Skip to main content

Home/ StJulians_ITGS/ Group items tagged policies

Rss Feed Group items tagged

Jorge F1

Google 'fails EU privacy rules' - 1 views

  •  
    28 February 2012 Last updated at 11:58 ET Google's been letting users of services know that its privacy policies will change on 1 March Google's new privacy policy may violate the European Union's data protection laws, according to the French data regulator. The search giant plans to unify 60 different privacy policies across its products from 1 March.
Tranny Franny

BBC News - Backlash over Google move to change privacy settings - 1 views

  •  
    The main stakeholder here is the google, youtube, gmail, etc. user. The change in privacy policy settings in the system affects the stakeholder in these ways, as outlined in the article: In "suggesting search queries, or tailoring search results, based on the interests expressed in Google+, Gmail and YouTube" (mining data to provide "ever more targeted adverts"), the results become limited: "something I am interested in this week, I might not be interested in next week. I use Google's facilities as both a private individual and in my professional life. Which bit are they going to give back to me?" There is no opt-out alternative to the changes in the system. "Google has become a way of life for some people. They can't do without it even if they don't like the direction it is going in". The simplification of policies could lead to graver problems. http://edition.cnn.com/2012/01/27/tech/web/google-privacy-clarified/index.html
Mr Brooke

Transparency Report - Google - 0 views

  •  
    "Data that sheds light on how laws and policies affect Internet users and the flow of information online."
The Zhan

Obama Turns Down Rumors On Afghanistan, Blasts WikiLeaks - 1 views

  • The President of the United States of America Barack Obama is expressing some of his unfavorable opinions on a website claiming to have secret information about American government policies that are kept from the masses.
  • Tuesday, Obama clearly stated that he is highly “concerned about the disclosure of sensitive information” having to do with the goals and policies of the United States in Afghanistan by WikiLeaks
  • according to Obama as well as anyone who has taken a look at the claims, there is very little new information being represented on the site.
  • ...2 more annotations...
  • “While I’m concerned about the disclosure of sensitive information from the battlefield that could potentially jeopardize individuals or operations, the fact is these documents don’t reveal any issues that haven’t already informed our public debate on Afghanistan.
  • In addition, the alleged secret information being leaked by site such as WikiLeaks is information that has already been made public to the men and women of the United States to read about at their discretion.
Mr Brooke

Face recognition: In the future, can you remain anonymous? - Jan. 13, 2012 - 3 views

    • Mr Brooke
       
      I love the fact that the opt in can be as simple as "walking into a store"
  •  
    The social and ethical issues presented by this article is on privacy and anonymity.
  • ...2 more comments...
  •  
    Describe, step by step, how the IT system works. An example of a face recognition and detection technology is the iPhone app that can snap a photo of a person and within seconds display their name, date of birth and social security number. 1. A good quality, well-lit photograph of the person is taken. 2. The image is sent to a server where a database of images is located. 3. The images in the database are downloaded from publicly available sources (any database containing faces and names), such as facebook, twitter or LinkedIn profiles. 4. According to the information available in that profile, such as date and location of higher education stydy, other data can be inferred (date and state of birth). 5. This data is inserted into an algorithm developed to predict the social security number. All of this still within the database. 6. The biometric features of the iPhone photograph is compared to those of the image in the database 7. If they match, the information about that person is returned from the server to the iPhone: name, date of birth, state, social security nr. What are the flaws within this system? Explain the relationship between the IT system (facial recognition iPhone app) and the social/ethical (privacy and anonymity) "The technology to analyse faces in improving so quickly that unpredictable (...) inferrences from that information have become possible." - Alessandro Acquisti, professor of IT and public policy at Carnegie Mellon University's Heinz College The app is a proof-of-concept of how our privacy can be easily breached on a widespread basis (as one walks into a store or protests in a convention)
  •  
    This article raises the issue of privacy and anonymity. This article shows how there is a possibility that in the near future, as long as the technology continues to develop at this rate, all of our personal data will be stored on a database along with an image of our faces. The fact that a person can be recognized at any moment anywhere means that people will start to be monitored and everything they do will be recorded. This completely strips people from their privacy, much like the Big Brother situation that is described in George Orwell's "1984". This technology can, however, bring certain advantages as through the constant monitoring of people, people involved in criminal acts will be identified with much more ease and therefore crime levels are sure to decrease. However, this can also raise an issue of reliability, as although it is a very small percentage of it happening, there can be the case where the camera misidentifies someone, and in a case of crime, that could lead to an innocent person being conviected for a crime they did not commit. And although at the end of the article "Wear a mask," is said by John Verdi, senior counsel of the Electronic Privacy Information Center as a joke, if the tecnhology continues to develop, we might find ourselves in the ridiculous situation where the only way to ever remain anonymous is to in fact wear a mask.
  •  
    We could all just replace our eyes. http://www.youtube.com/watch?v=kx9IEP8pmiI&feature=related In the above clip we see an example of what might happen if facial recognition ever reaches the level portrayed in Minority Report. As the protagonist walks into the store, an AI asks him how he felt about his last purchase at the shop, information obtained by scanning the protagonist's eyes and searching for what he has bought. This brings up the issue of privacy, as has correctly been mentioned above, as third-party companies will be able to access databases with data concerning what people purchase, how much they spend and where they are.
Fiche Galinha

BBC News - Google admits profiting from illegal Olympic ticket ads - 6 views

  •  
    This article has made clear that the AdWords advertising system is flawed, it is unacceptable for a large company like Google to lead users to believe that a website can be trusted using the 'sponsored links' and continues to make profit. This goes against the 6th point in Google's philosophy "You can make money without doing evil" although they are not doing it consciously. From the article I understood that the system is run using an automated filter to identify websites which break Google's policy and a manual assessment also takes place by a human. Instead of using just one human, a group of humans can assess the adverts to ensure nothing is missed. Furthermore, an update of Google's databases should regularly take place in order to catch illegal websites quicker.
  • ...3 more comments...
  •  
    Here is a list of all Google's philosophy, http://www.google.com/about/corporate/company/tenthings.html
  •  
    Good story this and nice link to Google's philosophy Jorge. This article is a good one for commenting on the relationship between the stakeholder and the IT system. Anyone want to step up and "Describe the relationship of one primary stakeholder to the IT system"?
  •  
    This article raises a huge reliability issue as people are being tricked to buying tickets from fake websites, which are advertised by Google. Due to its increasing reputation over the years, the average internet user will use and think of Google as the most reliable website to navigate, and therefore would trust most of the llinks that would appear when they search for something. The secure and reliable reputation Google has is what makes the fact that these illegal websites being sponsored ads such a large issue. It affects many web users and as they are likely to visit these websites, their personal information such as bank account details and personal details are made public. So security could also be seen as an issue as these people are put at risk as they have given their bank account data to fake websites, who could use the data gain access to bank accounts and steal money.
  •  
    Google's corrupt sponsored links affects nearly every digital citizen, as Google is by far the most popular and used search engine. There is alternatives to Google, but nevertheless Google is the most popular search engine(we're talking 70+% http://www.seoconsultants.com/search-engines/ ) I agree with Jorge's main ideas above. However, I do not think that increasing the number of people checking would make any large difference. It is their filters which needs an update - something I'm sure they're already doing. It does raise some reliability concerns, being the most popular search engine, you'd expect them not to endorse(even unknowingly) corrupt links.
  •  
    The social and ethical issues related to this news story are reliability, privacy and anonimity to an extent. Privacy as the information from the buyers credit card is given to what seems to be an unknown person or company. The multiple stakeholders seen would be the buyer, Google and the advertiser. Although it is via Google that the advertiser gets sell his product, it is important to understand that there are most likely thousands of advertisements added daily to the Google search engine and, referring back to Jorge's point, it would be very likely that humans would fail to see such mistakes as well after repeatedly going through hundreds of adds everyday. The trust and reliance that people have on Google can be misleading and it is evident that to solve such an issue people must be awared of the several scams that they are exposed to every single day in order to prevent this sort of problems.
Jorge F1

BBC News - Storage sites unnerved by Megaupload action - 3 views

  •  
    The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
  • ...1 more comment...
  •  
    The manner of his arrest is unnerving. Apparently they used two helicopters, had to break down doors and electronic locks - only to find him in a safe room with sawed off shotgun. Seems like something out of a B-movie. Even more so, when you consider that these things are allowed under the current regulations. If SOPA, ACTA or equivalent passes and gives the government more free reins, it becomes truly terrifying(bit exaggerated, I know). Megaupload is claiming to be "just like youtube". Check this article out, his lawyer is making quite the argument for it. http://arstechnica.com/tech-policy/news/2012/01/were-just-like-youtube-megaupload-lawyer-tells-ars.ars He was the lawyer to defend isohunt.com as well. A well known search engine for torrents.
  •  
    How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
  •  
    http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
Ines Simon

France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 1 views

  • The privacy policies of individual Google services, especially its StreetView mapping feature, have also been investigated in a number of European Union countries.
The Game

ICAO | About ICAO - 2 views

  •  
    International Civil Aviation Organization This relates to RFID e-passports.
  •  
    Good find. Nice to back this discussion up with some hard facts about policy.
The Zhan

YouTube - Collateral Murder - Wikileaks - Iraq - 0 views

  •  
    To what extent does media and governments distort information that is presented to the general audience, taking into consideration the concealing of an extremely sensitive piece of information such as this?\n\nWhat degree of obscurantism does the US army's "don't ask, don't tell" policy imply? How much misunderstanding can it provoke?\n\nHow reliable is the information provided to us by Wikileaks?
Mr Brooke

What Google knows about you and how to tweak it - 1 views

  •  
    Some very useful stuff here and I would recommend you check your settings. I found that I was automatically opted into the Ad tracking!
1 - 13 of 13
Showing 20 items per page