Skip to main content

Home/ ITGS News/ Group items tagged Twitter

Rss Feed Group items tagged

Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
nicholas n

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...

Noreen C

Facebook, Twitter Turn Social Powers to Disaster Relief | Fast Company - 1 views

  •  
    The article is primarily about the increased usage of social networking sites for altruistic advances. Sites like Twitter and Facebook have become sources of information for people to discuss and come up with relief for the disasters occurring all over the world. Due to the increased usage of these networks, the perfect "central" location to reach out to many groups of people seems like the best option. According to the article, this is a great advancement and benefit for situations such as the disaster in Haiti. Facebook has reported that they have raised "hundreds of thousands" of dollars for the cause through "status updates, chat and micropayment systems." Twitter, specifically, is a method for people to share their motivational bits in their short Tweet updates. The article also brings about current effort of raising awareness and gaining a greater volunteer network for the upcoming Martin Luther Day holiday, for the Corporation for National Community Service. Most importantly, the end of the article brings about a great benefit of using the social networks to connect anyone in the world who wants to help, even if they are thousands of miles away. As seen, the hours spent online every week can be finally put to use for the greater good.
Olivia M

Iran's Protests: Why Twitter Is the Medium of the Movement - TIME - 4 views

  •  
    In the most recent Iranian elections, the government censored many websites on the Internet in order to prevent news and other information from leaking the country/"classified governmental issues within the election". The Iranian people started using social networks (mainly Twitter) to spread the information of governmental oppression around both nationally and through out the world. After Twitter started blocking such sites, Iranians started using their cellphones as the method of sending out information on the injustices occurring during the election.
  •  
    This is a very interesting article. I find it interesting that Iran is afraid of the word of their government is getting out, so they block one of the most used wrbsites on the internet, I feel as though you could have argued the point that the tweets were not neccesarily the most reliable. As said in the article, "The vast body of information about current events in Iran that circulates on Twitter is chaotic, subjective and totally unverifiable. It's impossible to authenticate sources. It's also not clear who exactly is using Twitter within Iran, especially in English. Anecdotal evidence suggests that the bulk of tweets are coming from "hyphenated" Iranians not actually in the country who are getting the word out to Western observers, rather than from the protesters themselves, who favor other, less public media."
Madeline Brownstone

U.S. State Department speaks to Twitter over Iran | Industries | Technology, Media & Te... - 3 views

  • Twitter and Facebook have been used as a tool by many young people to coordinate protests over the election's outcome.
  • The State Department declined to give immediate details of the contact with Twitter, which has been used particularly by young urban Iranians who are disputing President Mahmoud Ahmadinejad's re-election last Friday.
    • Madeline Brownstone
       
      Stakeholders are the protesters in Iran
    • Madeline Brownstone
       
      AND, the US State Deparment revealed the stake they had in this communications tool.
  •  
    Who would think that the US State Deparment would be interested in Twitter's downtime?
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Madeline Brownstone

Twitter is Everything but a Social Network - 3 views

  •  
    this article talks about twitter being more then just a social network, it is turning into a hub for people to share more important information such as spread of a news event, new discovery and gathering people's opinions on a large scale.
  •  
    Ram originally posted this article but did not cache it.
Madeline Brownstone

BBC News - Social networks and the web offer a lifeline in Haiti - 1 views

  •  
    "The collapse of traditional channels of communication in Haiti has again highlighted the role of social media and the internet in disasters. Twitter is being used as a prime channel for communications, while sites such as Ushahidi are providing maps detailing aid and damage. "
Madeline Brownstone

BBC NEWS | Business | Twitter 'costs businesses £1.4bn' - 1 views

  • Staff who use Twitter and other social networking sites while at work are costing UK businesses £1.38bn every year, a report has said.
  • Although many businesses have banned the use of Facebook in the workplace
    • Madeline Brownstone
       
      I infer that Facebook bans can be enforced through proxy server settings.
  • Over three-quarters of respondents said that their employer had not issued them with specific guidelines with regards to using Twitter. "Without guidelines and usage polices businesses are leaving themselves wide open to a reduction in productivity, brand damage and security risks," Morse said.
    • Madeline Brownstone
       
      If company policies need to specify this site or that site, they will drive themselves crazy with writing and rewriting regulations. It is just not a practical solution.
  • ...1 more annotation...
  • It added that companies should think about protecting the reputation of their brand. A third of workers admitted they had seen sensitive information posted on social networks. However, 84% said they felt it should be up to them what they posted online
    • Madeline Brownstone
       
      a secondary issue is inferred here. The author implies that there are some workers who revealy company business through social networking sites and that is potentially harmful for the company's reputation. A twist here: the company wants privacy!
  •  
    Seem like this has potential as a lead article.
Ariel A

Social networks could help community college students - 3 views

  •  
    Facebook and Twitter helps college students in their learning experience. There are alot of facts on the use of technology and how some colleges take advantage on social networking to learn more in there educated purposes.
  •  
    hey ariel, i have read your post and you said that with the internet access other people are able to communicate about the collage that they are in. But what experience would a collage student need if they are already inside the collage? also i would agree with you about how it can help other people outside of the collage and wondering what they want to know. Also what advantages would someone in collage get? what kind of educational purposes?
Madeline Brownstone

Schools creating new rules for social networking policies - USATODAY.com - 2 views

  •  
    "beginning of the academic year warning them of social networking issues. Source: Individual schools * Share * Yahoo! Buzz * Add to Mixx * Facebook * Twitter * More o Fark o Digg o Reddit o MySpace o StumbleUpon o Propeller o LinkedIn * Subscribe * myYahoo * iGoogle * More o Netvibes o myAOL * By Kyle Oppenhuizen, USA TODAY More college athletic departments are developing or publicizing online social networking policies for student athletes, experts say. USA TODAY researched social networking policies for 27 schools in six major conferences, including the University of Iowa, which will implement a new monitoring policy Friday. Last fall, pictures emerged on Facebook of two 19-year old Hawkeye football players holding cash and liquor bottles. Five of these schools already have specific monitoring policies in effect - Auburn, Iowa State, Ohio State, Miami and North Carolina. Others warn athletes of the potential dangers of sites such as Facebook and MySpace through student-athlete handbook policies, meetings, coach's discussions and even letters. Some schools don't have a specific policy but allow coaches to monitor at their discretion, or take action if inappropriate material online is reported. Iowa's policy puts senior leaders in charge of monitoring profiles of athletes' on their team and bring problems to administrators, who then work with the athlete, associate athletic director Fred Mims said. Administrators will not get involved, Mims said, unless issues are brought to their attention, in which case they will talk to the athlete about addressing the issue and check out the profile, public or private. Ohio State, on the other hand, requires athletes to have a public profile or add coaches and administrators as friends (which gives access to the private profile). Fred Stutzman, a Ph.D. cand
Madeline Brownstone

Keeping A Lid On "Flash Mobs" - KDAF - 1 views

  •  
    "The events are organized through Twitter, Facebook and other social media sites, "The fact they you can get on the internet for 20 minutes and all of a sudden have 600 people for a pillow fight its amazing" said student Ryan Muldoon."
Jackie C

Social networks, texts boost fundraising - CNN - 0 views

  •  
    Social networks help boost fundraising and donation efforts in Haiti by 5 million in only a day.
  •  
    Social Networking helps raise money for Haiti donations and relief efforts
Jaymee C

TOPIC: In what ways is social networking used for serious business? - 35 views

The article I read was about the United States government using social networking sites like Facebook and Myspace to do investigation on people and catch criminals. Though it may be helpful for the...

politics and government social networking internet

Madeline Brownstone

Doctor and Patient - Are Doctors Ready for Telemedicine? - NYTimes.com - 18 views

  •  
    "For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones and the Internet, to connect doctors to patients in far-flung locales. But are doctors ready for this form of technology?"
  •  
    Please read this news item and add a thoughtful comment that shows how this article helps you think differently about the Case Study for 2010
Madeline Brownstone

Activists utilizing Twitter, Web proxies to sidestep Iranian censorship - The Boston Globe - 0 views

  • Derek Lowe and his Iranian-born wife were appalled by the violence that came in the wake of Iran’s disputed presidential election, and by the Tehran government’s attempts to censor news of the upheavals. And so they joined the protest, as best they could from their home in Acton. They decided to become members of the legion of Internet activists fighting the Iranian government’s aggressive attempts at post-election censorship. Armed with their computers and Internet access, they are helping Iranian protesters get the words and images out of their country for the world to see.
  •  
    "Derek Lowe and his Iranian-born wife were appalled by the violence that came in the wake of Iran's disputed presidential election, and by the Tehran government's attempts to censor news of the upheavals. And so they joined the protest, as best they could from their home in Acton. They decided to become members of the legion of Internet activists fighting the Iranian government's aggressive attempts at post-election censorship. Armed with their computers and Internet access, they are helping Iranian protesters get the words and images out of their country for the world to see."
1 - 20 of 23 Next ›
Showing 20 items per page