Skip to main content

Home/ Globaltech/ Group items tagged systems

Rss Feed Group items tagged

anonymous

Judge Hands Over IP Logs of Several Geohot Sites to Sony - 4 views

  •  
    brief analysis march 11 nat
  •  
    Identify the area of impact the scenario relates to. Business Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers. 5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
Natsuno Yoshida

IBM supercomputer wins first Jeopardy dust up - Computerworld - 1 views

  •  
    Explain how Watson can mimic human intelligence. Watson mimics human intelligence by going through the same process humans do in order to find an answer. Watsons can comprehend clues and pieces of information, analyze the information that is given, and come up with an answer to the problem. Explain the ways that computers can rival a human in answering questions. Computers are systematic machines. Humans, can also be, but in a less precise manner. Thus, computers that are given the same amount of information, and have access to a lot of background knowledge can possibly rival humans in answering questions because of the systems' advantage of sorting out pieces of information and analyzing it digitally. Humans depends on their brains, and not knowing whether they really do, or how much they analyze the data correctly or not. A computer's digital system can come up with a number of possibilities precisely and thus calculate the best conclusion to the question. Explain the ways AI can impact personal lives. With the help of AI, human needed jobs such as diagnosing problems and illness, self-service centers, and information center tasks can be given to the AIs. Also, this can enhance humans personal lives by offering the humans an extra helping hand, that isn't as emotional as humans, and can be just as effective as well as useful, albeit the cost will be very high. Why was Jeopardy a good challenge? Jeopardy is a good challenge because of the structure of the Jeopardy game itself. The game itself only provides sly clues, riddles mixed with sarcasm and irony. Humans can detect such facts in the clues, but for a machine, as well as the system to be able to recognize these clues as well as reading in between the words to understand the meaning for an answer is a challenge. The system would have to be taught the same way humans are taught to notice such abnormalities of the hints. This is harder to teach an AI since it doesn't follow the same path of instruction
Bala O

A Contradiction in the Web - 2 views

  •  
    Answer these questions 1. What kind of malware is heartbleed? 2. How is it dangerous to internet users? 3. What security measure should a user use to protect themselves?
  •  
    Heartbkeed isn't a malware, what it does is that it finds the hole or ways to get into a system of which points out the opening in a security system. then a malware of some sort uses that to get into the system. it isn't direct towards normal internet users so there is no concern there. but companies with a large system are the targets. for example google or the NSA. these organiations now use Open SSL.
anonymous

Amazon Goes Back to the Future With 'NoSQL' Database | Wired Enterprise | Wired.com - 1 views

  •  
    Describe NoSQL and its purpose. Explain how it is used differently than MySQL. M12 jan30 az
  •  
    Describe NoSQL and its purpose. NoSQL is a highly scalable and reliable non-relational databases designed to maintain high performance and to be highly cost efficient for workloads of any scale, from the smallest to the largest internet-scale applications. It is also used to build a new kind of database for "unstructured" information that comes spilling off the Internet with each passing second. It is capable of handling large amounts of data du to the fact that they use flash storage rather than traditional spinning disks. These solid-state drives can provide single-digit millisecond response times. Explain how it is used differently than MySQL. MySQL database is a relational database that stores data in neat rows and columns, and it's designed to run on a single machine, while NoSQL database can store data in a more flexible way and is designed to scale across a very large number of machines. "SQL databases are like automatic transmission and NoSQL databases are like manual transmission. Once you switch to NoSQL, you become responsible for a lot of work that the system takes care of automatically in a relational database system. Similar to what happens when you pick manual over automatic transmission. Secondly, NoSQL allows you to eke more performance out of the system by eliminating a lot of integrity checks done by relational databases from the database tier. Again, this is similar to how you can get more performance out of your car by driving a manual transmission versus an automatic transmission vehicle." http://stackoverflow.com/questions/2559411/sql-mysql-vs-nosql-couchdb
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
Alex Lenk

Smartphones all the rage, says St George | The Australian - 2 views

  •  
    Rot October 15th Brief Article Analysis
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. St George Bank, the customers who use their services, 3. Identify and describe one ITGS social/ethical concern in the article. Reliability, the company and the customers depend on the new paying system developed by the company to perform reliably. 4. Describe ITGS terminology and systems. Applications: A piece of software that serves an auxiliary function for your electronic device IT: Short for information technology Internet: A large online server that stores information. Online: Being connected to a network. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Alex Lenk

Omo GPS stunt opens doors for marketers | The Courier-Mail - 2 views

  •  
    Chae Min October 15th Brief Article Analysis
  •  
    Omo GPS stunt opens doors for marketers 1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Buyers who buy box of detergent, and users of technologies and companies like Unilever, Google, Microsoft and Apple 3. Identify and describe one ITGS social/ethical concern in the article. The main concern in this article is privacy. The article shows the detergent company detects their consumers who bought products with GPS for their event prize. It means, this intrusive behavior can find where you live where you go if you become the target. Besides, Google or other social networking site also makes use of people's personal information without their consent. This truly destroys your privacy, the right to decide how much information you will show to others. Furthermore, there is possibility that somebody gets your information from these companies and give harm to you, such as robbing your house 4. Describe ITGS terminology and systems. GPS- space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites social networking site- a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution to stop these intruders in your life is enacting strict laws that companies can't detect where their customers live and get the consent if they use the information. Government should protect citizen's privacy from danger. Companies should get consent if they want to use customer's private information, and if customers don't want it(such as stoking customer's house) they must stop to intrude other's privacy.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

Maybe Your Old Credit Cards Are Smart Enough - NYTimes.com - 3 views

  •  
    Jason October 17th  BAA
  •  
    1.Identify the area of impact the scenario relates to. Business and employee 2.Identify the main stakeholders to the IT system. The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well. 3.Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card. 4. Describe ITGS terminology and systems. PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only. Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
Azman Fadhilah

Bangkok Post : The rise of the digital spies - 1 views

  •  
    1. Identify the area of impact the scenario relates to. Business and employment, Politics and Government 2. Identify the main stakeholders to the IT system. Politicians, Large Business owners, Victims 3. Identify one ITGS social/ethical concern in the article Surveillance / Privacy 4. Describe ITGS terminology and systems. The main IT system in this situation is the use of the evolving hardware that is customized to best fit the various situations that need to infiltrate a certain amount of security. The new spy devices today are integrated into everyday devices such as pens and glasses so that it is hard to track and sensor while going through security checks. 5. If possible, describe a solution to the concern (issue). Having the government and users agree to sign contracts which only allow certain amounts of digital spy equipment to be produced, and while shipment, if any equipment was found to be not authorized and legitimate to pay a large amount of fine to prevent further disuse of the equipment. Since most of the devices require some sort of signaling in order to spy, having new security checks based on lens reflection as well as machine signal waves can increase security because it would be easier to sensor such devices.
anonymous

Google Jumps Into Fashion E-Commerce - WSJ.com - 2 views

  •  
    brief nat nov 22
  •  
    1. Identify the area of impact the scenario relates to. Business, leisure 2. Identify the main stakeholders to the IT system. Google Inc., users in the US. 3. Identify one ITGS social/ethical concern in the article. Security. 4. Describe ITGS terminology and systems. Boutiques.com : It is like amazon or ebay, and it directs shoppers to site where it can be purchased. Merchants pay them if the shopper buy the goods or click on it to learn more about it. 5. If possible, describe a solution to the concern (issue). Because it is on the internet, attention has to be paid to the issue of security. If any users buy anything, they would need to pay online by their credit cards, and some may feel reluctant to give credit card information online. To diminish this issue, Google will have to ensure a secure system where datas of each customers are kept safe and not misused.
anonymous

Facebook tightens grip on user ID data - Yahoo! News - 4 views

  •  
    analysis Az dec 2
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment- Online business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications. 3. Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy). 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks. 7. Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications.
anonymous

Bangkok Post : Virtual mall opens its doors - 3 views

  •  
    brief dec 2 cream
  •  
    Bangkok Post: Virtual mall opens its doors www.bangkokpost.com/...virtual-mall-opens-its-doors 1. Identify the area of impact the scenario relates to. Digital citizenship and people + machines / Home and leisure 2. Identify the main stakeholders to the IT system. Broadband technologies, 3D shopping, people individuals online shopping / Designer Companies, Online Shoppers, Ubermall 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. The ITGS terminology and systems is concerned to the virtual 3D online shopping. The site will allow shoppers to build new relationships by chatting with sellers and fellow customers. online 3D virtual world promoting businesses and tourist attractions that represent the country's "creative economy" policy. The new online shopping has opened in Thailand and it is likely 3D virtual mall. Shoppers can fill up their currency at anytime on the Internet by that currency software. 5. If possible, describe a solution to the concern (issue). The issue in this article is that this action will increase the economic issue and the business can increase their amount of products. " The company is also expanding its presence to Facebook, at apps.facebook. com/taraddotcom, in an effort to bring together its merchants and offer them the chance to sell their products through the world's most popular social network, in what is described as the first example of "social commerce" in Asia. However, there should be some security for payment online, which means that the site must be more secured in term of policy.
  •  
    1.2 Security 1.11 People and machines 2.5 Home and leisure 3.4 Internet 3.6 Multimedia/digital media
anonymous

France24 - New funding for Viewdle, which lets smartphones 'see' - 1 views

  •  
    brief dec 2 kuninari
  • ...1 more comment...
  •  
    1.11 2.5 home and leisure / 2.5_digital_entertainment 2.5_social_networking 3.1,3.2,3.3,3.4,3.5
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is people and security on the machine. 2. Identify the main stakeholders to the IT system. The main stakeholder is security 3. Describe one ITGS social/ethical concern in the article. The concern is about the people and machines were there are problem with the recognitions on people 4. Describe ITGS terminology and systems. public transfer information systems is the information that will justify the people who is using on account to find whether people is using account on their own or using other person's account. 5. If possible, describe a solution to the concern (issue). It might need some more technology to fix the problem on recognitions that people can be use on other account or people can't use it even they are on their own account. They should be able to find the difference on fake also, like people using photo on other person to log in to their account.
  •  
    Kuni, you're suppose to upload your answers IN class. Just remember that for next time.
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Libya turns off the Internet and the Massacres begin | ZDNet - 3 views

  • Now, though, realizing that they could no longer hide their abuses from a world a Twitter tweet away, the new model autocracies, such as Libya and Bahrain have realized that they need to cut their Internet links before bringing out the guns.
  • As in Bahrain, Libya’s Internet is essentially owned and controlled by the government through a telecommunication company Libya Telecom & Technology
  • Mobile phone services in Libya are also under the control of the government. So far though the government doesn’t seem to have cut international phone services off-perhaps because that’s harder to do without cutting off local telephone service.
  • ...1 more annotation...
  • “Should Libya block Internet traffic, as Egypt did, it will not affect http://bit.ly or any .ly domain.”
  •  
    Brief analysis march 1 natsuno
  •  
    Identify the area of impact the scenario relates to. Politics and government Identify the main stakeholders to the IT system. Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology) 3. Identify one ITGS social/ethical concern in the article. Surveillance 4. Describe ITGS terminology and systems. Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address. Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. 5. If possible, describe a solution to the concern (issue). It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
anonymous

Bangkok Post : It's a small world - 4 views

  •  
    brief analysis march 3 Jen
  • ...1 more comment...
  •  
    business and leisure
  •  
    1.11_people_machines 2.5_social_networking 3.4_internet 3.5_per_public_com
  •  
    1. Identify the area of impact the scenario relates to. Business, Leisure 2. Identify the main stakeholders to the IT system. IT users, mainly the ones who access social networking sites through mobile devices smart phone/tablet users, the business companies. 3. Identify one ITGS social/ethical concern in the article. The digital Divide and the Equality of Access / Globalization and Cultural Diversity 4. Describe ITGS terminology and systems. The tablets that offer internet as well as phone features play an important role in making the system work. The tablets offer a larger screen for the access compared to mobile phones, and it is challenging business companies and sites to remake their site into different various resolutions to fit all the new screen sizes. This affects the software of the program as well as the use of internet to connect to these sites. These sites offer personal and public communications through sites like Facebook. Social Networking - the grouping of individuals who have joined together to form a virtual community or neighborhood subdivision. Smart Phone: the "smart" mobile device that offers more advanced connectivity than the normal contemporary feature phone. 5. If possible, describe a solution to the concern (issue). Users around Thailand are now being more connected online besides the rural areas where cable TV have a larger impact. Having governmental or commercial groups to try and build signal towers as well as spread the awareness of the use of mobile phones and decreases who uses the internet, and who doesn't.
anonymous

Congressmen, Facebook go back and forth over personal data sharing - 3 views

  •  
    brief analysis march 7 kuni
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is that personal information about people using a site such as Facebook is being made available to businesses. Even with the safeguards and agreements put in place to stop spammers there have already been cases of misuse of information. This is particularly worrying if personal information about children and young people is being made available. 2. Identify the main stakeholders to the IT system. The main stakeholders are the person who uses the Facebook, and they are having the businesses by the games and the system on making money from them. They use the work on creating the privacy issues 3. Describe one ITGS social/ethical concern in the article. The ITGS social/ethical concern is that there are problem on the information that can be shared on the third parties, which will have problem on the privacy issues where you could get stolen your information. 4. Describe ITGS terminology and systems. App- Protocols seen by user programs, such as email and the web API- is an interface implemented by a software program to enable interaction with other software, similar to the way a user interface facilitates interaction between humans and computers. ... 5. If possible, describe a solution to the concern (issue). Facebook have strict policy on collection regarding the companies collecting information from users as well as a harsher punishment instead of just a 6 month suspension. The change of policies should be notified to every users and the team should ask for the agreement of general users.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

IPhone Users in South Korea Sue Apple for Collecting Data Without Consent - Bloomberg - 3 views

  •  
    Brief Aug 24 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Government 2. Identify the main stakeholders to the IT system. Apple, Google, iOS device users 3. Identify one ITGS social/ethical concern in the article. Privacy, Anonymity 4. Describe ITGS terminology and systems. iPhone smartphone - Apple's iPhone smartphone that includes various smart features such as receiving e-mail, and application, more than just the average phone. Location recognition - the feature on the iPhone that allows the users to be recognized by their location near wifi hubs. Apple was ordered to encrypt location data of people using iPhones to address privacy concerns but the users claim that the device secretly collected information of the users' whereabouts. 5. If possible, describe a solution to the concern (issue). A solution to the privacy issue would be for users to turn off the location-recognition features on their iPhones so that Apple doesn't have access to your phone. Apple needs to be more careful with their data collection process, as well as encrypting the data so there is no breach of privacy of its users, or completely get rid of the whole system itself.
‹ Previous 21 - 40 of 99 Next › Last »
Showing 20 items per page