Skip to main content

Home/ ITGS News/ Group items tagged IT

Rss Feed Group items tagged

Madeline Brownstone

NOVA Online | Cracking the Code of Life | Watch the Program - 7 views

  •  
    Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
  • ...10 more comments...
  •  
    Criterion A- The IT system (research DNA database) that allows medical researchers to record and track medical histories throughout generations, arise a variety of issues. One of these issues is privacy, where the database holds genetic information that many ethical doctors call a "future diary". These medical databases can be analyzed by a variety of people and those who have access to this information are handling private information. The major stakeholders were those patients who gave up their DNA because their genetic information put into the hands of these medical doctors creates the privacy issue. This information needed to be well stored and doctors take implications such as encoding social security numbers and no names are used. Criterion B- These research DNA databases begin with the obtainment of genetic information. In a relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. Criterion C- From the point of view of the major stake holders (patients who given up their genetic information) the IT system (research DNA databases) (Not done)
  •  
    Criterion A) The IT system is a database. This database is a link of DNA records, health records, and family trees. Major stakeholders of this issue are citizens of Iceland who agree to let their information be put on these databases and analyzed. Criterion B) The database works in parts. First, there is already a database of family trees in place. This family tree generator works by inputting an individual's social security number. After this is in place, the name of many generations of ancestors of this individual is shown in a tree. Then, the creator of the database asks for the permission, of family members, to add the DNA code and the health record of each person. This allows for a social security number and a disease to be input at the same time. With this, the scientist can see those who have it, and those who don't. Then, with the use of the DNA codes, they can "hunt down" genes that cause certain diseases. The database is related to an issue of privacy. This is because those who allow their health records and DNA code, are letting the medical team and users of the database know all things about them. With just a social security number, a user that has access to the database may learn more things about you than you may want: such as your family, what diseases you may have, and many other things. Another issue is in reliability. There is the possibility that the medical teams that try to track genetic code differences between those with a disease and those without it, may come to realize that a difference they find is only a coincidence and not helpful. (not completed)
  •  
    The IT system being used is the DNA database that are being kept on the Icelandic people. The DNA database holds a lot of information of the people in the database and even things that they do not know such as their DNA and what it means. The major stakeholder is the people that are sending their DNA information, blood samples, medical histories and family trees. The issue of privacy is then involved because of the personal information that others can go through by accessing the database. The database is run by first getting the blood sample of the patient who willingly gives permission to give their DNA information to the company, deCODE. The information is then entered into the database which organizes the information by each person's social security number. The relational database is used to organize the information. (Cont.) The impacts of the database is both negative and positive. The database can be
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. * The IT system described in this video is a medical database. The major stakeholder are the doctors who manage the data of patients in the relational databases. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). * A relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. * One of the positive impacts of these medical databases are that the family tree is in a database and all health records can be found for each patient and because this is a relational database, all of the patient's information is linked to their families and other people who have similar diseases. This is beneficial because experts can see trends in the people who have a certain disease and once they figure out the "spelling" of the genetic code with the disease, they can work on coming up for cures for that particular disease. A negative impact of the medical databases can be privacy. The doctors have access to every patients information and they can know everything about a certain person or family if he/she wanted to. This would then raise an issue of integrity.
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system is the database and the issue is who has access of the Database which has medical records of individuals. The major stakeholders are the Doctors and Patients. Doctors are trying to find information on specific DNA that create sickness and diseases. Finding the relationship between the family members and there DNA, can possibly improve medicine and also allow doctors figure out what an individual can have(sickness) in future references, making inferences of what might happen. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). A data base function is that it is a computer stored software that contains tables of various information and organizes all the data into categories. One subject/category can be related to another with little difference. This is why the database makes it easier for information to be viewed and interpreted much faster. By entering data on the tables one can interlink topics in order to find specific information needed. The person who enters the data can use software like Openoffice to create a database to view DNA and the relationship with the other individuals. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. The primary issue of the negative impact on Databases, have on the skateholders for DNA purposes is Privacy. Privacy has a big part in the stakeholders because many of the patient give away there Social Security number which is something private to them. With the Social Security Number the doctors can have access to other information not related in there investigation of finding a cure. This can cause reliability with the doctors to decrease. The database would have information of all sort on there medical records which should not be something that would be public for eve
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues: The IT system in these videos were medical databases containing records of many patients. Specialists use these databases to help them identify where a certain disease came from and whether or not it could be treated. they do this by viewing the patients ancestors records and seeing who had the disease in that family tree. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). Specialists (with the permission of the patient) insert a patients social security number into the medical database and let the database generate the patients entire family tree. Using this family tree, doctors were able to "hunt" down the origin of diseases, by looking at the genes of the ancestors. That way, by matching the DNA of the patient affected by a certain disease with the DNA of one of his/her ancestors DNA that suffered the same disease, and looking for similarities or patterns. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. There were several positive and negative impacts regarding this "hunting down" of diseases. By looking at family trees specialists and doctors would be able to determine what caused the disease and possibly come up with a cure or treatment for it. However, many patients are concerned with doctors going through their records and DNA due to there being a lack of privacy. If patients grant permission, specialists would be able to find out and know absolutely everything about their health history. Specialists argue that it would be of great benefit to detect diseases early so they could be treated by doing this. Chips are being created were thousands of babies genes could be looked at to look for any abnormalities. Some people argue that even if a disease were detected, there's two possibilities, one
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system involved is the DNA database system, identified as an organized collection of age old family trees, accompanied by state of the art DNA analysis and computer technology. Systematically, genetic information (DNA) is stored in related tables, distinguished by individuals' own security number codes. One centralized ethical and social consideration is privacy, mainly a major concern of the involved DNA suppliers (the public), that place their given personal information (genetic data, reference to family origins, medical history etc) in a national database system, from which the accessing of medical records and history of one's entire family can become manipulated or misused. In addition to the elevated risk of data misuse, once the involved participants (Icelandic citizens) give access to their personal information, there are no limitations placed on the utilization of the data within the national database, as it becomes accessible for the government, medical researchers and operating staff. Thus, the implications are straining to the individual donor, unable to determine when, how and to what extent the information given is shared amongst other groups. Furthermore, the privacy of the participants undesirably opens access to the medical information of related family members, as cross-referencing and data matching give the research staff operating the DNA database, access to retrieve a plethora of other members' data mainly for the purpose of effective data mining (the retrieval of hidden predictive patterns, as a diagnostic tool to decode the occurrence of genetic disorders/diseases). CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). With the possession of participant's medical data, including blood type, isolated samples of DNA, medical health records e
  •  
    The primary IT system in use is a DNA database, which includes information about patients, illnesses, and virtually one's make up as a human. DNA databases allow researchers to find patterns in a human genome, by looking at the DNA from various family members and determining the difference or similarities between the DNA of family members. This is done through database functions such as data mining, and data matching. Locations such as Iceland, have a database that traces back all of the people within the country to their Viking ancestors. These family trees have been paired with DNA analysis in order to trace diseases back to their start. Some more tests could be conducted in order to determine which of the living relatives of one family with arthritis, for example, have the disease. Then, the DNA can be compared in order to identify the exact gene that is at fault for the disease. This process is very easy to do because the database with all of the ancestral information is accessible with the presence of one of the family member's SSN. A simple data query can then bring together all of the person's information. Moreover, DNA, health records, and the family trees of Iceland were proposed to be linked. This could be very beneficial because new drugs could be made available to suit the specific disease of a patient. It could also be a way for diagnosed patients to take early preventative measures. This could increase the probability for a cure, and in general this would increase the life expectancy of certain areas. However, some doctors in Iceland opposed to this linkage, because the information is representative of each person's medical history, and potentially their future medical history. This information, according to the plans of the linkage of medical records and the family tree, would be available on a central database that would bring together private information about a person and connect it to all of their family members, past, present, and future. T
  •  
    There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
  •  
    Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
Madeline Brownstone

Electronic health records raise doubt - The Boston Globe - 11 views

  •  
    "Google Health and others in the fast-growing personal health record business say they are offering a revolutionary tool to help patients navigate a fragmented healthcare system, but some doctors fear that inaccurate information from billing data could lead to improper treatment."
  • ...10 more comments...
  •  
    This article provides a possible service that can be used in the east African country our case study is on. Google health is a free service that would give all patients the opportunity to store their health records digitially, making it easier for doctors to access it. Especially if telemedicine were to be used, having electronic health records would be a great benefit. However, the issue of reliability is especially troubling when it comes to using services like Google health in this context. There have been many reported errors with the diagnoses of patients using this service, and it is crucial that the records are checked by both patients and doctors to ensure that all information listed is correct. Literacy rates are much lower in rural African settings, creating a problem for patients who may be unaware of inaccurate information on their records. Especially for individuals in critical conditions, fatal mistakes can therefore be made.
  •  
    Electronic Health Records are also used in the case study. Patients and doctors rely on these records for accurate data, but it is rather difficult, due to the lack of reliability with which Google Health updates patient's health data. In order for Dr. Ogola's plan to work (face the challenges, create a modern health system), he must implement such health records that will store patients' information on an accessible, secure and easy to use database. This would help patients, doctors and nurses share data without having to travel long distances. Data would be secure and also accessible to the three parties. However, this would require a reliable system (more than Google Health) so as to not provide inaccurate data to the patients. Patient involvement in the care of his/her own data would be required for an such an erroneous system, as would a reliable source of healthcare information on the patients. Unreliable sources can potentially damage the whole system.
  •  
    The use of Electronic Health Records in this article can be applied to our case study. Firstly, it would make the transfer of patient data easier and faster, this would increase the quality of care that the hospitals and clinics offer to their patients. These Electronic Health Records can also keep data from different doctors in order, for example if a patient visits several Doctors all of their information will be in one place and ready to access when ever necessary. In the case study if doctors had a more accurate picture of the patients medical history they would be more prepared to make diagnoses, especially when they are working with strange cases. This would also help to increase the quality of treatment that the patient would receive. Digital Health Records are easy to update both the patient and the doctor can edit the Electronic Health Record, it also can keep track of test results, and medications that the patient is currently using. Electronic Health Records allow patients to be more active in their health care allowing them to see and have access to all of their medical information. Even though this IT system is ideal for our case study there are some things we should take into consideration. In our case study we would have to make sure that equality of access is equal for everyone, there may be some people living on the outskirts of villages that might not have access to Digital Health Records. We would also have to assume that everyone would know how to use the Digital Health Record. Meaning how to update it and how to look for errors. Lastly we would have to assume that the patient would make good use out of having an Electronic Health Record. They would have to constantly be updating and checking their records to see if there is any missing information or any errors within their data. Lastly, the coding system would have to be revised, it is confusing and very inaccurate, there should be a new coding system that makes understanding your own records
  •  
    In this article, the use of electronic health records is discussed. However, some problems arising from their use are also introduced, including inaccurate patient information. In the world of the case study, this IT system, electronic health records. is quite relevant and can be useful. EHRs can be used in Africa to connect rural doctors to hospitals and other professional health care workers in better facilities. This way patients' records can be reviewed, diagnoses can be made and other help can be given. However, if this system is taken advantage of in Africa, its users must be certain that the information in the records is accurate and comes from a reliable source. This is because if the information in a record is inaccurate, incorrect diagnosis and/or medication can be given as was the situation in the article. These kinds of mistakes can be detrimental to some patients.
  •  
    This article elaborates on the drawbacks of electronic health files. Although the IT System, Google Health, seems that it will make getting quality health care much easier and quicker, there is a major issue of possible inaccurate information. These inaccuracies or exaggerated diagnoses on Google Health may prevent patients from receiving the care they need, and Google Earth is prone to human error as real people are responsible for inputting insurance billing codes or mislabeling a lab test with a disease that is hoped to be ruled out. This has an impact on our African case study as this article illustrates one of the highly potential problems that arise from the use of telemedicine. Although medical centers in Africa would be able to eliminate the tedious process of paper work by instantly communicating records over the internet, these records can be inaccurate and therefore compromise an already sick patients health even further. However, for the case study, EMR's prove to be a very feasible solution for the lack of communication and distances between villages and health centers, but a solution must be made in order to counteract the potential misdiagnoses'. One solution could be that patients would check their EMR's for accuracy, but with the poor conditions of living in the African villages and poor or no internet service, this solution does not seem possible for the case study.
  •  
    This article is about a man getting his health information in an electronic health records massed up. There's an issue with the EMRs in the sense that they are sometimes unreliable. In regard to the Case study, as they want to place EMRs into their hospitals and clinics they ma have this issue with reliability. But it has shown signs of improvement from paper records. But the hospitals and clinics in the East African cities will need to hire more staff to make sure these records are up to date and accurate. As for the health of the patients, EMRs has its benefits and drawbacks. If the information is accurate then a life could be saved and that person could be properly cared for in a more timely fashion, but if the information isn't accurate they could be given unneeded surgery or given the wrong drugs. The EMRs could help the efficiency of the hospitals and clinics because they could work faster and get to more patients without wasting countless time looking through paper records.
  •  
    This article arises a social and ethical issue of integrity of electronic health records. In this article, Dave deBronkart faced this issue when he transferred his medical records to Google Health. His information was inaccurately transferred because of the incorrect coding that insurance companies use. The database then used this incorrect coding and stated that Dave had other health problems, which he never had. The lack of codes makes the database more likely to make an inaccurate diagnosis. It also suffers from reliability because if the information, doctors can't rely on it to make correct diagnosis. Electronic databases are very useful and can be used in Oobunta if its integrity is improved. It will allow patients in villages that can't afford travel to share their symptoms and past medical history with doctors in the hospital. This will cut costs for both doctors and patients because they won't have to pay for transportation. It will also benefit the patients because it will let them be diagnosed accurately especially if they don't have enough resources or medical care in their village.
  •  
    This article covers a recent problem that has risen from the use of Electronic Medical Records. Google's new Google Health, a service that gathers e-health records for patients all in one place has become unreliable. Google Health gathers medical information from billing records, which is an inaccurate source of information. The medical records on the site also do not distinguish between recent illnesses and past illnesses, and does not indicate the level of severity for the health issues. The diagnostic medical coding is to blame for inaccuracies in information gleaned from insurance data, mostly because it is clunky and includes tests for diseases that doctors hope to rule out, not for diseases that the patients necessarily have. The problems that the unwieldy code and medical records in Google Health bring up are enormous. Information is inaccurate and out of date, and this is potentially deadly when patients are being treated. The issue of reliability is that data in the records is out of date, and entered incorrectly, which could be the difference between life and death for patients with dangerous diseases.
  •  
    This article was about electronic medical records. They allow patients to share their health information with doctors over the Internet, using Goggle Health. However, this application is not completely accurate. It takes information from insurance bills. These insurance bills may not be precise in describing the treatment of a patient because of their lack of codes. This raises the issue of reliability of the electronic health records. Inaccurate records could stop a doctor from performing a life saving procedure on a patient. The article relates to the case study because it talks about the drawbacks of having electronic medical records. In order for issues with reliability and integrity to be avoided in Oobunta, patients should regularly check their records to ensure their accuracy. Doctors and patients should also communicate more to eliminate problems within the health records.
  •  
    In this article, a new electronic health system arose. In order for one to use this newly aged system, their personal health records must be transferred. According to the article, "accuracy gets lost in translation" (Wangsness). Due to the fact that certain information is getting lost in translation, many issues have been brought up, such as reliability. Health records are vital for every individual because they contain information that cannot be found anywhere else. A loss in data, such as certain dates, can lead to many problems for the patients during treatment. As a solution, people are asked to do one thing. They are told to check out their record and see if everything is accurate. There is a positive side for this new system and it relates directly to our case study. These Google health records are easily transferable. If one needs to send out their information to a hospital for a diagnosis, they can do so in no time. In the case study, people in Africa are having trouble getting to a hospital because of the expenses and lack of transportation. By using these Google electronic health records, the people would be able to e-mail their record to a hospital for a direct prognoses. This would save them so much money and time because they would be able to complete this task in the comfort of their own home, or anyplace with internet access. These electronic health records can solve many problems in Africa.
  •  
    This case study tackles the issues of Integrity and Reliability. The article talks about inaccurate health records and it effect on patients who want to follow updates on their health status. The stakeholders in this articles are patients because they are the ones who need accurate information, doctors because patients come to them when they read inaccurate information about their health and the people who control the information in the databases because they are the ones responsible for whether or not the information is accurate. Integrity is an appropriate Social and Ethical Issue because the information in the databases have a been changed accidentally, in turn affecting accuracy. Reliability is even better because is directly about accuracy of data, if it is entered incorrectly. If data is entered wrong patients lose trust in them. This is especially relevant to databases which is the major IT system discussed in this article. In relation to the case study it is important to find a solution for the patients of Africa, that is as efficient as possible. In a place like the one described in the study it is important to save time by being as accurate as possible and making sure that patents and doctors can understand the information on databases, ensuring more successful treatments for the patients.
  •  
    In the East African city, the medical facilities all contain databases that their patient's health records are recorded on, however the platform for each database varies between each clinic and the main hospital. This in turn makes it more difficult to exchange health records between each clinic and the main hospital.This article brings up a solution to the health records exchange problem that are within this East African Region. Google Health is a database that is in the cloud and makes it possible to exchange health records through the internet. This form of exchanging data for a patient helps to keep a patient's data up to date. Now though this could be a great solution it comes with many drawbacks from the system and the lacking materials from the East African region makes it difficulty to better utilize it.
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
nicholas n

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...

helen g

The Hindu Business Line : ArcelorMittal may tap Indian IT cos for infrastructure play i... - 0 views

  •  
    The issue of globalization and cultural diversity is raised in this article which deals with the realm of business. Steel Maker ArcelorMittal is planning to outsource certain IT infrastructure to India and smaller European countries such as Poland in order to be able to save money and reduce costs. The stakeholders in this situation are the CEO's of ArcelorMittal, the local IT companies in India and the small European countries being outsourced to, as well as the governments of India and the small European countries, the current IT workers of ArcelorMittal, the IT workers in India and the small European Countries, and the people who buy steel from ArcelorMittal. The IT systems involved in this scenario are PCs, servers, data centers, and networks. IT workers in India and small European countries such as Poland will be working with ensuring privacy on these systems as well as taking care of their maintenance. A positive issue that results from the outsourcing of ArcelorMittal is that the company will be able to save money by paying its workers less. This would lead to a decrease in steel prices as well, which would be beneficial for the consumer. Also, outsourcing gives good job opportunities to people in the countries being outsourced to. However, through outsourcing many current IT workers of the company will most likely loose their jobs. Indian workers are also being exploited due to the fact that they are being payed less than a worker in a more developed nation would be payed. Lastly, local IT companies need to compete for workers.
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Lenny H

Telemedicine Healing Haiti Earthquake Victims, Puts Healthcare on the Map - 2 views

  •  
    This articles with the solutions that were created by telemedicine during the disastrous earthquake. Much similar to victims in Argentina or those in Argentina who don't have telemedicine, those victims in Haiti are being treated through telemedicine. After the unfortunate earthquake in Haiti, the University of the Miami took into their own hands to set up various tents around Haiti. Besides having very little medicine, Haiti also had a communication problem. These from the University of Miami were not able to communicate with those from the United State. Therefore, they set up real time technology as a form of communication in order to consult colleagues at the University of Florida. Two devices about the size of a laptop were donated to them, and the satellite telephone, internet and video camera contained in each allowed the doctors to communicate with each other. These satellites allowed doctors to conduct and give prescriptions as well as well as communicate to other doctors of those patients who needed to evacuated from the are and taken to the United States for Health care. This article also talks about doctors who are using cellphones in order to take pictures and perform x-rays. There are a variety of stakeholders in relation to the satellites that are allowing the doctors from the University a Miami to perform their real time operations for their consultations and for prescribing medicine. One of these stakeholders would be the people or victims in haiti. After the Earthquake, many were left in dangerous need of assistance, and without these satellites, there would be no way in which they could communicate with people in the United States (The University in Miami) in order to get proper prescriptions. These are very important stakeholders, because if the people of Haiti aren't provided with this form of telemedicine, they would not be able to get treated for the illnesses/injuries that occurred to them during the earthquake. Another stake holder is the U
  •  
    niversity of Miami. Without these satellites, they would not be able to do their job. This is the only form of communication they have with their fellow doctos in the United States. In the Article, is specifies that the doctors had a hard time creating forms of communication in Haiti, therefore if the satellites do not function, the doctors from UMiami, would not be able to prescribe medicine to the victims, and the victims would not be able to get their treatment. Social and Ethical issues then arrive from the Article and the IT system. These satellites that allow for communication and telemedicine are breaking down the digital divide. Specifically in the article, it states that Haiti did not have doctors and that form of technology in order to perform telemedicine. These satellites and bringing them to Haiti was breaking down a digital divide, in which it was giving them the IT that other countries were already familiar and working with. Another Social/Ethical issue that arrives from the IT system is Globalization. In the way in which it breaks down cultural, economic, or divisions causes by a countries location to another. The IT system allows for those in Haiti to communicate with those in the United States. Therefore, it is creating or breaking down any divisions that were previously there because of their location as countries. Another major Social/Ethical issue that arrises is Reliability. The doctors from the University of Miami are relying on these satellites in order to perform their job. If there is an issue on their reliability, it would be catastrophic to the worked (not having any form of communication with their colleagues) as well as the people who would no source of medicine through the real time consultations.
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Mohammad A

In Haiiti, Practicing Medicine From Afar - 0 views

  •  
    After the January earthquake in Haiti, many people were left under extremely bad health conditions, with little or no health care being at their service. Haiti is a poor country, and with a natural disaster like that occurring, medical treatment for those that required it to the minimal extent was rare, let alone for the people that needed to be operated upon (such as surgical patients). The solution that some United States officials found after attempting to help Haiti with this issue was telehealth, better known as telemedicine; telemedicine was initially used for space astronauts back in the 1960s. In the situation with Haiti however (better known as "real-time"), it essentially involves a video-conference between a patient and a health professional and/or doctor in a different location (often times in hospitals or offices). Also during certain operations however, a doctor at the scene will be conferencing with a specialist at a different geographical location through the uses and benefits of telemedicine. The main IT system involved in this situation with telemedicine is satellite connections. A satellite communication system requires a satellite to function. Thus, a satellite is in high orbit over the Earth (stationary or geosynchronous, which means that the speed of the satellite is complementary to the speed of the rotaion of the Earth, thus it will always remain above the same spot). A satellite dish on Earth is then directed at the satellite, and all the signals (voice & data information, television signals, etc.) are transmitted on an uplink. The satellite itself (while still in orbit outer space) has a receiving antenna mechanism which is able to capture the incoming signals towards it and is able to diverge them through an amplifying network.
  •  
    continued.... After this process, it then re-transmits the signals to the designated receivers (these signals are waves that go upon a certain frequency). Depending on what the frequencies are, when it comes to telemedicine, the frequencies are repudicated for an instance, and the digital data is then linked to set receivers. These data packets are routed through satellite, which makes the end (whether it is a phone call or the merging of voice and data transmission such as video-conferencing) come along. The satellite may be compared to a ground-based signal, in which the signal points upward and it is later reflected down back at the user/client. Therefore, with sufficient bandwidth, Haiti is running on high-speed Internet access. As a result of this IT system involved (as well as the use of telemedicine), social and ethical issues emerge. The use of such IT devices and systems such as satellite linkage and telemedicine through video-conferencing was not present in Haiti even before the earthquake. However, with the aid of other countries, more advanced form of health care came into view. This is a breakthrough from the digital divide, where Haiti was not able to provide proper medical care for its citizens. Another issue that comes into play (vexing from the digital divide) is globalization. Doctors on the seen are able to provide their patients with the best care by either consulting a specialist from a remote area far away, or the patients who require health care have video-conferences with doctors in order to discuss health related issues. This breaks down the barrier in which Haitians were facing with little or no medical support.
Kim T

RFID Implants Found to Cause Cancer Tumors - 0 views

  •  
    It would seem like a great idea to be able to see patient's medical records on the spot, clearly and accurately. However, RFID's should not be the technology used to do so. Some patients have had RFIDs implanted into their skin for doctors to scan but in rats, no less humans, there have been cases where links between the use of RFIDS under the skin and cancer has been linked together. Many people would know about this, especially if they were to have the procedure done but this isnt the problem. Companies using the technology are practicing it on those who cannot protect themselves from its  harm. Patients who have Alzheimer disease are commonly practiced on. The question that poses from this is what and will the government do anything to stop these companies, why was it approved of and is it worth the medical advantages?
Jaymee C

Facebook, Inc. News - The New York Times - 1 views

  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • ...7 more annotations...
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  • Like other social networks, the site allows its users to create a profile page and forge online links with friends and acquaintances.
  •  
    for assitance in portfolio 1
Karen M

BBC NEWS | Technology | Software maps Rwandan health - 4 views

  • The biggest challenge is to collect enough information to make the databases reliable.
    • Karen M
       
      Social and Ethical Issue: The issues in this article are reliability and integrity. The information that is put into the database needs to be accurate and reliable for other doctors to access. It is important for the data to be reliable because doctors need to be able to know about the other cases of malaria as well as the resources they have.
  • The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
    • Karen M
       
      IT System: The Geographic Information Systems (GIS) is the main IT system that is being discussed in this article. IT is large database compiled from information from smaller ones.
  • The system has allowed health workers in Rwanda track the number of malaria cases at each health facility.
    • Karen M
       
      Stakeholders: The people who are being affected are the doctors who access and add information into the database, as well as the patients who are being treated.
  • ...1 more annotation...
  • A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda.
    • Karen M
       
      Area of Impact: Health
  •  
    A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda. The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
  •  
    A system of electronic mapping which allows many different types of data to be layered onto a single image is being used to improve healthcare across Rwanda. The digital maps, called Geographic Information Systems (GIS), are designed to compile information from numerous databases and use it to both track and predict outbreaks of disease.
  •  
    A system of electronic mapping has been developed that allows different types of data to be layered onto a single image. It is being used to improve the health care in Rwanda. These digital maps are called Geographic Information Systems (GIS). The database is compiled of information from different doctors working on cases of malaria. This brings up the issues of reliability and integrity. The information in the database needs to be reliable enough for the doctors to use in treating patients with malaria. It affects both doctors and patients, but the patients are being affected the most because they are the ones being treated. If the information is inaccurate, the patients may be placed in dangerous situations.
Ram Bhadra

Offshoring blamed in part for IT's jobless recovery - 2 views

  •  
    A very slow recovery is seen in the field of IT after the economic melt down however the bad economy is half the problem since another factor which has been growing since a very long time. It is offshoring of IT jobs from developed countries such as US and in Europe to countries such as China and India. It is also predicted that the IT jobs shall go down by 50% in the next four years in Europe and US.Also in this article the solely blames outsourcing for lack of jobs in developed countries and does not talk about how leads to growth in economies of developing nations which increases the consumption of goods manufactured in the developed countries and also leads to creation of new jobs. Hence this article has only one opinion. It does not talk about the growing opportunities for IT workers in countries besides the US and so on. It should focus on how offshoring had led to the ceasing of digital divides since individuals in developing nations now have economic power to consume similar products as Americans or Europeans and also the growing economies give the government chances to improve the infrastructure. Hence in the end it benefits all.
Santiago P.

Why IT Jobs Are Never Coming Back - Computerworld - 0 views

  •  
    I chose this article because I found that it especially related to the field that we are currently studying in. It is that of ITGS, Information Technology. IT jobs are more and more frequently being offshored to nations like India. There is an obvious issue relating to Business and Employment, or in this case, a rising unemployment. The main stakeholders are the IT workers, who, with the hopes of entering a strong workforce, are having their jobs offshored by multinational companies like IBM and HP (these companies are also primary stakeholders). The primary social and ethical issue involved is that of equality of access. This is due to the fact that access is becoming more widespread - access to technology, computers, databases, servers - all throughout the world. There is no longer "the need to be local", as the article states. People's jobs can be moved to a cheaper place, where it won't be so expensive for the company to keep its workers. Offshoring is not only creating higher levels of unemployment, but helps worsen the U.S. economy while it strengthens foreign economies.
Mark Gakin

Outsourcing: Its Effects on the U.s Economy and Leadership - 0 views

  •  
    This article is about how companies use outsourcing and offshoring as a way to reduce costs and as a method for cheap labor. One of the articles' main points about outsourcing is that the decision to outsource is often in the interest of the company to reduce costs, divert or energy-saving measures aimed at making the skills of a particular company or for the more efficient use of labor, capital, technologies and resources. One problem that arises from outsourcing is that it takes much-needed jobs from the U.S. economy. It is not too different from offshoring, because both are beneficial for companies and used to cut costs. When a company chooses to offshore, it means that it does its business in another country. This 'other' country is usually a developing country because rates tend to be much cheaper there, which is exactly how businesses save money. One of the main issues, again, lies within the U.S. economy. Since US businesses are leaving to do business in other countries, the US economy is suffering quite a blow because less companies are becoming dependent on it. This is a big problem and could lead to an even bigger one for the business because third world countries cannot always be trusted. Even though they are saving so much more money by offshoring, the business they now perform is unreliable and could possibly be affected my many more problems. The main stakeholders in this issue are the businesses who are offshoring and outsourcing, the US government, and the countries the businesses now rely on. Also, depending on the company, people in America tend to suffer as well because since the main issue that arises is reliability, the users or owners of the product may not have the same service. For example, if Time Warner decides to station in India, the workers there may be inexperienced and the company will not be able to do anything about it. This means that when the users of Time Warner call their main number, someone in India will pick up. The probl
T Graham

Page 2 Bringing IT outsourcing closer to home - ComputerworldUK.com - 1 views

  •  
    This article presents a unique view of outsourcing from the perspective of the big businesses turning to places like India to save money in labor. This article argues about the negative aspects of offshoring. The author Naoum argues that the negatives of sending IT labor to India outweigh the positives. Naoum writes that even though offshoring may save money in terms of lower costs to pay Indian workers many business owners are not aware of the hidden costs associated with this type of move. He goes on to give statistics of businesses who have sunk due to offshoring without researching all the costs. Naoum points out that business owners may be solely focused on the fact that they are saving some money but ignore that consequences that include the lowering of labor quality and "business innovation." The article mostly focuses on the American or European business owner who is considering offsourcing. The area of impact is business and employment because it involves first world businesses and the labor (employment) of skilled third world citizens. The issue raised in this article is that of reliability he is questioning the quality of IT business done in these nations and whether or not it is worth the extra costs. At the end of the article he suggests outsourcing somewhere a little closer where people are more skilled and the hidden costs are not a threat. For example he suggests outsourcing to Spain where 20% of the older workers are educated in the use of IT. Naoum also raises the issue of security in offshoring to a place like India. He uses the example of a business that outsourced to India and experienced a leak of sensitive information about its clients. Naoum brings an alternate view about outsourcing/offshoring, he points out the negative aspects that people don't usually recognize.
  •  
    Seems like you missed the point of data security.
Rubayeth M

Video boom threatens to gridlock the internet - 0 views

  •  
    In this article the stakeholders are worried about the internet connectivity. Since many people are using it today as we speak they are watching videos, tv shows, listening to music from the Internet, and many others and would be known as stakeholders. The issue here is the reliability of the hardware. In the article it states that the copper wires that were initially put for calling which only required voice. Now it has increased with much more and in order for the internet connectivity to increase there needs to be more of a solution than fiber optic cables since it was not planted in to the ground before. The IT systems that requiring so much internet speeds are computers, mobile devices, computers within the doctors office, and many other. For tele medicine to continue there needs to sufficient or reliable internet connectivity. For instance, say a doctor wanted to help out another doctor in India. For the doctor in America it wouldn't take more than a couple of minutes. If the hospital did not have its own secure internet then it would have taken a long time since other internet connectors are using it to download and upload video,stream live music, and much more. The point here is that for one to have accessibility in the internet connectivity there needs to be globalization. Globalization will help increase and satisfy almost everyone's needs.
Madeline Brownstone

BBC NEWS | Technology | Big Brother is watching you shop - 0 views

  •  
    "There is an enormous pent-up demand for personalised location advertising, whether it is on your cellphone or PDA, on your radio in your car, or on the billboards you walk by on the streets and inside stores," says Bruce Schneier, chief security technology officer of BT. "This is yet another technological intrusion into privacy. And like all such intrusions, it will be taken as far as the owner of that intrusion finds it profitable."
  •  
    "There is an enormous pent-up demand for personalised location advertising, whether it is on your cellphone or PDA, on your radio in your car, or on the billboards you walk by on the streets and inside stores," says Bruce Schneier, chief security technology officer of BT. "This is yet another technological intrusion into privacy. And like all such intrusions, it will be taken as far as the owner of that intrusion finds it profitable."
Kristin O

Poker Bots Invade Online Gambling - 6 views

  •  
    This article starts out with a scenario about a professional online poker player figuring out that he was actually playing against a bot, which is designed to beat its opponents against all odds. There area of impact of this article can be arts entertatinment and leisure because the players do play for money and compete with one another online. This is from the point of view from the players however it can be also seen as business and employment because bots are being sold on line to do this specific task and to win earnings for whoever has paid for them. The Social and ethical issues here can be Security when looking at it from the point of view of the poker site owner, they are supposed to try and root out any bots to make online playing fair for everyone else. People and Machines can also be applied here because the bots are taking something that is meant for recreation by humans and extending their faculties but to the extent of not playing by the rules and playing an unfair game with some one else. The stakeholders of this issue are the online poker players, the people who own the poker playing website and the people who sell and use the poker bots. The IT system referred to in the article are the bots.
  •  
    I found this article really interesting because I had not thought about it at all. This is an important case to pay attention to because of the fact that machines are taking over another aspect of the human life. Not only are machines capable of replacing jobs, such as the repetitive ones in factories, but they are also able to take away the fun in gambling. They are also bending the rules and creating an unfair environment for gamblers on the Internet.
  •  
    This article piqued my interest because it made me think about my own article in a broader way. My article talked about the issue of artificial intelligence talking menial and low skill jobs from people. This article attracted me because it show AI used in another way to make money for people. It takes what is mentioned in my article and extends it to another dimension. People are using these bots to actually make money by competing against human competitors but this is occurring to players unsuspecting players, technically this is using advanced technology to steal.
Madeline Brownstone

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  • ...2 more comments...
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
  •  
    Please go back and "cache" this page.
  •  
    I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
  •  
    This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
1 - 20 of 253 Next › Last »
Showing 20 items per page