Skip to main content

Home/ ITGS News/ Contents contributed and discussions participated by sarah d

Contents contributed and discussions participated by sarah d

sarah d

AML Case Study: New Way to Fight Fraud - 3 views

  •  
    The IT system is the behavior-based software that uses artificial intelligence. the stakeholders are the bank implementing this software and the customers of the bank. The area of impact is business and employment, specifically banking. The issue with the use of this system is reliability. If this software is not reliable, then the customers at the bank are less protected from fraud. Also an issue that arises from the use of this system is security. The use of this system is to protect against fraud. However, if the computer becomes insecure, fraud would not be detected. 
sarah d

Profit Outweighs Risk in Juárez Factories - 0 views

  •  
    This article is about the United States outsourcing manufacturing jobs to Mexico. Some companies in El Paso are also thinking of outsourcing to Juarez. At the same time, there have been more than 2500 killings due to drug issues, forcing thousands of residents to flee and businesses to close. The stakeholders are the retail businesses and the residents forced to find safety somewhere else. Assembly line workers, being paid $1.60-$2.00 an hour are also stakeholders in this situation. The system of outsourcing jobs, has created violence as well as low standards of living for the assembly-line workers. The issue at hand is how globalization and cultural diversity changed the way business is done. By outsourcing jobs, businesses are willing to accept higher profits, even with bad working atmospheres and internal tension.
sarah d

What's Lurking in That RFID Tag? - 2 views

  •  
    After the professor of computer science and technical director of the Information Security Institute at Johns Hopkins University and his students broke the encryption of a popular RFID system in car keys, it was apparent that there is a security issue when it comes to the use of RFIDs. The stakeholders are consumers who use products that have radio frequency identification systems embedded in them. As seen from the experiment done by the professor and his students, people can have their cars broken if the encryption of this identification is broken. The area of impact is business because this identification is on items sold in stores. The IT system is RFIDs, which are radio frequency identification. These forms of identification are similar to bar codes because when scanned can show people the price of items. However, being more advanced, RFIDs also show what the item is, the trends in sales and much more.
sarah d

Rural Doctor finds benefit in Electronic Health records - 1 views

  •  
    22 Feb 2010 "Rural Doctors Find Benefit in Electronic Health Records" by: Milt Freudenheim www.nytimes.com ITGS Triangle- Area of Impact: health Social and Ethical issues: equality of access, global and cultural diversity; electronic health records allow patients' information to be more easily accessed by professionals. IT system: Electronic Health Records Stakeholders: Patients and professional health-care workers. Professionals can share and access patient information more easily and readily. Presentation of Issue-- If a professional cannot switch to electronic health records, they are at a disadvantage. The playing field is not even for all professionals. Some professionals were switching their written records to electronic records to make access and use of records easier. While some professionals made the switch, others were having difficulty succeeding. This issue affected some doctors severely. For example Dr. Michael Ferris had a problem with his expensive system continuing to crash. This put his practice in jeopardy.
sarah d

Mobile Malware Targeting Smartphones - 1 views

  • A comparison of these statistics to the worldwide smartphone population places the number of infected devices globally in the millions. Because the vast majority of these infections are designed to be stealthy and the fact few smartphones have Anti-Malware applications, most infected users are unaware their devices have been compromised.
    • sarah d
       
      i dont know if this counts as examples. i think it might be too broad.
sarah d

Technologies - Cell-phone college classes face hurdles - 0 views

  • campus technology officials expect most college course material soon will be accessible on mobile devices
    • sarah d
       
      This relates to teh area of impact, education. If courses can be taken via cell phones, education will be very different.
  • courses via cell phone
    • sarah d
       
      This phrase tells us that cell phones are the IT system being discussed in this article.
1 - 7 of 7
Showing 20 items per page