Unable to keep up with the 21st-century transition from film to digital technology, Kodak listed a debt of $6.8 billion
#OpMegaupload - Pastebin.com - 3 views
4More
shared by The Zhan on 20 Jan 12
- No Cached
Kodak declares bankruptcy: The company that captured the 20th century (Photos) - 0 views
www.washingtonpost.com/...gIQAnR35AQ_blog.html
1.11_people_machines; 2.5_digital_entertainment; 3.1_hardware; 3.6_multimedia_digital_media

-
The main social and ethical issue that this article brings up is that of people and machines. The fact that Kodak has declared bankruptcy is hardly surprising, as though they were the company who worked so hard to develop the world of photography, they have failed to develop themselves in order to adapt to the new world of photography, while other companies such as nikon, samsung etc, have by constantly creating new digital cameras with new attractive features. This article is recent story of how Kodak are trying to sue Samsung for potentially infringing one of their patents: http://www.bbc.co.uk/news/technology-16631710 This article is prime example of how having an innovative idea is simply not enough to be successful over an elongated period of time: Just because Kodak had the idea of digital photography, that does not mean that they did not have to compete with other companies to remain the leading brand in photography. It seems to me that Kodak's complacency after having had the idea of digital photography led to their downfall. Explain the relationship between the IT system (digital photography) and the social/ethical (people and machines) The article shows how for the the public to continue to have an interest in machines such as digital cameras, they must continue to be developed, improved, updated and upgraded, as the appeal of new technology attracts customers. In this case, Kodak failed to keep up with the rate at which the world of digital photography is evolving.
-
http://gigaom.com/2012/01/19/why-kodaks-bankruptcy-should-scare-nokia/ Is Nokia the Kodak of the mobile phone world?
1More
Viewpoints: Sites go offline in US piracy laws protest - 0 views
6More
Face recognition: In the future, can you remain anonymous? - Jan. 13, 2012 - 3 views
-
The social and ethical issues presented by this article is on privacy and anonymity.
- ...2 more comments...
-
Describe, step by step, how the IT system works. An example of a face recognition and detection technology is the iPhone app that can snap a photo of a person and within seconds display their name, date of birth and social security number. 1. A good quality, well-lit photograph of the person is taken. 2. The image is sent to a server where a database of images is located. 3. The images in the database are downloaded from publicly available sources (any database containing faces and names), such as facebook, twitter or LinkedIn profiles. 4. According to the information available in that profile, such as date and location of higher education stydy, other data can be inferred (date and state of birth). 5. This data is inserted into an algorithm developed to predict the social security number. All of this still within the database. 6. The biometric features of the iPhone photograph is compared to those of the image in the database 7. If they match, the information about that person is returned from the server to the iPhone: name, date of birth, state, social security nr. What are the flaws within this system? Explain the relationship between the IT system (facial recognition iPhone app) and the social/ethical (privacy and anonymity) "The technology to analyse faces in improving so quickly that unpredictable (...) inferrences from that information have become possible." - Alessandro Acquisti, professor of IT and public policy at Carnegie Mellon University's Heinz College The app is a proof-of-concept of how our privacy can be easily breached on a widespread basis (as one walks into a store or protests in a convention)
-
This article raises the issue of privacy and anonymity. This article shows how there is a possibility that in the near future, as long as the technology continues to develop at this rate, all of our personal data will be stored on a database along with an image of our faces. The fact that a person can be recognized at any moment anywhere means that people will start to be monitored and everything they do will be recorded. This completely strips people from their privacy, much like the Big Brother situation that is described in George Orwell's "1984". This technology can, however, bring certain advantages as through the constant monitoring of people, people involved in criminal acts will be identified with much more ease and therefore crime levels are sure to decrease. However, this can also raise an issue of reliability, as although it is a very small percentage of it happening, there can be the case where the camera misidentifies someone, and in a case of crime, that could lead to an innocent person being conviected for a crime they did not commit. And although at the end of the article "Wear a mask," is said by John Verdi, senior counsel of the Electronic Privacy Information Center as a joke, if the tecnhology continues to develop, we might find ourselves in the ridiculous situation where the only way to ever remain anonymous is to in fact wear a mask.
-
-
We could all just replace our eyes. http://www.youtube.com/watch?v=kx9IEP8pmiI&feature=related In the above clip we see an example of what might happen if facial recognition ever reaches the level portrayed in Minority Report. As the protagonist walks into the store, an AI asks him how he felt about his last purchase at the shop, information obtained by scanning the protagonist's eyes and searching for what he has bought. This brings up the issue of privacy, as has correctly been mentioned above, as third-party companies will be able to access databases with data concerning what people purchase, how much they spend and where they are.
4More
Israeli hacker retaliates to credit card hacking - 2 views
-
An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
- ...1 more comment...
-
One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
-
Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
-
I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
5More
Who's to blame when an autonomous vehicle crashes? - 3 views
-
Also, here's a link to another article explaining about how google's self-driving car works.
- ...2 more comments...
-
-
Basically the car works with a Velodyne 64-beam laser mounted on the roof on the car, the laser produces a detailed 3D map of the environment and takes measurements of the area. The car uses the data from the 3D map and the measurements to avoid obstacles and respect traffic laws. Furthermore, the car uses various sensors, two of which are placed on the front and rear bumpers to track obstacles. There is also a camera, that detects traffic lights, GPS, inertial measurement unit, and wheel encoder, that determine the vehicle's location and keep track of its movements. In my opinion, the idea of a self driving car is incredible if it is built correctly, however I believe that the wheel encoder may invade the privacy of some.
-
I'm a bit curious Jorge, how would this invade the privacy of some? This is an amazing technological improvement, it will be interesting to see what happens in the future with this. This is a quite good article on how it works http://news.discovery.com/autos/how-google-self-driving-car-works-111018.html
-
Because the car records it's position using the GPS, if a black hacker is able to get hold of this information the owner of the car could be put at risk.
4More
BBC News - Facebook works with Websense to add phishing safety net - 5 views
-
Don't forget the other tags. You are missing one from section 2 and one from section 3
- ...1 more comment...
-
Privacy is the main issue being presented as facebook users are exposed to phising. Phising involves 'stealing' a users username and passwords usually through emails or links leading to fake websites which seem to be trustworthy. Phishing attempts give the user a sense of urgency in order to convince them to give their information. (e.g. You need to provide us with your username and password as soon as possible. Not doing so will result in permanent deletion of your account) The relationship between the users and the IT system is that users often use facebook on a day to day basis to perform various activities. This makes facebook a 'profitable' target due to the large number of people that can be tricked at once. The risk is that the stakeholders may be susceptible to is the loss of their username and password, giving the hacker/phisher full acess to ones account which may then lead to other information to be divulged about the user. Facebook is attempting to solve this issue by warning users about suspicious links they may be accessing, although there are already some security options in facebook settings such as the use of HTTPS which provides "encrypted communication and secure identification of a network web server." http://en.wikipedia.org/wiki/HTTP_Secure
-
-
In theory this would be a good solution, due to the fact that as soon as the user read the warning message in detail, they would feel encouraged not to follow the link. However, due to the facebook's nature, in practice, this solution isn't as effective as one would expect. Throughout Facebook's history, when a user clicks a link that leads to an application, a message appears stating that if the user accepts then information from their profile will be accessed. Because of this, when users see this message they will simply think it is one of the usual messages and skip to the link due to habit. Another obvious limitation is the fact that all it does is simply suggest that it MIGHT be malicious, and therefore most users that are unaware of the dangers of phishing might ignore it and choose to follow the link.
4More
BBC News - Google China e-mail hack: FBI to investigate - 5 views
-
The main social and ethical issue in this article is security and privacy. Using a method known as 'spear-phising', hackers were handed users' account information. I find it quite freightning how people, who are supposed to be some of the best minds in the world, as they work in sensitive parts of the US government, fall into the trap of giving their account information to hackers. In my opinion a greater awareness should be raised, on how to protect their privacy, among high-profile government officials in order to protect vital and classified information.
- ...1 more comment...
-
I agree with Andre as though the consequences of the hack can be dealt with in a relatively short amount of time, the incident reveals a bigger problem with the security of the government's files and questions just how safe confidential information really is from being accessed by the wrong people. The main social and ethical issue is security, as the security of US official's e-mails may have been breached by fishing. The fact that such an incident has occurred in such a place with such important information and with supposedly very high security measures is worrying, and ways to detect and combat the threat of phishing should be publicized.
-
-
1More
shared by Mr Brooke on 17 Jan 12
- No Cached
Wikipedia to shut for 24 hours to stop anti-piracy act - chicagotribune.com - 0 views
www.chicagotribune.com/...y-act-20120116,0,4821013.story
3.4_internet 2.6_law_control 1.12_digital_citizenship

-
For details on the Wikipedia blackout that is planned for January 18, 2012 see Wikipedia:SOPA initiative http://en.wikipedia.org/wiki/Wikipedia:SOPA_initiative and http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
2More
shared by Fiche Galinha on 16 Jan 12
- No Cached
Kaspersky Warns of New Facebook Chat Phishing Attack - eSecurity Planet - 2 views
www.esecurityplanet.com/...book-chat-phishing-attack.html
3.4_internet 1.2_security 2.5_home_leisure 2.5_social_networking

Hacked Indian memo making Apple and BlackBerry claims likely to be fake | Technology | ... - 2 views
Google 'improperly' accessed Kenyan rival Mocality's database - 1 views
2More
shared by Mr Brooke on 13 Jan 12
- No Cached
Air France 447 Flight-Data Recorder Transcript - What Really Happened Aboard Air France... - 6 views
www.popularmechanics.com/...-aboard-air-france-447-6611877
1.11_people_machines 2.1_transportation 3.1_hardware

-
"For more than two years, the disappearance of Air France Flight 447 over the mid-Atlantic in the early hours of June 1, 2009, remained one of aviation's great mysteries. How could a technologically state-of-the art airliner simply vanish? "
-
This article presents us the feedback system of the airplane's autopilot. According to the reliable source of wikianswers, feedback is when The input is adjusted based on the output of the system so as to achieve a certain end, like minimizing disturbance, cancelling echo (in a speech system) and so on. http://wiki.answers.com/Q/What_is_a_feedback_system#ixzz1jUMOZkrU Here is how the autopilot system works: Through the various sensors and measuring instruments located in the body of the airplane, data such as "such as groundspeed, altitude, engine settings, and rate of climb" is logged in real-time. This data is sent to the processor of the pilot's computer It is then processed and the computer stipulates what controls to actuate in order to stabilise flight "The Airbus is a fly-by-wire plane; the control inputs are not fed directly to the control surfaces, but to a computer, which then in turn commands actuators that move the ailerons, rudder, elevator, and flaps." (the processor requests the output controls to be carried out)
6More
shared by Fiche Galinha on 10 Jan 12
- No Cached
BBC News - Google admits profiting from illegal Olympic ticket ads - 6 views
www.bbc.co.uk/...business-16468846
3.4_internet 1.1_reliability_integrity 1.5_authenticity 2.1_bus_emp 2.1_online_bus

-
This article has made clear that the AdWords advertising system is flawed, it is unacceptable for a large company like Google to lead users to believe that a website can be trusted using the 'sponsored links' and continues to make profit. This goes against the 6th point in Google's philosophy "You can make money without doing evil" although they are not doing it consciously. From the article I understood that the system is run using an automated filter to identify websites which break Google's policy and a manual assessment also takes place by a human. Instead of using just one human, a group of humans can assess the adverts to ensure nothing is missed. Furthermore, an update of Google's databases should regularly take place in order to catch illegal websites quicker.
- ...3 more comments...
-
Here is a list of all Google's philosophy, http://www.google.com/about/corporate/company/tenthings.html
-
Good story this and nice link to Google's philosophy Jorge. This article is a good one for commenting on the relationship between the stakeholder and the IT system. Anyone want to step up and "Describe the relationship of one primary stakeholder to the IT system"?
-
This article raises a huge reliability issue as people are being tricked to buying tickets from fake websites, which are advertised by Google. Due to its increasing reputation over the years, the average internet user will use and think of Google as the most reliable website to navigate, and therefore would trust most of the llinks that would appear when they search for something. The secure and reliable reputation Google has is what makes the fact that these illegal websites being sponsored ads such a large issue. It affects many web users and as they are likely to visit these websites, their personal information such as bank account details and personal details are made public. So security could also be seen as an issue as these people are put at risk as they have given their bank account data to fake websites, who could use the data gain access to bank accounts and steal money.
-
Google's corrupt sponsored links affects nearly every digital citizen, as Google is by far the most popular and used search engine. There is alternatives to Google, but nevertheless Google is the most popular search engine(we're talking 70+% http://www.seoconsultants.com/search-engines/ ) I agree with Jorge's main ideas above. However, I do not think that increasing the number of people checking would make any large difference. It is their filters which needs an update - something I'm sure they're already doing. It does raise some reliability concerns, being the most popular search engine, you'd expect them not to endorse(even unknowingly) corrupt links.
-
The social and ethical issues related to this news story are reliability, privacy and anonimity to an extent. Privacy as the information from the buyers credit card is given to what seems to be an unknown person or company. The multiple stakeholders seen would be the buyer, Google and the advertiser. Although it is via Google that the advertiser gets sell his product, it is important to understand that there are most likely thousands of advertisements added daily to the Google search engine and, referring back to Jorge's point, it would be very likely that humans would fail to see such mistakes as well after repeatedly going through hundreds of adds everyday. The trust and reliance that people have on Google can be misleading and it is evident that to solve such an issue people must be awared of the several scams that they are exposed to every single day in order to prevent this sort of problems.
5More
shared by Morten Nielsen on 12 Jan 12
- No Cached
Google search changes are bad for the internet, says Twitter | Technology | guardian.co.uk - 1 views
www.guardian.co.uk/...earch-changes-internet-twitter
3.4_internet 1.7_surveillance 1.11_people_machines

-
Google has angered Twitter and faces accusations of "warping" its search results and breaking antitrust rules by boosting posts from its Google+ social network in its standard search results.
-
"We're transforming Google into a search engine that understands not only content, but also people and relationships.
- ...2 more annotations...
-
The Guardian's own tests on google.com when not signed in to any Google account found that links to people in Google+ appeared prominently in suggested searches,
-
If Google extends the promotion of Google+ results to European countries where it has a greater share of search, and also if it extends it to results on Android phones, then it may face more urgent calls for antitrust investigation.
2More
BBC News - Police crackdown on fake shopping sites - 3 views
-
This article refers to the authenticity of the identity of web shops, and the security of shoppers' credentials. "DI Hoare said shoppers should also be wary of unsolicited offers that arrive via email." A common scamming tool that cyber thieves resort to in order to "harvest credit card and banking details" is phishing. "Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email." http://www.phishtank.com/what_is_phishing.php
-
this gives a similar example where they used a real store and created the fake website then... the shop owners would receive all the complaints with out actually knowing what was going on http://voices.washingtonpost.com/securityfix/2009/01/caveat_emptor.html
4More
shared by Isy :) on 10 Jan 12
- No Cached
'Anonymous' targets German far-right with Nazi-leaks.net - 7 views
www.bbc.co.uk/...technology-16424987
1.2_security 1.3_privacy_anonymity 3.4_internet 2.4_political_processes

-
The social and ethical issues that relate to this article are that privacy and security and reliablility to a certain extent. What the Anonymous group are doing is basically taking people's personal information such as name, age, adress etc. and putting online for everyone to see, simply becuase they favoured nazi views. This is essentially the invasion of people's privacy as people's information is free for everyone to see. IT is also a security issue as people who feel very strongly against people who favour nazi views, have access to these peoples' adresses and could impose a danger. Reliability is also an issue, as it's mentioned in the article that none of the people that were mentioned in the website were actually confirmed to share Nazi ideals, meaing they are unjustly putting people in danger.
- ...1 more comment...
-
One of the problems here is the authenticity of data being released. ""This is a lot of data, but there are already some names where it's clear the people are not right-wing extremists." Some people identified in the data had merely been contacted by right-wing publications seeking interviews, she added." Some of the people on the list are not Nazis. What could be a solution to this?
-
The article does raise some rather interesting social and ethical concerns. The main thing here is of course "Anonymous" breaking the Data Protection Act 1998 with their unlawful obtaining of personal information. While one can admire "Anonymous" fight against neo-nazism, the results they are producing are in fact not reliable. Though, as we've seen in the past, "Anonymous" are skilled proper encryption and security should have been able to fend them off and safeguard all information. Looking back, this would have the ideal to avoid the situation the websites are in now. I cannot see a plausible way of undoing this, and again give privacy to those who had it broken, as the information has been linked to multiple other sites - so perhaps this is only to serve as a lesson for others websites containing personal information.
-
Well, to be honest the best solution would just to not post any private information online but seeing as that option wouldn't be considered by the 'anonymous' hacker group they could at least find a way and make sure that the only personal information posted online its authentic and from the main followers and contributors to this Nazi supporting website… but I don't really know how they would be able to do this, sooo if anyone knows please share because now I'm curious aha As much as I don't agree with the Nazi ideals and as much as I believe that supporting them is (sorry for being improper here) idiotic. I still don't agree with posting this private information online because as mentioned above, this does pose a major danger to the people whose information has been posted online by the people who have very strong feelings against these Nazi supporters.
4More
shared by Morten Nielsen on 05 Jan 12
- No Cached
BBC News - Valve's online game service Steam hit by hackers - 3 views
www.bbc.co.uk/...technology-15690187
1.2_security 1.1_reliability_integrity 3.7_databases 3.4_internet

-
The attackers used login details from the forum hack to access a database that held ID and credit card data
-
The initial investigation showed that the attackers gained access to a Steam database that held "user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information".
-
This article further increases the already notorious fear of databases containing people's details being accessed by undesired people, who could potentially use this data to cause harm. This raises a serious privacy issue, as, although it has not been confirmed, these hackers have accessed the Steam database which holds up to 35 million people's credit card data and email addresses, posing a threat to a large amount of people. Although it is not known if any harm came of this attack, security measures such as changing password and transferring credit card data to a more secure service (Steam Guard security service) were suggested to Steam users. This is a solution that doesn't undo the harm that has already been made, but is still a positive measure as it can help prevent potential future attacks from hackers on this database.
-
"Valve has officially rolled out its new Steam security system, Steam Guard, which allows users to lock their accounts to a single PC if they so choose. Steam Guard essentially blocks all attempts to access a protected Steam account, then sends verification emails to a registered email address which allow the account owner to monitor account activity and grant access on a single PC at a time. " http://www.bit-tech.net/news/gaming/2011/03/17/valve-launches-steam-guard-security/1 This ensures the 35 million users "the account security they need as they purchase more and more digital goods", especially if they use Steam in public spaces such as cibercafés. http://www.joystiq.com/2011/03/03/valve-introduces-steam-guard-to-fight-acount-phishing-and-hijack/
4More
shared by The Zhan on 11 Jan 12
- No Cached
Device Tracks Blood Flow in the Brain - 2 views
www.technologyreview.com/...39313
1.1_reliability_integrity; 1.11_people_machines; 2.4_med_research; 2.6_military

-
A headset ultrasound monitor could make it easier to detect the dangerous aftereffects of brain injuries.
-
The company's monitor consists of a headset that directs an array of ultrasound beams through the head and uses a proprietary algorithm to automatically detect the mid-cerebral artery, one of the major arteries supplying blood to the brain. The device then locks the relevant beam onto the artery and measures its blood flow. A machine attached to the headset gives an index of flow and peak velocity.
-
"A new ultrasound device could make it easier to detect a potentially life-threatening condition". An excellent example of data-logging applied to a practical real-life situation.
-
The invention of this device will drastically improve the monitoring of brain related injuries and in particular the one mentioned in the article - vasospasm. The fact that nearly 50% of soldiers who sustain blast injuries can potentially develop vasospasm is more than enough reason for there to be plenty of funding towards the development of this device. It says in the article that "the company plans to make a more rugged version of its commercial device for the battle field." If the company manages to actually develop this, the amount of soldier deaths in the battle field will decrease as the soldiers will be able to get treatment sooner. Within this development the company could have the data be live streamed to the doctors so that they can analyze the data to see if there is any problem. The data can then be stored so that the patient's development can be recorded. As the device is measuring the blood flow in the brain this could also be used to analyze the soldiers brain whilst on the field. This could contribute to developments in other studies of the brain like post-traumatic stress.
View AllMost Active Members
View AllTop 10 Tags
- 1553.4_internet
- 703.1_hardware
- 671.2_security
- 601.3_privacy_anonymity
- 332.1_bus_emp
- 323.11_robotics_AI_exp_sys
- 311.1_reliability_integrity
- 30wikileaks
- 292.5_digital_entertainment
- 271.4_Intellectual_Property
- 261.11_people_machines
- 253.2_software
- 241.7_surveillance
- 233.10_IT_sys_organizations
- 233.7_databases
- 223.8_modelling_simulations
- 222.6_pol_gov
- 192.6_military
- 163.6_multimedia_digital_media
- 152.4_health