Skip to main content

Home/ ITGSopedia/ Group items tagged activism

Rss Feed Group items tagged

Barbara Stefanics

School accused of spying on students at home | News.com.au - 0 views

  •  
    "A lawsuit filed against the Lower Merion School District in Philadelphia claims laptop computers issued to students by the school came with remotely-activated webcams which it used to monitor their activities at home."
Sandra Stark

The Habitable Planet - Interactive Labs - 1 views

  •  
    These 5 interactive lab activities span several units, but tie together their common concepts. You may explore functional simulations or do field activities that are tied to the content of related units. Please Note: Units 6, 8, and 11 do not have an Interactive lab.
Barbara Stefanics

RAND | News Release | Organized Crime Is Increasingly Active in Film Piracy; Three Case... - 1 views

  •  
    "Organized Crime Is Increasingly Active in Film Piracy; Three Cases Link Terrorists to Piracy Profits"
Sandra Stark

Creative Commons Aotearoa New Zealand | Copyright, Creative Commons & Mix & Mash: Lesso... - 0 views

  •  
    Great resource, lesson plan, game, interesting activity. 
Julie Lindsay

The science and technology of air traffic control - 0 views

  •  
    The typical image people have of air traffic control (ATC) is that of a group of people in an airport tower who coordinate aircraft activity by staring at radar screens that use points of light to represent aircraft. While not fundamentally incorrect, this isn't a fair representation of the extent of ATC operations. This article will flesh out that simplistic image and introduce you to the equipment, technologies, and procedures that go into keeping aircraft and air travelers safe in the air and on the ground. We'll look at the way air traffic control is organized, and explore the communication technologies that air traffic controllers use to keep in touch with air crew and ground personnel. We'll also look at the radar technologies used to keep track of aircraft, and we'll end with a brief look at some next-generation technologies.
Barbara Stefanics

The Legal Implications of Surveillance Cameras | District Administration Magazine - 0 views

  •  
    "The Legal Implications of Surveillance Cameras District administrators need to know the law and make these policies clear. By: Amy M. Steketee District Administration, February 2012 undefined The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education reported that more than half of all public schools used security cameras during the 2007-2008 school year to monitor students, a 30 percent increase over eight years prior. While security cameras can be useful in addressing and deterring violence and other misconduct, they also raise several legal issues that can leave school administrators in a quandary. Does the use of surveillance cameras to capture images violate a student or staff member's right of privacy? If the images captured on a surveillance recording are of a student violating school rules, may district administrators use the recording in a disciplinary proceeding? If so, are parents of the accused student entitled to review the footage? What about parents of other students whose images are captured on the recording? How should schools handle inquiries from media about surveillance footage? Can administrators use surveillance cameras to monitor staff? I outline the overriding legal principles, common traps for the unwary and practical considerations. Advertisement Legal Principles Fourth Amendment to the U.S. Constitution. The Fourth Amendment prohibits the government, including public schools, from conducting unreasonable searches or seizures. Courts have generally held, however, that what an individual knowingly exposes in plain view to the public will not trigger Fourth Amendment protection because no search has occurred. Someone who is videotaped in public has n
Barbara Stefanics

Facebook's photo app will not be available in Europe - BBC News - 0 views

  •  
    "Facebook's photo-sharing app Moments will not be made available in Europe due to concerns about its use of facial recognition, it has been revealed. The app, which allows users to share mobile-phone photos with friends without posting them publicly, was launched in the US this week. The Irish data regulator said that users must be given a choice about whether they want it, with an opt-in. There is currently no timetable for such a feature, said Facebook. Richard Allen, Facebook's head of policy in Europe said: "We don't have an opt-in mechanism so it is turned off until we develop one." Moments arranges the photos on someone's mobile phone into groups, based on when they were taken. The facial recognition technology can identify Facebook friends to whom users can then forward the photos. Combining data The social network is taking facial recognition very seriously and announced earlier this year that its DeepFace AI system was powerful enough to identify users with a 97.25% level of accuracy. But the social network's use of the technology has not gone down well with European and Canadian regulators. In 2010, Facebook rolled out facial recognition technology to identify people in photos but, two years later, it was forced to withdraw the technology from Europe, after Ireland's data protection commission highlighted privacy issues. At the time, the privacy commissioner of Canada said: "Of significant privacy concern is the fact that Facebook has the ability to combine facial biometric data with extensive information about users, including biographic data, location data, and associations with friends." The system, which is increasingly used by technology and other firms, is the subject of debate in the US too. Recent talks between privacy organisations and government agencies aimed at creating a code of conduct around facial recognition technology broke down after they failed to reach agreement. "At a base minimum, people should be able to walk down a publ
Madeleine Brookes

Tor: anonymity online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. (Note: sometimes ITGS students need to be able to access sites that are sometimes blocked)
Barbara Stefanics

RAND | Multimedia | Gregory F. Treverton | Film Piracy, Organized Crime, and Terrorism - 0 views

  •  
    "Gregory F. Treverton discusses how organized crime is increasingly involved in the piracy of feature films, with syndicates active along the entire supply chain from manufacture to street sales of pirated movies. His detailed investigation looks into the connections between intellectual-property piracy, organized crime, and terrorism, including case studies of criminal and terrorist groups and recommendations for reducing the demand for and supply of pirated goods."
Sandra Stark

Welcome to WhaleNet - Wheelock College, Boston, Massachusetts - 0 views

  •  
    Interactive educational site that offers activities, explanations, and links regarding satellite tracking of tagged whales. Lots of useful material
Barbara Stefanics

ALI- Apple Learning Interchange - 0 views

  •  
    Educator created lessons and activities. Rich with movies, images and podcasts. Special collections on a range of topics
Barbara Stefanics

fMRI Reads the Images in Your Brain - We Know What You're Looking At | Singularity Hub - 2 views

  •  
    "fMRI can track activity in your brain" and video
Sandra Stark

Science Friday Archives: Online Privacy - 0 views

  •  
    Facebook has dozens of toggles for privacy settings on its service, and a privacy policy longer than the US Constitution. And while many users of the service know that they're sharing information with their friends and associates, they may be surprised to find out just exactly what they're sharing, and with what groups of people. New programs that offer to tie social media integration into outside web sites offer an ever-more social experience, but they also expose even more of your online activities to social media service providers and advertisers. Is it getting too hard to keep hold of our privacy online?
Barbara Stefanics

BBC - GCSE Bitesize - ICT - 0 views

  •  
    GCSE Bitesize: examination topics presented with revision, activity and test
Sandra Stark

New Hacking Tools Pose Bigger Threats to Wi-Fi Users - NYTimes.com - 0 views

  •  
    You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents' basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.
Sandra Stark

'Digital Inspections' at U.S. Border Raise Constitutional Questions - NYTimes.com - 0 views

  •  
    concerns have developed about invasions of privacy, for the most complete records on the travelers may be the ones they are carrying: their laptop computers full of professional and personal e-mail messages, photographs, diaries, legal documents, tax returns, browsing histories and other windows into their lives far beyond anything that could be, or would be, stuffed into a suitcase for a trip abroad. Those revealing digital portraits can be immensely useful to inspectors, who now hunt for criminal activity and security threats by searching and copying people's hard drives, cellphones and other electronic devices, which are sometimes held for weeks of analysis
Stuart Gray

Textbook | Information Technology in a Global Society, for the IB Diploma - 6 views

  •  
    Information Technology in a Global Society is the first textbook written specifically for the new IB ITGS syllabus, covering IT systems, social impacts and ethical issues, and each area of application. The text provides engaging content that blends clear examples of technical concepts with consideration of social issues. Discussion points for extended independent learning and complete, modern examples are included to enhance teaching and understanding. Over 200 student exercises and 300 diagrams and photographs are included to clearly explain content and ensure students get the best possible experience from the ITGS course. Support material and additional activities are available on the book's web site.
samaraad

Twitter vows to 'protect' users - 0 views

  •  
    Ahead of their one-year anniversary of operating in the UK, Twitter has told the BBC it now wants to have a closer role with government and policymakers. The site has revealed that there are over 10 million active tweeters across the nation.
1 - 20 of 28 Next ›
Showing 20 items per page