Skip to main content

Home/ M2017 ITGS HL section B/ Group items tagged risk

Rss Feed Group items tagged

Yee Lee Chen

NZ government scraps e-voting trial * The Register - 0 views

  •  
    In New Zealand, numerous security and privacy issues of their e-voting system couldn't be addressed in time for the elections so they scrapped the plan. 2 stakeholders: The people running for elections and the people voting. The turnout of the elections would decide which person running would end up as the local president/prime minister which would also affect the people who voted during the elections. 2 social/ethical issues: If the issues with the e-voting systems weren't fixed by the time of the election, there could have been risks of hacking into the system and purposely altering the votes to go the way of one of the people running in the election. If it wasn't purposeful, there may have been accidents occurring with the system which would cause some votes to be miscounted or counted as invalid which would make it unfair. Possible solution: To help with the security risks, they can implement firewalls and password protection to prevent hackers from accessing the voting system.
Emma Wenger

Paper-Based vs. Electronic Voting: States Move in Different Directions - 0 views

  •  
    Scenario: Different US states are taking different approaches to voting. Maryland is enforces paper voting, with some digital use by scanning a copy of each vote to have on record. On the other extreme, Utah Republicans are embracing technology by having everyone vote over the Internet. Social Ethical Issues: Security: James Evans, Utah GOP Chairman, thinks "the risks associated with Internet voting aren't worse than the current system". Learning Curve: Maryland bought new machines for voting and there was some concern about people being confused when using them. IT Systems: Optical scanner for a digital record of votes Electronic Voting Machines Internet Stakeholders: Voters - Do they care about the convenience of online voting or the more reliable security of paper voting? State - Depending on what method of voting, time and money will be used more or saved. Applications to Specified Scenario: The article questions why there is so much concern with voting electronically when we already do so many important things online. We do our banking and buying online, giving out personal information, so why not elections? The article answers, "e-commerce expects and is comfortable with a certain level of fraud. Our electoral process, however, has zero tolerance for fraud". With banking and e-commerce, the costs aren't as high as with elections. Any risks also outweigh the benefits. Elections have also historically never been electronic until now. So there is a certain security and assurance that comes from the traditional paper ballot votes.
Omer Shaikh

The societal costs of digital piracy - 1 views

  •  
    Situation: The article focuses on the extent of losses on industries which have been affected by digital piracy, such as major film and music industries. The article states that these industries have taken tremendous hits because their content is simply copied and illegally distributed, resulting in major losses of profit. It says that in our time, it is far too easy to get a hold of pirated content, and as a result, it is virtually impossible to punish every single violation. Social and ethical: The article relates to several social and ethical concerns. It links to security because it states that pirated content can often contain viruses and other forms of malware, and attempting to pirate content means that you are putting the information within your system at risk. Intellectual property is the main focus of the article, which is obvious because it focuses upon the control content creators should have over their works and how this control is violated by individuals who pirate content online. It also links to the issue of digital citizenship in that it seems to set an expectation for users of the online world to be just and reasonable with their activities online. It discusses why it is wrong to pirate content online, which further displays that the writer is trying to indicate the privileges of the digital world and why they should not be misused. It systems: The article does not discuss the IT system behind online piracy. However, it is rather simple. Firstly, original content is published on a domain which is approved of by the author. Often, the author will require money in return for his or her work, and this will be handled by the administrators of that domain. The content is then either bought or hacked by an outsider, and given away for free or cheaper on another domain which has not been approved of by the original author. Outside users may then access this domain and take part in the piracy chain. Application to applied
Panayiotis Floros

IBM: Modernize your business or risk being Uber-ized - 0 views

  •  
    IBM made a very wise comment regarding businesses in the age of technology, and how things are changing radically for all businesses, and in the long term, for all consumers as well. The IT system and issue at stake here is the future of businesses who choose to not adapt to new technologies, and transform their businesses in the world of technology in our day. Specifically, the article refers to "digital transformation," but does not touch upon an important topic we have discussed in ITGS, being the ethical implications involved in making such a transition. Beginning from the positive aspects of such a transformation, and specifically in the long term, these include: - more buyers - no data loss - better data management/analysis - improved business models through online systems - better quality marketing -- more effective So, in terms of these factors, one could say that such a "digital transformation" would definitely be worth the effort in the long term. However, ethical implications must also be considered, which include potential spreading of data to the wrong people, "filtering" the minds of consumers through online marketing, but also violating the consumer's privacy by noting down what they purchase each time and exchange a list of the consumer's interests to other businesses. In conclusion, we can see that such a digital transformation in terms of technology in relation to businesses can be both good and bad; this entirely depends on the effort that is put in the creation of this system, how well the system is maintained, and to what extent the system is targeted for attacking.
  •  
    Hello! I liked how you incorporated that one of the biggest technology companies in the world has the same changes as some smaller companies; and the one thing that they have in common is the change of technology. I also think that your article choice was linked nicely to ITGS because it develops on the idea of Information technology changes throughout many societies.
Varjavand Contractor

How the digital world is changing our idea of news | Media Network | The Guardian - 1 views

  •  
    Summary of the Article: Major newspaper companies such as the NY Times, and Al Jazeera, emphasise on the need for websites for their articles, to give news under a good amount of time. Stakeholders: Those companies who now need to spend more money and resources in order to provide both paper print and online copies of their news articles. The people who used to read the North Adams Transcript on a daily basis. Social and Ethical Significance: Reliability and Integrity - The fact that news outlets now work on a globalised, 24/7 and instant response system, means that they need to be able to take the risk to upload or run an article about certain news, that a random person must have claimed. As a result, if the news is unreliable, the news publisher is at risk and fault for running a story without backing their facts with suitable evidence. Intellectual Property - Usually there are videos or images online that are taken and uploaded by a person and the news outlets find it as the best feed for the certain news article or live upload. The person responsible for capturing the video or image has the right to reclaim the image from the news outlet if he/she deems necessary. That way, news outlets have to be very cautious about using images and videos, about the certain live news. Application to various scenarios: There are many examples about how news outlets have been warned yet not fined for using copyrighted or unreliable information.
Omer Shaikh

E-Voting: Big Risks for Small Gains - 1 views

  •  
    Scenario: The article I am analyzing focuses upon the disadvantages brought about by electronic voting. The article attempts to convince the reader that there are absolutely no advantages to e-voting when compared to traditional voting, and the chance of fraud is much higher in e-voting than it is in traditional voting. The article does give credit to the fact that traditional voting, especially in the US, can also be prone to acts of fraud and corruption, however, he seems to be inclined towards this being less likely than the possibility presented by e-voting. Social/ethical issues: The social and ethical issues that show up in this article are primarily security and reliability. The writer clearly does not seem to believe that the e-voting system is too secure, as he often states that there are many ways in which the e-voting system can be cheated and violated. He believes that e-voting often generates results that do not match up with the predicted results from the votes cast. He also does not seem to comfortable with the idea of fully trusting a machine to measure and calculate the result of the votes, as he seems to favor the idea of votes being manually counted and recorded by poll workers. IT systems: E-voting often takes place on a particular website or on a private network which specific voting computers are connected to. Here, voters can verify their identification before proceeding to cast a vote. After the vote is cast, the information is sent to a central server where it is stored and constantly recalculated by the system for an updated vote count. Stakeholders: Regionally, everyone is a stakeholder in electronic voting. All individuals in the particular area are effected by the results of a large-scale electronic vote, as these are usually to decide governmental leaders/officials. Local businesses might be the most impacted stakeholders, because they are heavily effected by the policies and laws that could be passed by the new official,
Emma Wenger

On Instagram and Other Social Media, Redefining 'User Engagement' - 0 views

  •  
    Scenario: Some companies are using people's photos that they have posted on social media sights as advertisements without their consent. Social and Ethical Significance: Privacy - With multitudes of social media sights, individual's privacy is being degraded Intellectual Property - Experts have said, "The person featured in a photo may own the publicity rights, which may give the individual control over the commercial use of his or her likeness" (Ember, Abrams). This goes to mean that companies must have consent from whoever is in the picture before using it in advertising. Policies - Companies like Crocs must have rules in place before exposing people who may not want to be featured in ads. Digital Citizenship - While companies do need to ask for permission to use others photos, people need to understand that by using social media sites, they are putting themselves out there. If they don't realize their privacy is at risk to being disregarded, they shouldn't be using the technology. Possible Solutions are to continue educating people on what can happen online and to create standard policies regarding the need for consent that all companies should follow. IT Systems: Networks Firewalls Servers Web Softwares Stakeholders: People are getting advertised without consent - Their privacy and rights to their pictures are being violated Companies who are using pictures of social media - Who may be blamed for loss of privacy, and gain bad publicity Social Media Sites - Who is the communication between companies trying to find pictures and the people who post pictures Applications to Specified Scenario: People's rights - In the world of technology, we are becoming less and less secure that we have rights to privacy. Everything we do on the Internet is tracked and we don't know who sees it. This article pinpointed how people can be found and unwillingly advertised. As technology continues to grow, more policies and regulations wil
annaosborne

Cyber Attacks on U.S. Companies in 2014 - 1 views

  • The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector’s information security. According to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]
  • more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.
  • As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should: Create a safe legal environment for sharing information
  • ...3 more annotations...
  • Work with international partners.
  • Encourage cyber insurance
  • nstituting the right policies is critical to harnessing the power of the private sector. In a cyber environment with ever-changing risks and threats, the government needs to do more to support the private sector in establishing sound cybersecurity while not creating regulations that hinder businesses more than help them.
  •  
    One of the articles for network threats
1 - 8 of 8
Showing 20 items per page