Skip to main content

Home/ ITGS News/ Group items tagged websites

Rss Feed Group items tagged

T Graham

Foto Tailor - 1 views

  •  
    The website fototailor.com shares several of the same needs as Carmen. The website successfully showcases the services of the company. The user interface is inviting, consistent, and easy to maneuver. The information about the business and its clients is organized and easy to follow along. The website does have page that lists the prices for specific services but it does encourage interaction with the client through the offering of an account where users can upload their pictures identify what they want done and send the request to fototailor. With this feature it is obvious that this site does indeed provide safe access to customers to view and upload their personal pictures. Visiting this site has given me new ideas about how the user interface of Carmen's website should be and how important it is to the attraction of customers. I also learned an interesting way of getting clients to interact more digitally with the company through the login/out account option.
Kristin O

Personalized Gifts, Baby Gifts, Birthday Gifts - Personal Creations - 1 views

  •  
    This site is similar to Carmens because it offeres similar services and products. It even offers a place for the customer to upload their own photos in order to personalize various items. While exploring this site I learned that it is very important to think about the design of the website. This website is easy to navigate well organized and esthetically really nice to look at and click around.
Madeline Brownstone

10 Websites To See What HTML5 Is All About - 1 views

  •  
    Shows what HTML 5 is all about.
Daniell S

Data Security Is No Longer an Option - 0 views

  •  
    This article starts off with the actions of a small travel site. This article speaks of the price they had to pay to upgrade the security. This company has to make big changes to their security in order to do business with larger companies. In this situation there are both positive and negative impacts. One big negative impact is the price to pay for this upgrade in security. In order to be on par with the security of higher level businesses smaller businesses have to pay large amounts of money to gain this security. This would require a lot of faith in the big businesses from the smaller business. As said in the article "The connection, and everything transmitted over it - financial, customer and product data - has to be secure and out of the reach of hackers, cyber thieves and even disgruntled employees." This shows how secure the website has to be. This is so that bigger companies can trust the smaller companies to handle business. However, through this impact can come a positive one. By having security equal to those of bigger businesses customers will have an easier time trusting the company. Another issue that comes up is reliability. A question that can be asked is whether or not the security is strong enough against hackers? This would give customers right to question whether or not this website would be trustworthy or not. In this situation the important stakeholders would be the bigger businesses and the smaller businesses. In order to do business both companies need to have the same level security. This would require one or both companies to upgrade their systems greatly to be on par with each other. Another important stakeholder would be the customer. The customer would need to know whether or not they could use the website without worrying too much about being hacked. If the customer knew the security was stable it would make them more comfortable about using it.
Santiago P.

Dani's House of Pizza Home - 0 views

  •  
    This website shares similarities with Carmen's business. Dani's House of Pizza is a small neighborhood business that wishes to optimize commerce by minimizing loss and maximizing profit. Just like Carmen wants to do, Dani's Pizzeria has established a website that is not that attractive to customers. It is trying to attract a wider customer base, but it needs to get organized. As it is now, the website gives the audience some basic information on the menu, the prices, the location, history, reviews, contact information, and special events. I believe it could use a database to keep track of business goods, stock, customer information, and to keep a useful inventory that would help maximize profit in the business. Even better would be for the business to begin to sell through e-commerce - or sell pizzas online by having customers order it online, just like Dominos currently does. This would definitely boost sales and increase revenue.
Mark Gakin

Portofinos - 1 views

  •  
    This website would be very similar to one Carmen would have because it is also a small business that is trying to grow. Carmen is trying to create a website that will attract many customers, but it is important for her to get organized. This seems to be a well organized website that appears to be attractive to customers. I have some first hand knowledge on this because i have been to Portofinos many times and it is usually packed. Clearly their advertisement has an impact on their business, and this is something Carmen needs to improve on. This site is very neat and includes a variety of information such as their menu, events, history and more. It pretty clear that e-commerce has had a big impact on business and will hold a greater importance in the near future. I learned that since Carmen wishes to optimize commerce by minimizing loss and maximizing profit, she should follow a good example, such as this one. If all goes well, she may be looking at a brighter future.
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
nicholas n

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...

Noreen C

Keeping Secrets WikiSafe - NYTimes.com - 0 views

  •  
    WikiLeaks has led to several problems related to privacy and security of government data. The legal debate weighs whether the posting of this data is against Constitutional laws, but many others in the Government fear the magnitude of this problem. Some people ask, what would the founding fathers have done....but the world of the internet is a whole other ball field. The latest on the WikiLeaks threats claim that Assange still has more documents which were uploaded onto the website. However, the files are encrypted. Many people have access to these files, but because they are in cipher text, they cannot be read. As soon as Assange, or anyone who has access to the information publishes the Public Key, the encrypted documents will be decoded, using the same software that Assange used to encrypt it. If these documents have material in them that could threaten national security, then the USFG will have a stronger case against Assange on the basis of a privacy breach. Because of the high security, and the reliability of the encryption software, these documents have little value at the moment. The Obama Administration is clearly keeping an eye on the situation, because they wish to protect the privacy of the documents, but also because they want to find a way to take down the documents before they create damage. However, there is an extreme level of difficulty in decrypting the data, which is protected by a mathematical algorithm specific to the software that Assange initially used. The intersection of the privacy of the Government and the reliable security that Assange used comes to show that the IT world is constantly expanding, beyond the prediction of one business, or even the Government. But these Assange and the USFG aren't the only ones involved. Many people around the world are trying to attain access to these documents, primarily in the US in order to understand national secrets that have been held back from the public. The internet as a form of media has transfo
  •  
    continued.....transformed the notion of what is private and what isn't, and clearly now more than ever privacy needs to be secured. Maybe the USFG should look into some high security protocols such as encryption, and their data files wouldn't be intercepted and posted on the internet.
Alex F

Opinion: Why the web benefits liberals more than conservatives - CNN.com - 0 views

shared by Alex F on 31 Dec 10 - No Cached
  •  
    In this article it gives information of how a "Liberal" would have a benefit if they are using facebook, which is a social networking website. The article states that if they were to write a speech then it would be posted to facebook, and it would spread out faster.
Madeline Brownstone

Mark Frydenberg - Teaching and Learning Technology - 0 views

  •  
    this is the author's website for the new book you will be using to prepare for the case study "Web 2.0 Concepts and Applications"
Madeline Brownstone

BBC News - Children social network in secret says Prof Byron - 2 views

  •  
    ""Parents are often in the dark, so who is talking to kids about what they do?" she told the BBC News website. "
Saida K

Google: Internet freedom is declining - 1 views

  •  
    The Government censorship has expanded outside of China.
  •  
    This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
  •  
    This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
Mariam B

How Obama tapped into Social Networks' Power - 0 views

  •  
    The benefit of social networking allowed a medium of communication, in order to spread and advertise the campaign of Obama. The widespread usage of facebook, myspace, and other popular social networking websites by users was used to promote Obama during the election. He was able to gain many supporters through advertising on these social networks. Rather then excessively spending money on campaigning, it allowed a easy medium of spreading knowledge. Often times a lot of money is spent on president campaigns, and the emergence of social networks as a tool in the campaign helped increase Obama's supporters-significantly increasing his votes.
Olivia M

Iran's Protests: Why Twitter Is the Medium of the Movement - TIME - 4 views

  •  
    In the most recent Iranian elections, the government censored many websites on the Internet in order to prevent news and other information from leaking the country/"classified governmental issues within the election". The Iranian people started using social networks (mainly Twitter) to spread the information of governmental oppression around both nationally and through out the world. After Twitter started blocking such sites, Iranians started using their cellphones as the method of sending out information on the injustices occurring during the election.
  •  
    This is a very interesting article. I find it interesting that Iran is afraid of the word of their government is getting out, so they block one of the most used wrbsites on the internet, I feel as though you could have argued the point that the tweets were not neccesarily the most reliable. As said in the article, "The vast body of information about current events in Iran that circulates on Twitter is chaotic, subjective and totally unverifiable. It's impossible to authenticate sources. It's also not clear who exactly is using Twitter within Iran, especially in English. Anecdotal evidence suggests that the bulk of tweets are coming from "hyphenated" Iranians not actually in the country who are getting the word out to Western observers, rather than from the protesters themselves, who favor other, less public media."
Madeline Brownstone

BBC NEWS | Business | Personal data exposed on website - 2 views

  • Last month, it was revealed that a laptop computer with details of 109,000 members of six pension schemes had been stolen from offices in Marlow in Buckinghamshire. The data, which was not encrypted, included names, addresses, dates of birth, employers' details, national insurance numbers, salary details and, in the case of those receiving their pensions, their bank details too. Last October, a laptop containing personal details of more than 100,000 members of the Network Rail and British Transport Police pension schemes was stolen from the accountancy firm Deloitte. And in November 2007, HM Revenue and Customs lost two computer discs that held the entire child benefit database, including the personal details of 25 million people, covering 7.25 million families. If a business regularly fails to safeguard sensitive information, it can be served with an enforcement notice by the Information Commissioner. Any breach of such a notice is a criminal offence.
Saida K

How to make sure your smartphone payments are secure - 0 views

  •  
    This news article specifies the considerations of using a cellphone to make secure payments. In order to make secure transactions using one's cellphone, a certain procedure must take place. Of course, the mobile phone must have access to the internet, and will go to any website of their choice in which they find something they want to buy, or to simply pay a bill. Also, this can be done using an "application" such as PayPal. PayPal is technically more secure considering that a consumer would only have to write they're credit card information in one place. But with so many people using it, it becomes easier for hackers to access this data, especially with vast quantities of money in the savings. Afterwards, no matter which way you started a transaction, encryptions are always used to transform the that so that only the consumer and business company can read the transaction with the decryption. One possible stakeholder is the consumer whom is indeed effected by making payments using their mobile devices. It's only been recently that they began trusting the internet using a computer, but using the internet via cellphone is a new change that must take time to adjust to. But they are effected since hackers can easily take their money. Plus a third party, can occur during the process of the transaction while the consumer is using another window, and might not notice that they're information is not only going to the business itself. These are all issues of security.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Ariel A

Skype security and privacy concerns - 1 views

  •  
    Skype is a software that enables online free instant messaging, video chatting and voice calling to anyone else that has Skype. Skype is a great resource for world conversations. The issue that Skype has are both security and privacy reasons. Skype is currently in the hands of ebay. Ebay is a well known site that allows people to buy items online and it some what reliable. The information that one would need to register in order to be a member of ebay and now Skype, one would need to place information stating, "Full name, User ID, Email address, Street address, State, City, ZIP code, Phone number, Country, Company, Password, Secondary phone number, Gender, Shipping information (including name, street address, city, state, ZIP), Bidding history on an item, Items for sale, Feedback left about the user, Bidding history, Prices paid for items, Feedback rating, Chat room and bulletin board posts" According to Ms.Brownstone in order for someone to find the identify of someone's personal information one would need the date of birth, and Zip code. What Ebay requires one to give out information is far more than what is necessary. One would question if they are really that reliable of a site. Skype claims that its reliable but we have to verification of evidence that it is indeed reliable. The security reasons behind Skype is that according to what i read, "Skype is an insistently closed program." This can affect the stakeholders which are the users of Skype to know if its a really secure website.
Michael M

Video of purported PlayStation Phone hits Web | The Digital Home - CNET News - 0 views

  •  
    There is supposedly a new telephone that supports the Sony game playing experience coming out, running under the Android OS, found under the website Cnet.com. The main stakeholders here are those who look forward to a gaming telephone, so basically it can run from kids to adults that look for a phone with all this phones capabilities. This development will change the life of gamers who can now take a system that can work as a psp and a phone at the same, and also an mp3 player, picture taker, and other big upgrades to the psp, play station portable. The biggest impact is the development of a new Android phone. This phone combines game play and a cell phone all in one, and the quality of game play is much higher than all phones that have come out so far, which begs questions to be asked, will the phone, which runs under Android, have problems with battery time? Will it be able to have such good game play and be able to function as a fully functional phone, without lag time? If this phone fully functions as a gaming system and a phone, then there will definitely be success to the Android Company, and Sony as well, these two companies will thrive from the money that they will make. Since the phone functions as a computer, its processor is required to be high, especially since it will be playing video games, and the RAM must also be high. The processor and RAM, or random access memory, both define the speed and capability of this cell phone/gaming system. It all comes down to the specs and the scrutiny of the stakeholders, those who will be using this cell phone
  •  
    I liked my own work XD
1 - 20 of 23 Next ›
Showing 20 items per page