indians to save their own time and money and gain access to a larger work force, however for a certain price. With all these benefits from outsourcing the issue of globalization is involved. Western lawyers are using Indians across the world to get the work done at a lower price. Money is what these firms are tackling but also the efficacy of the work and the experience many Indians have (or the Indians learn through training). Jobs are available to them and this helps the economy of India but not the economy of America. The stakeholders thus are the Indian employees and the Western lawyers.
Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Mariam B

Privacy Issue Complicates Push to Link Medical Data - 1 views

  •  
    This article deals with the use of electronic health records in order to record medical information of patients. Congress wishes to pass a bill to enforce the use of electronic health records, however issues regarding the privacy of patients and information stored on these databases have arose. Electronic health records are used to record personal patient information such as name, age, address along with health sicknesses and symptoms. This also allows doctors to send e-prescriptions to the patient. However the computerization of health records triggers obvious privacy issues which prevent many hospitals to completely switch to using these electronic databases. Stakeholders of this technology include the patients whose medical information is being stored and sent on the databases, the hospitals and doctors that use the databases to track and send prescriptions to their patients, along with policy makers such as Congress and President Obama who promote the use of electronic health databases. The major stakeholder is the patient, whose private information is at risk by using these databases. Doctors can also use the electronic databases to send prescriptions to their patients for medicines or further appointments. Patient databases include sensitive personal information that may be at risk of being hacked or seen by an unauthorized user. In the article, solutions to these privacy issues have been proposed such as increased spending and investments in order to create solutions to privacy issues. Measures can be taken to safeguard medical information such as using encryption technology to secure private information that is sent online or kept on the hospital's computer database. This encryption would prevent unauthorized users from accessing and using patient information. However, in cases where this encryption technology fails to protect patient information, policies have been created that the patient must be notified if their personal information has been h
  •  
    continued: have been created that the patient must be notified if their personal information has been hacked or seen by an outsider. Other policies have been enforced that give patients the ability to control and prevent hospitals from sending private information for research without their permission. These policies help prevent private patient information from being seen by unwanted individuals.
« First ‹ Previous 41 - 60 of 62 Next ›
Showing 20 items per page