Risks of Having a Facebook Account. Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with.
The Risks of Having a Facebook Account Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with. I am particularly keen with the privacy settings of my profile in any social networking site I associate my identity and email address with so the privacy check that I engaged in a few weeks ago was just to verify whether or not I have properly safeguarded my Facebook profile. What I did was to sign out from Facebook and search my name as an anonymous individual. I recognized my profile among others whom I shared a name with through my profile picture. What made my name stand out from all the other Gerard Padillas were the university and high school networks which were under my name. I clicked my name and realized that only a larger version of the thumbnail of my current profile picture is further revealed upon clicking my name. I checked some of my friends' profiles and theirs disclosed a few of their friends. This revelation is already quite jeopardous since spammers and people who are up to no good can collect information and also be able to verify assumptions through one's set of friends. Also, the friends who are revealed, especially those who have weak privacy settings, are put in a risk. What really alarmed me was the
Task One - Impact on Information Availability What electronic information do I access and what impact has this had on my life The internet has had a huge impact on people's lives throughout the world, it allows people from all over the world to communicate and meet in one place, and the impact is clearly visible in today's society. Originally used for communication and business the internet has quickly grown and everything can now be found on the internet quickly and easily. Personally, the internet plays a big part in my life as it is easy to find any information that I may require. It assists me in my school work and revision with sites like BBC Bitesize set up with revision resources and links to other helpful sites. I also use the internet for the latest news (and weather) using sites such as BBC News which contain all the days main headlines as well as discussion by the public on these stories. More recently I have been using the internet for online shopping, which is particularly helpful for events such as Christmas, with sites like Amazon and Play supplying goods for cheaper prices than most high street retailers as well as quick and efficient delivery. All of these websites listed are everyday sites which I use as helpful aids in my life, but I also use the internet for my interests and hobbies. I frequently visit sites such as Skysports to check all the latest
M1 explain the role of web architecture in website communications On the internet, there are many websites which let you share information with other users. This is where web 2.0 comes in. While many people may think that web 2.0 is a newer version of the World Wide Web, It is actually just a change in the way that developers use the web. Web 2.0 refers to design that is made to help interactivity, information sharing and communication. It includes web communities such as social network sites like facebook, video/photo sharing websites and blogs and wikis. There are many factors which all successful web 2.0 websites share. These include, being easy and fun to use, being affordable, they have a clear purpose and people can add and edit their own information. Blog A web page that presents short journal entries in chronological order, newest first, is typically referred to as a "blog" or "weblog." Most blogs emphasize links to other pages and sites, and most entries are short commentaries or even simple one-sentence links to an interesting page somewhere else. Many blogs are concerned with current news events and often provide unabashedly partisan commentary. "Blogging," of course, is the act of writing a blog; those who write blogs are sometimes referred to as "bloggers." Cloud Computing Cloud computing is Internet- based computing, whereby shared resources, software, and
E-commerce Ecommerce is the ability to, browse, decide, purchase goods online through the use of the internet and internet transactions exchange procedures. There are four different types of E-commerce and they are • Business to Business (B2B) • Business to Consumer (B2C) • Consumer to Consumer (C2C) • Consumer to Business (C2B) The advantages of using of ecommerce for the customers are * Buying can be easy and private because the product you want to buy maybe in another country making it easier to buy it from your own home and it can be brought privately this way because no one has to know that you have brought that product. * You would have much choice over the internet because the internet has become so big there are endless products you would want to buy. * It can also save you time buying something over the internet because the place you would want to go to could be a long distance away making it more efficient to do it over the internet. * Buying is interactive and immediate because you can buy it with instant success making it easier and immediate. * Can be used 24/7 because the internet ever closes. Disadvantages of ecommerce for the customers are: * Security concerns with personal and credit card details. * You can't check the quality when purchasing like you could in a shop. * Things might look different online to what you get e.g. slightly
The Future of communication -"Behind every man now alive stand thirty ghosts, for that is the ratio by which the dead outnumber the living. Since the dawn of time, roughly a hundred billion human beings have walked the planet Earth. --Now this is an interesting number, for by a curious coincidence there are approximately a hundred billion stars in our local universe, the Milky Way. So for every man who has ever lived, in this universe, there shines a star." (from Clarke's foreword in 2001, A Space Odyssey, 1968) I think the next century; the educational revolution will ensure that learning will be completely liberated from the tyrannies of schedules and locations. Anybody, anywhere will be able to study any subject, and access any form of information - at his or her most comfortable speed. This will make education the life-long process it must be.*** I defiantly think the future of communications is in people. People will become more open to discussion or chat. Interaction of any kind is an important form learning, even body language; people will be more expressive and affectionate with each other. Who knows? The world may be a safer and ever more comfortable place to live…. I mean, we have seen single-interest groups - pro-choice, environmental, animal rights, and gay rights groups being the most prominent in the past centuary. Although I am always feeling since
Hardware and Network issues in e-commerce Introduction This review will discuss the issues and outline some future developments related to the three most prominent forms of network technology, broadband, m-commerce and wireless broadband. What is broadband? A good definition of broadband is: "Broadband refers to any communication technology that permits clients to play streaming video and audio files at acceptable speeds - generally anything above 100 Kbps" (Laudon and Traver, 2002). Typically, broadband is characterised by very high upload and download speeds and most interestingly it is an 'always-on' technology as opposed to narrowband where the user has to 'dial-up' to the server every time they begin a new session on the internet, whereas with broadband the user simply has to click on the internet icon on their desktop and they are instantly linked to home page of their choice. Types of broadband There are many types of broadband access available to the internet user. The most commonly used type of broadband connections made by the general consumer is via cable modem and DSL connections. Cable Modem is usually used by consumers who cannot get DSL connections in their area or who live in a cabled area and is characterised as a shared network service. Internet connection is 'piggybacked' on the television signal received by consumers who have cable television. It
Introduction I am a student starting my second year of A levels at a College of Further and Higher Education and one of these A levels is ICT. The A2 part of the ICT A level consists of three modules, one of which is coursework and it is worth 40% of my overall A2 grade. The coursework requires me to identify and conduct research into an open-ended problem that exists for a real end-user. From results of this preliminary research, I must design an appropriate ICT-based solution for the problem using the skills and knowledge that I have acquired throughout the duration of my course. After designing such a solution, I will develop the actual software to be used to address the problem along with the technical documentation. This software will then undergo extensive testing so that I may identify and correct any bugs that may be present within the system. Plans on how the system will be implemented will then be made, including any training the staff will need and how existing data will be transferred into the new system. Finally, the User Documentation will be produced and I will evaluate the system on a number of various criteria to see if it meets the requirements outlined at the analysis stage. Throughout the whole process, I will be using the skills and experience that I've acquired in the first year of the course (and what I will be learning this year) to incorporate a wide
Examine the key features around the growth, development and policing of cyber crime in the 21st century.
Emma Fields Social Policy and Criminology Examine the key features around the growth, development and policing of cyber crime in the 21st century. The internet was first created in the 1960’s, but it only really started to take off and develop in the last 20 years with big websites such as Google (1998) and YouTube (2005). With the internet developing and people knowing more about it, cybercrime then came about and since then it has grown and gotten more dangerous and more extreme. There are several different types of cybercrime for example one is called cyber violence, this includes stalking and harassment, it can also be bullying people online via social networking sites and chat rooms. Cyber obscenity is another type of cyber crime which is sexual including porn sites. Cyber trespass is the crime of hacking sites and cyber theft is also another cybercrime which is credit card fraud as well as the illegal downloading of movies, music, books etc. Computer hackers are very intelligent, initially they started hacking sites simply because they were able to, and they wanted to explore the sites, at the start it was done just for fun. However it didn’t take long for these hackers to realise their potential and what they could actually be doing, soon it then escalated and they became more educated and more confident in hacking. These hackers could now be described
Nick Strife Data Protection Act The Data Protection Act was implemented to protect the privacy of living individuals who could be identified from the data, or from a combination of data held by the data controller. This also includes any opinions expressed about the individual. When Collecting data, the data controller must ensure they tell the individual who they are, what the information is going to be used for and ensure that they do not collect more information than is necessary. The data must be kept securely and not kept for longer than it’s needed. It must also be kept up to date and accurate. Individuals have the right to access their data at any time. Companies may charge a fee for this but they must respond within a set timeframe set out by their particular contract. The act contains eight “Data Protection Principles”. These specify that personal data must be: . Processed fairly and lawfully. 2. Obtained for specified and lawful purposes. 3. Adequate, relevant and not excessive. 4. Accurate and up to date. 5. Not kept any longer than necessary. 6. Processed in accordance with the “data subject’s” (the individual’s) rights. 7. Securely kept. 8. Not transferred to any other country without adequate protection in situ. This has an impact on businesses because they must ensure anyone involved in collecting or accessing personal data
Administrative systems - The place where I worked for 'work experience' was in Tesco plc in Covent Garden.
Administrative systems The place where I worked for 'work experience' was in Tesco plc in Covent Garden. It was a two weeks 'work experience' in Tesco. One week I worked on the shop floor and the second one I worked in the office. It was an enjoyable work experience and I've learned a lot during two weeks. Tesco is one of the best-known names in the High Street. It is a large public limited company (plc) with approximately 165 000 share holders. By 1995, Tesco had become the largest food retailer in the UK, overtaking Sainsbury's. The company operates 800 stores throughout Europe. What is meant by the term 'administrative systems'? Administrative: relating to the arrangements and work, which is needed to control the operation of a plan or organization. System: a way of doing things. 'Administration system' is a procedure/process to help the business run smoothly. Why are administrative systems important to a business in general? It is important for a business to have 'administrative systems' in place to: * Save money * Help the business run smoothly * Make it easy for supervisors to manage their staff. * Save resources * Save time The main systems at my work placement are: * Answering the telephone. Answering the telephone wasn't that good because when there was a big queue hardly anyone thought of answering the phone, which don't make a quite good 'customer