1. Identify the area of impact the scenario relates to.
- Business and employment
2. Identify the main stakeholders to the IT system.
- JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple.
3. Identify one ITGS social/ethical concern in the article
- Intellectual property
4. Describe ITGS terminology and systems.
- Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device.
- Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work.
The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose.
Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement.
5. If possible, describe a solution to the concern (issue).
Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
Identify the area of impact the scenario relates to.
Business
Identify the main stakeholders to the IT system.
Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Sources : http://en.wikipedia.org/wiki/IP_address
iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV.
Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers.
5. If possible, describe a solution to the concern (issue).
There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
Selected Article
Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
NEW YORK (CNNMoney) -- If AT&T and Verizon are any indication, it could be a rough quarter for Apple. IPhone sales at the two biggest U.S. wireless carriers came in well below expectations.
There is a new function on icloud called "Find My iPhone". It used to locate lost iPhone on a digital map in the icloud webpage. It is work simply by logging in to your apple ID that you use to buy songs and the digital map will show where your iPhone is and it can send signal to iPhone and command it to ring calling sound when you get near so it is easier to track the missing iPhone.
Omo GPS stunt opens doors for marketers
1. Identify the area of impact the scenario relates to.
Business and employment
2. Identify the main stakeholders to the IT system.
Buyers who buy box of detergent, and users of technologies and companies like Unilever, Google, Microsoft and Apple
3. Identify and describe one ITGS social/ethical concern in the article.
The main concern in this article is privacy. The article shows the detergent company detects their consumers who bought products with GPS for their event prize. It means, this intrusive behavior can find where you live where you go if you become the target. Besides, Google or other social networking site also makes use of people's personal information without their consent. This truly destroys your privacy, the right to decide how much information you will show to others. Furthermore, there is possibility that somebody gets your information from these companies and give harm to you, such as robbing your house
4. Describe ITGS terminology and systems.
GPS- space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites
social networking site- a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections.
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
One solution to stop these intruders in your life is enacting strict laws that companies can't detect where their customers live and get the consent if they use the information. Government should protect citizen's privacy from danger. Companies should get consent if they want to use customer's private information, and if customers don't want it(such as stoking customer's house) they must stop to intrude other's privacy.
Malicious Applications that log details about incoming/outgoing phone calls, as well as recording the calls. They can create unwanted service charges subscriptions to phone users. The users may or may not even receive the "service" that was subscribed, and paid for. They cab intercept text messages, compromise emails, photos and private content. Malicious applications that appear to be games, calculators, or pornographic photos and videos are downloaded to smartphones. Malware that replies incoming text messages with spam links. E-mail based phishing - because the phone screens are smaller than computers, it is harder to tell apart phishing links and scams in the url.
iPhone's unencrypted file of location logs for iPhone users. Jailbroken iPhones that run unauthorized content is also a gap where malware can get through. Because these apps are unauthorized, they haven't gone through Apple's authorization process, and can contain malware, and can hack the user's phone.
o By Malicious Application= The Applications which Apple and Android offers to customer, sometimes have malicious worms or viruses. Sometimes, malicious applications masquerade to games, calculators, or pornographic photos and videos. Hackers made their own malicious app and phishing people to download. The payment will charge to the victim's phone bills.
o By Phishing Texting= Personal texting sometimes contain spam and malicious links which lead to the hacking site
o By Advertisement link= Viruses might attach to the advertisement link
o By Weak Security= Weak security of iPhone and Android phone therefore, find the weak part of the phone and hack.
o By E-mail= Users tend to be less caring on phones, as the words and the screen itself are small
Why are iphones tracking people?
This is the issue of storing user's location data in unencrypted file. The file, named "consolidated.db," is an unencrypted SQLite database that can be found in the devices' file systems and in the iOS backup files created and updated by iTunes every time an iPhone or 3G iPad is synced. Since, we know that Apple is actually collecting location and some information on iphone that's why iphone is not safe at all. Although the file isn't immediately accessible on the device itself, it can be accessed on a jailbroken device via the iTunes-generated backup file. It also could potentially be accessed using other tools that allow you to explore an iOS device's file system while it's attached to a computer.