Skip to main content

Home/ ITGS News/ Group items tagged ITGS-privacy

Rss Feed Group items tagged

Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Jaymee C

TOPIC: In what ways is social networking used for serious business? - 35 views

The article I read was about the United States government using social networking sites like Facebook and Myspace to do investigation on people and catch criminals. Though it may be helpful for the...

politics and government social networking internet

Madeline Brownstone

BBC - BBC World Service Programmes - Digital Planet, 04/11/2008 - 0 views

  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
Madeline Brownstone

American Chronicle | Standing in the Footprint: Including the Self in the Privacy Debat... - 0 views

  •  
    Personal information sharing is core to both social exchange and, in today's economy, commercial interaction. Yet, the pervasive nature of information sharing and the commoditizing of personal details challenge the current perspective of informational privacy.
  •  
    Personal information sharing is core to both social exchange and, in today's economy, commercial interaction. Yet, the pervasive nature of information sharing and the commoditizing of personal details challenge the current perspective of informational privacy.
Jackie C

RFID tags: Big Brother in small packages - 1 views

  •  
    A relatively old news article, that details concerns and issues about RFID tags that remain relevant, or have become more relevant over time. The article clearly defines law enforcement agents, criminals, marketing corporations, and the average consumer as stakeholders in the development and widespread use of RFID tags. The article describes the issue of privacy and unauthorized or undetected monitoring, whether for illegal use or law enforcement or for marketing schemes as rising from the continued functionality of RFID tags after they have served their purpose -- outside of the stores and past the RFID scanners. The article mentions several concerns, including the more widespread adoption of long-range RFID scanners by non-commercial groups or people, and their ability to be used as an invasion of privacy. Evidently, the technology that makes the continued functionality of RFID tags a privacy issue is in the way that each tag, which can be as small as a few centimeters long, can store various bits of data, such as when the item was bought, where the item was bought, for what price, and who bought it, in combination with the ability to use long-range RFID scanners to scan and detect this information outside of a store.
Madeline Brownstone

Boston launches flu shot tracking - The Boston Globe - 0 views

  •  
    tracking patients
Olivia M

Good and Bad News about RFIDs in Hospitals - 1 views

  •  
    Although it is still in debate over whether it negatively affects hospitals, research has shown that RFIDs have a huge chance of disrupting hospital equipment. Some scientists showed that it can shut off equipment especially equipment that patients may rely on. A few studies have proved that it does not conflict but the results are still unsure based on the conditions that both experiments were tested under. But RFIDs are safe enough to have in hospitals as long as they are far away from the equipment.
Jaymee C

AMA Issues Ethics Code for RFID Chip Implants - RFID Journal - 0 views

  • physicians should strive to protect patients' privacy by storing confidential information only on RFID devices utilizing informational security similar to that required for medical records
    • Jaymee C
       
      Though physicians may try to protect the privacy of the patient there is still the chance of it being broken. If some other person holding the reader for the RFID impant happened to pass the patient then they would be able to see that persons person information.
Ariel A

Skype security and privacy concerns - 1 views

  •  
    Skype is a software that enables online free instant messaging, video chatting and voice calling to anyone else that has Skype. Skype is a great resource for world conversations. The issue that Skype has are both security and privacy reasons. Skype is currently in the hands of ebay. Ebay is a well known site that allows people to buy items online and it some what reliable. The information that one would need to register in order to be a member of ebay and now Skype, one would need to place information stating, "Full name, User ID, Email address, Street address, State, City, ZIP code, Phone number, Country, Company, Password, Secondary phone number, Gender, Shipping information (including name, street address, city, state, ZIP), Bidding history on an item, Items for sale, Feedback left about the user, Bidding history, Prices paid for items, Feedback rating, Chat room and bulletin board posts" According to Ms.Brownstone in order for someone to find the identify of someone's personal information one would need the date of birth, and Zip code. What Ebay requires one to give out information is far more than what is necessary. One would question if they are really that reliable of a site. Skype claims that its reliable but we have to verification of evidence that it is indeed reliable. The security reasons behind Skype is that according to what i read, "Skype is an insistently closed program." This can affect the stakeholders which are the users of Skype to know if its a really secure website.
Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
mesbah095

Guest Post Online - 0 views

  •  
    Article Writing & Guestpost You Can Join this Site for Your Article & guest post, Just Easy way to join this site & total free Article site. This site article post to totally free Way. Guest Post & Article Post live to Life time only for Current & this time new User. http://guestpostonline.com
Madeline Brownstone

Expert: Technology fosters voyeurism - Washington Times - 0 views

  •  
    It seems new personal video technology is having unintended consequences for our culture. Answer: Without a doubt. I work with a lot of adolescents, and one of the issues we are running into is the "sexting" or text-messaging of sexually explicit materials and pictures. In a lot of ways, it's raising or heightening the sexualized nature of adolescence.
  •  
    It seems new personal video technology is having unintended consequences for our culture. Answer: Without a doubt. I work with a lot of adolescents, and one of the issues we are running into is the "sexting" or text-messaging of sexually explicit materials and pictures. In a lot of ways, it's raising or heightening the sexualized nature of adolescence.
Madeline Brownstone

Center for Democracy & Technology - 0 views

  •  
    Keeping the Internet Open, Innovative and Free
  •  
    Keeping the Internet Open, Innovative and Free
Yuval S

Removing spyware from Windows - 1 views

  •  
    This article is about the important of using an anti-spyware program. A lot of people only use anti-virus programs expecting it to cokpete the job, but an anti-spyware program is important.
  •  
    This relates to ITGS because it includes all components. The stakeholders in this article are people that own laptops. The social and ethical issues in this are security. It has to do with spyware coming into your computer, and this invades ones privacy.
Madeline Brownstone

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  • ...2 more comments...
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
  •  
    Please go back and "cache" this page.
  •  
    I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
  •  
    This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
1 - 20 of 22 Next ›
Showing 20 items per page