Recent Changes

Sunday, February 4

  1. page Case Study 2018 edited A Doll Called Alicia Current articles for the case study (publically available) at **https://w…

    A Doll Called Alicia
    Current articles for the case study (publically available) at
    **https://www.facebook.com/groups/606132166253455/**

    'Only the Best' Links
    Link
    ...
    Hackers are able to unlock your front door with the help of a child's doll in a shocking demonstration of how vulnerable cyber security can be at your home.
    Latest Online Resources
    Current articles for the case study (publically available) at
    **https://www.facebook.com/groups/606132166253455/**

    ITGS class website
    Page Manager: Full Name
    (view changes)
    3:47 am
  2. page Case Study 2018 edited ... "My Friend Cayla PartyTime is a beautiful 18-inch interactive fashion doll that offers ho…
    ...
    "My Friend Cayla PartyTime is a beautiful 18-inch interactive fashion doll that offers hours of imaginative play. Cayla can understand and respond to your child in real-time about almost anything. She can tell stories, play games, share photos from her photo album and can sing too. With new MyTouch Technology, Cayla can even magically recognize and talk about her accessories — no smart device needed. Just place an accessory in her hand and Cayla will amaze you with what she knows!"
    This Toy is Spying on and Recording Kids
    ...
    it down.
    "Two

    "Two
    talking dolls
    ...
    your family.
    On Dec. 6, a coalition of international consumer watchdog groups filed a complaint to the Federal Trade Commission. The complaint alleges that the dolls My Friend Cayla and i-Que Intelligent Robot, which use speech-recognition software to have conversations with kids, are using this technology to record their personal information. The coalition also claims this is happening without parents’ knowledge or consent and is potentially violating laws that protect children’s privacy."*
    HACKERS CAN UNLOCK YOUR FRONT DOOR BY A CHILD'S DOLL
    (view changes)
    3:39 am

Wednesday, January 31

Saturday, January 13

  1. page 3.4 Internet edited ... {What happens.jpg} 'Only the Best' Videos and Podcasts **Net Neutrality - What it is and w…
    ...
    {What happens.jpg}
    'Only the Best' Videos and Podcasts
    **Net Neutrality - What it is and why you should care?**
    Chinese Tech Firms Forced to Choose Market: Home or Everywhere Else
    The video shows the power of WeChat - the all-purpose app being copied by Western companies.
    (view changes)
    3:30 am

Tuesday, December 12

  1. page 1.2 Security edited ... See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Se…
    ...
    See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Security.
    Security Solutions
    The most damaging hacks and
    data breaches of 2017, so far

    {security_taxonomy_small.jpg}
    Click on the image on the website and
    (view changes)
    12:55 am
  2. page 1.2 Security edited ... See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Se…
    ...
    See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Security.
    Security Solutions
    {security_taxonomy_small.jpg} Click
    Click
    on the
    ...
    the website andreadand
    read
    about each level of security.http://www.the451group.com/security/451_security.phpsecurity.
    http://www.the451group.com/security/451_security.php

    'Only the Best' Links
    Description
    (view changes)
    12:53 am
  3. page 1.2 Security edited ... See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Se…
    ...
    See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Security.
    Security Solutions
    ...
    the website and readandread about each level of security. http://www.the451group.com/security/451_security.phpsecurity.http://www.the451group.com/security/451_security.php
    'Only the Best' Links
    Description
    (view changes)
    12:51 am
  4. page 1.2 Security edited ... STRAND 1: Social/ethical significance > 1.2 Security See the ITGS Guide p. 21 for details …
    ...
    STRAND 1: Social/ethical significance > 1.2 Security
    See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Security.
    Security Solutions
    {security_taxonomy_small.jpg} Click on the image on the website and read about each level of security. http://www.the451group.com/security/451_security.php
    'Only the Best' Links
    (view changes)
    12:49 am

More