Skip to main content

Home/ ITGS News/ Group items tagged IT Technology

Rss Feed Group items tagged

Madeline Brownstone

NOVA Online | Cracking the Code of Life | Watch the Program - 7 views

  •  
    Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
  • ...10 more comments...
  •  
    Criterion A- The IT system (research DNA database) that allows medical researchers to record and track medical histories throughout generations, arise a variety of issues. One of these issues is privacy, where the database holds genetic information that many ethical doctors call a "future diary". These medical databases can be analyzed by a variety of people and those who have access to this information are handling private information. The major stakeholders were those patients who gave up their DNA because their genetic information put into the hands of these medical doctors creates the privacy issue. This information needed to be well stored and doctors take implications such as encoding social security numbers and no names are used. Criterion B- These research DNA databases begin with the obtainment of genetic information. In a relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. Criterion C- From the point of view of the major stake holders (patients who given up their genetic information) the IT system (research DNA databases) (Not done)
  •  
    Criterion A) The IT system is a database. This database is a link of DNA records, health records, and family trees. Major stakeholders of this issue are citizens of Iceland who agree to let their information be put on these databases and analyzed. Criterion B) The database works in parts. First, there is already a database of family trees in place. This family tree generator works by inputting an individual's social security number. After this is in place, the name of many generations of ancestors of this individual is shown in a tree. Then, the creator of the database asks for the permission, of family members, to add the DNA code and the health record of each person. This allows for a social security number and a disease to be input at the same time. With this, the scientist can see those who have it, and those who don't. Then, with the use of the DNA codes, they can "hunt down" genes that cause certain diseases. The database is related to an issue of privacy. This is because those who allow their health records and DNA code, are letting the medical team and users of the database know all things about them. With just a social security number, a user that has access to the database may learn more things about you than you may want: such as your family, what diseases you may have, and many other things. Another issue is in reliability. There is the possibility that the medical teams that try to track genetic code differences between those with a disease and those without it, may come to realize that a difference they find is only a coincidence and not helpful. (not completed)
  •  
    The IT system being used is the DNA database that are being kept on the Icelandic people. The DNA database holds a lot of information of the people in the database and even things that they do not know such as their DNA and what it means. The major stakeholder is the people that are sending their DNA information, blood samples, medical histories and family trees. The issue of privacy is then involved because of the personal information that others can go through by accessing the database. The database is run by first getting the blood sample of the patient who willingly gives permission to give their DNA information to the company, deCODE. The information is then entered into the database which organizes the information by each person's social security number. The relational database is used to organize the information. (Cont.) The impacts of the database is both negative and positive. The database can be
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. * The IT system described in this video is a medical database. The major stakeholder are the doctors who manage the data of patients in the relational databases. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). * A relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. * One of the positive impacts of these medical databases are that the family tree is in a database and all health records can be found for each patient and because this is a relational database, all of the patient's information is linked to their families and other people who have similar diseases. This is beneficial because experts can see trends in the people who have a certain disease and once they figure out the "spelling" of the genetic code with the disease, they can work on coming up for cures for that particular disease. A negative impact of the medical databases can be privacy. The doctors have access to every patients information and they can know everything about a certain person or family if he/she wanted to. This would then raise an issue of integrity.
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system is the database and the issue is who has access of the Database which has medical records of individuals. The major stakeholders are the Doctors and Patients. Doctors are trying to find information on specific DNA that create sickness and diseases. Finding the relationship between the family members and there DNA, can possibly improve medicine and also allow doctors figure out what an individual can have(sickness) in future references, making inferences of what might happen. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). A data base function is that it is a computer stored software that contains tables of various information and organizes all the data into categories. One subject/category can be related to another with little difference. This is why the database makes it easier for information to be viewed and interpreted much faster. By entering data on the tables one can interlink topics in order to find specific information needed. The person who enters the data can use software like Openoffice to create a database to view DNA and the relationship with the other individuals. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. The primary issue of the negative impact on Databases, have on the skateholders for DNA purposes is Privacy. Privacy has a big part in the stakeholders because many of the patient give away there Social Security number which is something private to them. With the Social Security Number the doctors can have access to other information not related in there investigation of finding a cure. This can cause reliability with the doctors to decrease. The database would have information of all sort on there medical records which should not be something that would be public for eve
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues: The IT system in these videos were medical databases containing records of many patients. Specialists use these databases to help them identify where a certain disease came from and whether or not it could be treated. they do this by viewing the patients ancestors records and seeing who had the disease in that family tree. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). Specialists (with the permission of the patient) insert a patients social security number into the medical database and let the database generate the patients entire family tree. Using this family tree, doctors were able to "hunt" down the origin of diseases, by looking at the genes of the ancestors. That way, by matching the DNA of the patient affected by a certain disease with the DNA of one of his/her ancestors DNA that suffered the same disease, and looking for similarities or patterns. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. There were several positive and negative impacts regarding this "hunting down" of diseases. By looking at family trees specialists and doctors would be able to determine what caused the disease and possibly come up with a cure or treatment for it. However, many patients are concerned with doctors going through their records and DNA due to there being a lack of privacy. If patients grant permission, specialists would be able to find out and know absolutely everything about their health history. Specialists argue that it would be of great benefit to detect diseases early so they could be treated by doing this. Chips are being created were thousands of babies genes could be looked at to look for any abnormalities. Some people argue that even if a disease were detected, there's two possibilities, one
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system involved is the DNA database system, identified as an organized collection of age old family trees, accompanied by state of the art DNA analysis and computer technology. Systematically, genetic information (DNA) is stored in related tables, distinguished by individuals' own security number codes. One centralized ethical and social consideration is privacy, mainly a major concern of the involved DNA suppliers (the public), that place their given personal information (genetic data, reference to family origins, medical history etc) in a national database system, from which the accessing of medical records and history of one's entire family can become manipulated or misused. In addition to the elevated risk of data misuse, once the involved participants (Icelandic citizens) give access to their personal information, there are no limitations placed on the utilization of the data within the national database, as it becomes accessible for the government, medical researchers and operating staff. Thus, the implications are straining to the individual donor, unable to determine when, how and to what extent the information given is shared amongst other groups. Furthermore, the privacy of the participants undesirably opens access to the medical information of related family members, as cross-referencing and data matching give the research staff operating the DNA database, access to retrieve a plethora of other members' data mainly for the purpose of effective data mining (the retrieval of hidden predictive patterns, as a diagnostic tool to decode the occurrence of genetic disorders/diseases). CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). With the possession of participant's medical data, including blood type, isolated samples of DNA, medical health records e
  •  
    The primary IT system in use is a DNA database, which includes information about patients, illnesses, and virtually one's make up as a human. DNA databases allow researchers to find patterns in a human genome, by looking at the DNA from various family members and determining the difference or similarities between the DNA of family members. This is done through database functions such as data mining, and data matching. Locations such as Iceland, have a database that traces back all of the people within the country to their Viking ancestors. These family trees have been paired with DNA analysis in order to trace diseases back to their start. Some more tests could be conducted in order to determine which of the living relatives of one family with arthritis, for example, have the disease. Then, the DNA can be compared in order to identify the exact gene that is at fault for the disease. This process is very easy to do because the database with all of the ancestral information is accessible with the presence of one of the family member's SSN. A simple data query can then bring together all of the person's information. Moreover, DNA, health records, and the family trees of Iceland were proposed to be linked. This could be very beneficial because new drugs could be made available to suit the specific disease of a patient. It could also be a way for diagnosed patients to take early preventative measures. This could increase the probability for a cure, and in general this would increase the life expectancy of certain areas. However, some doctors in Iceland opposed to this linkage, because the information is representative of each person's medical history, and potentially their future medical history. This information, according to the plans of the linkage of medical records and the family tree, would be available on a central database that would bring together private information about a person and connect it to all of their family members, past, present, and future. T
  •  
    There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
  •  
    Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Madeline Brownstone

BBC NEWS | Technology | Big Brother is watching you shop - 0 views

  •  
    "There is an enormous pent-up demand for personalised location advertising, whether it is on your cellphone or PDA, on your radio in your car, or on the billboards you walk by on the streets and inside stores," says Bruce Schneier, chief security technology officer of BT. "This is yet another technological intrusion into privacy. And like all such intrusions, it will be taken as far as the owner of that intrusion finds it profitable."
  •  
    "There is an enormous pent-up demand for personalised location advertising, whether it is on your cellphone or PDA, on your radio in your car, or on the billboards you walk by on the streets and inside stores," says Bruce Schneier, chief security technology officer of BT. "This is yet another technological intrusion into privacy. And like all such intrusions, it will be taken as far as the owner of that intrusion finds it profitable."
Ariel A

How the society and human impacts of technology affect us - 1 views

  •  
    "The idea of engagement -- using technology to bring about discussions -- as well as incorporating commonly held human values should be brought into the design process, the researchers said.The notion that a piece of technology can be simply be produced and plunked down in front of a person "is unlikely to move us forward," said Tom Rodden, a professor of interactive systems at the University of Nottingham."\nJeremy Kirk, IDG News Service\nSat, 5 Apr 2008 23:00:00 UTC\nThis information I felt was very important because it helped me think of technology in a whole new way. Technology is not what is going to help us make the future, its us(humans) who are going to have the idea and the capacity to create this future using robots/machines to help us create the basses of it. Robots will have a huge impact on how we live in our everyday lives.
  •  
    I think i should get a Sufficient Criteria(2 marks)
Lenny H

Telemedicine Healing Haiti Earthquake Victims, Puts Healthcare on the Map - 2 views

  •  
    This articles with the solutions that were created by telemedicine during the disastrous earthquake. Much similar to victims in Argentina or those in Argentina who don't have telemedicine, those victims in Haiti are being treated through telemedicine. After the unfortunate earthquake in Haiti, the University of the Miami took into their own hands to set up various tents around Haiti. Besides having very little medicine, Haiti also had a communication problem. These from the University of Miami were not able to communicate with those from the United State. Therefore, they set up real time technology as a form of communication in order to consult colleagues at the University of Florida. Two devices about the size of a laptop were donated to them, and the satellite telephone, internet and video camera contained in each allowed the doctors to communicate with each other. These satellites allowed doctors to conduct and give prescriptions as well as well as communicate to other doctors of those patients who needed to evacuated from the are and taken to the United States for Health care. This article also talks about doctors who are using cellphones in order to take pictures and perform x-rays. There are a variety of stakeholders in relation to the satellites that are allowing the doctors from the University a Miami to perform their real time operations for their consultations and for prescribing medicine. One of these stakeholders would be the people or victims in haiti. After the Earthquake, many were left in dangerous need of assistance, and without these satellites, there would be no way in which they could communicate with people in the United States (The University in Miami) in order to get proper prescriptions. These are very important stakeholders, because if the people of Haiti aren't provided with this form of telemedicine, they would not be able to get treated for the illnesses/injuries that occurred to them during the earthquake. Another stake holder is the U
  •  
    niversity of Miami. Without these satellites, they would not be able to do their job. This is the only form of communication they have with their fellow doctos in the United States. In the Article, is specifies that the doctors had a hard time creating forms of communication in Haiti, therefore if the satellites do not function, the doctors from UMiami, would not be able to prescribe medicine to the victims, and the victims would not be able to get their treatment. Social and Ethical issues then arrive from the Article and the IT system. These satellites that allow for communication and telemedicine are breaking down the digital divide. Specifically in the article, it states that Haiti did not have doctors and that form of technology in order to perform telemedicine. These satellites and bringing them to Haiti was breaking down a digital divide, in which it was giving them the IT that other countries were already familiar and working with. Another Social/Ethical issue that arrives from the IT system is Globalization. In the way in which it breaks down cultural, economic, or divisions causes by a countries location to another. The IT system allows for those in Haiti to communicate with those in the United States. Therefore, it is creating or breaking down any divisions that were previously there because of their location as countries. Another major Social/Ethical issue that arrises is Reliability. The doctors from the University of Miami are relying on these satellites in order to perform their job. If there is an issue on their reliability, it would be catastrophic to the worked (not having any form of communication with their colleagues) as well as the people who would no source of medicine through the real time consultations.
Noreen C

TAGSYS Develops Airline Industry's First Reusable RFID Baggage Tag for Qantas | Busines... - 1 views

  •  
    In airports nationally and internationally, flyers have to stand in line to wait to check in. The process is anything but welcoming for those who are running late, dislike crowds, and are just simply impatient. The process is just has grueling for the workers who have to deal witht the annoyed customers day after day. Luckily, the ticket kiosks have made the check in time shorter, being great for those who have no luggage to check in, but still just a part of the process for those who do. With RFID tags, the check in process isn't as dreadful. Companies are now begining to use reusable RFID tags that can track up to four flights at a time for each luggage, and can be programmed to track upcoming flights. This technology reduces the check in time, and increases effciency as the luggage is already associated with the flyer, and it's location is known at all times. Lost luggage can be found easier, and the manual labor needed for check in is cut down. There is also less paper being used, since the RFID tags only involve electronic mediums. For both the flyer and the company, the RFID tags can be a bright future. However, with more and more ways to eliminate time and human error, it is possible that the jobs of the people at the check in will be reduced. This seems to be a problem with many technologies, but this is the way in which our future is going. But, even though technology seems to be super efficient and a lot better than humans, it has it's flaws. RFID tags are read by radio rignals. If the tags are broken, or placed in an area where the radio signals cannot reach, then the tags are useless. There also needs to be new technology that allows airline companies to begin to use the tags, which may be costly. Another major issue is that in order to increase efficiency, all of the customers must be on board. There is no guarantee that this will happen any time soon, or that all of the airline companies will wish to use the technolgy.
Noreen C

New Toolkit for Disaster Response: Social Media, Mobile Tools & Telehealth - Features -... - 1 views

  •  
    According to Alexander Vo, an associate professor in preventive medicine and community health, telemedicine is a helpful measure to be taken in order to help patients from a remote location. However, he says that problems have arose when telemedicine was used in relation to diaster relief. One example given is the earthquake in Haiti, when many technologies were donated by companies in order to promote the use of telemedicine for immediate disaster relief. Vo says that this technology was not used, especially within the first few weeks, because the locations were staffed with enough doctors. Further, even if the technology could be used, the doctors were not trained to use it, and there was no time to train them at that moment.Only after the voluntary doctors went back to their home towns could they be of any use in regard to telemedicine. The patients in need of special care could then connect with the doctors in the remote areas, however, there could be problems if the internet was down, or if the necessary hardware was destroyed due to the diaster. Even though the egagement in telemedicine was not the best for Haiti, it was seen to be of great help for a hurricane in Texas recently. Vo explains that telemedicine was successful because it was already established within the communities. The technology was available throughout the affected areas, and could be put to use immediately. The use of cell phones was also crucial, because many of the patients had pre-established access to doctors who could help diagnose and alleviate the problems of the patients in affected areas. Because the protocols were established prior to the disasters, the care was planed out to be available to the most amount of patients. Plans in advance can also taken into account the problem of damaged internet service, cables, and networks, and determine what the best plan of action is given the situation. Thus, the relief would allow the affected area to be back on track quickly, and efficientl
Mariam B

In Haiti, Practicing Medicine From Afar - 0 views

  •  
    This article deals with how telemedicine was used following the earthquake that occurred in Haiti in order to provide medical care to patents and individuals. The stakeholders in this scenario include the patients and doctors in Haiti and the doctors/hospitals in the U.S. They are able to use satellite technology and wireless internet, in order to bridge the gap between both areas and provide people with access to medical care. Satellite technology is used to communicate between doctors in the U.S with clinics in Haiti. This provides real time service to patients, where the doctor is providing a consultation and diagnosis immediately to the patient. This technology also allows doctors in the U.S to perform surgeries since the satellite technology is able to support telemedicine because it provides a high amount of bandwidth. Additionally, in Haiti they are using high speed wireless internet throughout certain regions. The radio system is used in extreme cases where more advanced technology is not available, but still allows doctors from two areas to communicate with one another. Images and messages during consultations are sent through a secured network, so the data of the patients is kept private. Obvious benefits of using this technology include that people are able to get access to medical care and this decreases the digital divide and globalization. This is because people are able to get more care and consultation through using this IT technology, which would not have been available without telemedicine. However, some issues still arise despite these benefits in medical care. This includes the security of information and privacy of the patients. In this case, the article states that the internet messages are secured so that there is not privacy breach. This must be done using encryption technology so that people are not discouraged from using telemedicine and so that no private patient information is leaked or seen by unwanted users.
Kim T

RFID Implants Found to Cause Cancer Tumors - 0 views

  •  
    It would seem like a great idea to be able to see patient's medical records on the spot, clearly and accurately. However, RFID's should not be the technology used to do so. Some patients have had RFIDs implanted into their skin for doctors to scan but in rats, no less humans, there have been cases where links between the use of RFIDS under the skin and cancer has been linked together. Many people would know about this, especially if they were to have the procedure done but this isnt the problem. Companies using the technology are practicing it on those who cannot protect themselves from its  harm. Patients who have Alzheimer disease are commonly practiced on. The question that poses from this is what and will the government do anything to stop these companies, why was it approved of and is it worth the medical advantages?
Elisavet M

"Virtual Reality tackles tough questions" - 1 views

  •  
    Scientists in Barcelona have constructed a technological device, enabling users to engage and "live" within a virtual reality; this digital world however, is bound by the oppressive and devastating human conditions experienced by the victimized individuals of physical and verbal maltreatment. The device, although it may conjure ethical realizations within the user's mind, also poses as an ethical dilemma for it brings the cruel severity of the downtrodden and exploited people into visual and mental display terrorizing the emotional stability of the participants.
  •  
    Technological breakthroughs in decoding the human mind have blossomed ever since the invention of a device through which users are immersed within a virtual reality, to live and experience the trauma and distressing scenarios of people victimized by physical as well as emotional abuse. Developed by a team of Spanish scientists, this device is breaking down the mind's irrational judgement in relation to discriminatory or wrongful perceptions against others. The user of the device, once transported into the anguished lives of the virtual characters, comes face to face with the agony of living through abusive violence, and begins to form a clearer impression about the effects of such experiences upon the lifestyle, behavior and well being of any victim. In doing so, the participant ultimately widens the boundaries of his mental state of thought, and begins to appreciate and acknowledge the peace given by a happy life rid of gnawing internal complications. However, in engaging with such a virtual reality the user becomes an unshielded target of bitter misery, felt and illustrated by the depictions seen through the device. The software that is included in this article is the technological device that offers an entrance into the virtual world for the user. The stakeholders within this article are the users of the device, whose mental and emotional stability is controlled by the virtual reality developed by the scientists. The scientists hold the success of the entire experiment in the palm of their hands, and really are the source of the effect upon human behavior. One has to take into consideration the physical and psychological considerations (in "Health" scenario) of technology on the user of this particular device; although this device does help others modify their morality as they expand their considerations for the factors that have made people what they are today. The device however, does inflict the same trauma and terror depicted by the gestures and movements
  •  
    I agree with the ethical and social concerns involved within your article. Although there are some benefits of recognizing the pain and violence inflicted on others, it can cause emotional stigma and trauma upon the person who is using this technological device. Technology controls our ethical morality, in developing software that explores the way the human brain works we destroy this boundary of what is right and wrong because we begin to focus on research and forget the effects involved. In this case, those involved in the experiment are unaware of the effects that this virtual reality exposed to the user will eventually have on them mentally and emotionally.
Mariam B

How Good Software makes us Stupid - 1 views

  •  
    This article discusses the drawbacks of using digital technology as a mode of acquiring knowledge. Although many believe that the emergence of digital technology allows individuals to increase their knowledge through the use of navigation devices and laptops, studies show how our intellectual capacity of storing and memorizing information is suddenly decreasing due to our dependancy on such devices.
  •  
    Within our current society, individuals are very dependent on their digital devices in order to provide them with knowledge. However, studies prove that the more reliant we become on this technology our ability to calculate, process, and store information decreases. We resort to our laptops, cellphones, and navigational system devices in order to find out how to get to a certain location or to quickly gain some information about a certain topic. This article investigates the social and ethical concerns involving people and machines: individuals are able to access knowledge, gain answers to their questions, and fulfill their curiosity using digital devices. This is beneficial in the way that we able to expand our knowledge on a variety of separate topics in a generally fast and efficient way. However a drawback that is triggered through the continuous use of this technology is the dependancy on using it as the only mode of gaining information. Traditional means of reading a newspaper or book have been abandoned and many individuals have resorted to search engines on the internet. This alternately limits our in-depth knowledge on a focused subject. The stake holders in this case are taxi driver who would usually memorize highways and routes to various places within a city have adopted to using their GPS as a easy guide to reach their destination. Additionally students, parents, and many organizations also often just use their digital devices such as the GPS, cellphones and their laptops to get quick answers. This article explores the use of IT in the process of teaching and learning. We are using our digital devices to learn from online forums and research from search engines like google. Individuals immediately turn to technology to search up the answer to a question that they have. Additionally it concerns the idea of mapping virtual globes through the use of GPS, taxi cab drivers are able to locate the destination that the passenger wants to arrive at.
Elisavet M

TECHNOLOGY; Companies in Radio Tag Business Broaden Legal Dispute - 0 views

  •  
    Discussion about the agreement to integrate the new process of product tracking in company supply chains (RFID technology), continues to widely expand and challenge the business mentality as it has become reinforced by major companies such as Wal Mart and the Defense Department. A dispute transpired between two alliance companies, Symbol (a leader in bar code systems) and Intermec, as both were unable to consider possessing concurrence upon licensing proposals for RFID technology usefulness. Initially, Intermec Technologies, accused Symbol of infringement transgressions in regards to six Intermec patents that were being sold by Symbol; such products included the utilization of RFID technology, an investment that was supported upon by both business partnerships. Such accusations had been followed after Symbol had also charged Intermec for infringing patents including Wi-Fi technology. The issue of integrity as well as reliability resurfaces in this particular case, directly conveying the disadvantages of business collaboration, that must embed mutuality in justly managing shared information, equality of confidentiality and a clear understanding about each businesses' ideas and plans for profit purposes. It is significant to have fluidity in exchanging perspectives, in order to establish a solid foundation of trust that stands as a promise to future investments and processes.
Karen M

Visa Introduces a Credit Card on a Phone - NYTimes.com - 1 views

  •  
    In this article, RFID is being used in the business world. People are now able to purchase phones with the capability of making purchases by moving it over the terminal. RFID technology allows people to stop using credit cards, making the process of buying something even more convenient. The stakeholders are the credit card companies, the people using this new technology, and the stores with the terminals that read RFID. Credit card companies need to have a good security system to ensure their customers and users that their information will be kept safe on the RFID chip. The people who are switching to this new technology are risking their private information for convenience. The stores with these new RFID terminals are also risking their customers' private information because there is a possibility that their system could be hacked. The area of impact is Business and Employment. Businesses are switching to this new technology because it is convenient for them as well as their customers. The main issues that arise from using RFID are security and reliability. The RFID terminal needs to be reliable so that every customer is able to use the RFID chip on their phone to make purchases. The security issue is that a hacker may be able to get into the system to read customers' private information. It may also be possible for a hacker to carry around a portable terminal that would be able to store people's private information on it for future usage. The security system described in this article sounds like a good start, but more needs to be done to keep up with the technology that is growing along with it.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Madeline Brownstone

Multi-purpose TV aids India - 3 views

  •  
    "The underlying problem," he says, "is how you can increase their wealth and reduce their poverty and reduce their illiteracy, and improve their health care.' "And what I'm postulating is that this is the technology that will enable them. If I didn't have it, it would be an uphill battle. Even with the technology it's an uphill battle. But I have a tool. There is hope. I can reach them in ways that have not been possible before."
Daniell S

Security risk found in new credit cards - Technology - International Herald Tribune - 1 views

  •  
    In this article it talks about the idea of putting RFID, or Radio Frequency Identification technology into a credit card. This can be both a good thing and a bad thing. It would be a good thing because it would totally change the way a business could work. It would decrease the amount of time a person spends in a store. A person could simply walk in and out of the supermarket with the items they wanted and the amount of money would be charged directly to the persons credit card. However, this could result in an increase in credit card abuse. with RFID technology the signal could be picked up by any radio frequency. This can result in identity theft, and credit card fraud. This is a a violation of the social and ethical issue Security. The stakeholders in this situation would be the credit card users, and the companies issuing the credit card. The users would become angered that their credit cards could be maxed out without them using it more than once and the companies could be sued for each credit card they issued.
Carmen M

RFID security, data protection and privacy, health and safety issues - 0 views

  •  
    This was a rather long but interesting article to read regarding RFID. It starts out by stating what RFID is and how it is being planned on being introduced across many stores. What made this article informative was that it discussed not only the first thing that comes to mind when we hear this, privacy and security, but also possible health and environmental issues. Security was a big issue discussed. Concerns that came up was who would manage the information picked up by RFID's? Can this be used to track people? Can personal items or documents integrated with RFID track a specific person? Would they know? To what extent does this violate privacy? Are there laws to prevent any form of privacy violation? The article also stated people might have a choice whether or not to use the RFID and what would be the other option. Another issue stated was a health issue. Since this uses radio frequency waves, can this pose any damage to lets say tissue cells? The hypothesis was that no because it uses different kinds of waves than other technologies. However, this technology is too early in its stage to know for sure. Another concern was the disposal of this technology. What effect would it have on the environment. Again, it was too early to determine for sure.
Karen M

BBC NEWS | Technology | Software maps Rwandan health - 4 views

  • The biggest challenge is to collect enough information to make the databases reliable.
    • Karen M
       
      Social and Ethical Issue: The issues in this article are reliability and integrity. The information that is put into the database needs to be accurate and reliable for other doctors to access. It is important for the data to be reliable because doctors need to be able to know about the other cases of malaria as well as the resources they have.
  • The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
    • Karen M
       
      IT System: The Geographic Information Systems (GIS) is the main IT system that is being discussed in this article. IT is large database compiled from information from smaller ones.
  • The system has allowed health workers in Rwanda track the number of malaria cases at each health facility.
    • Karen M
       
      Stakeholders: The people who are being affected are the doctors who access and add information into the database, as well as the patients who are being treated.
  • ...1 more annotation...
  • A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda.
    • Karen M
       
      Area of Impact: Health
  •  
    A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda. The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
  •  
    A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda. The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
  •  
    A system of electronic mapping has been developed that allows different types of data to be layered onto a single image. It is being used to improve the health care in Rwanda. These digital maps are called Geographic Information Systems (GIS). The database is compiled of information from different doctors working on cases of malaria. This brings up the issues of reliability and integrity. The information in the database needs to be reliable enough for the doctors to use in treating patients with malaria. It affects both doctors and patients, but the patients are being affected the most because they are the ones being treated. If the information is inaccurate, the patients may be placed in dangerous situations.
Santiago P.

Why IT Jobs Are Never Coming Back - Computerworld - 0 views

  •  
    I chose this article because I found that it especially related to the field that we are currently studying in. It is that of ITGS, Information Technology. IT jobs are more and more frequently being offshored to nations like India. There is an obvious issue relating to Business and Employment, or in this case, a rising unemployment. The main stakeholders are the IT workers, who, with the hopes of entering a strong workforce, are having their jobs offshored by multinational companies like IBM and HP (these companies are also primary stakeholders). The primary social and ethical issue involved is that of equality of access. This is due to the fact that access is becoming more widespread - access to technology, computers, databases, servers - all throughout the world. There is no longer "the need to be local", as the article states. People's jobs can be moved to a cheaper place, where it won't be so expensive for the company to keep its workers. Offshoring is not only creating higher levels of unemployment, but helps worsen the U.S. economy while it strengthens foreign economies.
1 - 20 of 118 Next › Last »
Showing 20 items per page