2.5+Home+and+leisure

Facebook is one of the biggest social network that is used by millions of users worldwide, but recently it has been getting complaints about its security and privacy. Therefore, Facebook is clarifying their policy on User Identification Data, because third party companies are not allowed to share the UIDs it collects to ad networks. Facebook modified its policy to forbid UIDs from leaving third-party applications and for such information to remain confidential. Ad networks had to sign a policy deal to make sure that they delete any information they obtain. Any who break this policy get placed on moratoriums, and will be observed, so that they don’t do it again. Not only were the small developers effected, but also big companies such as Zynga were also caught transmitting some information. || 2.5_social_networking || To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. 2. Define digimarketing. 1) Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. 3. Explain the mistakes marketers make with social networking. 1) Marketers are not using the ‘social’ side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the ‘Twitter trend’, and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users. || 2.5_social_networking || Digital citizenship and people + machines / Home and leisure 2. Identify the main stakeholders to the IT system. Broadband technologies, 3D shopping, people individuals online shopping / Designer Companies, Online Shoppers, Ubermall 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. The ITGS terminology and systems is concerned to the virtual 3D online shopping. The site will allow shoppers to build new relationships by chatting with sellers and fellow customers. online 3D virtual world promoting businesses and tourist attractions that represent the country's "creative economy" policy. The new online shopping has opened in Thailand and it is likely 3D virtual mall. Shoppers can fill up their currency at anytime on the Internet by that currency software. 5. If possible, describe a solution to the concern (issue). The issue in this article is that this action will increase the economic issue and the business can increase their amount of products. " The company is also expanding its presence to Facebook, at apps.facebook.com/taraddotcom, in an effort to bring together its merchants and offer them the chance to sell their products through the world's most popular social network, in what is described as the first example of "social commerce" in Asia. However, there should be some security for payment online, which means that the site must be more secured in term of policy. || 2.5 home and leisure || Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook’s users’ computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer’s Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim’s social network contacts. This is a security breach to Facebook’s users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a way through, members of the operations team remove them. Facebook also has systems to detect the fake profiles the group uses to seed attacks. Facebook developers have created roadblocks that can help halt the attacks. For instance, if Facebook detects malicious activity and suspects a user’s PC has become infected, it will temporarily suspend the account and require that the user run a free McAfee antivirus scan and remove infections. || 12월.10 ||
 * Strand 2.5 Home and leisure ||
 * Date || Article || Comments || Tags ||
 * || Facebook tightens grip on user ID data - The Economic Times || 1) Summarise:
 * March 2011 || Bangkok Post : Leveraging social networks for sales || 1) What does it mean to leverage social networks?
 * 11월.10 || Bangkok Post : Virtual mall opens its doors || 1. Identify the area of impact the scenario relates to.
 * 3월.11 || Apple iPad 2 vs. Motorola Xoom || In my opinion it would be Ipad, but that's only if you're too intense about the aesthetics of Apple's iPad. I am sure that many people are obsessed with the look and how famous Apple products are. Even though Motorola Xoom seems to be better with its Horsepower and screens. I know how good Motorola Xoom is base on the rear end camera and the wider screen. But, new Ipad is out now! There is camera too which much better design and it is only 8.8 mm. when Motorola zoom is 12.7 mm. I believe that new Ipad would get develop much more. || 2.5 Home and Leisure ||
 * 11월.10 || Koobface Worm Sharpens Facebook Security - NYTimes.com || 1. Identify the area of impact the scenario relates to.
 * 9.6월 || Don't pay for technology || I might use Adobe Buzzword, BibMe and 4 shared. For example Adobe Buzzword is helping me to write document on desktop therefore I can prepare my report or essay perfectly with free cost. BibMe is making citations in MLA format automatically so I don't have to spend my time writing and sort out about citation formatting. 4 shared is good program which gives all users free 5 GB of storage. So that I can save my work and I don't have to bring my USB all the time and if there is internet access, I can access to the internet and work on my work which saved in 4 shared. || 2.5 home and leisure ||