1. Identify a news article that address the 3 strands of the ITGS triangle.
2. Prepare a short presentation that highlights
a) The description of the Technology
b) The description of two main social and ethical significance associated with the technology
c) Two areas of application to specified scenario
Presentations to be completed
https://sites.google.com/site/keremitgsnotes/home/topic-1-continues
Task 2;
Learning Objectives:
- Describe common security problems and their impacts.
- Identify recent examples of various types of malware.
- Explain good security practices (preventative measures).
- Apply the ITGS Triangle to security scenarios.
Security;
Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society’s confidence in the information contained in the systems.
We will read the list of news articles below.
These articles will provide some perspective on the history of hacking, high-profile hacking in 2017, and hacking as it relates to the Internet of Things.
While reading these articles:
1) Make note of the various kinds of hacking that are noted, so that you can use them as examples in the writing tasks you will do in the future.
2) Formulate a list of questions raised by the articles.
3) Consider how the issues raised in these articles can be applied to the ITGS Triangle.
Task 4 Period 1 on Monday 2/9/2019
Privacy
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.i) Read the new articles below
It is about Alexa
https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/05/06/the-technology-202-alexa-are-you-spying-on-me-here-s-why-smart-speakers-raise-serious-privacy-concerns/5ccf46a9a7a0a46cfe152c3c/?noredirect=on
https://www.forbes.com/sites/kateoflahertyuk/2019/04/12/amazon-staff-are-listening-to-alexa-conversations-heres-what-to-do/#3434049171a2
- Formulate a list of questions raised by the articles
- Describe how the ITGS triangle addressed by the news articles above.
ii) Identify and an ideal current news article which raises Privacy / Anonymity issues and describe how the ITGS triangle is addressed in your OneNote page.
Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.
i) Read the new articles below
Facial Recognition
https://www.scmp.com/news/china/society/article/2115094/china-build-giant-facial-recognition-database-identify-any#targetText=China%20is%20building%20the%20world's,about%2090%20per%20cent%20accuracy.
https://www.pulse.com.gh/bi/tech/facial-recognition-is-almost-perfectly-accurate-heres-why-that-could-be-a-problem/xnvwl26
https://www.aljazeera.com/news/2019/01/ces-2019-facial-recognition-technology-brings-privacy-concerns-190110082030740.html
- Formulate a list of questions raised by the articles
- Describe how the ITGS triangle addressed by the news articles above.
ii) Identify and an ideal current news article which raises Privacy / Anonymity issues and describe how the ITGS triangle is addressed in your OneNote page.
Task 5 Period 1 3/9/2019
Surveillance
Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.
a) Obtain ONE news article that raises a surveillance issue
b) Describe how the technology impacts on the different stakeholders.
c) Describe ONE main problem of the Technology and ONE solution to the problem.
The digital divide and equality of access
The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socio-economic groups as well as within what may appear to be relatively homogenous groups. This may lead to groups or individuals without access to IT being disadvantaged. For example, while telelearning may bring previously unavailable opportunities to everyone’s doorstep, factors such as the cost and availability
of hardware, software or access to the internet may create a “digital divide”.
a) Obtain ONE picture that shows digital divide and equality of access issue
b) Describe how the the stakeholders are impacted.
c) Describe ONE solution to addressing any of the problem associated with the picture.
Intellectual property
Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyright, trademarks and patents exist to protect intellectual property. However, the easy and accurate duplication methods made available through IT can undermine such protection.
a) Obtain ONE video which less 4 mins that represents intellectual Property issue
b) List and describe how the the stakeholders are impacted in the video.
c) How would you have improved the video to present the issue clearly?
Task 6 4/9/2019 Period 3
Policies
Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software, and networks.
a) Compare TWO policies for Facebook and Instagram social media platform and share the similarities and the difference on your OneNote page.
b) Imagine you have developed a unique software or invented a new digital device; What would you include in your policy statements and why?
Standards and protocols
Standards and protocols are technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information.
a) Apple phones charges are too different from other phone chargers, why is that so?
b) Justify the reasons for having the same rules and protocols to enable compatibility between IT systems / devices.
Task 7 (Use your class time to complete all the pending tasks in this page)
Create an animation or a video that explains the 4 remaining social and ethical issues;
a) The video /Animation should be less than 4 mins
b) Use images as much as possible
c) Use background music in the background
d) Have your voice recorded within the solution.
Use can try signing up for https://animoto.com/ or any other online solution.