Skip to main content

Home/ StJulians_ITGS/ Group items tagged People

Rss Feed Group items tagged

Isy :)

'Anonymous' targets German far-right with Nazi-leaks.net - 7 views

  •  
    The social and ethical issues that relate to this article are that privacy and security and reliablility to a certain extent. What the Anonymous group are doing is basically taking people's personal information such as name, age, adress etc. and putting online for everyone to see, simply becuase they favoured nazi views. This is essentially the invasion of people's privacy as people's information is free for everyone to see. IT is also a security issue as people who feel very strongly against people who favour nazi views, have access to these peoples' adresses and could impose a danger. Reliability is also an issue, as it's mentioned in the article that none of the people that were mentioned in the website were actually confirmed to share Nazi ideals, meaing they are unjustly putting people in danger.
  • ...1 more comment...
  •  
    One of the problems here is the authenticity of data being released. ""This is a lot of data, but there are already some names where it's clear the people are not right-wing extremists." Some people identified in the data had merely been contacted by right-wing publications seeking interviews, she added." Some of the people on the list are not Nazis. What could be a solution to this?
  •  
    The article does raise some rather interesting social and ethical concerns. The main thing here is of course "Anonymous" breaking the Data Protection Act 1998 with their unlawful obtaining of personal information. While one can admire "Anonymous" fight against neo-nazism, the results they are producing are in fact not reliable. Though, as we've seen in the past, "Anonymous" are skilled proper encryption and security should have been able to fend them off and safeguard all information. Looking back, this would have the ideal to avoid the situation the websites are in now. I cannot see a plausible way of undoing this, and again give privacy to those who had it broken, as the information has been linked to multiple other sites - so perhaps this is only to serve as a lesson for others websites containing personal information.
  •  
    Well, to be honest the best solution would just to not post any private information online but seeing as that option wouldn't be considered by the 'anonymous' hacker group they could at least find a way and make sure that the only personal information posted online its authentic and from the main followers and contributors to this Nazi supporting website… but I don't really know how they would be able to do this, sooo if anyone knows please share because now I'm curious aha As much as I don't agree with the Nazi ideals and as much as I believe that supporting them is (sorry for being improper here) idiotic. I still don't agree with posting this private information online because as mentioned above, this does pose a major danger to the people whose information has been posted online by the people who have very strong feelings against these Nazi supporters.
Fiche Galinha

BBC News - O2 apology for disclosing mobile phone numbers online - 3 views

  •  
    25 January 2012 Last updated at 12:23 ET O2 has apologised for a technical problem which caused users' phone numbers to be disclosed when using its mobile data. The company said it normally only passed numbers to "trusted partners". A problem during routine maintenance meant that from 10 January numbers could have been seen by other websites.
  • ...5 more comments...
  •  
    Well, the main problem in this story is the privacy of the O2 users in my opinion. The issue is the fact that they've let(intentional or not) websites gain the user's phone number. Even though they "investigated, identified and fixed it this afternoon" - it is still rather disconcerting that it happened. It might have a been an isolated problem, but that does not change the fact that their personal information was shared without their consent. But I may be overreacting, as of now there is no knowing how many will be affected. However, one would expect that there some are legal obligations in terms of notifing the offended costumer and the authorities - this does not seem to be the case in a lot of EU countries. Including the UK as far as I can tell. Last year there was talk of creating data breach notification laws in the EU - but from what I gather has not passed yet.
  •  
    This article writes about the EU data protection act - I guess I was right, there are no laws universal EU law at the moment. http://www.pcworld.com/businesscenter/article/248566/eus_data_protection_proposals_likely_to_include_24hour_breach_notification.html It says that the EU should have made an announcement today about it.
  •  
    http://www.bbc.co.uk/news/magazine-15730499 How much privacy can smartphone owners expect?
  •  
    How much privacy can anyone except these days? It is no only owners of smartphones. Our generation is literally throwing away our privacy. Smartphones, facebook - it seems to be that most mainstream technology items lessen our privacy nowadays. http://www.theatlantic.com/technology/archive/2012/01/use-google-time-to-get-real-about-protecting-your-digital-self/251981/#.TyBIy3wo_AA "Google's decided to integrate the data it has about you, which means you better think about the digital tracks you're leaving. "
  •  
    I agree with Morten and Isy. Privacy is decreasing by the second. Technology is increasing rapidly and many people like these new technologies, such as using smartphones, social networks etc. Yet, are they aware of all these drawbacks? Privacy is lacking, and many people believe that we don't even have privacy anymore since data can be accessed much easily now that technology has evolved. Here's a video about how a smartphone can cause privacy issues. http://www.youtube.com/watch?v=N2vARzvWxwY&feature=fvst With one click on a person's picture, people may obtain their location, where they live and other personal information. This is a cause of technology rising so much in the past years, which has lead to all these privacy issues. People should start to be more aware of this situation, that by only a picture on the internet people can obtain personal information that can lead to severe issues. One of the solutions for this issue could be to turn off the location service on their smartphone in order to not be able to be tracked where hackers can see the exact place where a person is.
  •  
    As mentioned above the the issue concerned about in this article is privacy as peoples information (mobile phone numbers) are displayed on websites without their consent. Obviously the fact of having others know personal information may leave people concerned, however they must be aware that their personal information is spread all over the internet. From pictures on facebook to a gmail/youtube accounts peoples names, adresses and surnames are most likely known by some companies. Google and Facebook holds personal information that belongs to each one of us. What companies like such do to profit from this is sell a list of names, adresses and emails to third party which will then have means of communication with us to advertise their products and this is responsible for some of the spam we receive. The solution for this specific scenario of mobile phones isn't very clear, although it has been fixed no way of how it could of been prevented was suggested. Perhaps a the server could be shut down while it was under maintenance and another one should've been running in the meanwhile. Clearly the issue here had nothing to do with the mobile phone users and there was nothing they could have done as they were unnaware of the situation. I personally believe that privacy does not exist on the internet. It someone wishes to have privacy then the safest way to go do so is to not use/be connected to the internet. http://www.dailyfinance.com/2011/09/30/when-it-comes-to-cell-phone-privacy-youre-an-open-book/ Shows how mobile phones can cause privacy issues and how police officers now have gadgets that allows then to see everything that a person has done in their mobile phone, this clearly violates peoples privacy.
  •  
    I would just like to mention that I posted this, not fiche galinha -.- diigo is trolling me.
Fiche Galinha

SOPA: Google, Facebook and Twitter May Go Offline in Protest | Techland | TIME.com - 3 views

  • SOPA: What if Google, Facebook and Twitter Went Offline in Protest?
  •  
    If the proposed blackout were to occur, a greater awareness and understanding could be achieved. This would likely garner more support against SOPA, as websites like Facebook, Google and Twitter are used by millions of people worldwide, most of these people being casual internet users who have no idea what SOPA really is, meaning some would attempt to educate themselves on the subject and try to do something about it. The potential increase in support could lead to more people demanding big companies to 'drop' their support by threatning to boycott said comapnies products/services. As mentioned in an article bookmarked by Tranny Franny (http://www.slashgear.com/sony-and-nintendo-drop-sopa-support-amid-anonymous-threats-03205579), Sony and Nintendo appear to have dropped their suppor after being threatned by Anonymous. Although what Anonymous threatned to do was wrong, it certainly go the point across to both companies meaning a boycott from customers worldwide could change other companies minds on whether or not to support SOPA
  •  
    Although that seems like a good way to reach a wider audience in order for them to understand the severity of how SOPA would affect the internet, it could be seen as quite unethical. These casual internet users could only use websites such as Facebook to get an quick update, so these could be people who would be indifferent after knowing the affect of SOPA. Why should these people be prevented to access a website they use simply because the website feels the need to make a statement. And in terms of big companies dropping their support, is it really correct for them to drop their support? why did they support it in the first place? If they believe that this act should be made official is it correct for them to "drop" their support simply because too many people are going against it? So they would be "changing sides" out of fear, rather than due to their opinion, which in a way goes agaisnt the point of voting or supporting somethis such as SOPA
Mr Brooke

Face recognition: In the future, can you remain anonymous? - Jan. 13, 2012 - 3 views

    • Mr Brooke
       
      I love the fact that the opt in can be as simple as "walking into a store"
  •  
    The social and ethical issues presented by this article is on privacy and anonymity.
  • ...2 more comments...
  •  
    Describe, step by step, how the IT system works. An example of a face recognition and detection technology is the iPhone app that can snap a photo of a person and within seconds display their name, date of birth and social security number. 1. A good quality, well-lit photograph of the person is taken. 2. The image is sent to a server where a database of images is located. 3. The images in the database are downloaded from publicly available sources (any database containing faces and names), such as facebook, twitter or LinkedIn profiles. 4. According to the information available in that profile, such as date and location of higher education stydy, other data can be inferred (date and state of birth). 5. This data is inserted into an algorithm developed to predict the social security number. All of this still within the database. 6. The biometric features of the iPhone photograph is compared to those of the image in the database 7. If they match, the information about that person is returned from the server to the iPhone: name, date of birth, state, social security nr. What are the flaws within this system? Explain the relationship between the IT system (facial recognition iPhone app) and the social/ethical (privacy and anonymity) "The technology to analyse faces in improving so quickly that unpredictable (...) inferrences from that information have become possible." - Alessandro Acquisti, professor of IT and public policy at Carnegie Mellon University's Heinz College The app is a proof-of-concept of how our privacy can be easily breached on a widespread basis (as one walks into a store or protests in a convention)
  •  
    This article raises the issue of privacy and anonymity. This article shows how there is a possibility that in the near future, as long as the technology continues to develop at this rate, all of our personal data will be stored on a database along with an image of our faces. The fact that a person can be recognized at any moment anywhere means that people will start to be monitored and everything they do will be recorded. This completely strips people from their privacy, much like the Big Brother situation that is described in George Orwell's "1984". This technology can, however, bring certain advantages as through the constant monitoring of people, people involved in criminal acts will be identified with much more ease and therefore crime levels are sure to decrease. However, this can also raise an issue of reliability, as although it is a very small percentage of it happening, there can be the case where the camera misidentifies someone, and in a case of crime, that could lead to an innocent person being conviected for a crime they did not commit. And although at the end of the article "Wear a mask," is said by John Verdi, senior counsel of the Electronic Privacy Information Center as a joke, if the tecnhology continues to develop, we might find ourselves in the ridiculous situation where the only way to ever remain anonymous is to in fact wear a mask.
  •  
    We could all just replace our eyes. http://www.youtube.com/watch?v=kx9IEP8pmiI&feature=related In the above clip we see an example of what might happen if facial recognition ever reaches the level portrayed in Minority Report. As the protagonist walks into the store, an AI asks him how he felt about his last purchase at the shop, information obtained by scanning the protagonist's eyes and searching for what he has bought. This brings up the issue of privacy, as has correctly been mentioned above, as third-party companies will be able to access databases with data concerning what people purchase, how much they spend and where they are.
Fiche Galinha

BBC News - Google admits profiting from illegal Olympic ticket ads - 6 views

  •  
    This article has made clear that the AdWords advertising system is flawed, it is unacceptable for a large company like Google to lead users to believe that a website can be trusted using the 'sponsored links' and continues to make profit. This goes against the 6th point in Google's philosophy "You can make money without doing evil" although they are not doing it consciously. From the article I understood that the system is run using an automated filter to identify websites which break Google's policy and a manual assessment also takes place by a human. Instead of using just one human, a group of humans can assess the adverts to ensure nothing is missed. Furthermore, an update of Google's databases should regularly take place in order to catch illegal websites quicker.
  • ...3 more comments...
  •  
    Here is a list of all Google's philosophy, http://www.google.com/about/corporate/company/tenthings.html
  •  
    Good story this and nice link to Google's philosophy Jorge. This article is a good one for commenting on the relationship between the stakeholder and the IT system. Anyone want to step up and "Describe the relationship of one primary stakeholder to the IT system"?
  •  
    This article raises a huge reliability issue as people are being tricked to buying tickets from fake websites, which are advertised by Google. Due to its increasing reputation over the years, the average internet user will use and think of Google as the most reliable website to navigate, and therefore would trust most of the llinks that would appear when they search for something. The secure and reliable reputation Google has is what makes the fact that these illegal websites being sponsored ads such a large issue. It affects many web users and as they are likely to visit these websites, their personal information such as bank account details and personal details are made public. So security could also be seen as an issue as these people are put at risk as they have given their bank account data to fake websites, who could use the data gain access to bank accounts and steal money.
  •  
    Google's corrupt sponsored links affects nearly every digital citizen, as Google is by far the most popular and used search engine. There is alternatives to Google, but nevertheless Google is the most popular search engine(we're talking 70+% http://www.seoconsultants.com/search-engines/ ) I agree with Jorge's main ideas above. However, I do not think that increasing the number of people checking would make any large difference. It is their filters which needs an update - something I'm sure they're already doing. It does raise some reliability concerns, being the most popular search engine, you'd expect them not to endorse(even unknowingly) corrupt links.
  •  
    The social and ethical issues related to this news story are reliability, privacy and anonimity to an extent. Privacy as the information from the buyers credit card is given to what seems to be an unknown person or company. The multiple stakeholders seen would be the buyer, Google and the advertiser. Although it is via Google that the advertiser gets sell his product, it is important to understand that there are most likely thousands of advertisements added daily to the Google search engine and, referring back to Jorge's point, it would be very likely that humans would fail to see such mistakes as well after repeatedly going through hundreds of adds everyday. The trust and reliance that people have on Google can be misleading and it is evident that to solve such an issue people must be awared of the several scams that they are exposed to every single day in order to prevent this sort of problems.
El Mexicano Pastiche

Google offers secure searching to protect from nosy bosses and ISPs - 4 views

  •  
    Google has enabled encrypted searching using SSL (Secure Sockets Layer) which it says will prevent "employers and internet service providers" from reading what is sent. The possibility that employers and ISPs might be watching peoples' search traffic clearly concerns Google, and it has often concerned employees.
  • ...3 more comments...
  •  
    Might want to rethink those tags Sr Pastiche. Any suggestions anyone?
  •  
    I knew it was privacy and anonymity, I was testing you sir.
  •  
    Did I pass?
  •  
    Essentially what Google is trying to do is to offer people a way of securely navigating their website, using SSL, so that people don't have to worry about being monitored. People can see if they are using the secure version of the google search engine if the web adress cointains "https" rather than just "http". SSL works as follows: 1- The web browser being used checks the websites' certificate to make sure that the client is connecting to the real site and not someone intercepting 2- The encryption types that the browser and the web site server can both use to understand each other are determined 3- Browser and Server each send each other unique codes to use when encrypting the data that will be sent 4- The browser and server start communicating using encryption, leaving the web pages secured. For more information on how SSL works ckeck the following website: http://www.ourshop.com/resources/ssl.html
  •  
    The following article shows how the asymmetric encryption inherent to SSL (Secure sockets layer) and TLS (Transport Layer Security) have been rendered useless by a tool called BEAST (Browser Exploit Against SSL/TLS). It attacks the "AES encryption algorithm" used in the cryptographic protocols. "BEAST is able to grab and decrypt HTTPS cookies once installed on an end user's browser." "While other attacks focus on the authenticity property of SSL, BEAST attacks the confidentiality of the protocol. As far as we know, BEAST implements the first attack that actually decrypts HTTPS requests". "Transaction confidentiality based on the SSL TLS V1.0 protocol (the most used still today) is dead." "The only true defense from fraudulent transactions is to sign the (...) transaction data so that the attacker cannot inject bogus material. This means effectively using a token with a pin pad." "Fixing the vulnerability that BEAST exploits may require a major change to the protocol itself." http://www.itpro.co.uk/636304/ssl-under-threat-as-flaw-exploited
joey <3

First human robotic arm implant - 3 views

  •  
    "This is an innovative technique which is going to bring a great advance,"
  •  
    Here's a proof of how technology is increasing. Who would think, lots of years ago, that such thing would be possible. This technique consists of "implanting a microchip into the human brain to translate the nerve pulses into electric pulses, making it possible for the patient to move robotic prosthetics" which means that technoogy has increase to the point that even microchip's can by implanted in order to be able to move robotic prosthetics! Would this mean than in unknown years time, our body will be taken over by robotic implants, therefore humans would be taken over by robots? Yet, despite that, this is a great advantage for people who don't have arms or have arm problems, with this, they will be able to do what they always wanted with their robotic arm just like normal people!
  •  
    I do not think that "humans would be taken over by robots". As long as we keep our emotions and all the other things that makes us human, we will not become robots. Anyway. This is a great leap forward in prosthetic and one, if successful, will help a great many people. It is going to take time to perfect though, at the moment I doubt they are able to do this without bugs. Here is a link to a duke article on "Monkey Adapt Robot Arm as Their Own" http://today.duke.edu/2005/05/monkeyrobot.html
Mr Brooke

Skilled robots set to infiltrate schools and military - The National - 2 views

  •  
    As technology is increasing, robots are becoming more and more used in our society. This has impacted our world in many ways such as more machinery is being used in order to produce goods. This can lead to unemployment since less people are required to work in this industries as machines have taken the role. "The latest version of Honda's Asimo robot is reported to be able to distinguish between the voices of three different people spoken at once by using a combination of face recognition and sound analysis" By this quote taken from this article, we can see that robots are starting to resemble more to humans such that they can now distinguish between voices of three different people spoken at once. This is a social and ethical issue since machines such as robots are taking the role of human beings. The question is, for how long more is technology going to continue to increase? Are human beings on their way to extinction?
  •  
    As the article states, there are numerous robots that could perform tasks such as serving drinks (Asimo), teaching psychology (Nao), and replacing infantry (Petman). There is a danger of becoming overly dependent on technology. As we have discussed in class, the inherent characteristics of computers are that they will only do what they programmed to, regardless of the identity and intentions of the user. Also, both the computer and the user (if not equipped with appropriate technical know-how) become very vulnerable if the system malfunctions in a way that was not predicted. In tasks too dangerous to be directly undertaken by human beings, such as operating valves at the Fukushima Daiichi nuclear power plant, robotics become essential. Companies need to strike a balance between commercialisation and what is truly necessary for the benfit of humanity.
  •  
    In the field of medicine, robotic surgery is becoming increasingly popular: http://futureoftech.msnbc.msn.com/_news/2012/01/13/10150612-robot-surgeons-may-get-upgraded
Mr Brooke

BBC News - Soldier Andrew Garthwaite to get bionic arm controlled by mind - 2 views

  •  
    Criterion B . Describe, step by step, how the IT system works. 1. Surgically implanted nerves are connected to electrodes placed on the chest area. 2.The nerves prompt electrical signals from the brain to the electrodes. 3. The electrical signals are then interpreted by a micro-processor, into natural movements. More information on how bionic arms work: http://thetartan.org/2008/9/22/scitech/howthingswork
  •  
    Outline how this IT system works: Essentially, this system consists of hardware (electrodes) that replace the nerves going to and from the brain. Electrodes are connected to the chest muscles which control 6 motors that move the prosthetic joints. When the mind sends a message through the nerves to move a muscle in the arm, the signal causes a muscle in the chest to contract, which activates a certain electrode to tell a motor to move a part of the bionic arm. A more detailed account of how mind-controlled bionics works is here: http://science.howstuffworks.com/bionic-arm.htm This story is a prime example of how IT is being used to radically develop medical research and treatments.
  •  
    The main social and ethical issue in this article is People and Machines. This new bionic arm which is controlled by the mind is an important development, in this technology, now allowing people who have had to have limbs amputated to have new arms/legs that they can control as they would their original arms/legs. However, due to the fact that it is very new and expensive technology to develop, although it points to the future, at the moment almost no one that would need a bioninc arm would be able to afford it. This means that although it is an essential step forward, at the moment it will not be something that can help the majority of people who most need it. As well as this, the bionic arm, although it is controlled by the mind, it will never be as fluid and will never work as intuitively as your arm.
Mr Brooke

What's in electronic devices? | Greenpeace International - 3 views

  •  
    1.11_people_machines 2.3_environment 2.3_ewaste 3.1_hardware
  •  
    1.11_people_machines 1.9_policies 2.3_ewaste 3.1_hardware
  •  
    I could never thought that such things could lead to such problems! This social and ethical issue (people and machines) is surely affecting the world around us, not only use but the environment as well. Not everyone is aware of this, that these electronics can lead to a lot of harm! Yet, even if more people would be aware of this, I don't think anything special would be made to reduce so many pollution and harm to the society as people are becoming so dependent of technology that eventhough they would like to reduce such pollution, they wouldn't abdicate their electronics in order to reduce pollution (in my opinion) Furthermore, technology has been increasing rapidly and will continue to increase even more. This means that more pollution due to more electronics will be made. The question is, for how long will Earth continue 'alive'? Because by this passe, how technology and pollution is increasing drastically, not many more centuries.
Fiche Galinha

How to identify fake Facebook accounts | InSecurity Complex - CNET News - 1 views

  •  
    The main social and ethical in this article would have to be authenticity, as it deals with the fact that people are making accounts to be real people. In my own experience I've had this happen to me once and it was easily identified for the reasons this article states, no status updates etc. Although in my case it was harmless, it can lead to issues of a greater significance. This article also highlights the worrying ease at which people can fake an accout and that there is a very significant number of these accounts. They could in some cases be used in a harmful manner. For example, sexual predators could easily make a profile pretending to be 15 years old, add a profile picture of a child and then add other children as friends. This creates a security issue as the children's life is in a potentially harmful situation, as these cases of sexual predators over the internet has been a security issue since social networks came to be. Another issue that lack of authenticity brings is that these fake accounts could be used for spam, and could also potentially be used to spread malware. This is a very common problem in Facebook as these fake accounts can share a link with their "friends" and from this it starts spreading throughout the entire social network.
Isy :)

BBC - Newsbeat - Not enough done to tackle cyberbullying, warns NSPCC - 4 views

  • One thousand teenagers across the UK were questioned for the survey and 12% said they had been cyberbullied.
  • more than half a million
  • It follows you home, it follows you over the weekend, it doesn't leave you alone.
  • ...1 more annotation...
  • educating the children they come into contact with into staying safe online.
  •  
    The news article shows some very important facts for instance, out of 5.3m teenagers in the UK more than half a million of them have suffered from cyber bullying. Furthermore, as social networks are now becoming more available on mobile devices this number is likely to increase in the coming years.
  • ...1 more comment...
  •  
    This website offers good advice on how cyber bullying works and prevention techniques: http://www.stopcyberbullying.org/index2.html
  •  
    Nowadays lots of cyber bullying is going on, and it is increasing. Not only cyber bullying exists via text messages, yet also through anonymous calls and what is increasing a lot now, via social networks. People create facebook pages with names such as 'The ugliest person in Cascais' (this is probably an example of one of the 'less worse') and post images of people, with insulting descriptions on the photos. This is a big issue since people who are bullied may psychologically or even physically suffer from this. "half a million of them had been a victim of online bullying.". Technology is increasing, so surely, if no one tries to actually do something to change this, cyber bullying will also increase.
  •  
    I'm a bit surprised at the number, it's lower than what I thought it would be. Perhaps I'm just a pessimist. Nevertheless, I agree with Ines. We're getting more and more cyber bullying, Stopping cyber bullying has proved difficult with the exponential growth of social networking. Cyber bullying is of course as we know, the use of the Internet or text messaging to bully others. But what can we do to change this escalation of cyber bullying? Not a whole lot really, in my opinion. Kids will, unsurprisingly, bully each other. The Facebook-generation is merely using the medium they are given.
The Zhan

Freedom of information vital for promoting cultural diversity - 1 views

  • “Free speech and media freedom are an inseparable part of the United Nations’ mission for peace, human development and a better world,” Under-Secretary-General for Communications and Public Information Kiyo Akasaka told a global seminar on linguistic diversity, globalization and development in Alexandria, Egypt, on Sunday.
  • “But around the world, we see Governments and those who wield power use many different ways to obstruct it. The Internet and digital media are becoming a new battleground for information.”
  • He cited the impressive pace of innovation and growth in new information and communications technologies (ICTs): by the end of 2010, there will be an estimated 5.3 billion mobile cell phone users; access to mobile networks is now available to 90 per cent of the world population and 80 per cent of people living in rural areas. Moreover, the total number of text messages sent globally has tripled in the past three years, from 1.8 trillion to a staggering 6.1 trillion, that is 200,000 text messages sent every second, and the number of Internet users has doubled between 2005 and 2010, when it will surpass the 2 billion mark, of which 1.2 billion will be in developing countries.
  • ...3 more annotations...
  • But the digital divide remains, he warned, with 71 per cent of the population of developed countries online, compared to only 21 per cent in developing countries, and by the end of this year, Internet users in Africa will reach 9.6 per cent, far behind the world average of 30 per cent. For millions of people in poorer countries, downloading a high-quality movie can take one-and-a-half days compared to five minutes somewhere else.
  • All this increased connectivity and the role media and institutions can play in protecting and promoting cultural and linguistic diversity and ensuring its use for the greater good require two elements, Mr. Akasaka stressed.
  • “First, is the need to find ways to provide information to all people,” he said. “And second, is the need to ensure that the information that is conveyed – the substance – is diverse, pluralistic, and tolerant. Member States, the private sector, UNESCO and the United Nations are all working to bring information and communication assets and services to communities around the world.
  •  
    Statements of a UN official stressing the importance of the freedom of information for globalisation.
The Zhan

Globalization and the Internet - Probe Ministries - 0 views

  • The Internet has provided an opportunity to build a global information infrastructure that would link together the world's telecommunications and computer networks. But futurists and governmental leaders also believed that this interconnectedness would also bring friendship and cooperation, and that goal seems elusive.
  • Maybe peace and harmony are just over the horizon because of the Internet, but I have my doubts. The information superhighway certainly has connected the world together into one large global network, but highways don't bring peace. Highways connected the various countries in Europe for centuries, yet war was common and peace was not. An information superhighway connects us with countries all over the world, but global cooperation hasn't been the result, at least not yet
  • The information superhighway also has some dark back alleys. At the top of the list is pornography. The Internet has made the distribution of pornography much easier. It used to be that someone wanting to view this material had to leave their home and go to the other side of town. The Internet has become the ultimate brown wrapper. Hard core images that used to be difficult to obtain are now only a mouse click away. Children see pornography at a much younger age than just a decade ago. The average age of first Internet exposure to pornography is eleven years old.{3} Sometimes this exposure is intentional, usually it is accidental. Schools, libraries, and homes using filters often are one step behind those trying to expose more and more people to pornography.
  • ...6 more annotations...
  • All of these concerns lead to the obvious question: Who will regulate the Internet? In the early day of the Internet, proponents saw it as the cyber-frontier that would be self-regulating. The Internet was to liberate us forever from government, borders, and even our physical selves. One writer said we should "look without illusion upon the present possibilities for building, in the on-line spaces of this world, societies more decent and free than those mapped onto dirt and concrete and capital."
  • Jack Goldsmith and Tim Wu, in their book, Who Controls the Internet?, describe the various ways foreign governments have exercised their authority.{6} • France requires Yahoo to block Internet surfers from France so they cannot purchase Nazi memorabilia.{7} • The People's Republic of China requires Yahoo to filter materials that might be harmful or threatening to Party rule. Yahoo is essentially an Internet censor for the Communist party.{8} • The Chinese version of Google is much slower than the American version because the company cooperates with the Chinese government by blocking search words the Party finds offensive (words like Tibet or democracy). Even more disturbing is the revelation that Yahoo provided information to the Chinese government that led to the imprisonment of Chinese journalists and pro-democracy leaders. Reporters Without Borders found that Yahoo has been implicated in the cases of most of the people they were defending.
  • All of this censorship and cooperation with foreign governments is disturbing, but it also underscores an important point. For years, proponents of the Internet have argued that we can't (or shouldn't) block Internet pornography or that we can't regulate what pedophiles do on the Internet. These recent revelations about Yahoo, Google, and Microsoft show that they can and do block information.
  • In previous articles we have addressed the issue of globalization and have recognized that technology (including the Internet) has made it much easier to move information around the world. There is no doubt that the Internet has accelerated the speed of transmission and thus made the world smaller. It is much easier for people around the world to access information and share it with others in this global information infrastructure
  • it diminishes the relevance of borders, territorial governments, and geography. Thomas Friedman believes that the Internet and other technologies are flattening the world "without regard to geography, distance, or, in the near future, even language."
  • There is still a legitimate function for government (Romans 13:1-7) even in this new world of cyberspace. Contrary to the perceived assumption that the Internet will shape governments and move us quickly toward globalization, there is good evidence to suggest that governments will in many ways shape the Internet.
  •  
    An explanation on the implications of the information highways internet provides, censorship and governments.
Miguel Gray Pereira

Chromium OS - The Chromium Projects - 0 views

  •  
    "Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people who spend most of their time on the web. Here you can review the project's design docs, obtain the source code, and contribute"
Mr Brooke

BBC News - Homeless hotspots plan causes controversy for BBH ad agency - 0 views

  •  
    An "experiment" which involved using homeless people as mobile wi-fi hotspots has attracted criticism, forcing the advertising agency behind it to defend itself.
The Zhan

Kodak declares bankruptcy: The company that captured the 20th century (Photos) - 0 views

  • Unable to keep up with the 21st-century transition from film to digital technology, Kodak listed a debt of $6.8 billion
  • Kodak has been felled by exactly what it espoused: universal access to cameras.
  •  
    The main social and ethical issue that this article brings up is that of people and machines. The fact that Kodak has declared bankruptcy is hardly surprising, as though they were the company who worked so hard to develop the world of photography, they have failed to develop themselves in order to adapt to the new world of photography, while other companies such as nikon, samsung etc, have by constantly creating new digital cameras with new attractive features. This article is recent story of how Kodak are trying to sue Samsung for potentially infringing one of their patents: http://www.bbc.co.uk/news/technology-16631710 This article is prime example of how having an innovative idea is simply not enough to be successful over an elongated period of time: Just because Kodak had the idea of digital photography, that does not mean that they did not have to compete with other companies to remain the leading brand in photography. It seems to me that Kodak's complacency after having had the idea of digital photography led to their downfall. Explain the relationship between the IT system (digital photography) and the social/ethical (people and machines) The article shows how for the the public to continue to have an interest in machines such as digital cameras, they must continue to be developed, improved, updated and upgraded, as the appeal of new technology attracts customers. In this case, Kodak failed to keep up with the rate at which the world of digital photography is evolving.
  •  
Morten Nielsen

Google search changes are bad for the internet, says Twitter | Technology | guardian.co.uk - 1 views

  • Google has angered Twitter and faces accusations of "warping" its search results and breaking antitrust rules by boosting posts from its Google+ social network in its standard search results.
  • because they will see fewer results from outside it when they search for information
  • "We're transforming Google into a search engine that understands not only content, but also people and relationships.
  • ...2 more annotations...
  • The Guardian's own tests on google.com when not signed in to any Google account found that links to people in Google+ appeared prominently in suggested searches,
  • If Google extends the promotion of Google+ results to European countries where it has a greater share of search, and also if it extends it to results on Android phones, then it may face more urgent calls for antitrust investigation.
Mr Brooke

3quarksdaily: All About PIPA and SOPA, the Bills That Want to Censor Your Internet - 2 views

  •  
    Nice video explaining the current issues
  • ...4 more comments...
  •  
    In my opinion, the main objective is purely to protect the entertainment industry by blocking infringing domain names however, as stated in the video these industries do not contribute so much to the US economy. Furthermore, theses bills will put the stability of new search engines at risk as the US government will be able to sue them if they advertise any infringing website.
  •  
    If you're looking to understand the debate from the perspective of copyright holders, then watch Follow the Money: Who Profits from Piracy?,( http://vimeo.com/22541902 ) a video that tracks the theft of one movie, making it a microcosm of a larger problem.
  •  
    Although protecting the entertainment industry from piracy and blocking certain websites containing disturbing and innappropriate material (paedophilia) is a good idea, the way SOPA and PIPA have been written/proposed makes it very easy for people enforcing both acts to abuse their power. Once we censor one thing, other will decide that other things must also be censored, therefore destroying any sembelence of free-speech Internet users have. I also find it worrying how the American Senate decided by itself that these two acts should be made law, in the process crippling the Internet, a resource used by billions of people all around the world and not just the population of the US.
  •  
    Criterion B . Describe, step by step, how the IT system works. How unauthorised sites outside usa jurisdiction is censored within american borders: A little bit like the great firewall of China, this kind of censorship takes place at a router level. 1. The American ISPs enter the domain names of the unauthorised sites and directories, blogs and forums that contain related links into the Internet routers. These enable data to flow back and forth between ISPs in the USA and Internet servers around the world. 2. The user types in the domain name of an unauthorised website. 3. The request is sent to the web server at the ISP, and the domain name is looked up on the database of addresses in the router 4. The router denies the request from the web server 5. An error message appears in the user's browser how chinese censorship works - http://embargo.gn.apc.org/3.htm#_ftn5 how internet works - http://www.explainthatstuff.com/internet.html
  •  
    The SOPA is mainly adresses the protection of intellectual property of content creators. Obviously this is the one of the biggest advantages being proposed by the act as artists and entertainers will be able to profit more from the content they make. Nowadays much of their content is illegally downloaded from the internet, such as music. However SOPA will have a severe impact on online freedom of speech as numerous websites would be affected by the act and blacklisted as a result. The internet is makes frequent use of copyrighted material not necessarily in a legal way. Doing streaming of such content after the act could lead to a maximum penalty of five years in prison. However the US congress states that protecting intellectual property is not the same as censorship http://agbeat.wpengine.netdna-cdn.com/wp-content/uploads/2011/12/sopa-infographic1.png The image above provides more detail about SOPA including how it will take effect and the impact it would have on businesses. It shows the major supporters of SOPA as well as the major opposers, one of them being Google.
  •  
    Apparently there are multiple ways of circumventing the SOPA: 1. Using a VPN Service 2. Using Your HOSTs File 3. Using TOR 4. Using a Web DNS Tool 5. Changing Your DNS Server 6. Using Command Prompt 7. Using Foxy Proxy 8. Using MAFIAAFire Source: http://www.zeropaid.com/news/95013/8-technical-methods-that-make-the-protect-ip-act-useless/
Jorge F1

Zuckerberg Facebook photos hacked - 2 views

  •  
    A series of private pictures of Facebook founder Mark Zuckerberg have been posted online by "hackers" to highlight a bug in the social network. In total 14 pictures of Mr Zuckerberg were posted to image site Imgur under the headline: "It's time to fix those security flaws Facebook".
  •  
    Although some people have no problem whatsoever with flaunting themselves on facebook, effectively giving up on their right to privacy, some people do appreciate their privacy something that lately seems to be inexistent for facebook users. As mentioned in the following article: http://www.thenational.ae/thenationalconversation/comment/facebook-having-devoured-your-privacy-wants-more, facebook are slowly implementing a new feature that will suggest events your friends are attending even if you were not invited. This latest facebook bug goes to show how easy it is for someone to lose their privacy on the internet as even facebook founder and creator Mark Zuckerburg is susceptible. Hopefully this "small" incident will increase facebook's concern for protecting their users' privacy and increase its security after complaints that privacy settings are not functioning properly and various users being victims of phising attacks.
1 - 20 of 44 Next › Last »
Showing 20 items per page