This article is about a trading website called "OLX" which is previously called "Dealfish". The purpose of this website is for people to trade unused items or second hand items to another people who want it. It's a useful website to clear out valuable items that we doesn't use for some cash. This website is similar to Ebay and is popularly used around the world(and also in Thailand). There are around 9 million visitors(Thailand) each month so it's quite a lively place. A lot of people also get good feedback from posting their possessions online.
1. The area of impact that the scenario relates to the Prgivacies that people can visit to the other people's profiles and view histories to find what the other person done in the past.
2. This is related to the Databases where Google stores the information on profile and history that what they had done. It is also related to surveillance
3. There is the problem with the privacy and anonymity that people can have access to the other persons profile to see their actions in the past. Most companies do this in career test for finding some inappropriate action that the person has done.
4.The database is a collection of information stored in an organized form in a computer.
Program helps keep track of corporate passengers
5. For sollution, it might be helpfult to use proxy to get away from google tracking accounts.
1. Identify the area of impact the scenario relates to.
Business and employment, Politics and Government
2. Identify the main stakeholders to the IT system.
Politicians, Large Business owners, Victims
3. Identify one ITGS social/ethical concern in the article
Surveillance / Privacy
4. Describe ITGS terminology and systems.
The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks.
5. If possible, describe a solution to the concern (issue).
Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
1. The cloud has been around for a while
Summary about the cloud
Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing.
To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.
Define enterprise market.
A different market to the consumer market, for an example, to companies and businesses so that they can use it for their business.
Describe 3 examples of increasing the productivity and efficiency of employees.
Car insurance - If there is an road accident, the insurance company can take pictures and send information through the tablet, without going back to the company to tell the information.
Auto business - Customers can look at e-catalogs, where they can see the models easily because it is touch sensitive.
1. Identify the area of impact the scenario relates to.
This article is related to Heath problems
2. Identify all the ITGS terminology and phrases (IT and Social/Ethical)
Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera
3. Describe one ITGS social/ethical concern in the article.
Internet access and privacy problems, digital divide and internet access equality
4. Describe the relationship of the main stakeholders to the IT system.
Main stakeholders : doctors, patients
Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing.
5. Explain the relationship between the IT system and the social/ethical issue identified in question 3.
The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable.
6. Discuss at least one problem that relates to the impacts of the social/ethical issue.
The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives.
7. Evaluate one solution that addresses the problem identified.
A solution that has been done is
az
wiki versus ning, or wikis linked to ning
which is better
especially compare to - http://itgsopedia.wikispaces.com/
march 1
look at some of the other itgs sites i am posting here on diigo to compare...
and ideas for format
also consider individual wikis linked to mother site
or everything on one site
What's more feasible and practical?
1. Identify the area of impact the scenario relates to.
Business, Leisure
2. Identify the main stakeholders to the IT system.
IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies.
3. Identify one ITGS social/ethical concern in the article.
The digital Divide and the Equality of Access / Globalization and Cultural Diversity
4. Describe ITGS terminology and systems.
The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook.
Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision.
Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone.
5. If possible, describe a solution to the concern (issue).
Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
What does it mean to leverage social networks?
To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising.
Define digimarketing.
Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online.
Explain the mistakes marketers make with social networking.
Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers.
Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
What does cloud computing deal with?
Describe each of the characteristics cloud services must have.
Explain horizontal and vertical services.
Define each layer of services.
Explain the infrastructure capability terms.
Why is bandwidth important?
march 17
cream
What does cloud computing deal with?
Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications.
Describe each of the characteristics cloud services must have.
Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them.
Fstandard user interface - Web browsers to have access to the cloud services.
Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human.
Fservice metering - The Charge of the usage of the cloud services.
Faccess over the internet - The medium of having access to the internet, as well as other places over the internet.
Explain horizontal and vertical services.
Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example.
Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used.
Define each layer of services.
Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere.
Why is bandwidth important?
Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
Tangerine, a reseller of Google enterprise product, says business policies for
dealing with cloud computing in Thailand will start to emerge this year
The cloud applications specialist has just started providing consulting and
selling cloud services for Salesforce.com after providing services for
enterprises and supply chains for two decades.
Why is cloud computing gaining widespread adoption?
Why is it cheaper?
Describe saas
Describe the Tangerine example.
What kind of customers does salesforce target?
How does cloud computing encourage collaboration?
march 17
soo
1.Why is cloud computing gaining widespread adoption?
Cloud computing is gaining widespread adoption because cloud computing enables users to connect to corporate data and applications via online enabled devices. It offers the complexities and unique requirements of sophisticated applications, yet delivers them in less time and with lower startup costs.
2.Why is it cheaper?
Cloud computing is cheaper cost when they deliver IT systems because businesses pay for only what is used and by that they could reduce the amount of cost in capital and operating cost.
3.Describe SaaS.
SaaS stands for Software as a Service. Users who use services that is net-based are charged for the software they used, either as a subscription or as a pay-as-you-go basis. It is basically charging the service costs for the software that the users are utilizing.
4.Describe the Tangerine example.
Tangerine is a company that sells enterprise version of Google mail and applications. These applications uses Gmail or Google's online document systems as an interface. Users who use Tangerine are charged a subscription fee for the usage of Tangerine.
5.What kind of customer does sales-force target?
Salesforce is targeting people who actively use clouding computing system. Basically, it could be individual people but mostly many huge companies are using clouding computing to work efficiently. Also this system could save the money for the storage systems.
6. How does cloud computing encourage collaboration?
By using user-friendly services like Facebook rather than conventional e-mail, feeds rather than memos, a touch-based system rather than a click-user interface, a push-based information system rather than pull or browse, location-based technology rather than unknown locations, and web service/HTML rather than Windows or Mac.
Identify the issue
Intellectual Property Rights - Piracy
Describe the possible solutions
Solutions that are harsh to the point of shutting down the website that hosts these download links to pirated music, videos, and other intellectual property, etc. Or censoring the pirated files on the website to be inaccessible. However, this isn't a feasible solution since it would cause massive uproar for the users who use the sites on a regular basis, which in this case may be millions of people. Policing IT malls, as well as formulating and enforcing strict laws with hard punishments for violators.
Describe the following terms and explain possible solutions:
drive-by downloads
clickjacking
targeted brand attacks on social networks
MitB (Man-in-the-Browser)
MitMo (Man-in-the-Mobile)
advanced on-the-fly SSL hacking
may 23
soo
drive-by downloads
Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing.
Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on.
http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledgehttp://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html
Clickjacking
Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users.
A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content.
https://www.owasp.org/index.php/Clickjacking
Targeted brand attacks on social networks
Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.