Group items matching
in title, tags, annotations or urlCan robots stop Gulf of Mexico oil spill? | Crave - CNET - 1 views
-
robotic submarines in an effort to contain the spill
-
BP quoted National Oceanic and Atmospheric Administration experts
-
They are monitoring the leak, which was discovered Saturday, as well as trying to activate the blowout preventer, a
- ...1 more annotation...
-
The IT system in this case is the remotely operated vehicles (ROVs) created by the oilfield engineering company Oceaneering. These robots monitored the leak deep down in the Transocean Deepwater Horizon, where humans could not reach to check out the oil spill. The major stakeholders are BP (the company responsible for the oil spill), experts from the National Oceanic and Atmospheric Administration, who control and protect the environment in the Gulf of Mexico, Oceaneering, which created the ROVs, and the people living in the coast who were impacted by the massive oil spill in the gulf. The area of impact is that of science and the environment. The area of science applies to the robotics and artificial intelligence aspect, and the environment side deals with the environmental concern. The social and ethical issue is that of people and machines, and policies and standards. Experts in the field of environment must issue and enforce the policies that they stipulate, so as to protect the environment.
NOVA Online | Cracking the Code of Life | Watch the Program - 7 views
-
Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
- ...10 more comments...
-
There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
-
Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
In Haiti, Practicing Medicine From Afar - 0 views
-
(NOT FINISHED) After the devastation of Haiti's earthquake, impoverishment plagued the millions of patients, in dire need for medical assistance and resources. The "low tech" equipment failed to meet the needs of the population, so tele medicine is being adapted.
-
Medical facilities in Haiti are in essence trying to integrate satellite connection and internet service (along with increased bandwidth) in order to greatly expand the distribution and administering of medical services. Donated by the other organizations in Miami, the Haitian hospitals are now given the opportunity to form intercommunication via a wireless regional network system (internet service provided by neighboring countries, such as the Dominican Republic). One of the primary stakeholders, the patient and injured Haitian individuals required to maintain necessary medical help from the American doctors and medical professionals (other primary stakeholder). Such IT systems, enable the patients suffering from the devastating results of the earthquake to retrieve an increased amount of help and attention from doctors and other medical health professionals in other parts of the world, specifically recruiting medical help centralized in the United States. The adapted procedures of tele health already in American hospitals, including the use of internet messaging, x rays, scans, and medical reports all enable doctors to obtain confrontation and collaboration with Haitian patients on accurate and more reliable grounds. The scenario included in the article is Health, and the main theme is"medical information administration and marketing sales" for this pertains to telemedicine as a branched off aspect. In regards to the social and ethical considerations, the issue of the digital divide and equality of access is greatly highlighted in the article; telemedicine linked medical services found in another nation, to the needy Haitian population thus diminishing global boundaries placed up by the differences in development and advancement in certain regions of the globe. The digital divide that took control over Haitian lives( due to the catastrophic events of the earthquake) eliminated sources of internet connection, hardware and available software equipment to run teleme
-
In Diigo, you can always go back in and edit your own postings. It's only in the moodle that there is a time bomb that causes you to comment on your own reflections if you go back later to expand upon your initial thoughts.
Privacy Issue Complicates Push to Link Medical Data - 1 views
-
This article deals with the use of electronic health records in order to record medical information of patients. Congress wishes to pass a bill to enforce the use of electronic health records, however issues regarding the privacy of patients and information stored on these databases have arose. Electronic health records are used to record personal patient information such as name, age, address along with health sicknesses and symptoms. This also allows doctors to send e-prescriptions to the patient. However the computerization of health records triggers obvious privacy issues which prevent many hospitals to completely switch to using these electronic databases. Stakeholders of this technology include the patients whose medical information is being stored and sent on the databases, the hospitals and doctors that use the databases to track and send prescriptions to their patients, along with policy makers such as Congress and President Obama who promote the use of electronic health databases. The major stakeholder is the patient, whose private information is at risk by using these databases. Doctors can also use the electronic databases to send prescriptions to their patients for medicines or further appointments. Patient databases include sensitive personal information that may be at risk of being hacked or seen by an unauthorized user. In the article, solutions to these privacy issues have been proposed such as increased spending and investments in order to create solutions to privacy issues. Measures can be taken to safeguard medical information such as using encryption technology to secure private information that is sent online or kept on the hospital's computer database. This encryption would prevent unauthorized users from accessing and using patient information. However, in cases where this encryption technology fails to protect patient information, policies have been created that the patient must be notified if their personal information has been h
-
continued: have been created that the patient must be notified if their personal information has been hacked or seen by an outsider. Other policies have been enforced that give patients the ability to control and prevent hospitals from sending private information for research without their permission. These policies help prevent private patient information from being seen by unwanted individuals.
Regulations and Security Concerns Hinder Asia's Move to Cloud Computing - NYTimes.com - 0 views
-
In this article it talks about how the organization known as "The Youth Olympic Games" were hosting their games in August. But they have done something different this year. Unlike what they have done every year, purchasing their items all the time and selling them or giving them away for free; they have now would have an third-world country who has the equipment do their job if they were to buy it. By that I mean they would used a system called "cloud services", and the group in charge of working would be Asia and they would have the data of everyone who is watching, performing and workers of the organization. Therefore these are the stakeholders in with this program that because they are having someone else from a different country; without knowing if they are someone who wants to steal their identity has full access. The IT system in this "cloud services" would be cloud computing since someone that may be from home, or sitting in an office has control over the organization and the data. The issue in this would be security, that because the people that are using "cloud services" are in Asia; therefore they are in a different having control in the U.S. The scenarios in this would be the fact that everyone identity would be stolen since the controls would be in Asia and they wouldn't be tracked since they are in a different country. They also couldn't be charged since they were given permission to have access to the data.
TOPIC: In what ways is social networking used for serious business? - 35 views
The article I read was about the United States government using social networking sites like Facebook and Myspace to do investigation on people and catch criminals. Though it may be helpful for the...
Outsourcing: Its Effects on the U.s Economy and Leadership - 0 views
-
This article is about how companies use outsourcing and offshoring as a way to reduce costs and as a method for cheap labor. One of the articles' main points about outsourcing is that the decision to outsource is often in the interest of the company to reduce costs, divert or energy-saving measures aimed at making the skills of a particular company or for the more efficient use of labor, capital, technologies and resources. One problem that arises from outsourcing is that it takes much-needed jobs from the U.S. economy. It is not too different from offshoring, because both are beneficial for companies and used to cut costs. When a company chooses to offshore, it means that it does its business in another country. This 'other' country is usually a developing country because rates tend to be much cheaper there, which is exactly how businesses save money. One of the main issues, again, lies within the U.S. economy. Since US businesses are leaving to do business in other countries, the US economy is suffering quite a blow because less companies are becoming dependent on it. This is a big problem and could lead to an even bigger one for the business because third world countries cannot always be trusted. Even though they are saving so much more money by offshoring, the business they now perform is unreliable and could possibly be affected my many more problems. The main stakeholders in this issue are the businesses who are offshoring and outsourcing, the US government, and the countries the businesses now rely on. Also, depending on the company, people in America tend to suffer as well because since the main issue that arises is reliability, the users or owners of the product may not have the same service. For example, if Time Warner decides to station in India, the workers there may be inexperienced and the company will not be able to do anything about it. This means that when the users of Time Warner call their main number, someone in India will pick up. The probl
Usage of weak encryption codes in RFIDs - 0 views
-
In big corporations such as Wal-Mart, the use of RFIDs has increased, but the disadvantages of RFID is now a serious issue. With the use of RFIDs on items, the customer is able to avoid waiting at a register, and the RFID will charge the person's credit-card. Yet the tags embedded in the items bought, such as clothing, can be tracked down by the store management systems, risking customers' security and privacy. Since RFIDs do not require a power supply or batteries to operate, all that is needed is a wireless scanner, which Wal-Mart's managing system uses to keep track of the items. Privacy has now become a major issue within the use of RFIDs for many Wal-Mart customers. Also, in many credit cards and "gas-cards", RFIDs are being used, yet the information on the tags also stays within the system. At airports, many modern passports are now using RFID tags that can be scanned from a range as far as 30 feet. Thus this results in chaos for the passengers, and an issue in being able to control the airport security properly.
-
Large scale businesses like Wal-mart and government authorities in passport make use of sophisticated RFIDs which make the data stored in them or to be accesses through them safe, which helps them keep their business data or data of the clients(in some cases passport holders) safe, however many corporates make use of cheap RFIDs which have a weak encryption code to protect them. This code can be broken easily and hence the client of that RFID is vulnerable to hackers. Ford for example makes use of RFIDs manufactured by Texas Instruments, in their car keys. These RFIDs are protected by very weak codes, hence it is easy for thieves to break the code and steal cars.
India in talks with BlackBerry maker for access to corporate email service | Technology | guardian.co.uk - 1 views
-
This article Talks about Research in motion, the company of blackberry in talks with India about the services that the phones provide
-
This article meets the standards of ITGS. From assessing this article through strand 1 we see that their are a number social and ethical conditions to be considered in this story. Security is a major issue here, RIM's encryption is so secure that not even powerful governments can't crack. This brings up the issue of security because countries like India are worried that this secure network can be abused by the terrorists. This brings up the issue of the digital divide and equality of access. This issue is brought up because India was threatening to disrupt Blackberry access because India did not have access to some features that blackberry users from other countries have. This leads to another problem, Reliability and integrity. Since RIM's network is the most secure network that even the most powerful governments can't crack, because of this many Corporations use Blackberry, RIM fears that if they(RIM) allow governments get a little more access, they will lose their reliability of their majority steak holders. This brings up the number of steak holders, the steak holders are RIM. their customers, India, and other middle eastern countries who are threatening to cut off service due to inequality of access. The IT systems that are mentioned are cellphones, and RIM's network. The applications that apply to the article are Business and employment, and governments control and use of information.
-
Nick originally posted this article, but did not cache it.
TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views
On Mohammad post I learned how the people in Iran used Twitter in the Election of the President to bring information out to the rest of the world and organize rallies within the country. This is an...
Google: Internet freedom is declining - 1 views
-
The Government censorship has expanded outside of China.
-
This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
-
This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
More Than Half of Mobile Apps Not Secure, Report Says - 5 views
-
An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
- ...3 more comments...
-
Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
-
In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
"Virtual Reality tackles tough questions" - 1 views
-
Scientists in Barcelona have constructed a technological device, enabling users to engage and "live" within a virtual reality; this digital world however, is bound by the oppressive and devastating human conditions experienced by the victimized individuals of physical and verbal maltreatment. The device, although it may conjure ethical realizations within the user's mind, also poses as an ethical dilemma for it brings the cruel severity of the downtrodden and exploited people into visual and mental display terrorizing the emotional stability of the participants.
-
Technological breakthroughs in decoding the human mind have blossomed ever since the invention of a device through which users are immersed within a virtual reality, to live and experience the trauma and distressing scenarios of people victimized by physical as well as emotional abuse. Developed by a team of Spanish scientists, this device is breaking down the mind's irrational judgement in relation to discriminatory or wrongful perceptions against others. The user of the device, once transported into the anguished lives of the virtual characters, comes face to face with the agony of living through abusive violence, and begins to form a clearer impression about the effects of such experiences upon the lifestyle, behavior and well being of any victim. In doing so, the participant ultimately widens the boundaries of his mental state of thought, and begins to appreciate and acknowledge the peace given by a happy life rid of gnawing internal complications. However, in engaging with such a virtual reality the user becomes an unshielded target of bitter misery, felt and illustrated by the depictions seen through the device. The software that is included in this article is the technological device that offers an entrance into the virtual world for the user. The stakeholders within this article are the users of the device, whose mental and emotional stability is controlled by the virtual reality developed by the scientists. The scientists hold the success of the entire experiment in the palm of their hands, and really are the source of the effect upon human behavior. One has to take into consideration the physical and psychological considerations (in "Health" scenario) of technology on the user of this particular device; although this device does help others modify their morality as they expand their considerations for the factors that have made people what they are today. The device however, does inflict the same trauma and terror depicted by the gestures and movements
-
I agree with the ethical and social concerns involved within your article. Although there are some benefits of recognizing the pain and violence inflicted on others, it can cause emotional stigma and trauma upon the person who is using this technological device. Technology controls our ethical morality, in developing software that explores the way the human brain works we destroy this boundary of what is right and wrong because we begin to focus on research and forget the effects involved. In this case, those involved in the experiment are unaware of the effects that this virtual reality exposed to the user will eventually have on them mentally and emotionally.
BBC NEWS | Middle East | Is that cellphone kosher? - 1 views
-
The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
- ...5 more comments...
-
This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
-
This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views
-
People's face book accounts are being hacked by others alarming all the users about their security.
- ...2 more comments...
-
I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
-
This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
Scientists Worry Machines May Outsmart Man - 5 views
-
This article poses the traditional dystopian view of the future of robots and their eventual dominance of humanity. According to the Association for the Advancement of Artificial Intelligence however, humans are a long time away from being controlled by robots. For now, there are worries that increase use of robots will wipe out jobs (i.e. cleaning, service jobs). This may just lead to an increase in competition for jobs that require more skills (skills that robots can't yet do), and a university degree. Perhaps there will be an increase in poverty rates as a result, or a revolution might begin. The possibilities are endless. For now, humans must be aware that robots are gaining ground in the search for intelligence. control of such machines is an issue that humans will eventually have to face.
-
This article is about the social and ethical issue of people and machines. As technology advances, scientists are becoming more aware of the future consequences that can arise from creating advanced robots. They have realized that there is a risk of technology getting out of hand and become dangerous. As they become more advanced, robots can become a threat to society. Not only do they pose a security threat but they also threaten human employees. Robots are more accurate and can work 24/7 unlike humans. Jobs with robots still require human labor to operate them but in the future, robots might start taking over jobs.
-
This article brings up the issue of machines that possess Artificial Intelligence, possibly limiting the roles of humans in various area such as the work force. Often when the idea of robots and Artificial Intelligence is considered people think about the negative effects of smart machines. They worry about control and the interaction.