Skip to main content

Home/ ITGS News/ Group items tagged online

Rss Feed Group items tagged

Jaymee C

Facebook, Inc. News - The New York Times - 1 views

  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • ...7 more annotations...
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  •  
    for assitance in portfolio 1
Madeline Brownstone

Flames with names? That is the online question | online, world, real - Home - The Orang... - 2 views

  •  
    "Last week, one of the world's most successful online gaming companies, Blizzard Entertainment of Irvine, told its global community of World of Warcraft players that they'd have to use real names in forums. The pushback was severe. The most outraged, as Register writer Ian Hamilton reported, lashed out by publishing online every public item they could find about Blizzard employees and, in some cases, their relatives."
  •  
    Might be a good lead article to spur classroom debate about anonymity in social networking.
Kristin O

Poker Bots Invade Online Gambling - 6 views

  •  
    This article starts out with a scenario about a professional online poker player figuring out that he was actually playing against a bot, which is designed to beat its opponents against all odds. There area of impact of this article can be arts entertatinment and leisure because the players do play for money and compete with one another online. This is from the point of view from the players however it can be also seen as business and employment because bots are being sold on line to do this specific task and to win earnings for whoever has paid for them. The Social and ethical issues here can be Security when looking at it from the point of view of the poker site owner, they are supposed to try and root out any bots to make online playing fair for everyone else. People and Machines can also be applied here because the bots are taking something that is meant for recreation by humans and extending their faculties but to the extent of not playing by the rules and playing an unfair game with some one else. The stakeholders of this issue are the online poker players, the people who own the poker playing website and the people who sell and use the poker bots. The IT system referred to in the article are the bots.
  •  
    I found this article really interesting because I had not thought about it at all. This is an important case to pay attention to because of the fact that machines are taking over another aspect of the human life. Not only are machines capable of replacing jobs, such as the repetitive ones in factories, but they are also able to take away the fun in gambling. They are also bending the rules and creating an unfair environment for gamblers on the Internet.
  •  
    This article piqued my interest because it made me think about my own article in a broader way. My article talked about the issue of artificial intelligence talking menial and low skill jobs from people. This article attracted me because it show AI used in another way to make money for people. It takes what is mentioned in my article and extends it to another dimension. People are using these bots to actually make money by competing against human competitors but this is occurring to players unsuspecting players, technically this is using advanced technology to steal.
Lenny H

Barack Obama and the Facebook Election - 0 views

  •  
    This article describes the election of the 2008 election for President. Obama's election will go down as symbolic and inspiring victory for coming generations. A large amount of Obama's victory was due to the youth vote. With the rising of facebook and social networking Obama's ground swell support came from this generation of people on facebook and using social networks. He attempted to interact with American voters via online social networking sites like Facebook and Myspace. Obama teamed up with Chris Hughes, a facebook co-founder in order to podcast and mobile messaging. Obama is a natural Facebook politician. On his personal Facebook profile-which featured his "Our Moment Is Now" motto-Obama named his favorite musicians as Miles Davis, Stevie Wonder, and Bob Dylan and listed his pastimes as basketball, writing, and "loafing w/kids" (note the hip shorthand aimed at appealing to young voters). The 72-year-old John McCain, by contrast, never managed to connect on Facebook. He gave one of his pastimes as "fishing" and listed Letters From Iwo Jima among his favorite movies. McCain even got "punked" by a Facebook prankster who posted a phony policy announcement right on McCain's online profile: "Dear supporters, today I announce that I have reversed my position and come out in full support of gay marriage ... particularly marriage between two passionate females."
Jaymee C

TOPIC: In what ways is social networking used for serious business? - 35 views

The article I read was about the United States government using social networking sites like Facebook and Myspace to do investigation on people and catch criminals. Though it may be helpful for the...

politics and government social networking internet

Madeline Brownstone

A survey of technology and government: The road to e-democracy | The Economist - 0 views

  •  
    "According to Cary Coglianese, an American e-government expert, imagining that online consultation will breathe new life into democracy "is a bit like imagining that giving automobile owners the ability to download technical manuals and order car parts online would turn a great number of them into do-it-yourself mechanics". Greater involvement by experts may make for more sensible rules, but it will not turn the system of public administration on its head. In short, badly managed organisations with computers will stay badly managed. That has been the lesson from private business, and it equally applies to the public sector, where e-government has barely begun to scratch the surface of what is possible. That is reason for disappointment, but also for hope. "
Madeline Brownstone

Schools creating new rules for social networking policies - USATODAY.com - 2 views

  •  
    "beginning of the academic year warning them of social networking issues. Source: Individual schools * Share * Yahoo! Buzz * Add to Mixx * Facebook * Twitter * More o Fark o Digg o Reddit o MySpace o StumbleUpon o Propeller o LinkedIn * Subscribe * myYahoo * iGoogle * More o Netvibes o myAOL * By Kyle Oppenhuizen, USA TODAY More college athletic departments are developing or publicizing online social networking policies for student athletes, experts say. USA TODAY researched social networking policies for 27 schools in six major conferences, including the University of Iowa, which will implement a new monitoring policy Friday. Last fall, pictures emerged on Facebook of two 19-year old Hawkeye football players holding cash and liquor bottles. Five of these schools already have specific monitoring policies in effect - Auburn, Iowa State, Ohio State, Miami and North Carolina. Others warn athletes of the potential dangers of sites such as Facebook and MySpace through student-athlete handbook policies, meetings, coach's discussions and even letters. Some schools don't have a specific policy but allow coaches to monitor at their discretion, or take action if inappropriate material online is reported. Iowa's policy puts senior leaders in charge of monitoring profiles of athletes' on their team and bring problems to administrators, who then work with the athlete, associate athletic director Fred Mims said. Administrators will not get involved, Mims said, unless issues are brought to their attention, in which case they will talk to the athlete about addressing the issue and check out the profile, public or private. Ohio State, on the other hand, requires athletes to have a public profile or add coaches and administrators as friends (which gives access to the private profile). Fred Stutzman, a Ph.D. cand
Madeline Brownstone

Report: 'Why pirate when you can stream?' - FierceOnlineVideo - 5 views

  •  
    "Want to cripple content piracy? Stream your video online instead. That's the conclusion of a new study from Global Web Index, which says content piracy isn't about having the content, it's about watching it as soon as possible. GWI -- the offspring of research consultancy Trendstream and Lightspeed Research -- contends that the increasing popularity of Hulu, YouTube and other online video hubs has increased content availability to the point where personal ownership is redundant, making users less inclined to steal content."
Madeline Brownstone

ISIS: Protecting children in online social networks - 0 views

  •  
    "The aim of the Isis project is to develop an ethics-centred monitoring framework and tools for supporting law enforcement agencies in policing online social networks for the purpose of protecting children. The project will develop natural language analysis techniques to help identify paedophiles from chat logs and monitoring mechanisms that can be non-invasively attached to file sharing systems for identifying the distributors of child abuse media. "
Kim T

iTunes warning as thousands of fraudulent accounts are auctioned online - 1/7/2011 - Co... - 0 views

  •  
    Purchasing songs, apps, movies, and etc on ITunes requires each user to have an ITunes account. Upon signing up for the account, a valid credit or paypal account must be entered to pay for any purchased items. These purchases are made using a SSL (secure socket layer) connection so that when the user sends their information to ITunes to set up an account, log in, or purchase an item, the information they are sending is encrypted.The sender is given a public key to show that he or she was the one sending the message and ITunes will get the private key. The data is encrypted using a code that will translate the data into a message incomprehensible to others if not decrypted using a private key. Once it has reached the ITunes database after being sent over the network, the private key will decode the message and proceed with the transaction.  However, the problem lies within the process of setting up an account. Many customers' itunes accounts are being hacked into and sold online to other people in China. Hackers are still able to find and intercept customers' information, such as their passwords or credit card number, and use it to sell to other people. Passwords may be too weak in some cases or authentication by the itunes store may be too weak. The issue of security is therefore involved as sensitive information can be accessed by others. The customers are affected since they are being charged for items that they are not purchasing. The company, Apple, is also affected negatively since their customers may not feel safe buying from them anymore and therefore losing business. Then there are the hackers who are benefiting in such a situation, profiting off of other people illegally.
Madeline Brownstone

BBC NEWS | Technology | Hackers prepare supermarket sweep - 0 views

  •  
    Self-checkout systems in UK supermarkets are being targeted by hi-tech criminals with stolen credit card details. A BBC investigation has unearthed a plan hatching online to loot US bank accounts via the checkout systems.
  •  
    Self-checkout systems in UK supermarkets are being targeted by hi-tech criminals with stolen credit card details. A BBC investigation has unearthed a plan hatching online to loot US bank accounts via the checkout systems.
Olivia M

BBC NEWS | Technology | Free medical tool tackles disease - 3 views

  • Our mission is to build a health records system in support of direct patient care, on the ground for the very poorest of the poor,"
    • Madeline Brownstone
       
      Equality of Access
  •  
    The Open Medical Record System (OpenMRS) is providing countries, such as South Africa, with an online patient medical record system.
  • ...1 more comment...
  •  
    The Open Medical Record System (OpenMRS) is providing countries, such as South Africa, with an online patient medical record system.
  •  
    This article is about the need for OpenMRS in developing countries such as South Africa. This is necessary because it will help improve how people are treated. By knowing about someone's medical history, it can help decrease the spread of diseases such as HIV and Aids.
  •  
    The issue is that there is a lack of open medical record systems in developing countries. Because of this diseases are being spread when they can easily be prevented. The thing that people were doing that gave rise to this issue is that in some countries, diseases were being spread at a faster rate then in others because of lack of background medical information. the impact that this has on people is that people in developing countries are spreading diseases at a faster rate. So diseases such as HIV and Aids are spreading in developing countries such as South Africa because of lack of medical background. The stakeholders are patients. The IT system is open medical record system. The area of impact is health. The social and ethical issue is equality of access. By having a medical record of everyone, people will be able to be treated equally because the doctor's will have their whole medical history.
Mark Gakin

Glide Health Makes Medical Records Mobile -- InformationWeek - 3 views

  •  
    Shifting from paper to electronic medical records has long been cited as a way to improve access to information in the health system. Both Google and Microsoft (NSDQ: MSFT) have unveiled online medical records platforms, but the health industry has been slow to change.
  •  
    Shifting from paper to electronic medical records has long been cited as a way to improve access to information in the health system. Both Google and Microsoft (NSDQ: MSFT) have unveiled online medical records platforms, but the health industry has been slow to change.
  •  
    The social/ethical issue in this article is people and machines because doctors are now using medical databases to organize data. A major issue was lack of knowledge and that the information used to be all written. This disabled doctors from looking at medical records, which is why they began to use electronic databases. Clearly the area of impact is health and the IT system is medical data bases. The stake holders/people that are affected are the doctors because they can now locate information easier and patients because they can be helped faster. Using these databases had a huge impact on society because things were changed. Information is now stored differently and doctors can now work better.
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
nicholas n

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...

Noreen C

Facebook, Twitter Turn Social Powers to Disaster Relief | Fast Company - 1 views

  •  
    The article is primarily about the increased usage of social networking sites for altruistic advances. Sites like Twitter and Facebook have become sources of information for people to discuss and come up with relief for the disasters occurring all over the world. Due to the increased usage of these networks, the perfect "central" location to reach out to many groups of people seems like the best option. According to the article, this is a great advancement and benefit for situations such as the disaster in Haiti. Facebook has reported that they have raised "hundreds of thousands" of dollars for the cause through "status updates, chat and micropayment systems." Twitter, specifically, is a method for people to share their motivational bits in their short Tweet updates. The article also brings about current effort of raising awareness and gaining a greater volunteer network for the upcoming Martin Luther Day holiday, for the Corporation for National Community Service. Most importantly, the end of the article brings about a great benefit of using the social networks to connect anyone in the world who wants to help, even if they are thousands of miles away. As seen, the hours spent online every week can be finally put to use for the greater good.
Madeline Brownstone

A survey of technology and government: Identity parade | The Economist - 0 views

  •  
    "THE internet, argues Kim Cameron, who works as "Identity Architect" at Microsoft, "was built without a way to know who and what you are connecting to". That is bad enough in the private sector, where the only thing at stake is money. For dealing with government, it is potentially catastrophic. Technology can-just about-tell how an internet user got online. It can check the authenticity of passwords and logins, and validate smart cards or biometric checks. But such data, even if encrypted, can be stolen, borrowed, guessed or intercepted."
Madeline Brownstone

A survey of technology and government: Making it happen | The Economist - 0 views

  •  
    "The public face of this is a single portal, dc.gov, which allows residents to do almost anything that in the past would have involved either picking up the phone (and hanging on and on) or going to an office and waiting. The site not only lets them find out about every imaginable aspect of the city, but also provides them with a means of acting on the information. This is not just a matter of printing out forms, but often of filling them in and submitting them online too. It is possible to renew a driving licence, pay a parking fine, report broken traffic lights, request a visit from the rubbish-collection service, get all manner of permits, see planning applications and pay local taxes. "
Madeline Brownstone

A survey of technology and government: The good, the bad and the inevitable | The Econo... - 0 views

  •  
    "A PRODIGIOUS amount of money has been spent worldwide on putting government services online, but the results so far have been hard to measure and often disappointing (see chart 2). Accenture, a consultancy that pioneered the business of selling technology services to government, has been publishing reports on the subject since 2000. The titles give a flavour of the industry's struggle to balance promise and performance. In 2001 it was "Rhetoric vs. Reality: Closing the Gap", followed by "Realising the Vision" in 2002 and "Engaging the Customer" in 2003. "
Madeline Brownstone

A survey of technology and government: The electronic bureaucrat | The Economist - 0 views

  •  
    "Putting their services online should allow governments to serve their citizens much more effectively. But despite heavy spending, progress has been patchy, says Edward Lucas "
1 - 20 of 66 Next › Last »
Showing 20 items per page