Skip to main content

Home/ ITGS News/ Group items tagged risk

Rss Feed Group items tagged

Madeline Brownstone

BBC NEWS | Health | Office workers 'risk blood clots' - 0 views

  • It found fewer than one in five organisations conduct workplace health evaluations and fewer than half provide staff with ergonomic advice.
  •  
    "Workers who spend excessive amounts of time at their desk could be putting their lives at risk, research suggests. The Medical Research Institute in New Zealand found they may have a higher risk of developing potentially fatal blood clots."
Madeline Brownstone

NOVA Online | Cracking the Code of Life | Watch the Program - 7 views

  •  
    Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
  • ...10 more comments...
  •  
    Criterion A- The IT system (research DNA database) that allows medical researchers to record and track medical histories throughout generations, arise a variety of issues. One of these issues is privacy, where the database holds genetic information that many ethical doctors call a "future diary". These medical databases can be analyzed by a variety of people and those who have access to this information are handling private information. The major stakeholders were those patients who gave up their DNA because their genetic information put into the hands of these medical doctors creates the privacy issue. This information needed to be well stored and doctors take implications such as encoding social security numbers and no names are used. Criterion B- These research DNA databases begin with the obtainment of genetic information. In a relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. Criterion C- From the point of view of the major stake holders (patients who given up their genetic information) the IT system (research DNA databases) (Not done)
  •  
    Criterion A) The IT system is a database. This database is a link of DNA records, health records, and family trees. Major stakeholders of this issue are citizens of Iceland who agree to let their information be put on these databases and analyzed. Criterion B) The database works in parts. First, there is already a database of family trees in place. This family tree generator works by inputting an individual's social security number. After this is in place, the name of many generations of ancestors of this individual is shown in a tree. Then, the creator of the database asks for the permission, of family members, to add the DNA code and the health record of each person. This allows for a social security number and a disease to be input at the same time. With this, the scientist can see those who have it, and those who don't. Then, with the use of the DNA codes, they can "hunt down" genes that cause certain diseases. The database is related to an issue of privacy. This is because those who allow their health records and DNA code, are letting the medical team and users of the database know all things about them. With just a social security number, a user that has access to the database may learn more things about you than you may want: such as your family, what diseases you may have, and many other things. Another issue is in reliability. There is the possibility that the medical teams that try to track genetic code differences between those with a disease and those without it, may come to realize that a difference they find is only a coincidence and not helpful. (not completed)
  •  
    The IT system being used is the DNA database that are being kept on the Icelandic people. The DNA database holds a lot of information of the people in the database and even things that they do not know such as their DNA and what it means. The major stakeholder is the people that are sending their DNA information, blood samples, medical histories and family trees. The issue of privacy is then involved because of the personal information that others can go through by accessing the database. The database is run by first getting the blood sample of the patient who willingly gives permission to give their DNA information to the company, deCODE. The information is then entered into the database which organizes the information by each person's social security number. The relational database is used to organize the information. (Cont.) The impacts of the database is both negative and positive. The database can be
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. * The IT system described in this video is a medical database. The major stakeholder are the doctors who manage the data of patients in the relational databases. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). * A relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. * One of the positive impacts of these medical databases are that the family tree is in a database and all health records can be found for each patient and because this is a relational database, all of the patient's information is linked to their families and other people who have similar diseases. This is beneficial because experts can see trends in the people who have a certain disease and once they figure out the "spelling" of the genetic code with the disease, they can work on coming up for cures for that particular disease. A negative impact of the medical databases can be privacy. The doctors have access to every patients information and they can know everything about a certain person or family if he/she wanted to. This would then raise an issue of integrity.
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system is the database and the issue is who has access of the Database which has medical records of individuals. The major stakeholders are the Doctors and Patients. Doctors are trying to find information on specific DNA that create sickness and diseases. Finding the relationship between the family members and there DNA, can possibly improve medicine and also allow doctors figure out what an individual can have(sickness) in future references, making inferences of what might happen. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). A data base function is that it is a computer stored software that contains tables of various information and organizes all the data into categories. One subject/category can be related to another with little difference. This is why the database makes it easier for information to be viewed and interpreted much faster. By entering data on the tables one can interlink topics in order to find specific information needed. The person who enters the data can use software like Openoffice to create a database to view DNA and the relationship with the other individuals. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. The primary issue of the negative impact on Databases, have on the skateholders for DNA purposes is Privacy. Privacy has a big part in the stakeholders because many of the patient give away there Social Security number which is something private to them. With the Social Security Number the doctors can have access to other information not related in there investigation of finding a cure. This can cause reliability with the doctors to decrease. The database would have information of all sort on there medical records which should not be something that would be public for eve
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues: The IT system in these videos were medical databases containing records of many patients. Specialists use these databases to help them identify where a certain disease came from and whether or not it could be treated. they do this by viewing the patients ancestors records and seeing who had the disease in that family tree. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). Specialists (with the permission of the patient) insert a patients social security number into the medical database and let the database generate the patients entire family tree. Using this family tree, doctors were able to "hunt" down the origin of diseases, by looking at the genes of the ancestors. That way, by matching the DNA of the patient affected by a certain disease with the DNA of one of his/her ancestors DNA that suffered the same disease, and looking for similarities or patterns. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. There were several positive and negative impacts regarding this "hunting down" of diseases. By looking at family trees specialists and doctors would be able to determine what caused the disease and possibly come up with a cure or treatment for it. However, many patients are concerned with doctors going through their records and DNA due to there being a lack of privacy. If patients grant permission, specialists would be able to find out and know absolutely everything about their health history. Specialists argue that it would be of great benefit to detect diseases early so they could be treated by doing this. Chips are being created were thousands of babies genes could be looked at to look for any abnormalities. Some people argue that even if a disease were detected, there's two possibilities, one
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system involved is the DNA database system, identified as an organized collection of age old family trees, accompanied by state of the art DNA analysis and computer technology. Systematically, genetic information (DNA) is stored in related tables, distinguished by individuals' own security number codes. One centralized ethical and social consideration is privacy, mainly a major concern of the involved DNA suppliers (the public), that place their given personal information (genetic data, reference to family origins, medical history etc) in a national database system, from which the accessing of medical records and history of one's entire family can become manipulated or misused. In addition to the elevated risk of data misuse, once the involved participants (Icelandic citizens) give access to their personal information, there are no limitations placed on the utilization of the data within the national database, as it becomes accessible for the government, medical researchers and operating staff. Thus, the implications are straining to the individual donor, unable to determine when, how and to what extent the information given is shared amongst other groups. Furthermore, the privacy of the participants undesirably opens access to the medical information of related family members, as cross-referencing and data matching give the research staff operating the DNA database, access to retrieve a plethora of other members' data mainly for the purpose of effective data mining (the retrieval of hidden predictive patterns, as a diagnostic tool to decode the occurrence of genetic disorders/diseases). CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). With the possession of participant's medical data, including blood type, isolated samples of DNA, medical health records e
  •  
    The primary IT system in use is a DNA database, which includes information about patients, illnesses, and virtually one's make up as a human. DNA databases allow researchers to find patterns in a human genome, by looking at the DNA from various family members and determining the difference or similarities between the DNA of family members. This is done through database functions such as data mining, and data matching. Locations such as Iceland, have a database that traces back all of the people within the country to their Viking ancestors. These family trees have been paired with DNA analysis in order to trace diseases back to their start. Some more tests could be conducted in order to determine which of the living relatives of one family with arthritis, for example, have the disease. Then, the DNA can be compared in order to identify the exact gene that is at fault for the disease. This process is very easy to do because the database with all of the ancestral information is accessible with the presence of one of the family member's SSN. A simple data query can then bring together all of the person's information. Moreover, DNA, health records, and the family trees of Iceland were proposed to be linked. This could be very beneficial because new drugs could be made available to suit the specific disease of a patient. It could also be a way for diagnosed patients to take early preventative measures. This could increase the probability for a cure, and in general this would increase the life expectancy of certain areas. However, some doctors in Iceland opposed to this linkage, because the information is representative of each person's medical history, and potentially their future medical history. This information, according to the plans of the linkage of medical records and the family tree, would be available on a central database that would bring together private information about a person and connect it to all of their family members, past, present, and future. T
  •  
    There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
  •  
    Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
T Graham

Are cell phones safe? Researchers still uncertain | Signal Strength - CNET News - 0 views

  • The question over whether cell phones pose a health risk has been debated for years, and researchers say the final answer could still be years away.
  • The Interphone study, which began over a decade ago involving 13 countries and has been funded in part by the wireless industry, was supposed to settle the dispute. But the report's publication has been delayed as researchers disagree over how to interpret the data.
    • T Graham
       
      If the data is that unclear, that means that effects are different for different people.
  • indicates that children absorb twice as much radiation from cell phones as adults do, mostly because their faces and heads are much smaller.
    • T Graham
       
      This ia big health risk because children are pobably the most common users of cell phones.
  • ...4 more annotations...
  • can you
  • The question becomes how can you accept the epidemiologic research, if it's not plausible from a biological standpoint?"
  • There are 3 to 4 billion people using this technology throughout the world, so it's an important question to answer."
    • T Graham
       
      With this many people using this technology wouldn't it be harder to slow the problem down, because it would be too hard to keep track of al the users.
  • What is really needed is for the wireless industry to provide detailed usage information."
    • T Graham
       
      The wireless networks would not cooperate with this because they could lose money.
  •  
    Leading scientists gathering in Washington, D.C., this week say more research is needed to once-and-for-all determine whether cell phones pose major health risks. Read this blog post by Marguerite Reardon on Signal Strength.
helen g

SentinelSource.com | Archives | Wireless safety questioned - 0 views

  • — the level of radiation your cell phone sends sizzling toward your skull.
    • helen g
       
      It's really not that most people don't know this, they just put it to the side, being that they think its really not that big of a deal. Cell phones have become such a huge neccesity in peoples lives that they ignore the health risks it may cause.
  • In issuing its rankings, the Environmental Working Group — a nonprofit advocacy group concerned mostly with health problems it associates with pollution — injects itself into a scientific controversy that has simmered for years without consensus.
    • helen g
       
      Does this meant that cell phones can cause pollution? If so I think many people including myself are unaware of this fact.
  • behavior problems in children.
    • helen g
       
      What do they mean by behavior problems?
  • ...2 more annotations...
  • Yet the debate goes on. One recent study in Great Britain found “no evidence that the risk of developing pituitary tumors is associated with cellular phone use.” A Swedish study published this summer did find a correlation between cell phone and cordless phone use and tumors. Yet a third piece of recent research failed to connect tumors to cell phones but said that conclusion is less convincing “because the observation period has been too short.”
    • helen g
       
      The media doesn't want to ultimately say that there is a correlation between cell phones and brain tumors, because they will then be accountable to an extent for sales dropping in cell phones.
  • Use of a Bluetooth device — those blinking blue devices worn on the ear that connect wirelessly to a nearby cell phone — could raise or lower radiation exposure, depending on the circumstances.
    • helen g
       
      How would it decrease the radiation? A bluetooth is still an electronic device and peope actually stick it in their ear
  •  
    This article is about the health problems some people associate with cell phones and what different people think about these risks.
Madeline Brownstone

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  • ...2 more comments...
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
  •  
    Please go back and "cache" this page.
  •  
    I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
  •  
    This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
Rubayeth M

Ohio bans offshoring as it gives tax relief to outsourcing firm - 2 views

  •  
    In Milford, Ohio the governor Ted Strickand is trying to stop all outsourcing because his two major reasons are the "threat of of a job but an IT security risk." Then it goes more deep saying how more than 90% of the workers are Indian and 7% and lower have job in America. Strickland is more concerned with the issues which are jobs, data security, privacy,and identity theft risks.
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Karen M

Visa Introduces a Credit Card on a Phone - NYTimes.com - 1 views

  •  
    In this article, RFID is being used in the business world. People are now able to purchase phones with the capability of making purchases by moving it over the terminal. RFID technology allows people to stop using credit cards, making the process of buying something even more convenient. The stakeholders are the credit card companies, the people using this new technology, and the stores with the terminals that read RFID. Credit card companies need to have a good security system to ensure their customers and users that their information will be kept safe on the RFID chip. The people who are switching to this new technology are risking their private information for convenience. The stores with these new RFID terminals are also risking their customers' private information because there is a possibility that their system could be hacked. The area of impact is Business and Employment. Businesses are switching to this new technology because it is convenient for them as well as their customers. The main issues that arise from using RFID are security and reliability. The RFID terminal needs to be reliable so that every customer is able to use the RFID chip on their phone to make purchases. The security issue is that a hacker may be able to get into the system to read customers' private information. It may also be possible for a hacker to carry around a portable terminal that would be able to store people's private information on it for future usage. The security system described in this article sounds like a good start, but more needs to be done to keep up with the technology that is growing along with it.
Madeline Brownstone

Bus Accidents :: North Carolina Injury Lawyer Blog - 0 views

  •  
    "Virginia Tech Transportation Institute recently reported that large truck drivers increase their crash risk by 23 times when they text and drive. Merely reaching for communication device or dialing a cell phone increased the chance of a car accident or a truck collision by six times. The AAA Foundation for Traffic Safety says that more than 1 million auto crashes a year that happen in North American can be linked to driver inattention."
Karen M

BBC NEWS | Business | India faces battle for outsourcing - 0 views

  •  
    This article is about the issues that India is now facing because they are the world leader in IT outsourcing. The IT system in this article is the call centers that are located in India. The area of impact is Business and Employment. Outsourcing provides jobs for the citizens of India. Their employment is at risk because of the fact that India now has to compete against other countries for the same outsourcing jobs. The stakeholders are the Indian workers, global customers, competitors, and the companies who are outsourcing. The Indian workers now need to work even harder to keep their jobs because there are other countries who are trying to step up their people so that they could be capable of doing the same work. For example, Africa is starting to become well-known in the world of outsourcing because they have the same amount of talent and can also speak English. India is no longer the first country that comes to mind when companies are thinking about outsourcing. Other countries are willing to do the same job for less money, leading for companies to choose them over India. There have also been cases where the customers are not satisfied by the calls that they make offshore. This would play into the decision of the company of whether they want to move their outsourcing site or not. One issue mentioned in the article is security. There have been instances in which a customer's financial information has been sold by unscrupulous employees. By outsourcing, the head company is putting a lot of trust in the company they hire to do the job. They are risking their customers' satisfaction by allowing foreign countries manage their operations. Although a call center may not seem really important in the company, the workers are still dealing with customers of the company and should make sure to keep them satisfied. If the customers are not satisfied, they would probably take their money and invest in another company who would give them a more secure experience.
Mariam B

Privacy Issue Complicates Push to Link Medical Data - 1 views

  •  
    This article deals with the use of electronic health records in order to record medical information of patients. Congress wishes to pass a bill to enforce the use of electronic health records, however issues regarding the privacy of patients and information stored on these databases have arose. Electronic health records are used to record personal patient information such as name, age, address along with health sicknesses and symptoms. This also allows doctors to send e-prescriptions to the patient. However the computerization of health records triggers obvious privacy issues which prevent many hospitals to completely switch to using these electronic databases. Stakeholders of this technology include the patients whose medical information is being stored and sent on the databases, the hospitals and doctors that use the databases to track and send prescriptions to their patients, along with policy makers such as Congress and President Obama who promote the use of electronic health databases. The major stakeholder is the patient, whose private information is at risk by using these databases. Doctors can also use the electronic databases to send prescriptions to their patients for medicines or further appointments. Patient databases include sensitive personal information that may be at risk of being hacked or seen by an unauthorized user. In the article, solutions to these privacy issues have been proposed such as increased spending and investments in order to create solutions to privacy issues. Measures can be taken to safeguard medical information such as using encryption technology to secure private information that is sent online or kept on the hospital's computer database. This encryption would prevent unauthorized users from accessing and using patient information. However, in cases where this encryption technology fails to protect patient information, policies have been created that the patient must be notified if their personal information has been h
  •  
    continued: have been created that the patient must be notified if their personal information has been hacked or seen by an outsider. Other policies have been enforced that give patients the ability to control and prevent hospitals from sending private information for research without their permission. These policies help prevent private patient information from being seen by unwanted individuals.
Madeline Brownstone

EU to Allow Cell-Phone Use on Airplanes - Science News | Science & Technology | Technol... - 1 views

  •  
    Airlines and EU officials said the security risk will be minimized because the system will not connect inflight phones directly to the ground - instead using an onboard base station to link up to a satellite and then to ground networks. "It has to go through a central onboard cellular network that can be switched off by the captain at any moment, so that enhances the security of the passengers," said EU spokesman Martin Selmayr. He added that for safety and security concerns the phone services will not be available during takeoff, landing or during turbulence.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Joel Lubi

Study Says Chips in ID Tags Are Vulnerable to Viruses - 1 views

  •  
    RFID is a technology which can create many new possibilities, as well as build upon existing ones. The technology can be applied to a variety of scenarios, but concerns rise due to problems with privacy and lack of security as it has been proven that viruses can be stored on the small 128 character capacity of the RFID chip. These viruses can be used to exploit whatever it is that the technology is implemented in. This could potentially cause problems such as some tags not getting scanned, or even all tags not getting scanned. The risk increases in other scenarios such as airports, where RFID technology could be very useful for streamlining and organizing the baggage transport process, but a single virus and the whole thing would be disrupted. Just as with computers, I'm sure that people will eventually figure out a way to protect from RFID-bound viruses to implement them for great purposes.
Ariel A

Business Technology: Implementing RFID Is A Risk Worth Taking- Informationweek.com - 0 views

http://www.informationweek.com/news/mobility/RFID/showArticle.jhtml?articleID=164302282 This Article describes the disadvantages of using RFID on items. If an item is leaving the store there is...

ITGS Business

started by Ariel A on 06 Dec 10 no follow-up yet
Ram Bhadra

Usage of weak encryption codes in RFIDs - 0 views

  •  
    In big corporations such as Wal-Mart, the use of RFIDs has increased, but the disadvantages of RFID is now a serious issue. With the use of RFIDs on items, the customer is able to avoid waiting at a register, and the RFID will charge the person's credit-card. Yet the tags embedded in the items bought, such as clothing, can be tracked down by the store management systems, risking customers' security and privacy. Since RFIDs do not require a power supply or batteries to operate, all that is needed is a wireless scanner, which Wal-Mart's managing system uses to keep track of the items. Privacy has now become a major issue within the use of RFIDs for many Wal-Mart customers. Also, in many credit cards and "gas-cards", RFIDs are being used, yet the information on the tags also stays within the system. At airports, many modern passports are now using RFID tags that can be scanned from a range as far as 30 feet. Thus this results in chaos for the passengers, and an issue in being able to control the airport security properly.
  •  
    Large scale businesses like Wal-mart and government authorities in passport make use of sophisticated RFIDs which make the data stored in them or to be accesses through them safe, which helps them keep their business data or data of the clients(in some cases passport holders) safe, however many corporates make use of cheap RFIDs which have a weak encryption code to protect them. This code can be broken easily and hence the client of that RFID is vulnerable to hackers. Ford for example makes use of RFIDs manufactured by Texas Instruments, in their car keys. These RFIDs are protected by very weak codes, hence it is easy for thieves to break the code and steal cars.
Daniell S

Security risk found in new credit cards - Technology - International Herald Tribune - 1 views

  •  
    In this article it talks about the idea of putting RFID, or Radio Frequency Identification technology into a credit card. This can be both a good thing and a bad thing. It would be a good thing because it would totally change the way a business could work. It would decrease the amount of time a person spends in a store. A person could simply walk in and out of the supermarket with the items they wanted and the amount of money would be charged directly to the persons credit card. However, this could result in an increase in credit card abuse. with RFID technology the signal could be picked up by any radio frequency. This can result in identity theft, and credit card fraud. This is a a violation of the social and ethical issue Security. The stakeholders in this situation would be the credit card users, and the companies issuing the credit card. The users would become angered that their credit cards could be maxed out without them using it more than once and the companies could be sued for each credit card they issued.
Madeline Brownstone

Simple Passwords Remain Popular, Despite Risk of Hacking - NYTimes.com - 1 views

  •  
    "According to a new analysis, one out of five Web users still decides to leave the digital equivalent of a key under the doormat: they choose a simple, easily guessed password like "abc123," "iloveyou" or even "password" to protect their data."
Arafat Chowdhury

Scientists Worry Machines May Outsmart Man - 5 views

  •  
    This article poses the traditional dystopian view of the future of robots and their eventual dominance of humanity. According to the Association for the Advancement of Artificial Intelligence however, humans are a long time away from being controlled by robots. For now, there are worries that increase use of robots will wipe out jobs (i.e. cleaning, service jobs). This may just lead to an increase in competition for jobs that require more skills (skills that robots can't yet do), and a university degree. Perhaps there will be an increase in poverty rates as a result, or a revolution might begin. The possibilities are endless. For now, humans must be aware that robots are gaining ground in the search for intelligence. Control of such machines is an issue that humans will eventually have to face.
  •  
    This article is about the social and ethical issue of people and machines. As technology advances, scientists are becoming more aware of the future consequences that can arise from creating advanced robots. They have realized that there is a risk of technology getting out of hand and become dangerous. As they become more advanced, robots can become a threat to society. Not only do they pose a security threat but they also threaten human employees. Robots are more accurate and can work 24/7 unlike humans. Jobs with robots still require human labor to operate them but in the future, robots might start taking over jobs.
  •  
    This article brings up the issue of machines that possess Artificial Intelligence, possibly limiting the roles of humans in various area such as the work force. Often when the idea of robots and Artificial Intelligence is considered people think about the negative effects of smart machines. They worry about control and the interaction.
1 - 20 of 28 Next ›
Showing 20 items per page