Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 3: SOCIAL ISSUES IN IT (3.2 IMPACT OF COMPUTER TECHNOLOGY (1)…
CHAPTER 3: SOCIAL ISSUES IN IT
3.1 PRIVACY AND PERSONAL INFORMATION
Key aspects of privacy:
:star: Freedom from intrusion (being left alone)
:star: Control of information about oneself
:star: Freedom from surveillance (from being tracked, followed, watched)
Terminology:
:star:
Personal Information
- any information relating to an individual person.
:star:
informed consent
- users being aware of what information is collected and how it is used.
:star:
invisible information gathering
- collection of personal information about a user without the user's knowledge.
:star:
Cookies
- Files a Web site stores on a visitor's computer.
:star:
Secondary use
- Use of personal information for a purpose other than the purpose for which it was provided.
:star:
Data Mining
- Searching and analyzing masses of data to find patterns and develop new information or knowledge.
:star:
Computer matching
- Combining and comparing information from different databases to match record.
:start:
Computer profiling
- Analyzing data to determine characteristics of people most likely to engage in a certain behavior.
Two common forms for providing informed consent are opt out and opt in:
:star:
opt out
- Person must request that an organization not use information.
:star:
opt in
- The collector of the information may use information only if person explicitly permits use.
3.2 IMPACT OF COMPUTER TECHNOLOGY
1) Search and seizure of computers and phone
2) Video Surveillance and Face Recognition
:<3:
Security cameras
- increased security and decreased privacy.
3) Marketing and Personalization:
:<3: Data mining
:<3: Targeted ads
:<3: informed consent
:<3: "Do Not Track" button in browsers
:<3: Paying for consumer information
4)
Social Networks
- Post opinions, gossip, pictures, " away from home" status
5) Life In the Clouds
:<3: Security of online data.
:<3: Convenience
6) Location Tracking
7) A right to be forgotten - the right to have material removed
:<3: negative right (a liberty)
:<3: positive right (a claim right)
8) Government System
9) National ID Systems
10) Protecting Privacy
11) Encryption Policy
12) Right and Laws
13) Communications
3.3 PRIVACY RISKS, PROTECTING PRIVACY, COMMUNICATIONS PRIVACY
Technology and markets
- Many individuals, organizations, and businesses help meet the demand for privacy to some degree: Individual programmers post free privacy-protecting software on the web
Policies for protecting personal data
- The businesses, organizations and government agencies that collect and store personal data have an ethical responsibility to protect it from misuse
Right and law
:explode: Warren and Brandeis: The inviolate personality
:explode: Judith Jarvis Thomson: Is there a right to privacy
:explode: Applying the theories
:explode: A basic legal framework
:explode: Regulation
:explode:Contrasting Viewpoints
:explode: The free market view
:explode:The consumer protection view
Communications
- Intelligence agencies intercept communications to collect information about the activities and plans of hostile governments and terrorists.
Wiretapping and email protection
:explode: Telephone
:explode: Email and other new communications
Designing communications system for interception
- The Communications Assistance for Law Enforcement Act (CALEA) requires that the design of telecommunications equipment ensure that the government can intercept telephone calls
The NSA and Secret Intelligence Gathering
- The purpose of the National Security Agency (NSA) is to collect and analyze foreign intelligence information related to national security and to protect U.S. government communications and sensitive information related to national security.
3.4 RISKS OF NEW TECHNOLOGY
Risk
- Uncertain event or outcome that occurs in decision making
Risk of new technology
- An organization will cope high risks when there are new technologies being deployed or employed in the organization.
New technology risks
:black_flag: High cost maintenance.
:black_flag: Piracy
:black_flag: Insufficiency of expertise
:black_flag: Loss of data
:black_flag: Unachieved goals
:black_flag: Loss of profit
:black_flag: Difficult to be adapted
:black_flag: Inexperienced users
3.5 COMPUTER ERRORS & FAILURE
Error and Failure
- The state or condition of being wrong, or do not function as planned
Factors of computer system errors
:fire: Faulty design
:fire: Sloppy implementation
:fire: Insufficiency trained users
:fire: Poor user interface
:fire: new technology
Impact of computers systems errors to human
:fire: Safety- death
:fire: Economic - Loss
:fire: Politic - War
:fire: Education - Fault Information
Type of safety - Critical Computer Systems
:fire: Military
:fire: Power plant
:fire: Medical
:fire: Train
:fire: Aircraft
:fire: Production Industries
Reliability
- ability of a person or system to perform and maintain its functions in routine circumstances, as well as hostile or unexpected circumstances.
Safety
- The word safety refers to the freedom from danger, injury and damage, and to personal security.
Overconfidence
:fire: Unappreciative Risk
:fire: Ignore warning
:fire: Don't consult manual
Professional Technique
User Interface and human factors
Redundancy and self-checking
Testing
Law, regulation & market
Risk and progress