Skip to main content

Home/ ITGS News/ Group items tagged monitoring

Rss Feed Group items tagged

Madeline Brownstone

Schools creating new rules for social networking policies - USATODAY.com - 2 views

  •  
    "beginning of the academic year warning them of social networking issues. Source: Individual schools * Share * Yahoo! Buzz * Add to Mixx * Facebook * Twitter * More o Fark o Digg o Reddit o MySpace o StumbleUpon o Propeller o LinkedIn * Subscribe * myYahoo * iGoogle * More o Netvibes o myAOL * By Kyle Oppenhuizen, USA TODAY More college athletic departments are developing or publicizing online social networking policies for student athletes, experts say. USA TODAY researched social networking policies for 27 schools in six major conferences, including the University of Iowa, which will implement a new monitoring policy Friday. Last fall, pictures emerged on Facebook of two 19-year old Hawkeye football players holding cash and liquor bottles. Five of these schools already have specific monitoring policies in effect - Auburn, Iowa State, Ohio State, Miami and North Carolina. Others warn athletes of the potential dangers of sites such as Facebook and MySpace through student-athlete handbook policies, meetings, coach's discussions and even letters. Some schools don't have a specific policy but allow coaches to monitor at their discretion, or take action if inappropriate material online is reported. Iowa's policy puts senior leaders in charge of monitoring profiles of athletes' on their team and bring problems to administrators, who then work with the athlete, associate athletic director Fred Mims said. Administrators will not get involved, Mims said, unless issues are brought to their attention, in which case they will talk to the athlete about addressing the issue and check out the profile, public or private. Ohio State, on the other hand, requires athletes to have a public profile or add coaches and administrators as friends (which gives access to the private profile). Fred Stutzman, a Ph.D. cand
Madeline Brownstone

ISIS: Protecting children in online social networks - 0 views

  •  
    "The aim of the Isis project is to develop an ethics-centred monitoring framework and tools for supporting law enforcement agencies in policing online social networks for the purpose of protecting children. The project will develop natural language analysis techniques to help identify paedophiles from chat logs and monitoring mechanisms that can be non-invasively attached to file sharing systems for identifying the distributors of child abuse media. "
Madeline Brownstone

The virtual doctor visit: Health monitoring at home - washingtonpost.com - 2 views

  • Right now, the biggest impediment to high-tech monitoring is that Medicare and private insurers generally do not reimburse for it. And the devices can be expensive. As part of a pilot project, Juanita and Arthur Wood get their devices for free; normally patients would have to pay about $100 a month to rent them.
    • Madeline Brownstone
       
      Equality of access seems to be the only issue here. And, what are the impacts of that? Can that be determined? Is there evidence in this article?
  • Eric Dishman, general manager of Intel's Research and Innovation Group, said these devices perform an increasingly important function: "You just can't crank out enough medical students to solve our personnel shortage in this country. You need to rely on other means, especially technology, to bridge that gap."
    • Madeline Brownstone
       
      The issue of people relying on machines to do what was previously done by human contact is clearly coming through here.
  •  
    Right now, the biggest impediment to high-tech monitoring is that Medicare and private insurers generally do not reimburse for it. And the devices can be expensive. As part of a pilot project, Juanita and Arthur Wood get their devices for free; normally patients would have to pay about $100 a month to rent them.
Jackie C

RFID tags: Big Brother in small packages - 1 views

  •  
    A relatively old news article, that details concerns and issues about RFID tags that remain relevant, or have become more relevant over time. The article clearly defines law enforcement agents, criminals, marketing corporations, and the average consumer as stakeholders in the development and widespread use of RFID tags. The article describes the issue of privacy and unauthorized or undetected monitoring, whether for illegal use or law enforcement or for marketing schemes as rising from the continued functionality of RFID tags after they have served their purpose -- outside of the stores and past the RFID scanners. The article mentions several concerns, including the more widespread adoption of long-range RFID scanners by non-commercial groups or people, and their ability to be used as an invasion of privacy. Evidently, the technology that makes the continued functionality of RFID tags a privacy issue is in the way that each tag, which can be as small as a few centimeters long, can store various bits of data, such as when the item was bought, where the item was bought, for what price, and who bought it, in combination with the ability to use long-range RFID scanners to scan and detect this information outside of a store.
Madeline Brownstone

Can Employers Do That? Turns Out, They Can: Exploring Workers' Rights : NPR - 2 views

  •  
    "In terms of monitoring its employees, the list of things a corporation can't do is a short one - it's basically confined to eavesdropping on a personal oral conversation, Maltby said. "Anything else is open season." And outside the workplace, personal blogs or social media pages on services like Twitter or Facebook offer no refuge. "
Madeline Brownstone

Smuggling Europe's Waste to Poorer Countries - NYTimes.com - 1 views

  •  
    "In the United States, more states are passing laws that require the recycling of goods, especially electronics. But because the United States places fewer restrictions on trash exports and monitors them far less than Europe, that increasing volume is flowing relatively freely overseas, mostly legally, experts say"
Madeline Brownstone

VA takes a leap of faith into telehealth -- Federal Computer Week - 1 views

  •  
    Critics also worry about possible negative effects on patient care. VA's inspector general recently investigated two deaths at a Colorado VA hospital that occurred while the patients were being monitored by cardiac telemetry, a form of telemedicine. "We substantiated the allegation that there were competency and training issues with medical support assistants and registered nurses assigned to telemetry," the IG wrote in the report dated Jan. 21. The report also notes that hospital managers had been informed of the telemetry problems before the deaths but had taken no action. VA managers agreed to evaluate the telemetry program in Colorado to ensure safety, and Linkous and Casscells said it was likely an isolated incident. However, more of the same can be expected, Deal predicts. "The rapid growth of the telemedicine industry will leave gaps in training and/or policy among its practitioners, which could spark an increase in litigation," he said.
Madeline Brownstone

BBC NEWS | Business | Bosses 'should embrace Facebook' - 1 views

  •  
    ""In today's difficult business environment, the instinctive reaction can be to batten down the hatches and return to the traditional command-and-control techniques that enable managers to closely monitor and measure productivity. "Allowing workers to have more freedom and flexibility might seem counter-intuitive, but it appears to create businesses more capable of maintaining stability." "
  •  
    An interesting twist on using social networking in the workplace
Santiago P.

Can robots stop Gulf of Mexico oil spill? | Crave - CNET - 1 views

  • robotic submarines in an effort to contain the spill
  • BP quoted National Oceanic and Atmospheric Administration experts
  • They are monitoring the leak, which was discovered Saturday, as well as trying to activate the blowout preventer, a
  • ...1 more annotation...
  • stop the oil flow.
  •  
    The IT system in this case is the remotely operated vehicles (ROVs) created by the oilfield engineering company Oceaneering. These robots monitored the leak deep down in the Transocean Deepwater Horizon, where humans could not reach to check out the oil spill. The major stakeholders are BP (the company responsible for the oil spill), experts from the National Oceanic and Atmospheric Administration, who control and protect the environment in the Gulf of Mexico, Oceaneering, which created the ROVs, and the people living in the coast who were impacted by the massive oil spill in the gulf. The area of impact is that of science and the environment. The area of science applies to the robotics and artificial intelligence aspect, and the environment side deals with the environmental concern. The social and ethical issue is that of people and machines, and policies and standards. Experts in the field of environment must issue and enforce the policies that they stipulate, so as to protect the environment.
Madeline Brownstone

BBC NEWS | Technology | Mobiles used to monitor asthma - 0 views

  •  
    Very old article. What's the latest? Asthma suffers could soon benefit from a system which allows them to keep check their condition via mobile phone.
  •  
    Very old article. What's the latest? Asthma suffers could soon benefit from a system which allows them to keep check their condition via mobile phone.
Saida K

Google: Internet freedom is declining - 1 views

  •  
    The Government censorship has expanded outside of China.
  •  
    This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
  •  
    This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
Jialin C

Google Reports on Government Requests and Censorship - NYTimes.com - 2 views

  •  
    Google has came up with a tool in which people can view the government's censorships. It keeps track of how many times the government has requested for Google to take down certain information due to privacy.
  •  
    Strand 1: 1.2: Security: Google isn't secure if they put statistics and a counter on how many times they were asked to take information down. 1.7 surveillance: Governments don't want to be monitored and therefore, many of them refuse to share whether or not their censorship demands. 1.3 Privacy and anonymity: Google created this tool which keeps track of how many different countries would want their government "secrets" and policies to be taken down; there fore, google does respect that to a certain extent. Although, many countries do make a huge number of requests for their data to be taken down. Strand 2: 2.6:This Google transparency tool can be used to view the demands and requests of data been removed by specific countries and their governments. Stakeholders: Google is the organization that created such a tool. And it's main purpose was to show the world that censorship and privacy is asked for by many. The governments around the world are asking for either data requests to be taken off, or data requests based on their country from the transparency tool. Strand 3: 3.4 Internet: it plays the main role of how Google puts up too much information and due to privacy and surveillance issues, the IT system is shown as a map that organizes the lack of information that can be seen by viewers and the amount of information that are taken off due to requests.
  •  
    Please go back and "cache" this page. I see by the URL that this is a blog. Although the lines between bloggers and journalists are somewhat blurred these days, blogs are usually opinion pieces and not considered journalism in the same way as edited news items. For example, this summer, you blogged on the NY Times site. That wasn't "news" it was your opinion about what you read about what was happening.
Madeline Brownstone

Archerfish Video Monitoring| Video Surveillance System | Wireless Security Camera - 0 views

  •  
    More than a video camera. this one thinks and sends you updates.
Madeline Brownstone

Doctor and Patient - Are Doctors Ready for Telemedicine? - NYTimes.com - 18 views

  •  
    "For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones and the Internet, to connect doctors to patients in far-flung locales. But are doctors ready for this form of technology?"
  •  
    Please read this news item and add a thoughtful comment that shows how this article helps you think differently about the Case Study for 2010
Noreen C

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  • easily and securely share information
  • A fancy electronic patient record, unconnected, is just an expensive way to capture data.
  • Getting many different health care providers and suppliers of specialized software to agree on how to do that is no simple task.
  • ...2 more annotations...
  • The solution the group agreed to is essentially Internet-based e-mail and public key encryption technology, tailored for health care.
  • For health care technology companies, the data-sharing standards, experts say, should stimulate the market for electronic health records and allow them to focus their efforts on making their individual offerings more affordable and easier to use.
  •  
    This article is primarily about setting standards and protocols so that an electronic health records could world easily and securely for many health care providers and suppliers. The reason the introduction of an EHR hasn't worked before, is that there were no data-sharing standards, which would ensure that the data is transmitted securely across the internet. These standards are also in accordance of many of the interests of all of the health providers and stakeholders involved, which was a major problem previously. Without the issue of connecting the EHR from provider to provider, then the records would be a "fancy...way to capture data," and it's full potential would never be recognized. However, these new standards and protocols, filled with secure transactions based on encryptions, have made the introduction of an electronic health record possible. There are many benefits to the use of an EHR, including productivity and financial improvement for the companies and the employees. For example, doctors/nurses no longer need to spend time pulling a patient's file, or writing the details of the visit afterwards. There are also fewer repetitive tasks, and improved communication between doctor and nurse, or doctor and another doctor. Quality of care may also improve because doctors have quick access to a patient's information, there is better monitoring and discovery of chronic illnesses, and doctors can return phone calls/ provide medication refills immediately. Also, in general, the electronic charts allow for a more efficient office, which leads to a less stressful environment and more attention on the patients' care rather than searching for their charts. This can only be done through the introduction of an EHR, leading to easier queries, instant reorganization, and file management that could be transmitted to both the patient and any other doctors. This minimizes the ambiguity of not having tests results from one doctor, and allows all doctors treating a p
  •  
    patient to see all of the patient's history. This is important in having a correct diagnosis and treatment. However, there are also some drawbacks. Initially, doctors who chose to engage in the implementation of a EHR, see some decreases in productivity. This is because entering information and learning how to use the software takes some time. Some doctors also do not have the money to invest in such software and accompanying hardware to, and others no not want to because they are accustomed to their hand-written charts. There are also some security issues, leading to greater privacy issues. The EHR maintains very personal data about a patient, and if the records are breached, then the privacy of the patient may be put at risk. There is also the issue of interoperability, which was brought up in the article. Many of the companies in different countries wishing to engage in the implementation of EHR have different standards involving the usage. This could harm the usage of an international EHR.
Madeline Brownstone

To Curb Truancy, Dallas Tries Electronic Monitoring - New York Times - 0 views

  •  
    Big Brother tactics odly have found acceptance.
  •  
    Big Brother tactics odly have found acceptance.
Madeline Brownstone

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 1 views

  •  
    Interesting plan that GB has proposed. Monitoring ALL internet traffic. Whoa!!
Madeline Brownstone

BlackBerry Spy Software Hits the Market | Reuters - 2 views

  •  
    Can't be a good portfolio article because it is a product announcement.
  •  
    Interesting software. BUT!! Can't be a good portfolio article because it is a product announcement.
1 - 18 of 18
Showing 20 items per page