Skip to main content

Home/ Globaltech/ Group items tagged knows

Rss Feed Group items tagged

anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

Good to Know - Google - 10 views

  •  
    Presentations M13 starting feb 9
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Book Review - The Net Delusion - By Evgeny Morozov - NYTimes.com - 3 views

  • the ­asocial pursuit of profit is what drives social media
  • more capricious technology” than radio or television
  • capricious technology” than radio or television. Neither radio nor TV has “keyword-based filtering,” which allows regimes to use URLs and text to identify and suppress dangerous Web sites, or, like marketers, to collect information on the people who visit them
  • ...5 more annotations...
  • “Technology changes all the time,” he writes, “human nature hardly ever.”
  • Mass journalism and democracy are inextricably entwined
  • The Net Delusion
  • Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters
  • For more on “The Net Delusion,”
  •  
    Feb 22 Does the Net allow more freedom or does is it a tool for governments and business to control us? Jenny
  •  
    1.7_surveillance 2.6_pol_gov 3.4_internet
  •  
    Does the Net allow more freedom or is it a tool for governments and businesses to control us? The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement. Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
anonymous

Apple iPad 2 vs. Motorola Xoom - 2 views

  •  
    Who's the winner in your opinion and why? be sure to read page 2 march 3 cream
  •  
    In my opinion it would be Ipad, but that's only if you're too intense about the aesthetics of Apple's iPad. I am sure that many people are obsessed with the look and how famous Apple products are. Even though Motorola Xoom seems to be better. i know how good Motorola Xoom is base on the rear end camera and the wider screen. But, new Ipad is out now! There is camera too which much better design. I believe that new Ipod would get develop much more.
anonymous

Nokia at the crossroads: Blazing platforms | The Economist - 1 views

  •  
    Explain: As microprocessors become more powerful, mobile phones are changing into hand-held computers. As a result, most of their value is now in software and data services. This is where America, in particular Silicon Valley, is hard to beat. Companies like Apple and Google know how to build overarching technology platforms. And the Valley boasts an unparalleled ecosystem of entrepreneurs, venture capitalists and software developers who regularly spawn innovative services. march 29 cream
  •  
    It is all about microprocessor and how powerful it is. According to this article, it concerns with Nokia mobile phones as the company develop so much on hardware, which lack in software nowadays. In the other hand, Apple provides a really good with software, because they are mostly useful and impressive. So, now it is quite hard for Nokia to fight against this advance of Apple.
anonymous

http://www.eweek.com/c/a/Security/Senate-Do-Not-Track-Bill-Aims-to-Add-Teeth-to-Web-Pri... - 3 views

  •  
    Why is the US introducing a bill to limit tracking? Explain problems with implementing a no-tracking law. may 17 jen
  •  
    Why is the US introducing a bill to limit tracking? The US is introducing a bill to limit tracking because practically every website you visit keep track of at least some activity for some conventional purposes, while some aren't (such as preventing you to vote twice in a poll). With this bill, the users will be able to have the Do Not Track option while visiting the website. Explain problem with implementing a no-tracking law. The problem with implementing a no-tracking law is that once the law is passed, users will still have a hard time of knowing whether or not a site is tracking them. Not all sites will honor the no-tracking law, and because they don't honor it, they probably won't tell their users' that they're still being tracked, along with what information is being gathered for what purpose.
Natsuno Yoshida

IBM supercomputer wins first Jeopardy dust up - Computerworld - 1 views

  •  
    Explain how Watson can mimic human intelligence. Watson mimics human intelligence by going through the same process humans do in order to find an answer. Watsons can comprehend clues and pieces of information, analyze the information that is given, and come up with an answer to the problem. Explain the ways that computers can rival a human in answering questions. Computers are systematic machines. Humans, can also be, but in a less precise manner. Thus, computers that are given the same amount of information, and have access to a lot of background knowledge can possibly rival humans in answering questions because of the systems' advantage of sorting out pieces of information and analyzing it digitally. Humans depends on their brains, and not knowing whether they really do, or how much they analyze the data correctly or not. A computer's digital system can come up with a number of possibilities precisely and thus calculate the best conclusion to the question. Explain the ways AI can impact personal lives. With the help of AI, human needed jobs such as diagnosing problems and illness, self-service centers, and information center tasks can be given to the AIs. Also, this can enhance humans personal lives by offering the humans an extra helping hand, that isn't as emotional as humans, and can be just as effective as well as useful, albeit the cost will be very high. Why was Jeopardy a good challenge? Jeopardy is a good challenge because of the structure of the Jeopardy game itself. The game itself only provides sly clues, riddles mixed with sarcasm and irony. Humans can detect such facts in the clues, but for a machine, as well as the system to be able to recognize these clues as well as reading in between the words to understand the meaning for an answer is a challenge. The system would have to be taught the same way humans are taught to notice such abnormalities of the hints. This is harder to teach an AI since it doesn't follow the same path of instruction
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

How to Keep Your Computer Secure Video - 5min.com - 9 views

  •  
    M13 List and describe the guidelines for PC security. M12 Describe additional guidelines that should be considered for PC security. August 31 Chut Jenny
  •  
    Additional Guidelines: Password locking/encrypting important, sensitive information containing files and folders. Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
  •  
    Types of Securities. Firewall is a program that protects against intrusions and it helps ensure privacy. Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions. Anti-whatever else, malware, adware, spyware, Trojans etc. Why do you need it? People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it. When do I need to use security programs? It depends on the activities that you do on your computer. How can I get viruses? There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses. Where can I get the right programs for my computer? download.com sourceforge.net majorgeeks.com Computer forums
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Yes, your iPhone is tracking you -- the question's why - Computerworld - 3 views

  •  
    Why are iphones tracking people? april 28' cream
  •  
    Why are iphones tracking people? This is the issue of storing user's location data in unencrypted file. The file, named "consolidated.db," is an unencrypted SQLite database that can be found in the devices' file systems and in the iOS backup files created and updated by iTunes every time an iPhone or 3G iPad is synced. Since, we know that Apple is actually collecting location and some information on iphone that's why iphone is not safe at all. Although the file isn't immediately accessible on the device itself, it can be accessed on a jailbroken device via the iTunes-generated backup file. It also could potentially be accessed using other tools that allow you to explore an iOS device's file system while it's attached to a computer.
anonymous

Apple named 'least green' tech company | Environment | guardian.co.uk - 0 views

  •  
    Why does apple rank low for being green? Which companies are fairly green? Why don't companies want to disclose their energy consumption? Is cloud computing green? Determine if use of IT often reduces environmental impacts or not. april 28 nat
  •  
    Why does apple rank low for being green? Because of their huge electricity consumption and the increase in their consumption in a new facility, which consumes approximately the same amount of electricity 80,000 US homes. Which companies are fairly green? Yahoo, Google and Amazon. Why don't companies want to disclose their energy consumption? They don't want others to know what they did or what they had to do to reach to the position they are in now. Is cloud computing green? No, it's not green as it already accounts for approximately 2& of the world's electricity consumption, and it is predicted that it will rise. Determine if use of IT often reduces environmental impacts or not. Yes it does, because if something was electronically saved, it can save paper. Moreover, It has been said that there are less carbon emissions produced when music is downloaded of the web, rather than bought in CD stores, because you don't need to use CDs.
anonymous

http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/ - 2 views

  •  
    Why were the customers spooked? Why is this a problem? Describe consolidated.db. Check this link: tracking and recording your location data. How is apple collecting geodata? Why is apple collecting geodata? Explain the problems with collecting geodata. Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads? april 26 cream
  •  
    How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. Just turn off your iphone right away!
  •  
    Cream: Wrong Comment for this article. Comment again with the right answers. incomplete
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
anonymous

Identity Theft Resource Center ITRC Fact Sheet 102 - 0 views

  •  
    Select and list 5 guidelines you think are reasonable. May 9 az
  •  
    * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms. * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers. * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis. * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose. * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.
anonymous

BBC News - BT given 14 days to block access to Newzbin - 9 views

  •  
    brief all oct 31 cream
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and Leisure 2. Identify the main stakeholders to the IT system. UK Telco BT, NewBinz2 pirate link sharing website and users, MPA (Motion picture association) 3. Identify one ITGS social/ethical concern in the article. Intellectual property 4. Describe ITGS terminology and systems. ISP - Internet Service Provider, is a company that collects monthly or yearly fee in exchange for providing the subscriber with Internet Access. The Terms of Service contract of the ISP will also state rules about hacking, protecting copyrighted materials, denial of service attacks, harassing other people, spam compromising the service, and many other issues. These are as much for the legal protection of the ISP as to let potential subscribers know what the ISP will and will not tolerate. 5. If possible, describe a solution to the concern (issue). NewBinz pirate link sharing website is essential site for various users who wish to download illegally copied materials. However, this action concerns as infringe laws and copyright among policies. Thus, This is why NewBinz would be permanently block by ISP. However, the fact is that online users are very active so the creative industries should maintain about this not just blocking the sites.
‹ Previous 21 - 40 of 41 Next ›
Showing 20 items per page