T3 : SOCIAL ISSUES IN IT
3.4 Risk of New Technology
3.2 Impact of Computer Technology Towards
3.3 Privacy Risks, Protecting Privacy,
Communications Privacy
3.5 Computer Errors & Failure
3.1 Privacy and Personal Information
2. Key Aspects of Privacy
Freedom from intrusion
Freedom from surveillance
Control of information about oneself
1. Privacy is the state of being private
3. Issue That Need to Kept Private
Medical Information
Political View
Family
4. Privacy Threat in Several Categories
Theft of information
Intentional uses of personal information
Unauthorized use or release
5. Illegal Data Collection
Secondary use - Usage of personal information for a purpose other than the one for which it was supplied for
Invisible Information Gathering - Collection of personal information about someone without the person knowledge
3. Shopping - All kinds of products and stores are available online
4. Education - Virtual college classes
2. Access of Information - One click of the mouse and all sorts of information come out using the search engine
5. Meeting People - The webcam and VOIP could enable us to see and hear the person we are chatting to
1. Communication - Done through emails, instant messaging or voice over internet protocol
Protecting
Communication
Risks
- People did not realize the company would store and use their information for other task for example in Mailing List
- Location Tracking is the technology that allow location tracking such as GPS
- Risk for Children
Inappropriate Material such as pornographic
Physical Danger such as paedophiles
Bullying through email , chat or text messages
2. Encryption
1. Awareness
Customer - More careful about information we give out.
Business Manager - Design systems with privacy protection
3. Right and Law
Process of transforming information to make it unreadable to anyone expect those possessing special knowledge
Computer Software Privacy and Control Act - Prevent deceptive software transmission practices
Fraud and related activity in connection with computer Acts - Prevent about accessing a computer without authorization
1. Communications Assistance for Law Enforcement Act - Requires technology used in comm systems be designed of modified to ensure ability of law enforcement agencies to intercept communication
2. Protection
Telephone - Gov can intercept or record the content of a telephone call for a criminal investigation
Email - Enforcement agent to use pen-registry authority to get destination and information for email
3. Secret Intelligence Gathering - National Security Agency
1. An organization will cope high risks when there are new technologies being deployed in the organization
Difficult to be adapted
Inexperienced users
High cost of maintenance
1. Definition - The state or condition of being wrong or do not function as planned
2. Factors of Errors
Faulty design
Insufficiency trained users
New Technology
3. Impact of Errors to Human
Safety - Death
Politic - War
4. Case of Computer System Failure
Economic- Loss
Deadly Crash on 02 October 2010 in United States of America where the car is accelerating due to computer system failure