Skip to main content

Home/ ITGS News/ Group items tagged 1.3_privacy_anonymity

Rss Feed Group items tagged

Madeline Brownstone

Flames with names? That is the online question | online, world, real - Home - The Orang... - 2 views

  •  
    "Last week, one of the world's most successful online gaming companies, Blizzard Entertainment of Irvine, told its global community of World of Warcraft players that they'd have to use real names in forums. The pushback was severe. The most outraged, as Register writer Ian Hamilton reported, lashed out by publishing online every public item they could find about Blizzard employees and, in some cases, their relatives."
  •  
    Might be a good lead article to spur classroom debate about anonymity in social networking.
Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
Yuval S

Removing spyware from Windows - 1 views

  •  
    This article is about the important of using an anti-spyware program. A lot of people only use anti-virus programs expecting it to cokpete the job, but an anti-spyware program is important.
  •  
    This relates to ITGS because it includes all components. The stakeholders in this article are people that own laptops. The social and ethical issues in this are security. It has to do with spyware coming into your computer, and this invades ones privacy.
Yuval S

Facebook Murderer Gets Life - 3 views

  •  
    This article is about a rapist on facebook that makes fake facebook profiles to speak to teens. He got one young teen girl to meet him and he raped and murdered her. This is a big problem in social networking that it is so easy to find another person.
  •  
    Yuval, there have been different cases of rape and murder through the use of social networking. Was the person who used facebook this way ever caught? Now, Facebook is one of the most secure social networks, with so many users online that its privacy settings are very well established; users are able to prevent others from viewing their profile. Its something old social networks have used as well, yet not to the extent that facebook is ensuring its users.
Mariam B

Another Day, Another RFID Trial-Debate about using RFID on DVDs - 0 views

  •  
    This article discusses the issue of individual security and invasion of ones privacy through the use of RFID tags. With RFID tags on almost ever retail item, customers who are main stake holders, are questioning the motives of these tracking codes. A major item that is being tracked is a DVD from when it is first put into its cover and sent to the store, till the costumer purchases it. However the question remains, What is the purpose of this? Is it necessary to track how the costumer uses the items that they buy? Other stake holders include the large business corporations such as Walmart, who use these RFID codes to profit from studying the purchases and trends in other stores and areas. Additionally another stakeholder that is seen as a threat is the government who may eventually be able to spy or track down individuals based on these RFID codes on the items that they purchase. This issue relates to business and employment because companies are able to economically profit through this even though the individual privacy remains a threat. These RFID tags allow businesses to profit because they can use the codes to efficiently organize the purchasing of stock and selling of items. The RFID can be considered a network that allows the hardware which is the actual code to work. Without the network tracking and creating the code, the device is unable to function. Although the customer is able to open the wrapper such as in the case of buying a DVD and throw it away, the thought still remains of what will happen in the future with these tags? There is constant dispute and consideration on how the alternate user who is the customer that purchases these items, may become a victim of privacy invasion.
nicholas n

iPhone Application Tracks Runners in the New York City Marathon - NYTimes.com - 0 views

  •  
    This articles shows the conventional uses of RFID, and you me personally the fears of doing using such technologies. This article tells the reader that in the latest new york city marathon, the people watching wanted to track certain runners(stakeholder). So for the race each runner placed an RFID tag (Hardware 3.1) on the shoes, and on the track (set intervals) sensors would pick up these RFID tags and record the information to each individual runner. To obtain this information one would need an Iphone and 4 dollars to pay for an app that can give you up to date information. There was an issue of reliability present from the perspectives of the cell companies(AT&T). That issue was reliability, to overcome this issue they put temporary cell tower around the track. While no major issue was sparked, I was scared of what it could potentially do. This may do into the realm of sci-fi but my own issue would be survaillence, what if one day everyone was forced to where one of these, there will be these seners at every door or entry way tracking our every move(1984-George Orwell Big brother). Maybe we will have less crime since everything is monatered, but we will lose all privacy. It may be an exaggerated case but not impossible. In reality I can see it being place in our passports, ensuring more security at our flights, but what are we losing
Yuval S

"RBNY to Use RFID at the Turnstiles" - 1 views

  •  
    This article discusses the usage of RFID to collect tickets in sports arenas. This article discusses the advantages RFID has on the customers' part, as it states that "there's a lot of convenience - they can enter the facility faster, it speeds up lines and makes it easy to transfer tickets, and it's all done online. It's very convenient and powerful." They also mention some disadvantages, such as "the erosion of fan rights and the elimination of resale competition." Also, the article discusses the idea of using a smart card, for season-ticket holders, instead of using tickets. With this smart card, there will be advantages "like discounts at the concession stands that can be sent to fans via text messages and exclusive autograph sessions with Red Bulls player." From the business point of view, this "allows us to communicate more effectively with the consumer, learn what they prefer so we can adapt - it's almost a subconscious level of communication." This has the potential to be extremely helpful in getting customers what they want, and in turn making more money for the business.
Madeline Brownstone

Can Employers Do That? Turns Out, They Can: Exploring Workers' Rights : NPR - 2 views

  •  
    "In terms of monitoring its employees, the list of things a corporation can't do is a short one - it's basically confined to eavesdropping on a personal oral conversation, Maltby said. "Anything else is open season." And outside the workplace, personal blogs or social media pages on services like Twitter or Facebook offer no refuge. "
Madeline Brownstone

Are IP addresses personal data? - ZDNet.co.uk - 1 views

  •  
    European data-protection chief Peter Hustinx talks about how far an IP address can stand as an ID Published: 04 Nov 2008 15:24 GMT
nicholas n

BlackBerry denies India email access deal as struggle continues | Technology | guardian... - 0 views

  •  
    This is a news report that RIM(research in motion ) I denying claims that India is now able to access the messages that many send through RIM secure network. This access includes company messages. However RIM refutes these claims and states they don't have access to any of this information. This is one part of a greater story India's government is not the only government that had problems with RIM due to lack of equality of service and the fact that RIM has the best encryption on their messages. There are many stakeholders such as RIM who are running a business that desires to make a profit and realize on their reputation on security, any company that uses blackberry service. The government that wants to have access to the messages to protect their national security, and finally the average consumer that loves using blackberry for their everyday lives. for the primary stakeholder which is RIM social and ethical issues are security, and reliability and integrity. Security refers to the protection of the blackberries encrypted network. The reliability and security concerns RIM's reputation for their secure networks. the primary scenario in this case is business and employment from various points of view, and the IT system is the blackberry cell phones.
Madeline Brownstone

Privacy is dead on Facebook. Get over it. - Technology & science - Tech and gadgets - T... - 0 views

  •  
    I wonder how many students at BSGE think the privacy is dead.
Mariam B

Privacy Issue Complicates Push to Link Medical Data - 1 views

  •  
    This article deals with the use of electronic health records in order to record medical information of patients. Congress wishes to pass a bill to enforce the use of electronic health records, however issues regarding the privacy of patients and information stored on these databases have arose. Electronic health records are used to record personal patient information such as name, age, address along with health sicknesses and symptoms. This also allows doctors to send e-prescriptions to the patient. However the computerization of health records triggers obvious privacy issues which prevent many hospitals to completely switch to using these electronic databases. Stakeholders of this technology include the patients whose medical information is being stored and sent on the databases, the hospitals and doctors that use the databases to track and send prescriptions to their patients, along with policy makers such as Congress and President Obama who promote the use of electronic health databases. The major stakeholder is the patient, whose private information is at risk by using these databases. Doctors can also use the electronic databases to send prescriptions to their patients for medicines or further appointments. Patient databases include sensitive personal information that may be at risk of being hacked or seen by an unauthorized user. In the article, solutions to these privacy issues have been proposed such as increased spending and investments in order to create solutions to privacy issues. Measures can be taken to safeguard medical information such as using encryption technology to secure private information that is sent online or kept on the hospital's computer database. This encryption would prevent unauthorized users from accessing and using patient information. However, in cases where this encryption technology fails to protect patient information, policies have been created that the patient must be notified if their personal information has been h
  •  
    continued: have been created that the patient must be notified if their personal information has been hacked or seen by an outsider. Other policies have been enforced that give patients the ability to control and prevent hospitals from sending private information for research without their permission. These policies help prevent private patient information from being seen by unwanted individuals.
Noreen C

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  • easily and securely share information
  • A fancy electronic patient record, unconnected, is just an expensive way to capture data.
  • Getting many different health care providers and suppliers of specialized software to agree on how to do that is no simple task.
  • ...2 more annotations...
  • The solution the group agreed to is essentially Internet-based e-mail and public key encryption technology, tailored for health care.
  • For health care technology companies, the data-sharing standards, experts say, should stimulate the market for electronic health records and allow them to focus their efforts on making their individual offerings more affordable and easier to use.
  •  
    This article is primarily about setting standards and protocols so that an electronic health records could world easily and securely for many health care providers and suppliers. The reason the introduction of an EHR hasn't worked before, is that there were no data-sharing standards, which would ensure that the data is transmitted securely across the internet. These standards are also in accordance of many of the interests of all of the health providers and stakeholders involved, which was a major problem previously. Without the issue of connecting the EHR from provider to provider, then the records would be a "fancy...way to capture data," and it's full potential would never be recognized. However, these new standards and protocols, filled with secure transactions based on encryptions, have made the introduction of an electronic health record possible. There are many benefits to the use of an EHR, including productivity and financial improvement for the companies and the employees. For example, doctors/nurses no longer need to spend time pulling a patient's file, or writing the details of the visit afterwards. There are also fewer repetitive tasks, and improved communication between doctor and nurse, or doctor and another doctor. Quality of care may also improve because doctors have quick access to a patient's information, there is better monitoring and discovery of chronic illnesses, and doctors can return phone calls/ provide medication refills immediately. Also, in general, the electronic charts allow for a more efficient office, which leads to a less stressful environment and more attention on the patients' care rather than searching for their charts. This can only be done through the introduction of an EHR, leading to easier queries, instant reorganization, and file management that could be transmitted to both the patient and any other doctors. This minimizes the ambiguity of not having tests results from one doctor, and allows all doctors treating a p
  •  
    patient to see all of the patient's history. This is important in having a correct diagnosis and treatment. However, there are also some drawbacks. Initially, doctors who chose to engage in the implementation of a EHR, see some decreases in productivity. This is because entering information and learning how to use the software takes some time. Some doctors also do not have the money to invest in such software and accompanying hardware to, and others no not want to because they are accustomed to their hand-written charts. There are also some security issues, leading to greater privacy issues. The EHR maintains very personal data about a patient, and if the records are breached, then the privacy of the patient may be put at risk. There is also the issue of interoperability, which was brought up in the article. Many of the companies in different countries wishing to engage in the implementation of EHR have different standards involving the usage. This could harm the usage of an international EHR.
1 - 13 of 13
Showing 20 items per page