Skip to main content

Home/ Groups/ M2017 ITGS HL section B
Yee Lee Chen

Hackers Demand Ransom from British Telecom - 1 views

  •  
    A British Telcom, TalkTalk, was hacked and demanded for ransom. 2 stakeholders: The company TalkTalk and subscribers to the company. The company was hacked for ransom and the data that was hacked were the personal information of the customers of TalkTalk. Issue #1: The hackers have gained very sensitive information such as credit card numbers and dates of birth. Negative: The hackers can use other people's money using the credit card information they received. They can also use the hacked information to do identity theft. Positive: There is no positive side to this. Issue #2: Some users and security experts criticized the company for going public about the hacking before knowing all the details. Positive: The company can use the criticism to help improve their company. Negative: The criticism can also reduce customers and statistics of their shares ratings.
  •  
    Hi, Your post provides good insight to a negative side of the effects technology has on businesses. Both company owners, and customers must be aware of unfortunate possibilities like being hacked. I like how the two issues you addressed deals with both the technological side of things, hackers and what information can be leaked, and the business side, what the occurrence of this event means for the company itself.
Emma Wenger

Meet Wall-Ye: The French grape-picking robot which can work day and night - and may wel... - 1 views

  •  
    Situation: Robots are now being invented to aid in farming. This particular farm built a robot to prune and de-sucker grapes. Social and Ethical Significance: People and Machines - People being replaced by technology is a reality that we must face as it is a reality that we are beginning to see. Obviously when machines replace people, jobs are lost which is never a good thing. But that's not all we should be worrying about. When machines start to perform human tasks, we lose the skill and knowledge that comes with completing those tasks. So technology taking over tasks could either lead to depletion of common knowledge that humans have but it could also go be good because it will leave room for humans to focus on more important issues and knowledge, while machines take care of the mundane chores. IT Systems: GPS Gyroscope - Part of security. The robot knows when it has been lifted off the ground Artificial Intelligence - grape recognition Plant recognition Hard drive Synchronization of cameras Built in security - The robot won't start if it is an unknown area and can self-destruct Stakeholders: Farm Owners - The way their business is conducted could change Farm workers - They could lose jobs or have to learn new ones Robotic Engineers - They are interested in the new technology being used Applications to Specified Scenario: Changing how companies function is only one piece of what technology is changing. Technologies like this robot in the article could be applied to many different areas in the world. One example is security and surveillance. The robot in the article watches plants all day. It wouldn't be hard to alter the cameras to recognize people too. These robots also have tools that they are able to use. Wouldn't it then be possible to give the robots weapons and have them enforce the law? Or go to war? What would that mean for us humans? The upbringing of Artificial Intelligence will induce lots of change and raise various ethical considerati
Panayiotis Floros

IBM: Modernize your business or risk being Uber-ized - 0 views

  •  
    IBM made a very wise comment regarding businesses in the age of technology, and how things are changing radically for all businesses, and in the long term, for all consumers as well. The IT system and issue at stake here is the future of businesses who choose to not adapt to new technologies, and transform their businesses in the world of technology in our day. Specifically, the article refers to "digital transformation," but does not touch upon an important topic we have discussed in ITGS, being the ethical implications involved in making such a transition. Beginning from the positive aspects of such a transformation, and specifically in the long term, these include: - more buyers - no data loss - better data management/analysis - improved business models through online systems - better quality marketing -- more effective So, in terms of these factors, one could say that such a "digital transformation" would definitely be worth the effort in the long term. However, ethical implications must also be considered, which include potential spreading of data to the wrong people, "filtering" the minds of consumers through online marketing, but also violating the consumer's privacy by noting down what they purchase each time and exchange a list of the consumer's interests to other businesses. In conclusion, we can see that such a digital transformation in terms of technology in relation to businesses can be both good and bad; this entirely depends on the effort that is put in the creation of this system, how well the system is maintained, and to what extent the system is targeted for attacking.
  •  
    Hello! I liked how you incorporated that one of the biggest technology companies in the world has the same changes as some smaller companies; and the one thing that they have in common is the change of technology. I also think that your article choice was linked nicely to ITGS because it develops on the idea of Information technology changes throughout many societies.
Lena Billos

Apple sued over Wi-fi Assist feature - BBC News - 0 views

  •  
    A woman in California was using Wi-fi assist on her iPhone, and it caused her major data charges on her phone bill. Wi-fi assist is suppose to help connect the phone to Wi-fi hotspots when they come up, or change the connection if the current connection is low. This should ultimately lead to having a smaller phone data bill. However, that was not the case for this woman. She sued Apple because of the false advertising. Apple advertised this new feature, however it does not work the same as it is advertised. Instead of changing the Wi-fi when the connection is low, the phone switches to data usage without notifying the user. AppleInsider mentioned that Apple did not state the specific details of this feature. Because of this mistake, users could lose up to $5 million dollars. The mistake will not reach that many people, because many people today are on higher data rates anyway. It is unknown what happened with the legal matters of the Californian Woman.
Sagarika Bala Prakash

Billboards That Look Back - NYTimes.com - 0 views

  •  
    An article relating to targeted advertising through the use of installed cameras within billboards. These tiny cameras gather details about passer-by - their gender, approximate age and how long they looked at the billboard. Social and ethical significance: 1)Privacy and anonymity - although Quividi claims that the process is completely anonymous, the details of the camera's recordings must be stored in a central database which, if not protected properly, could be susceptible to hackers and other perpetrators of crime. 2) Security - the safety of the data stored in the central database will be in danger if not properly protected. The data will most likely contain details of a person's identity. 3) Surveillance - the cameras must be connected to a network in order to to function to its full capacity. Once again, these cameras could be hacked into and used for surveillance purposes, which leads back to the issue of privacy and anonymity on the street. The general public, who are one of the stakeholders, are deeply involved in this matter as it is their identity that is being scrutinized by a small camera - in most cases the public are unaware that the billboard is identifying who they are and their presumed interests. The company, Quividi, is another stakeholder in this issue as they are responsible for this new technology. The advantages of this kind of "ultra-targeted advertising" is that companies can now know for sure what kind of advertisements to place and where, without the need of analysing the kinds of people that live in the particular area of interest etc; the camera installed in the billboards have the ability to do it themselves. Also, as the billboard is digital, there is no manpower involved in constantly changing the large billboard every other week or so. The main disadvantages to this is of course the invasion of privacy for the public but also the maintenance that would be required to keep the camera clean as well as updated
Pamela Vail

Microsoft's focus on Windows 10 is starting to pay off - CNET - 1 views

  •  
    The new Windows 10 operating system is becoming the main focus for Microsoft. Microsoft's CEO, Satya Nadella hopes that Windows 10 will bring Microsoft back into being a major competitor for companies such as Apple and Samsung. The Windows 10 operating system connects all Windows devices to the cloud, including computers, phones, tablets and the Xbox. It also is going to allow Windows to create a large array of apps to be used across their devices. The new operating system is not only going to bring Windows back as a major competitor against the current reigning companies, but also connect Windows users like never before. All the new products will run on Windows 10, and the new apps will be the connective factor between consumers. The system also incorporates the cloud to connect users. Windows 10 is also increasing Windows' sales. They have already exceeded their predicted profit for the first quarter with this new OS. With Windows back as a competitor, this is going to cause more competition and innovation among the companies. Over 110 million people are already using Windows 10, so there is plenty of opportunity for Windows to interact and connect the users together. On a different note, users need to be wary when using new software, as the dangers with the new software are unknown. Those who are affected by the introduction of Windows 10 include Windows, Apple, Samsung and all technological consumers.
annaosborne

Could this be the end of the office as we know it? - 1 views

  • The answer — until recently — was that companies needed a defined space where employees could focus, communicate and work together to solve problems. Of course, we also can't forget about the massive stores of vital information — cabinets and rooms filled to the brim with files — that could only be accessed in person.
  • "a couch near you" is hardly the office of the future. For all of its faults, the traditional office setting has a few things going for it: From business benefits like the ability to efficiently participate in group work, to person benefits, like staving off feelings of loneliness and alienation.
  • Evans points to his modern, multi-functional spaces, which blends meeting rooms, social space and independent workspaces as a possible alternative. The geographically diverse branches are also assets to Evans' idea. As one Impact Hub tenant says, "the future of business is to be local everywhere."
ashtonclark

Chinese hackers arrested after US request - BBC News - 1 views

  •  
    Chinese police have arrested hackers after the US government supplied them with a list of cybercrime suspects, the Washington Post reports. The hackers are believed to have stolen research and development information from several US firms. The arrests came shortly before Chinese President Xi Jinping visited the US for talks - partly about cyber security.
Omer Shaikh

What is IBM Watson? - 0 views

  •  
    Watson is IBM's latest supercomputer with a twist. Not only can it's artificial intelligence decipher and perfectly understand human literature and language, but it can even give a response which will be equally as startling. This computer is designed to think like a human being, and it's ability to do this is almost unbelievable. Watson even proved itself in a mini jeopardy game against two former jeopardy champions, crushing them with ease and easily claiming the reward of one million US dollars. An artificial intelligence with this power is a figure of great controversy, and many say that we should not be investing in machines such as Watson, which could potentially destroy the careers of millions of individuals across the globe with it's almost human like 'thinking' processes. However, Watson could still prove to be an extremely useful tool for many fields which require human attention, such as medicine, finance, commerce, and business. With it's almost human like attributes, Watson could execute tasks such as calculating and predicting stock exchange values, deciding how to solve medical problems, or even predicting which economies are to fall and which ones are to rise.
annaosborne

Common Types of Network Attacks - 1 views

  • ome attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself.
  • majority of network communications occur in an unsecured or "cleartext" format, which allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise.
  •  
    Article about Network Threats
annaosborne

Cyber Attacks on U.S. Companies in 2014 - 1 views

  • The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector’s information security. According to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]
  • more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.
  • As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should: Create a safe legal environment for sharing information
  • ...3 more annotations...
  • Work with international partners.
  • Encourage cyber insurance
  • nstituting the right policies is critical to harnessing the power of the private sector. In a cyber environment with ever-changing risks and threats, the government needs to do more to support the private sector in establishing sound cybersecurity while not creating regulations that hinder businesses more than help them.
  •  
    One of the articles for network threats
Noah Weingarden

Play it your way: how Twitch lets disabled gamers earn a living online | Technology | T... - 1 views

  •  
    Scenario: Many disabled people are making an income by streaming their video game experiences over the Internet and forming support communities among their fans. Social and ethical significance: Privacy and anonymity - If careless, some streamers may inadvertently reveal their identity on the internet, leaving them exposed to people with ill intentions who might wish to cause them harm. However, this issue can mostly be dealt with simply by being responsible and taking appropriate measures to protect one's privacy. Digital citizenship - Many people refuse to engage in polite and respectful discourse during their time spent on the internet, and it is not unexpected for streamers to be targeted with verbal abuse. Heavy moderation must be exerted to prevent cyberbulling, threats, and harassment to become pervasive. Globalization and cultural diversity - Services like this one allow people from all over the world to join together and learn about one another. Both the streamer and his/her viewers have an opportunity to meet people with whom they would otherwise never come into contact. IT systems: Video software, streaming software, networks, databases, online chat services, video game applications, etc. Applications to specified scenarios: This applies mostly to home and leisure, given that it is a system involving entertainment and social networking. However, it also applies to business by virtue of the commercial opportunities it offers, as well as education by serving as a potential pedagogic tool in the future. Stakeholders: Streamers, viewers, families of each (given the time investment made to create and/or follow Twitch channels), employees and executives of Twitch, other corporations that might wish to get involved, etc.
Emma Wenger

On Instagram and Other Social Media, Redefining 'User Engagement' - 0 views

  •  
    Scenario: Some companies are using people's photos that they have posted on social media sights as advertisements without their consent. Social and Ethical Significance: Privacy - With multitudes of social media sights, individual's privacy is being degraded Intellectual Property - Experts have said, "The person featured in a photo may own the publicity rights, which may give the individual control over the commercial use of his or her likeness" (Ember, Abrams). This goes to mean that companies must have consent from whoever is in the picture before using it in advertising. Policies - Companies like Crocs must have rules in place before exposing people who may not want to be featured in ads. Digital Citizenship - While companies do need to ask for permission to use others photos, people need to understand that by using social media sites, they are putting themselves out there. If they don't realize their privacy is at risk to being disregarded, they shouldn't be using the technology. Possible Solutions are to continue educating people on what can happen online and to create standard policies regarding the need for consent that all companies should follow. IT Systems: Networks Firewalls Servers Web Softwares Stakeholders: People are getting advertised without consent - Their privacy and rights to their pictures are being violated Companies who are using pictures of social media - Who may be blamed for loss of privacy, and gain bad publicity Social Media Sites - Who is the communication between companies trying to find pictures and the people who post pictures Applications to Specified Scenario: People's rights - In the world of technology, we are becoming less and less secure that we have rights to privacy. Everything we do on the Internet is tracked and we don't know who sees it. This article pinpointed how people can be found and unwillingly advertised. As technology continues to grow, more policies and regulations wil
Yee Lee Chen

Apple's App Store infected with XcodeGhost malware in China - BBC News - 0 views

  •  
    Apple says it is taking steps to remove a malicious software added to dozens of apps commonly used by owners of iPhones and iPads in China. Stakeholders: Apple and people who use Apple products in China. There was a malicious code on Apple products which affected the company and many people in China who use (among many others) the app WeChat: A very popular chatting app in Asia. Social/Ethical issues: When people start getting messages that makes them reveal their personal information, they would either believe it's important or be suspicious about it. If a friend "asks" for information and you reply to them, to have them later ask you why you told them that, then you are most likely being played and that would cause a lot of panic. I suppose a positive thing that could come from this is that people would be forced to close down the apps and actually talk face to face. This malware would also destroy Apple's reputation somewhat since they were so careless that the app store was infected. But this would have taught them to be more careful, which is a positive thing as it helps them improve. A solution for one negative impact - easily being played into giving out personal information - would be to make sure the person is real or the website or company is authentic. A list of IT systems: iOS Transaction Processing Systems Customer Relationship Management Systems Business Intelligence Systems Knowledge Management Systems [http://smallbusiness.chron.com/types-information-systems-organization-43097.html]
  •  
    Great article choice! What social or ethical impact do you think that this might have towards the people? Other than the obvious impacts of destroying devices, what else could arise from such an issue? Also, how would developers of applications be affected by these issues?
Panayiotis Floros

Intelligent Machines: Chatting with the bots - BBC News - 0 views

  •  
    This article discusses artificial intelligence, and the extent to which it is a) realistic and b) can be used as a replacement for humans in the case of chats -- in other words, it analyzes the question of how and when any such bots will be ready for usage in a manner that will be realistic enough for chatting with an actual human being. This development emerged due to the immediate need of firms such as customer service centers to use less work force and yet satisfy customers with solutions to trivial (to them) problems. The advantages for the stakeholders are immediately obvious -- less workforce will be needed because the computers will be in charge of answering most questions, and fewer questions will be eventually directed to an actual individual. However, the immediate ethical disadvantage is the loss of job openings in the area of customer service, along with many other areas, since intelligent machines will soon be the preferred alternative to complete such tasks; this provides the impacts concerning the economic and psychological aspects. Furthermore, through the loss of jobs, it is likely and very possible that legal issues may arise. The solutions to these problems is that the human workers work in tandem with each other; that way, both the machines are put to good use and the aspects involving the loss of jobs and the ethical/moral issues that arise with these points will be solved. Through the analysis of this article, it is immediately and readily obvious that the IT systems involved in this wide range of scenarios includes but is not limited to computers/computer servers, robotic mechanisms (e.g. robotic arms, etc.).
Henry Willams

Shoppers cheated by supermarket scanners - National - NZ Herald News - 0 views

  • meaning shoppers buy products believing they are getting a bargain but end up being charged full price.
    • Henry Willams
       
      The individuals who are affected by this IT development are everyday shoppers, and the very clear and evident disadvantages, are that they are paying more than they need to on the things they buy.
  • In the United States, scanner price mistakes have resulted in court cases against big retailers.
    • Henry Willams
       
      This shows another kind of person who is affected by this IT development, the retailers, as they are being called out on these glitches in the system, and having to pay for it. The retailers, in this case, are the responsible party. This also shows the legal ramifications on society that came about as a result of this development, as retailers are being sued for charging customers more than necessary, regardless of whether or not the retailers were aware of it.
  • Overseas studies have found that the introduction of barcode scanners cut the error rate from 11 per cent to about 4 per cent.
    • Henry Willams
       
      This shows a feasible way to solve this problem.
‹ Previous 21 - 36 of 36
Showing 20 items per page