Skip to main content

Home/ M2017 ITGS HL section B/ Contents contributed and discussions participated by Yee Lee Chen

Contents contributed and discussions participated by Yee Lee Chen

Yee Lee Chen

NZ government scraps e-voting trial * The Register - 0 views

  •  
    In New Zealand, numerous security and privacy issues of their e-voting system couldn't be addressed in time for the elections so they scrapped the plan. 2 stakeholders: The people running for elections and the people voting. The turnout of the elections would decide which person running would end up as the local president/prime minister which would also affect the people who voted during the elections. 2 social/ethical issues: If the issues with the e-voting systems weren't fixed by the time of the election, there could have been risks of hacking into the system and purposely altering the votes to go the way of one of the people running in the election. If it wasn't purposeful, there may have been accidents occurring with the system which would cause some votes to be miscounted or counted as invalid which would make it unfair. Possible solution: To help with the security risks, they can implement firewalls and password protection to prevent hackers from accessing the voting system.
Yee Lee Chen

How Robots Are Failing to Protect Copyright | Variety - 0 views

  •  
    The robots aren't doing so hot when it comes to policing copyright infringement. Computers are answering to copyright take down requests and some people are misusing it. 2 stakeholders: The people posting things online and the original creators of content that are being pirated online. 2 social/ethical considerations: If a new movie was to be leaked online then it would cause the movie creators to lose a lot of money as more people would just watch the movie for free online. With the computers deciding on the copyright requests, they can target blogs and personal websites which use other contents to post reviews or summaries or fan pages. This can potentially infringe on freedom of expression. A possible solution: A solution to prevent blogs and personal websites from being targeted is to have actual people doing the job instead of robots as us people would be able to decide whether the website is required to taken down or is safe under the creative commons law. "This infringement of copyright is called "fair use" and is allowed for purposes of criticism, news, reporting, teaching, and parody." A robot would not be able to tell between these and would take down innocent blogs while possibly leaving some that are really pirating content up on the internet. List of IT systems: automated bot-based systems
Yee Lee Chen

Music stars seek reform of online piracy law in US - BBC News - 0 views

  •  
    Singers such as Katy Perry, Bryan Adams and Christina Aguilera are among hundreds in the music industry calling on US lawmakers to reform online piracy law. 2 stakeholders: Songwriters and artists, as well as the people who purchase/download their works online or in stores
Yee Lee Chen

How the changing media is changing terrorism | Jason Burke | World news | The Guardian - 0 views

  •  
    Summary of the article: With technology, criminals and terrorists can use media to send threats, images and can even broadcast their crimes. 2 stakeholders: The criminals who use media and the viewers who end up watching their broadcasting. 2 social/ethical issues: With this technology, it is easier for terrorists to create a propaganda and they can easily spread fear by broadcasting their killings. For example, ISIS' videos include the killing of journalists, aid workers, government soldiers, etc. They would post this on the internet uncensored so anyone can watch everything that happened and may be unethical to certain cultures. We probably can't stop them from continuing to post these videos but there should be at least a program or a person who would censor the more gruesome parts. In the example of Mohamed Merah used in the beginning of the article, he used a Go Pro camera, his laptop and a USB drive to create a video documentary of his killings.
Yee Lee Chen

Hackers Demand Ransom from British Telecom - 1 views

  •  
    A British Telcom, TalkTalk, was hacked and demanded for ransom. 2 stakeholders: The company TalkTalk and subscribers to the company. The company was hacked for ransom and the data that was hacked were the personal information of the customers of TalkTalk. Issue #1: The hackers have gained very sensitive information such as credit card numbers and dates of birth. Negative: The hackers can use other people's money using the credit card information they received. They can also use the hacked information to do identity theft. Positive: There is no positive side to this. Issue #2: Some users and security experts criticized the company for going public about the hacking before knowing all the details. Positive: The company can use the criticism to help improve their company. Negative: The criticism can also reduce customers and statistics of their shares ratings.
Yee Lee Chen

Apple's App Store infected with XcodeGhost malware in China - BBC News - 0 views

  •  
    Apple says it is taking steps to remove a malicious software added to dozens of apps commonly used by owners of iPhones and iPads in China. Stakeholders: Apple and people who use Apple products in China. There was a malicious code on Apple products which affected the company and many people in China who use (among many others) the app WeChat: A very popular chatting app in Asia. Social/Ethical issues: When people start getting messages that makes them reveal their personal information, they would either believe it's important or be suspicious about it. If a friend "asks" for information and you reply to them, to have them later ask you why you told them that, then you are most likely being played and that would cause a lot of panic. I suppose a positive thing that could come from this is that people would be forced to close down the apps and actually talk face to face. This malware would also destroy Apple's reputation somewhat since they were so careless that the app store was infected. But this would have taught them to be more careful, which is a positive thing as it helps them improve. A solution for one negative impact - easily being played into giving out personal information - would be to make sure the person is real or the website or company is authentic. A list of IT systems: iOS Transaction Processing Systems Customer Relationship Management Systems Business Intelligence Systems Knowledge Management Systems [http://smallbusiness.chron.com/types-information-systems-organization-43097.html]
1 - 6 of 6
Showing 20 items per page