T3 : SOCIAL ISSUES IN IT

3.4 Risk of New Technology

3.2 Impact of Computer Technology Towards

3.3 Privacy Risks, Protecting Privacy,
Communications Privacy

3.5 Computer Errors & Failure

3.1 Privacy and Personal Information

2. Key Aspects of Privacy

Freedom from intrusion

Freedom from surveillance

Control of information about oneself

1. Privacy is the state of being private

3. Issue That Need to Kept Private

Medical Information

Political View

Family

4. Privacy Threat in Several Categories

Theft of information

Intentional uses of personal information

Unauthorized use or release

5. Illegal Data Collection

Secondary use - Usage of personal information for a purpose other than the one for which it was supplied for

Invisible Information Gathering - Collection of personal information about someone without the person knowledge

3. Shopping - All kinds of products and stores are available online

4. Education - Virtual college classes

2. Access of Information - One click of the mouse and all sorts of information come out using the search engine

5. Meeting People - The webcam and VOIP could enable us to see and hear the person we are chatting to

1. Communication - Done through emails, instant messaging or voice over internet protocol

Protecting

Communication

Risks

  1. People did not realize the company would store and use their information for other task for example in Mailing List
  1. Location Tracking is the technology that allow location tracking such as GPS
  1. Risk for Children

Inappropriate Material such as pornographic

Physical Danger such as paedophiles

Bullying through email , chat or text messages

2. Encryption

1. Awareness

Customer - More careful about information we give out.

Business Manager - Design systems with privacy protection

3. Right and Law

Process of transforming information to make it unreadable to anyone expect those possessing special knowledge

Computer Software Privacy and Control Act - Prevent deceptive software transmission practices

Fraud and related activity in connection with computer Acts - Prevent about accessing a computer without authorization

1. Communications Assistance for Law Enforcement Act - Requires technology used in comm systems be designed of modified to ensure ability of law enforcement agencies to intercept communication

2. Protection

Telephone - Gov can intercept or record the content of a telephone call for a criminal investigation

Email - Enforcement agent to use pen-registry authority to get destination and information for email

3. Secret Intelligence Gathering - National Security Agency

1. An organization will cope high risks when there are new technologies being deployed in the organization

Difficult to be adapted

Inexperienced users

High cost of maintenance

1. Definition - The state or condition of being wrong or do not function as planned

2. Factors of Errors

Faulty design

Insufficiency trained users

New Technology

3. Impact of Errors to Human

Safety - Death

Politic - War

4. Case of Computer System Failure

Economic- Loss

Deadly Crash on 02 October 2010 in United States of America where the car is accelerating due to computer system failure