Skip to main content

Home/ Groups/ ITGS News
Ariel A

How the society and human impacts of technology affect us - 1 views

  •  
    "The idea of engagement -- using technology to bring about discussions -- as well as incorporating commonly held human values should be brought into the design process, the researchers said.The notion that a piece of technology can be simply be produced and plunked down in front of a person "is unlikely to move us forward," said Tom Rodden, a professor of interactive systems at the University of Nottingham."\nJeremy Kirk, IDG News Service\nSat, 5 Apr 2008 23:00:00 UTC\nThis information I felt was very important because it helped me think of technology in a whole new way. Technology is not what is going to help us make the future, its us(humans) who are going to have the idea and the capacity to create this future using robots/machines to help us create the basses of it. Robots will have a huge impact on how we live in our everyday lives.
  •  
    I think i should get a Sufficient Criteria(2 marks)
Kevin S

Google wins YouTube case in Spain - 1 views

  •  
    Google is being blamed by a Broadcasting company for people posting things that were copyrighted to its Youtube affiliate.
  • ...3 more comments...
  •  
    This article is about Google being blamed by a broadcasting company in Spain for people posting copyrighted things, such as videos, on youtube. There are many people who post things they shouldn't on Youtube but Google shouldn't be condemned for a bunch of individuals that don't have anything better to do. Google won the lawsuit against Telecinco, and Telecinco even had to pay the case charges to Google. When Google is a big search engine on the internet, and you have stupid people posting things on it, but that isn't google's fault when people decide to post things that are copyrighted.
  •  
    Google wins a big court case in Spain against a Spanish television company. Allegedly You tube was airing shows before they aired on the actual television company costing them big bucks.
  •  
    Google wins a case in Spain for You Tube. A Spanish television company was accusing You Tube of breaking their company because You Tube was releasing their shows before they aired on the Spanish television company
  •  
    hey mike, how do you think that youtube is affiliated in any way with Google and why is google getting blamed for what happened on youtube?
  •  
    Google owns YouTube
Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Yuval S

Removing spyware from Windows - 1 views

  •  
    This article is about the important of using an anti-spyware program. A lot of people only use anti-virus programs expecting it to cokpete the job, but an anti-spyware program is important.
  •  
    This relates to ITGS because it includes all components. The stakeholders in this article are people that own laptops. The social and ethical issues in this are security. It has to do with spyware coming into your computer, and this invades ones privacy.
Rubayeth M

RIM's BlackPad tablet launch reported to be imminent - 2 views

  •  
    "BlackBerry-maker ready to launch hotly-anticipated tablet device, sources tell the Wall Street Journal." About their new tablet device that is similar to Apple's iPad.
  •  
    The requirements for ITGS are that it has Social and Ethical Significance and IT Systems. The Social and Ethical Significance that is included to this article are home and leisure and reliability because this product will be used by the people for the people. It is something that people will enjoy when used. This will create more ways to faster and easier way of keeping up with social networking, digital entertainment and many others. The reliability of this product will be compared to the iPad. For instance the 7in Blackberry is known as the BlackPad and is now a trademark by Blackberry. It weighs almost the same as an iPad and will be on AT&T or Verizon or only on AT&T and Verizon. The IT systems required for this product is a network provider which will be between AT&T and Verizon, wireless internet, internal memory, flash (is expected soon) and many others that are normal as regular phones and Apple's iPad. The stakeholder will be the people buying the BlackPad and the people learning how to adjust to this new generation of phones.
Mariam B

How Good Software makes us Stupid - 1 views

  •  
    This article discusses the drawbacks of using digital technology as a mode of acquiring knowledge. Although many believe that the emergence of digital technology allows individuals to increase their knowledge through the use of navigation devices and laptops, studies show how our intellectual capacity of storing and memorizing information is suddenly decreasing due to our dependancy on such devices.
  •  
    Within our current society, individuals are very dependent on their digital devices in order to provide them with knowledge. However, studies prove that the more reliant we become on this technology our ability to calculate, process, and store information decreases. We resort to our laptops, cellphones, and navigational system devices in order to find out how to get to a certain location or to quickly gain some information about a certain topic. This article investigates the social and ethical concerns involving people and machines: individuals are able to access knowledge, gain answers to their questions, and fulfill their curiosity using digital devices. This is beneficial in the way that we able to expand our knowledge on a variety of separate topics in a generally fast and efficient way. However a drawback that is triggered through the continuous use of this technology is the dependancy on using it as the only mode of gaining information. Traditional means of reading a newspaper or book have been abandoned and many individuals have resorted to search engines on the internet. This alternately limits our in-depth knowledge on a focused subject. The stake holders in this case are taxi driver who would usually memorize highways and routes to various places within a city have adopted to using their GPS as a easy guide to reach their destination. Additionally students, parents, and many organizations also often just use their digital devices such as the GPS, cellphones and their laptops to get quick answers. This article explores the use of IT in the process of teaching and learning. We are using our digital devices to learn from online forums and research from search engines like google. Individuals immediately turn to technology to search up the answer to a question that they have. Additionally it concerns the idea of mapping virtual globes through the use of GPS, taxi cab drivers are able to locate the destination that the passenger wants to arrive at.
Elisavet M

"Virtual Reality tackles tough questions" - 1 views

  •  
    Scientists in Barcelona have constructed a technological device, enabling users to engage and "live" within a virtual reality; this digital world however, is bound by the oppressive and devastating human conditions experienced by the victimized individuals of physical and verbal maltreatment. The device, although it may conjure ethical realizations within the user's mind, also poses as an ethical dilemma for it brings the cruel severity of the downtrodden and exploited people into visual and mental display terrorizing the emotional stability of the participants.
  •  
    Technological breakthroughs in decoding the human mind have blossomed ever since the invention of a device through which users are immersed within a virtual reality, to live and experience the trauma and distressing scenarios of people victimized by physical as well as emotional abuse. Developed by a team of Spanish scientists, this device is breaking down the mind's irrational judgement in relation to discriminatory or wrongful perceptions against others. The user of the device, once transported into the anguished lives of the virtual characters, comes face to face with the agony of living through abusive violence, and begins to form a clearer impression about the effects of such experiences upon the lifestyle, behavior and well being of any victim. In doing so, the participant ultimately widens the boundaries of his mental state of thought, and begins to appreciate and acknowledge the peace given by a happy life rid of gnawing internal complications. However, in engaging with such a virtual reality the user becomes an unshielded target of bitter misery, felt and illustrated by the depictions seen through the device. The software that is included in this article is the technological device that offers an entrance into the virtual world for the user. The stakeholders within this article are the users of the device, whose mental and emotional stability is controlled by the virtual reality developed by the scientists. The scientists hold the success of the entire experiment in the palm of their hands, and really are the source of the effect upon human behavior. One has to take into consideration the physical and psychological considerations (in "Health" scenario) of technology on the user of this particular device; although this device does help others modify their morality as they expand their considerations for the factors that have made people what they are today. The device however, does inflict the same trauma and terror depicted by the gestures and movements
  •  
    I agree with the ethical and social concerns involved within your article. Although there are some benefits of recognizing the pain and violence inflicted on others, it can cause emotional stigma and trauma upon the person who is using this technological device. Technology controls our ethical morality, in developing software that explores the way the human brain works we destroy this boundary of what is right and wrong because we begin to focus on research and forget the effects involved. In this case, those involved in the experiment are unaware of the effects that this virtual reality exposed to the user will eventually have on them mentally and emotionally.
Joel Lubi

Zuckerberg: Facebook's mobile strategy is breadth not depth. Got that? | Technology | g... - 1 views

  • "So if something like HTML5 becomes a big standard then that would be hugely valuable for us. So we'll help push that. I imagine that over the long term that will be the solution to this problem that you're talking about.
  • "So if something like HTML5 becomes a big standard then that would be hugely valuable for us. So we'll help push that. I imagine that over the long term that will be the solution to this problem that you're talking about.
  •  
    The CEO of Facebook, Mark Zuckerberg is responding to claims about the production of a Facebook oriented Operating System, and possibly a Facebook phone. Zuckerberg dismisses these claims and responds that his goal is 'breadth not depth', meaning that he is focused on spreading Facebook to a variety of platforms rather than going in depth on one.
  •  
    This guy, the CEO of Facebook, Mark Zuckerberg is one brilliant man. One thing that confuses me is the this thing about the HTML5 and about Windows 7 for phones that will affected when released for mobile Facebook. But still, this dude I think is definitely going to competing with Bill Gates when it comes to who will the richest.
Saida K

Google: Internet freedom is declining - 1 views

  •  
    The Government censorship has expanded outside of China.
  •  
    This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
  •  
    This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
Rubayeth M

How Do Teens Do Homework Today? - 2 views

  •  
    This relates to ITGS because the stakeholder her is a 17-year female who goes to high school in California and does her homework. However, when it comes to doing homework she gets distracted really quick and forgets. When she comes back she feels like she has so much homework until she finally she goes in to a room where she is isolated without technology which helps her complete concentrate and finish her tasks for school. This shows that home leisure comes in affect where technology at home which in this case is a computer and a phone directly links it to social networking and communication. If she was without a phone and a computer I am pretty sure it would less harder for her to get distracted. Sometimes using a computer will help complete the task faster this then will give her more time with her social life. What I am trying to say is that technology has its advantages and disadvantages.
Lenny H

Citizens Around the Country Consider Banning Traffic Cameras - 0 views

  •  
    "Petition drives are under way in six cities with the goal of offering local residents the opportunity to vote in the next election on whether automated ticketing should continue or not."
  •  
    This article on the banning of traffic cameras meets all of the requirements for ITGS because the article introduces and establishes/expands on the ideas found on the ITGS Triangle. Various Social and Ethical issues are established by the protest currently occurring with the protest to get red of these "robot cops". One of the Social and Ethical issues introduces is Policies. The government currently enforces the policies that allow the use of these traffic cameras on highways and on many of the streets in our communities/societies today. These policies restrict drivers from ever attempting to cross a red light or do thing that may be inappropriate when driving. With these policies, traffic cameras are allowed to take pictures of drivers and their license plate if committing a crime. States like Maryland a protesting against these policies and laws enforced by the government. This article also introduces stakeholders, which are the people driving in their cars, and the government that enforces the practice of these cameras. These Cameras are also the IT system that the article introduces. This article including or referencing an IT system is the single most important aspect of the article. If this article did not introduce the importance of an IT system it would not be reliable to analyze for the ITGS triangle.
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Baris T

The player: will the PlayStation Move or Kinect for Xbox change the future of gaming? |... - 1 views

  •  
    The future of gaming is in the hands of these two companies, who will do it the best?
  •  
    the stakeholders in this situation are gamers. the future of gaming is changing and many are asking the question which console is developing the 3D simulation better. many students are gamers and so they are drawn into games and learn about how they can improve. in this case 2 systems the xbox 360 and the ps3 are evolving into 3d systems. who is going to execute the systems better?
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Ram Bhadra

Cyber Command chief proposes secure network for government, key industries - 0 views

  •  
    The main stake holders in this articles are the Military, FBI, the government and all foreign surveillance. The technology involved is the military database. It has many important details and high level data that would be harmful if in wrong hands. The government needs to secure the data base to avoid in foreign invasion on their database hence this would pose a serious threat to the nations security. The first step in securing the government database is to take it off the main internet and hence there would be no way to access it unless if an individual or an organization had authorization to it.
Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
Daniell S

'One app for all' effort launches - 1 views

  •  
    This is an article about a European team creating an app can be downloaded on to any internet connected communications device. However, even after being presented with 10m euros, this group of 22 organizations hasn't yet received help from companies such as Apple. Apple still wishes to be different from others.
  •  
    This meets the requirements for the IT triangle because within the article it refers to some companies not accepting this application. Within strand 1 the issue of The digital divide and equality of access comes up. Within the article i learned about the organizations who are trying to make this app for all people with internet connected devices. This shows that the Apple company is at a sort of disadvantage for being behind in this new "App for all" program. By staying out of they will not be allowing the app created to the devices the company has created. This also related to Strand 2. In this app it will created to work on what ever people desire the app to work on. This is expressed in the article through "The idea would enable a given app to work, for example, on a web-ready television, in a car and on a mobile, no matter the makers of the devices." It would work on all of these things listed. This is represented through "Home and Leisure" and "Political Process". It would relate to "Home and Leisure" because the app can connect to computers and cell phones. It can also relate to the political process, with Apple not really wanting to get involved with the project. The relation between this article and Strand 3 is that this article involves Personal and Public Communications. This app can be downloaded by just about anyone with a internet connected device. The stakeholders in this situation would be the people using the apps. Another stakeholder would be the 22 organizations creating the app. The other stakeholders would the Companies who are allowing this app into their device;.
Madeline Brownstone

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  • ...2 more comments...
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
  •  
    Please go back and "cache" this page.
  •  
    I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
  •  
    This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
« First ‹ Previous 201 - 220 of 573 Next › Last »
Showing 20 items per page