Smartphone/Internet Safety

Total Page:16

File Type:pdf, Size:1020Kb

Smartphone/Internet Safety Smartphone/Internet Safety www.safekidsamerica.org Chad Williams Safe Kids America Thompson Middle School Presentation Email [email protected] for presentation notes What They Say… What they say… What they say… Learning Exercise Coffee Shop Scenario Typical unsecured wireless connection. This is what you think that you are logging into… Man In The Middle Attack The Man-In-The-Middle grabs and/or modifies data that is sent/received. http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Coffee-Shop-Data-Collectors • Most public wireless connections are NOT secure • It’s easy to capture your data • Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) • Use onboard firewall software • Lock your screen before leaving your seat • Don’t store sensitive information on your computer • Use an encrypted VPN (Virtual Private Network) VPN – Virtual Private Network Protect your traffic by encrypting it. • http://myvpnreviews.com/ • http://en.wikipedia.org/wiki/Virtual_private_network • http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Ten Ways Your Smartphone Knows Where You Are 1. GPS (45 seconds) 2. Assisted GPS (Speeds up the GPS locator process by using WiFi connections to transmit GPS data…15 seconds) 3. Synthetic GPS (Forecasts satellite positions…2 seconds) 4. Cell ID (Carriers figure out which cell a customer is using, and how far they are from the neighboring cells) 5. WiFi (see next slide) WiFi #1 RSSI (received signal strength indication), takes the signals your phone detects from nearby access points and refers to a database of Wi-Fi networks. The database says where each uniquely identified access point is located. Using signal strength to determine distance, RSSI determines where you are (down to tens of meters) in relation to those known access points. WiFi #2 The other form of Wi-Fi location, wireless fingerprinting, uses profiles of given places that are based on the pattern of Wi-Fi signals found there. This technique is best for places that you or other cellphone users visit frequently. The fingerprint may be created and stored the first time you go there. 6. Inertial Sensors (Most smartphones now come with three inertial sensors: a compass (or magnetometer) to determine direction, an accelerometer to report how fast your phone is moving in what direction, and a gyroscope to sense turning motions. Together, these sensors can determine your location with other outside inputs) 7. Barometer…Some smartphones already have chips that can detect barometric pressure and are best used in combination with other tools, including GPS, Wi-Fi and short-range systems that register that you've gone past a particular spot. 8. Near Field Communication (shopper loyalty company Shopkick is already using a short-range system to verify that consumers have walked into a store. Instead of using a radio, Shopkick broadcasts ultrasonic tones just inside the doors of a shop. If the customer has the Shopkick app running when they walk through the door, the phone will pick up the tone through its microphone and the app will tell Shopkick that they've entered). 9. Bluetooth Beacons (Very precise location can be achieved in a specific area, such as inside a retail store, using beacons that send out signals via Bluetooth. The beacons, smaller than a cellphone, are placed every few meters and can communicate with any mobile device equipped with Bluetooth. The system can determine location to within 10 centimeters. With location sensing that specific, a store could tell when you were close to a specific product on a shelf and offer a promotion. 10. Terrestrial Transmitters…uses the same principle as GPS but are mounted on buildings and cell towers. Because they are stationary and provide a much stronger signal to receivers than satellites do from space, Locata's radios can pinpoint a user's location almost instantly to as close as 2 inches. Another company in this field, NextNav, is building a network using licensed spectrum that it says can cover 93 percent of the U.S. population. SOCIAL NETWORKING SIMPLIFIED 1.Twitter I need to pee. 2.Facebook I peed! 3.Foursquare I’m peeing here. 4.Quora Why am I peeing? 5.Youtube Watch this pee! 6.LinkedIn I’m good at peeing. New Social Networking Apps Name That App WhatsApp WhatsApp is a mobile text messaging app designed to let cell phone users send text messages without having to pay SMS fees to their carriers. The messages are sent via the Internet and therefor require the user to have a data plan on their phone, which is typical of these messaging apps. Messages can include video, audio and photos, not just text. Name That App SnapChat Snapchat differs from most mobile communication apps in that it specializes in sending messages with a particular feature--they disappear. (However, there are ways around this…see next slide for details). The once thought short-lived nature of Snapchat messages has made the app controversial yet popular with young people. The company is valued at $800m and users send 350m messages per day, up from 200m in June. Name That App Text Plus and TextFree The textPlus app TextFree apps offer free unlimited texting on your iPod touch or phone by setting up your own “phone number” that you can give to your friends and family. Name That App Vine (Twitter for Videos) A mobile app that enables its users to create and post video clips. Video clips created with Vine have a maximum length of 6 seconds and can be shared or embedded on social networking services such as Twitter—which acquired the app in October 2012—and Facebook. Name That App GIFYO.com The most popular GIF sharing application on the internet. Allows for animated GIFs. When you get home, search Google for gifyo girls and go to the images…THAT is why knowing these apps ASAP is critical for parents. Name That App POOF Poof is an app that allows you to hide and unhide icons on your SpringBoard (your iPhone interface). The apps are still there, but cannot be seen unless you know how to access them. Poof requires the phone to be “JailBroken”, so if this may be a red flag app if you find it on your child’s phone. Name That App Tango Tango is a free app that, in addition to video calls, is also optimized for voice calls, texting, photo sharing, and playing games. Name That App Talkatone Another mobile app offering free voice calling and text messaging over WiFi or 3G/4G/LTE data plans. The Talkatone website says the Talkatone app allows people to "call and text any US or Canadian phone over WiFi or Data (3G/4G), without requiring cell minutes." What is Internet Safety? Internet safety or online safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, telephone number, birth date and/or social security number can potentially be used by on-line criminals. Adapted from: - Wikipedia: http://en.wikipedia.org/wiki/Internet_safety - eHow: http://www.ehow.com/about_6577504_definition-internet-safety.html Personal Protection From… • Internet Predators • Coffee-Shop-Data-Collectors • “Script-Kiddies” (what you might think of as “hackers”) • Viruses / Trojans / Ad-Ware • Those who take advantage of children & teens – Use “Social Engineering” to manipulate victim – Sexual Intentions – Murderous Intentions – Other Malicious Intent • Phishing Attempts (Masquerading as a trustworthy entity while attempting to acquire sensitive information) • Scam Artists – Email scams are meant to take your money – Scams on Craigslist that are using you to commit fraudulent activities What would you share with your neighbors? At what age should my child start using social media? • According to Consumer Reports an estimated 7.5 million pre-teens –including 5 million under the age of 10 are on a social network site like Facebook Up to age 10 • It's never too early to foster open and positive communication with children. It's a good idea to talk with them about computers and to stay open to their questions and curiosity. • Always sit with your kids at this age when they're online. • Set clear rules for Internet use. • Insist that your children not share personal information such as their real name, address, phone number, or passwords with people they meet online. • Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Up to age 10 • Use family safety tools to create appropriate profiles for each family member and to help filter the Internet. • For more information, see Windows Live Family Safety, Windows 7 Parental Controls, or Windows Vista Parental Controls. • Help protect your children from offensive pop-up windows by using the pop-up blocker that's built in to Internet Explorer. • All family members should act as role models for young children who are just starting to use the Internet. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Ages 11 to 14 • It's a good idea to foster open and positive communication with your children. Talk with them about computers and stay open to their questions and curiosity. (i.e. chat rooms & online predators) • Set clear rules for Internet use. • Insist that your children not share personal information (i.e. real name, address, phone number, or passwords) with people they meet online. • Help your kids create online nicknames that give away no personal information. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Ages 11 to 14 • Use family safety tools to help filter the Internet. • Keep Internet-connected computers in an open area where you can easily supervise your kids' activities.
Recommended publications
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • The Internet and "Telecommunications Services," Universal Service Mechanisms, Access Charges, and Other Flotsam of the Regulatory System
    The Internet and "Telecommunications Services," Universal Service Mechanisms, Access Charges, and Other Flotsam of the Regulatory System Jonathan Weinbergt In troduction .............................................................................................. 2 11 I. B ackground ...................................................................................... 2 14 A . InternetA rchitecture................................................................ 215 B . Telephone Regulation .............................................................. 217 1. The Federal-State Divide ................................................. 218 2. Comp uter II ...................................................................... 220 3. The 1996 Telecommunications Act ................................. 222 II. The Internet and Universal Service Mechanisms ............................ 225 A. The Report to Congress on Universal Service ......................... 225 B. The Breakdown of the Telecommunications/InformationService D istinction................................................................................ 227 C. Why the Telecommunications/InformationService D istinction Doesn't Work ........................................................ 232 D. Universal Service Redux .......................................................... 234 III. The Internet and Access Charges .................................................... 239 A . The Status Q uo ......................................................................... 239 B . Beyond the
    [Show full text]
  • Mass Media in the USA»
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by BSU Digital Library Mass Media In The USA K. Khomtsova, V. Zavatskaya The topic of the research is «Mass media in the USA». It is topical because mass media of the United States are world-known and a lot of people use American mass media, especially internet resources. The subject matter is peculiarities of different types of mass media in the USA. The aim of the survey is to study the types of mass media that are popular in the USA nowadays. To achieve the aim the authors fulfill the following tasks: 1. to define the main types of mass media in the USA; 2. to analyze the popularity of different kinds of mass media in the USA; 3. to mark out the peculiarities of American mass media. The mass media are diversified media technologies that are intended to reach a large audience by mass communication. There are several types of mass media: the broadcast media such as radio, recorded music, film and tel- evision; the print media include newspapers, books and magazines; the out- door media comprise billboards, signs or placards; the digital media include both Internet and mobile mass communication. [4]. In the USA the main types of mass media today are: newspapers; magazines; radio; television; Internet. NEWSPAPERS The history of American newspapers goes back to the 17th century with the publication of the first colonial newspapers. It was James Franklin, Benjamin Franklin’s older brother, who first made a news sheet.
    [Show full text]
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems
    Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems Paul Sabatino, [email protected] This paper details the impact of new advances in residential broadband networking, including ADSL, HDSL, VDSL, RADSL, cable modems. History as well as future trends of these technologies are also addressed. OtherReports on Recent Advances in Networking Back to Raj Jain's Home Page Table of Contents ● 1. Introduction ● 2. DSL Technologies ❍ 2.1 ADSL ■ 2.1.1 Competing Standards ■ 2.1.2 Trends ❍ 2.2 HDSL ❍ 2.3 SDSL ❍ 2.4 VDSL ❍ 2.5 RADSL ❍ 2.6 DSL Comparison Chart ● 3. Cable Modems ❍ 3.1 IEEE 802.14 ❍ 3.2 Model of Operation ● 4. Future Trends ❍ 4.1 Current Trials ● 5. Summary ● 6. Glossary ● 7. References http://www.cis.ohio-state.edu/~jain/cis788-97/rbb/index.htm (1 of 14) [2/7/2000 10:59:54 AM] Digital Subscriber Lines and Cable Modems 1. Introduction The widespread use of the Internet and especially the World Wide Web have opened up a need for high bandwidth network services that can be brought directly to subscriber's homes. These services would provide the needed bandwidth to surf the web at lightning fast speeds and allow new technologies such as video conferencing and video on demand. Currently, Digital Subscriber Line (DSL) and Cable modem technologies look to be the most cost effective and practical methods of delivering broadband network services to the masses. <-- Back to Table of Contents 2. DSL Technologies Digital Subscriber Line A Digital Subscriber Line makes use of the current copper infrastructure to supply broadband services.
    [Show full text]
  • Internet Radio: an Analysis of Pandora and Spotify
    Internet Radio: An Analysis of Pandora and Spotify BY Corinne Loiacono ADVISOR • Jim Bishop EDITORIAL REVIEWER • Phyllis Schumacher _________________________________________________________________________________________ Submitted in partial fulfillment of the requirements for graduation with honors in the Bryant University Honors Program APRIL 2014 Internet Radio Customizations: An Analysis of Pandora and Spotify Senior Capstone Project for Corinne Loiacono Table of Contents Acknowledgements: ..................................................................................................................................... 3 Abstract: ........................................................................................................................................................ 4 Introduction: ................................................................................................................................................. 5 Review of Literature: .................................................................................................................................... 7 An Overview of Pandora: ................................................................................................................ 7 An Overview of Spotify: ............................................................................................................... 10 Other Mediums: ............................................................................................................................. 12 A Comparison: ..............................................................................................................................
    [Show full text]
  • Netflix and the Development of the Internet Television Network
    Syracuse University SURFACE Dissertations - ALL SURFACE May 2016 Netflix and the Development of the Internet Television Network Laura Osur Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Social and Behavioral Sciences Commons Recommended Citation Osur, Laura, "Netflix and the Development of the Internet Television Network" (2016). Dissertations - ALL. 448. https://surface.syr.edu/etd/448 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. Abstract When Netflix launched in April 1998, Internet video was in its infancy. Eighteen years later, Netflix has developed into the first truly global Internet TV network. Many books have been written about the five broadcast networks – NBC, CBS, ABC, Fox, and the CW – and many about the major cable networks – HBO, CNN, MTV, Nickelodeon, just to name a few – and this is the fitting time to undertake a detailed analysis of how Netflix, as the preeminent Internet TV networks, has come to be. This book, then, combines historical, industrial, and textual analysis to investigate, contextualize, and historicize Netflix's development as an Internet TV network. The book is split into four chapters. The first explores the ways in which Netflix's development during its early years a DVD-by-mail company – 1998-2007, a period I am calling "Netflix as Rental Company" – lay the foundations for the company's future iterations and successes. During this period, Netflix adapted DVD distribution to the Internet, revolutionizing the way viewers receive, watch, and choose content, and built a brand reputation on consumer-centric innovation.
    [Show full text]
  • Setting up Spectrum Internet and Wifi
    Setting Up Spectrum Internet and WiFi 1 Connect the modem 3 Connect a wireless a Connect one end of the coax cable to the cable wall device to the WiFi router outlet and the other end to the modem. a Open the WiFi connections on your device. b Plug the power cord into the modem, then plug the other end into an electrical outlet. b Select your unique network name (SSID), which you can c After you plug in the modem, wait for it to connect find on the bottom of the router and on the enclosed to the network (about 2 to 5 minutes) before stickers. If you see the name ending in “5G,” the router proceeding to the next step. is 5 GHz-capable. Connecting to the “5G” network may provide a better experience. If a Spectrum receiver is connected to the cable c Enter the password printed on the WiFi router. This password wall outlet see, the instructions below. is also printed on the stickers included with the router. Not all cables will be used during installation. d Follow steps A-C to connect other devices. 2 Connect the modem and the 4 Activate the modem WiFi router a Choose from two ways to start your service: a Connect one end of the Ethernet cable to the modem and the other end to the yellow internet port on the WiFi router. Use your smartphone to go to activate.spectrum.net. b Plug the power cord into the WiFi router, and then On your computer, browse to activate.spectrum.net.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Understanding the Internet and the World Wide Web
    Understanding the Internet and the World Wide Web 1. The Internet is a network of networks which allows millions of computers to with each other. 2. Computers can exchange information over the Internet using special computer languages known as . 3. The Internet can be used to find and search for information. The World Wide Web is the method by which most people access the Internet. The World Wide Web was by Tim Berners-Lee. 4. The World Wide Web operates over the Internet. It is one way in which computers can send and receive over the Internet. The World Wide Web uses HTTP protocol – one of the languages spoken by computers. 5. Most of us access data in the World Wide Web using a web , such as Internet Explorer or Firefox. The web browser uses to direct us to web pages containing , text, video and sound. 6. The Internet is used in many ways. Email and instant are two other common uses for the Internet. communicate messaging graphics protocols hyperlinks invented data browser Understanding the Internet and the World Wide Web - Answers 1. The Internet is a network of networks which allows millions of computers to communicate with each other. 2. Computers can exchange information over the Internet using special computer languages known as protocols. 3. The Internet can be used to find and search for information. The World Wide Web is the method by which most people access the Internet. The World Wide Web was invented by Tim Berners-Lee. 4. The World Wide Web operates over the Internet.
    [Show full text]
  • An Introduction to Internet Radio
    NB: This version was updated with new Internet Radio products on 26 October 2005 (see page 8). INTERNET RADIO AnInternet introduction to Radio Franc Kozamernik and Michael Mullane EBU This article – based on an EBU contribution to the WBU-TC Digital Radio Systems Handbook – introduces the concept of Internet Radio (IR) and provides some technical background. It gives examples of IR services now available in different countries and provides some guidance for traditional radio broadcasters on how to adapt to the rapidly changing multimedia environment. Traditionally, audio programmes have been available via dedicated terrestrial networks broad- casting to radio receivers. Typically, they have operated on AM and FM terrestrial platforms but, with the move to digital broadcasting, audio programmes are also available today via DAB, DRM and IBOC (e.g. HD Radio in the USA). However, this paradigm is about to change. Radio programmes are increasingly available not only from terrestrial networks but also from a large variety of satellite, cable and, indeed, telecommunications networks (e.g. fixed telephone lines, wire- less broadband connections and mobile phones). Very often, radio is added to digital television plat- forms (e.g. DVB-S and DVB-T). Radio receivers are no longer only dedicated hi-fi tuners or portable radios with whip aerials, but are now assuming the shape of various multimedia-enabled computer devices (e.g. desktops, notebooks, PDAs, “Internet” radios, etc.). These sea changes in radio technologies impact dramatically on the radio medium itself – the way it is produced, delivered, consumed and paid-for. Radio has become more than just audio – it can now contain associated metadata, synchronized slideshows and even short video clips.
    [Show full text]