Skip to main content

Home/ Globaltech/ Group items tagged 2.5_social_networking

Rss Feed Group items tagged

anonymous

Bangkok Post : It's a small world - 4 views

  •  
    brief analysis march 3 Jen
  • ...1 more comment...
  •  
    business and leisure
  •  
    1.11_people_machines 2.5_social_networking 3.4_internet 3.5_per_public_com
  •  
    1. Identify the area of impact the scenario relates to. Business, Leisure 2. Identify the main stakeholders to the IT system. IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies. 3. Identify one ITGS social/ethical concern in the article. The digital Divide and the Equality of Access / Globalization and Cultural Diversity 4. Describe ITGS terminology and systems. The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook. Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision. Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone. 5. If possible, describe a solution to the concern (issue). Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

Music Lessons on Webcams Grow in Popularity - NYTimes.com - 7 views

  •  
    Describe the technology. Explain the advantages and disadvantages. all jan 17 Tik
  •  
    - this technology is that the normal video communicate that by the internet to connect to each other. For example, Skype, or Facetime etc. Advantages and disadvantages. - The advantage is that when children want to learn some music but parents don't have time to drive them to the music school, they could have lessons at home which is easy to do. - The disadvantage is that we need many thing to learn via computer, for example, webcam or video camera, good quality speaker, good quality microphone etc.
anonymous

Twitter tired? Fatigued with Facebook? Try a new network - 11 views

  •  
    Would you try a new network? all feb 10 nat
  •  
    Personally I wouldn't try new networks, unless I have friends there. A lot of my friends are focused on Facebook, and I don't mind sharing my content with people I am friends with, as I usually decline requests from strangers, and are friends with people who I actually know or have mutual friends. However, I wouldn't mind giving Pinterest a go, as I think it sounds interesting, and also it sounds like Tumblr, which I like a lot, because we can share images with people with the same interest.
anonymous

Twitter Is a Critical Tool in Republican Campaigns - NYTimes.com - 2 views

  •  
    How is Twitter used? How effective is it? m12 feb 2 alec
anonymous

Bangkok Post : Staying secure - 9 views

  •  
    Presentation: Explain the issue of mobile security. Provide a detailed explanation of how to provide mobile security. nov 14 champ az
  •  
    Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections. Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online. How to provide mobile security? Use anti-virus software You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen. Works Cited http://www.cellphonebeat.com/10-security-software-smart-phone.html http://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.html http://expertitgurus.blogspot.com/2011_05_01_archive.html
anonymous

BBC - Newsbeat - Not enough done to tackle cyberbullying, warns NSPCC - 6 views

  •  
    Give examples of cyberbullying. Describe possible solutions. all feb 13 jang
  •  
    Cyber bullying happens through the use if IT devices, especially through social networks. It has psychological effects on the person being bullied. An eighteen-year old boy Carney Bonner can be an example of cyber bullying. Carney was cyber bullied when he was 14 years old. He received constant text messages saying 'go kill yourself' or 'you're nothing.' This kind of messages made Carney anxious restricting him from social life. A possible solution to cyber bullying is parents educating their child about being safe online. Also, the person who is being bullied can consult to someone he can trust. Keeping it to yourself is very bad.
anonymous

BBC News - Why going online on smartphones can be costly - 15 views

  •  
    Why might smart phones be costly? Explain two possible solutions. all Nov 23 Tik
  •  
    Smart phones could be costly because it's download, upload and connect to the network almost all the time. People that use smart phones and don't have good deals or promotions,and people use data more than they think, so the phone company can cost the data that we download, upload with the network, and smart phones can do many thing that use a lot of data and it will cost a lot of money, for example sending 10 photos it's take 10MBand watch video on youtube it will take 15MB per video, etc. In this case the solutions are that users should make sure that they get the right deal or promotion, that they won't get a big bill in the end of the month. Secondly, there are people that use unlimit promotion, but every deal have a gap, so the phone company should tell their customers, or send the users a messages to warning them that they used data more than the deal they got.
anonymous

France24 - New funding for Viewdle, which lets smartphones 'see' - 1 views

  •  
    brief dec 2 kuninari
  • ...1 more comment...
  •  
    1.11 2.5 home and leisure / 2.5_digital_entertainment 2.5_social_networking 3.1,3.2,3.3,3.4,3.5
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is people and security on the machine. 2. Identify the main stakeholders to the IT system. The main stakeholder is security 3. Describe one ITGS social/ethical concern in the article. The concern is about the people and machines were there are problem with the recognitions on people 4. Describe ITGS terminology and systems. public transfer information systems is the information that will justify the people who is using on account to find whether people is using account on their own or using other person's account. 5. If possible, describe a solution to the concern (issue). It might need some more technology to fix the problem on recognitions that people can be use on other account or people can't use it even they are on their own account. They should be able to find the difference on fake also, like people using photo on other person to log in to their account.
  •  
    Kuni, you're suppose to upload your answers IN class. Just remember that for next time.
anonymous

On Computers » SOLAR NETWORKS - 6 views

  •  
    Describe the IT system. What problem does it solve? dec 7 Alec
  •  
    1.13 home and leisure 2.5 _IT_managed_home_networks 2.5_digital_entertainment 2.5_social_networking 3.3 3.4
  •  
    The IT system in this is wireless repeaters they simply repeat the wireless signal that the router sends out so that a larger area can be covered by a single signal. It solves the problem of having to spend money for more routers and also having to constantly change your signal when you move around a large area like a park because you would lose one signal while gaining another. =D
anonymous

Facebook tightens grip on user ID data - The Economic Times - 5 views

  •  
    summary march 29 nat
  •  
    Summarise: Facebook is one of the biggest social network that is used by millions of users worldwide, but recently it has been getting complaints about its security and privacy. Therefore, Facebook is clarifying their policy on User Identification Data, because third party companies are not allowed to share the UIDs it collects to ad networks. Facebook modified its policy to forbid UIDs from leaving third-party applications and for such information to remain confidential. Ad networks had to sign a policy deal to make sure that they delete any information they obtain. Any who break this policy get placed on moratoriums, and will be observed, so that they don't do it again. Not only were the small developers effected, but also big companies such as Zynga were also caught transmitting some information.
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

Egypt, Internet access: Egyptian government restores Internet service - latimes.com - 6 views

  • bring down Egyptian government websites
  • Welcome back to the Internet, #Egypt. Well, except http://www.moiegypt.gov.eg — you stay down,"
  •  
    Wooh How might the internet be useful for the Egyptian citizens? What does it mean "bring down Egyptian websites"? Feb 4
  •  
    1. How might the internet be useful for the Egyptian citizens? Egyptian citizens, especially for the protesters, have organized the initial protests against the government online, through social media such as Facebook groups. The restored Internet would allow them to use to do so again and other citizens are now back to their computers and can have regular socialization online. A main ways of communication with the outside world as well as with themselves, Internet would allow the citizens to join together through websites on the internet to create groups that support what they think is best for them. In this case, they want a reelection from their current leader. 2. What does it mean "bring down Egyptian websites"? "Bring down Egyptian websites" means to stop access to those Egyptian websites through means such as having a DoS attack on the website. Also hackers can hack into the website and destroy the coding and content of the website and thus "bring down" the websites. Bringing down Egyptian websites can also mean that they are blocking all access to Egypt because there wouldn't be any portal into Egypt if all the Egyptian websites are brought down.
anonymous

Blogs Wane as the Young Drift to Sites Like Twitter - NYTimes.com - 7 views

  •  
    Go to each link in the article and describe it. march 3 Nat
  •  
    Facebook : It is the world's largest social network site, which was founded in 2004 by Mark Zuckerberg. It has become a very developed source on the internet, where users can like, share, comment on something without leaving the web page that they were at. There are approximately 500 million users worldwide. Twitter : Twitter is a social networking site that was started up by a group of 10 people called Obvious, and it has become popular for its simplicity of "micro-blogging" where a twitterer or tweeter sends short messages called tweets, within 140 characters, and are shared with people that follow you, and to the public. Pew Research Center- It is a research center for the people and the press, and it is an independent, non-partisan public opinion research organization that studies attitudes toward politics, the press and public policy issues. Huffington post : Huffington post is a news website that began in 2005, and it has become the most heavily visited news web sites in the country. BlogHer : is a group blog, online community, and refers to an annual blogging conference for woman.  Lisa Stone, Elisa Camahort Page and Jory Des Jardins founded BlogHer in 2005 in response to the question, "Where are all the women bloggers?" Tumblr : Tumblr was founded in 2007 by David Krap, and it is a social networking site that allows user to post text, images, videos ,links, quotes and audio, which can be reblogged by other users who follow your blog. Google : Google was founded in 1998, and is known as the world's most popular internet search engine. Google hosts and develops a number of internet-based services and products,and generates profit primarily from advertising through its AdWords program, which has helped them earn huge profits for their company. LiveJournal : LiveJournal is a virtual community where Internet users can keep a blog, journal or a diary. LiveJournal is also the name of the free and open source server software that was desig
anonymous

Bangkok Post : Leveraging social networks for sales - 4 views

  •  
    What does it mean to leverage social networks? Define digimarketing. Explain the mistakes marketers make with social networking. march 17 nat
  •  
    What does it mean to leverage social networks? To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. Define digimarketing. Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. Explain the mistakes marketers make with social networking. Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
anonymous

Congressmen, Facebook go back and forth over personal data sharing - 3 views

  •  
    brief analysis march 7 kuni
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is that personal information about people using a site such as Facebook is being made available to businesses. Even with the safeguards and agreements put in place to stop spammers there have already been cases of misuse of information. This is particularly worrying if personal information about children and young people is being made available. 2. Identify the main stakeholders to the IT system. The main stakeholders are the person who uses the Facebook, and they are having the businesses by the games and the system on making money from them. They use the work on creating the privacy issues 3. Describe one ITGS social/ethical concern in the article. The ITGS social/ethical concern is that there are problem on the information that can be shared on the third parties, which will have problem on the privacy issues where you could get stolen your information. 4. Describe ITGS terminology and systems. App- Protocols seen by user programs, such as email and the web API- is an interface implemented by a software program to enable interaction with other software, similar to the way a user interface facilitates interaction between humans and computers. ... 5. If possible, describe a solution to the concern (issue). Facebook have strict policy on collection regarding the companies collecting information from users as well as a harsher punishment instead of just a 6 month suspension. The change of policies should be notified to every users and the team should ask for the agreement of general users.
anonymous

Facebook Questions defers to the crowd - CSMonitor.com - 0 views

  •  
    Would you find this app useful? march 31
anonymous

Moods on Twitter Follow Biological Rhythms, Study Finds - NYTimes.com - 3 views

  • The new analysis suggests that our moods are driven in part by a shared underlying biological rhythm that transcends culture and environment.
  •  
    Who is reading our tweets? Interesting info. m12 october 10 jenny
  •  
    Who is reading our tweets? Sociologists at Cornell University, as well as research teams around the world are ready our tweets to see the change in biological patterns in the days of the week, as well as the hours of the day.
1 - 20 of 24 Next ›
Showing 20 items per page