Skip to main content

Home/ StJulians_ITGS/ Group items tagged related

Rss Feed Group items tagged

Jorge F1

BBC News - TripAdvisor rebuked over 'trust' claims on review site - 2 views

  • Entertainment Video $render("advert","advert-leaderboard");Advertisement $render("advert-post-script-load");
  • TripAdvisor rebuked over 'trust' claims on review site

    TripAdvisor screenshot The travel site's UK homepage no longer makes the claims that provoked the complaints

    Related Stories

    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.

    The ruling follows complaints by hotels that the site had said that its holiday reviews could be "trusted".

    The ASA said it was concerned that consumers might be fooled by fraudulent posts since the entries could be made "without any form of verification".

    TripAdvisor described the ruling as a "highly technical view" of "copy that was used in a limited capacity".

    However, the watchdog said that the ruling served as a warning to all UK-focused sites with user-generated material.

    Fraud systems

    The ASA said that the US-based firm's site originally carried statements saying that it contained "reviews that you can trust" and that it had "more than 50 million honest travel reviews".

    It said that two hotels and the online reputation firm Kwikchex, which represented others, had complained that the claims were misleading since they could not be substantiated.

    The advertising body said it acknowledged that reviewers were asked to sign a declaration that their reviews were real and that they had no incentive or competitive interest with the places commented on.

    Start Quote

    Don't major on trustworthiness if fake reviews can appear”

  • "This should be regarded as a benchmark ruling which applies to all web sites which make claims about the reliability of their user-created content," the ASA's spokesman Matthew Wilson told the BBC.
  • ...1 more annotation...
  • When asked about this the ASA said that its remit only extended to claims targeted at a UK audience, so it would not be pursuing changes at the .com site.
  •  
    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.
  •  
    the social and ethical issue here is reliability. No one can be completely confident that what they see online is true whether it is with traveling companies or something mr brooke showed us in class: http://www.familywatchdog.us/search.asp in this website for example, we can not be sure that the people registered really are sex offenders.
The Zhan

Bosses switch on antisocial network - 2 views

  • 'It's about informing you where you stand in relation to other people rather than a manager having to come over and talk to you about it
  • Some companies are introducing internal social networks to try to encourage staff to talk to their colleagues rather than escape into the ether
  •  
    Rather than blocking access to Facebook and Twitter, a growing of employers are monitoring what proportion of the working day individuals spend on them.
  •  
    State and Describe the main Social and Ethical issues that relates to this article: The main social and ethical issue that relates to this article is surveillance. In this article, it is suggested that workers in an office space would have the time they spend on a social network being monitored and controlled. This survaillence of how the workers spend their time on the computer seems somewhat appropriate in my opinion. What this is doing is it's reaching a compromise for the workers, by still letting them access these social networks, while limiting how long they can access it for daily so as to ensure that they focus as much on their work. Although it could be question whether it's ethical to monitor people's computer, what this is doing is avoiding measures such as a boss visually monitoring everyone's computer behind their backs,which raises a much bigger surveillance issue. The second suggestion of an internal and local social network that would only include people in the workplace is also a good option that attempts to keep the workers focused on the workplace and to ecourage communication between workers, rather than getting distracted with life outside the workplace. This is also, in my opinion an excellent suggestion as it offers an alternative to simply blocking social networks, which raises an issue in terms of how ethical it is to simply restrict someone from visiting a website, which could be seen as censorship.
The Zhan

Bridges and Barriers to Digital Inclusion - 0 views

  • some 91 percent of Americans now use a cell phone, and 90 percent of cell phone subscribers in the United States and Western Europe have phones that are Internet-ready
  • Digital Inclusion: In some circles, the term digital divide is itself defunct. Instead, using digital inclusion is not only a way to reframe the discourse in a more positive light but also reflective of what access, adoption, and literacy in the digital world really mean today. Students who are excluded from the digital universe know exactly what they're missing
  • In May 2011, U.N. Special Rapporteur Frank La Rue released a report declaring that access to the Internet is a basic human right.
  • ...2 more annotations...
  • The digital divide, once seen as a factor of wealth, is now seen as a factor of education
  • "The question is not whether we can get an iPod into every kid's hand. It's whether communities can leverage the capacity of networks to make learning more authentic and powerful for students." It's not just word processing, but blogging and tweeting; not just a class project, but an international student collaboration; not reinventing the wheel every time, but tapping into a professional-learning community that shares ideas and resources.
  •  
    How do we define digital access when the price of personal computers and related technologies has dropped dramatically over the years?
joey <3

Petition calls for "ethical" iPhone 5 - 2 views

  •  
    this relates to a story which was previously posted by mr brooke. this was then argued by jorge who says that apple has some unethical procedures regarding Chinese labor: http://groups.diigo.com/group/mjb_itgs/content/apple-united-kingdom-the-story-behind-apple-s-environmental-footprint-4017062
  •  
    As this relates to another story then maybe your post is best placed in that discussion. Remember you are required to post in three places other than your own bookmarks....
The Game

ICAO | About ICAO - 2 views

  •  
    International Civil Aviation Organization This relates to RFID e-passports.
  •  
    Good find. Nice to back this discussion up with some hard facts about policy.
Mr Brooke

The Habitable Planet - Interactive Labs - 0 views

  •  
    "These 5 interactive lab activities span several units, but tie together their common concepts. You may explore functional simulations or do field activities that are tied to the content of related units."
Morten Nielsen

Adobe to plug Flash-related Webcam spying hole | Security - CNET News - 3 views

  •  
    Do you know if this has been resolved yet?
jas rafferty

Common Operating System Problems - Learning & Scholarly Technologies - 0 views

  •  
    Spyware/Internet Pop-Ups Allot of internet pop-ups are built into web sites, this means that when they are related to the site that you are currently visiting. Although there are ways to prevent these pop-ups, they are, for the most part, not annoying or offensive.
Mr Brooke

Face recognition: In the future, can you remain anonymous? - Jan. 13, 2012 - 3 views

    • Mr Brooke
       
      I love the fact that the opt in can be as simple as "walking into a store"
  •  
    The social and ethical issues presented by this article is on privacy and anonymity.
  • ...2 more comments...
  •  
    Describe, step by step, how the IT system works. An example of a face recognition and detection technology is the iPhone app that can snap a photo of a person and within seconds display their name, date of birth and social security number. 1. A good quality, well-lit photograph of the person is taken. 2. The image is sent to a server where a database of images is located. 3. The images in the database are downloaded from publicly available sources (any database containing faces and names), such as facebook, twitter or LinkedIn profiles. 4. According to the information available in that profile, such as date and location of higher education stydy, other data can be inferred (date and state of birth). 5. This data is inserted into an algorithm developed to predict the social security number. All of this still within the database. 6. The biometric features of the iPhone photograph is compared to those of the image in the database 7. If they match, the information about that person is returned from the server to the iPhone: name, date of birth, state, social security nr. What are the flaws within this system? Explain the relationship between the IT system (facial recognition iPhone app) and the social/ethical (privacy and anonymity) "The technology to analyse faces in improving so quickly that unpredictable (...) inferrences from that information have become possible." - Alessandro Acquisti, professor of IT and public policy at Carnegie Mellon University's Heinz College The app is a proof-of-concept of how our privacy can be easily breached on a widespread basis (as one walks into a store or protests in a convention)
  •  
    This article raises the issue of privacy and anonymity. This article shows how there is a possibility that in the near future, as long as the technology continues to develop at this rate, all of our personal data will be stored on a database along with an image of our faces. The fact that a person can be recognized at any moment anywhere means that people will start to be monitored and everything they do will be recorded. This completely strips people from their privacy, much like the Big Brother situation that is described in George Orwell's "1984". This technology can, however, bring certain advantages as through the constant monitoring of people, people involved in criminal acts will be identified with much more ease and therefore crime levels are sure to decrease. However, this can also raise an issue of reliability, as although it is a very small percentage of it happening, there can be the case where the camera misidentifies someone, and in a case of crime, that could lead to an innocent person being conviected for a crime they did not commit. And although at the end of the article "Wear a mask," is said by John Verdi, senior counsel of the Electronic Privacy Information Center as a joke, if the tecnhology continues to develop, we might find ourselves in the ridiculous situation where the only way to ever remain anonymous is to in fact wear a mask.
  •  
    We could all just replace our eyes. http://www.youtube.com/watch?v=kx9IEP8pmiI&feature=related In the above clip we see an example of what might happen if facial recognition ever reaches the level portrayed in Minority Report. As the protagonist walks into the store, an AI asks him how he felt about his last purchase at the shop, information obtained by scanning the protagonist's eyes and searching for what he has bought. This brings up the issue of privacy, as has correctly been mentioned above, as third-party companies will be able to access databases with data concerning what people purchase, how much they spend and where they are.
The Zhan

Legislation in Portugal - cybercrime - 2 views

  •  
    Some of the points are: 3. information falsitication The intention to cause errors in juridical relations by introducing, modifying, deleting or suppressing data or by producing non-genuine documents can lead to a fine of 120 to 600 days, or 5 years of jail. 4. Damage relative to programs or data Whoever does not have legal permission or the administrator's consent to delete, alter and impossibilitate utilisation of programs or data, will be punished with up to 3 years in jail or a fine. 5. electronic sabotage Whoever does not have legal permission or the administrator's consent to obstruct, interrupt of gravely disrupt the functioning of an information system through introduction of, alteration of, damaging of, or suppression of programs and data will be punished with up to 5 years in jail or a 600-day fine. 6. Ilegitimate access Whoever does not have legal permission or the administrator's consent and tries to access an IT system will be punished with up to 1 year in jail or a 120-day fine. Punishments also true for users who produce, sell or distribute a set of executable instructions destined to cause the aforementioned unauthorised actions. 7.Ilegitimate interception Whoever does not have legal permission or the administrator's consent and tries to intercept the transmission of data  will be punished with 3 years of jail.
Mr Brooke

3quarksdaily: All About PIPA and SOPA, the Bills That Want to Censor Your Internet - 2 views

  •  
    Nice video explaining the current issues
  • ...4 more comments...
  •  
    In my opinion, the main objective is purely to protect the entertainment industry by blocking infringing domain names however, as stated in the video these industries do not contribute so much to the US economy. Furthermore, theses bills will put the stability of new search engines at risk as the US government will be able to sue them if they advertise any infringing website.
  •  
    If you're looking to understand the debate from the perspective of copyright holders, then watch Follow the Money: Who Profits from Piracy?,( http://vimeo.com/22541902 ) a video that tracks the theft of one movie, making it a microcosm of a larger problem.
  •  
    Although protecting the entertainment industry from piracy and blocking certain websites containing disturbing and innappropriate material (paedophilia) is a good idea, the way SOPA and PIPA have been written/proposed makes it very easy for people enforcing both acts to abuse their power. Once we censor one thing, other will decide that other things must also be censored, therefore destroying any sembelence of free-speech Internet users have. I also find it worrying how the American Senate decided by itself that these two acts should be made law, in the process crippling the Internet, a resource used by billions of people all around the world and not just the population of the US.
  •  
    Criterion B . Describe, step by step, how the IT system works. How unauthorised sites outside usa jurisdiction is censored within american borders: A little bit like the great firewall of China, this kind of censorship takes place at a router level. 1. The American ISPs enter the domain names of the unauthorised sites and directories, blogs and forums that contain related links into the Internet routers. These enable data to flow back and forth between ISPs in the USA and Internet servers around the world. 2. The user types in the domain name of an unauthorised website. 3. The request is sent to the web server at the ISP, and the domain name is looked up on the database of addresses in the router 4. The router denies the request from the web server 5. An error message appears in the user's browser how chinese censorship works - http://embargo.gn.apc.org/3.htm#_ftn5 how internet works - http://www.explainthatstuff.com/internet.html
  •  
    The SOPA is mainly adresses the protection of intellectual property of content creators. Obviously this is the one of the biggest advantages being proposed by the act as artists and entertainers will be able to profit more from the content they make. Nowadays much of their content is illegally downloaded from the internet, such as music. However SOPA will have a severe impact on online freedom of speech as numerous websites would be affected by the act and blacklisted as a result. The internet is makes frequent use of copyrighted material not necessarily in a legal way. Doing streaming of such content after the act could lead to a maximum penalty of five years in prison. However the US congress states that protecting intellectual property is not the same as censorship http://agbeat.wpengine.netdna-cdn.com/wp-content/uploads/2011/12/sopa-infographic1.png The image above provides more detail about SOPA including how it will take effect and the impact it would have on businesses. It shows the major supporters of SOPA as well as the major opposers, one of them being Google.
  •  
    Apparently there are multiple ways of circumventing the SOPA: 1. Using a VPN Service 2. Using Your HOSTs File 3. Using TOR 4. Using a Web DNS Tool 5. Changing Your DNS Server 6. Using Command Prompt 7. Using Foxy Proxy 8. Using MAFIAAFire Source: http://www.zeropaid.com/news/95013/8-technical-methods-that-make-the-protect-ip-act-useless/
Isy :)

'Anonymous' targets German far-right with Nazi-leaks.net - 7 views

  •  
    The social and ethical issues that relate to this article are that privacy and security and reliablility to a certain extent. What the Anonymous group are doing is basically taking people's personal information such as name, age, adress etc. and putting online for everyone to see, simply becuase they favoured nazi views. This is essentially the invasion of people's privacy as people's information is free for everyone to see. IT is also a security issue as people who feel very strongly against people who favour nazi views, have access to these peoples' adresses and could impose a danger. Reliability is also an issue, as it's mentioned in the article that none of the people that were mentioned in the website were actually confirmed to share Nazi ideals, meaing they are unjustly putting people in danger.
  • ...1 more comment...
  •  
    One of the problems here is the authenticity of data being released. ""This is a lot of data, but there are already some names where it's clear the people are not right-wing extremists." Some people identified in the data had merely been contacted by right-wing publications seeking interviews, she added." Some of the people on the list are not Nazis. What could be a solution to this?
  •  
    The article does raise some rather interesting social and ethical concerns. The main thing here is of course "Anonymous" breaking the Data Protection Act 1998 with their unlawful obtaining of personal information. While one can admire "Anonymous" fight against neo-nazism, the results they are producing are in fact not reliable. Though, as we've seen in the past, "Anonymous" are skilled proper encryption and security should have been able to fend them off and safeguard all information. Looking back, this would have the ideal to avoid the situation the websites are in now. I cannot see a plausible way of undoing this, and again give privacy to those who had it broken, as the information has been linked to multiple other sites - so perhaps this is only to serve as a lesson for others websites containing personal information.
  •  
    Well, to be honest the best solution would just to not post any private information online but seeing as that option wouldn't be considered by the 'anonymous' hacker group they could at least find a way and make sure that the only personal information posted online its authentic and from the main followers and contributors to this Nazi supporting website… but I don't really know how they would be able to do this, sooo if anyone knows please share because now I'm curious aha As much as I don't agree with the Nazi ideals and as much as I believe that supporting them is (sorry for being improper here) idiotic. I still don't agree with posting this private information online because as mentioned above, this does pose a major danger to the people whose information has been posted online by the people who have very strong feelings against these Nazi supporters.
Fiche Galinha

BBC News - Google admits profiting from illegal Olympic ticket ads - 6 views

  •  
    This article has made clear that the AdWords advertising system is flawed, it is unacceptable for a large company like Google to lead users to believe that a website can be trusted using the 'sponsored links' and continues to make profit. This goes against the 6th point in Google's philosophy "You can make money without doing evil" although they are not doing it consciously. From the article I understood that the system is run using an automated filter to identify websites which break Google's policy and a manual assessment also takes place by a human. Instead of using just one human, a group of humans can assess the adverts to ensure nothing is missed. Furthermore, an update of Google's databases should regularly take place in order to catch illegal websites quicker.
  • ...3 more comments...
  •  
    Here is a list of all Google's philosophy, http://www.google.com/about/corporate/company/tenthings.html
  •  
    Good story this and nice link to Google's philosophy Jorge. This article is a good one for commenting on the relationship between the stakeholder and the IT system. Anyone want to step up and "Describe the relationship of one primary stakeholder to the IT system"?
  •  
    This article raises a huge reliability issue as people are being tricked to buying tickets from fake websites, which are advertised by Google. Due to its increasing reputation over the years, the average internet user will use and think of Google as the most reliable website to navigate, and therefore would trust most of the llinks that would appear when they search for something. The secure and reliable reputation Google has is what makes the fact that these illegal websites being sponsored ads such a large issue. It affects many web users and as they are likely to visit these websites, their personal information such as bank account details and personal details are made public. So security could also be seen as an issue as these people are put at risk as they have given their bank account data to fake websites, who could use the data gain access to bank accounts and steal money.
  •  
    Google's corrupt sponsored links affects nearly every digital citizen, as Google is by far the most popular and used search engine. There is alternatives to Google, but nevertheless Google is the most popular search engine(we're talking 70+% http://www.seoconsultants.com/search-engines/ ) I agree with Jorge's main ideas above. However, I do not think that increasing the number of people checking would make any large difference. It is their filters which needs an update - something I'm sure they're already doing. It does raise some reliability concerns, being the most popular search engine, you'd expect them not to endorse(even unknowingly) corrupt links.
  •  
    The social and ethical issues related to this news story are reliability, privacy and anonimity to an extent. Privacy as the information from the buyers credit card is given to what seems to be an unknown person or company. The multiple stakeholders seen would be the buyer, Google and the advertiser. Although it is via Google that the advertiser gets sell his product, it is important to understand that there are most likely thousands of advertisements added daily to the Google search engine and, referring back to Jorge's point, it would be very likely that humans would fail to see such mistakes as well after repeatedly going through hundreds of adds everyday. The trust and reliance that people have on Google can be misleading and it is evident that to solve such an issue people must be awared of the several scams that they are exposed to every single day in order to prevent this sort of problems.
The Zhan

Device Tracks Blood Flow in the Brain - 2 views

  • A headset ultrasound monitor could make it easier to detect the dangerous aftereffects of brain injuries.
  • The company's monitor consists of a headset that directs an array of ultrasound beams through the head and uses a proprietary algorithm to automatically detect the mid-cerebral artery, one of the major arteries supplying blood to the brain. The device then locks the relevant beam onto the artery and measures its blood flow. A machine attached to the headset gives an index of flow and peak velocity.
  •  
    "A new ultrasound device could make it easier to detect a potentially life-threatening condition". An excellent example of data-logging applied to a practical real-life situation.
  •  
    The invention of this device will drastically improve the monitoring of brain related injuries and in particular the one mentioned in the article - vasospasm. The fact that nearly 50% of soldiers who sustain blast injuries can potentially develop vasospasm is more than enough reason for there to be plenty of funding towards the development of this device. It says in the article that "the company plans to make a more rugged version of its commercial device for the battle field." If the company manages to actually develop this, the amount of soldier deaths in the battle field will decrease as the soldiers will be able to get treatment sooner. Within this development the company could have the data be live streamed to the doctors so that they can analyze the data to see if there is any problem. The data can then be stored so that the patient's development can be recorded. As the device is measuring the blood flow in the brain this could also be used to analyze the soldiers brain whilst on the field. This could contribute to developments in other studies of the brain like post-traumatic stress.
Mr Brooke

Ordering Pizza in 2015 | American Civil Liberties Union - 7 views

  •  
    "Ordering Pizza in 2015"
  • ...1 more comment...
  •  
    Scary! After this video I surely don't want to order another pizza. The social and ethical issue here is surely privacy. With only one phone call, people can "wire into the system" and be able to view this type of personal information. Plus, if this is in 2005, nowadays not only we can figure out this information, but also more! Privacy is becoming a great issue as we are seeing that as technology is increasing, the less privacy we have, more people are starting to be able to access people's personal information. Relating to this videos, solutions that could apply could be: 1. When ordering a pizza, instead of calling from your mobile phone or home phone, call from the nearest phone booth to your house an order to somewhere near your house. Yet, don't give any personal information such as home address or mobile phone number. 2. Don't order! Go to the pizzaria and buy your pizza straight from the restaurant. In this way, you surely don't have to give any personal information so that you'll have more privacy than if you called from your phone.
  •  
    The social and ethical issue here is surely privacy. We can see here that there are various databases which are interconnected and the pizza restaurant is able to access all of them. This is a major issue as the pizza restaurant can invade the customers privacy and use the data to exploit the customer e.g. the pizza restaurant may see that the customer is wealthy and charge a higher price. Furthermore, If anyone else can gains access to this information the customers safety can be put at risk for instance, the pizza service knows whether or not you are at home therefore this could increase home robberies.
  •  
    i think this can even be considered dangerous. There could be a scenario where a young and wealth girl places the pizza offer. what could happen then is the person on the phone would know all her private information where she lives, where she works/studies her income and would probably end up with a picture of her. the person on the phone might not be a very reliable person and decide to do something dangerous
Mr Brooke

YouTube - History Of The Internet (Full HD) - 1 views

  •  
    "History Of The Internet (Full HD) "
Mr Brooke

YouTube - The daVinci Surgical System at Riverside Medical Center - 2 views

  •  
    "The daVinci Surgical System at Riverside Medical Center "
  •  
    Would you be happy about having a surgeon operate on you like this?
  •  
    No
benjon hamal

Razer Launches Mechanical Gaming Keyboard | Hardware Canucks - 2 views

  •  
    Cool this will allow me to use Ebon Blade Banner, Darkmender's Tincture, Hodir's Horn, Essence of Ice, and Raelorasz's Spear, 2 nano seconds quicker than the other n00bs. LEEEEROY!!!111!!!
  •  
    oh yeh and please use the correct tags.
  •  
    sir you got every single thing right there. It's scary.
1 - 20 of 24 Next ›
Showing 20 items per page