28 Apr
Posted by whyhello as Database, Integrity, IT Systems, ITGS, People and Machines, Privacy, Security
Databases Social and Ethical Implications and Discussion Databases! Public Databases! Oh no! Security and Integrity affect databases in general, as the databases all depend on accurate data. The most up-to-date data could be the difference between having to spend time in jail – or not. Duplicate names, lack of updating, are just some reasons why […]
Delving deeper into the thoughtful book “Liars and Outliers” by Bruce Schneier, this time we move onto the Natural History of Security where Schneier takes us through the course of history, informing us about the origins of security and how its development has affected modern day’s society. Beginning the chapter he begins with “Security is […]
Liars & Outliers by Bruce Schneier is a book about trust and how it affects society. Additionally, trust links to security as there are always Liars and Outliers in every society. Society is all based on trust and without it, many big corporations will not be able to function. Business strategist Don Tapscott described trust […]
31 Aug
Posted by drtech as ITGS, Privacy, Surveillance
Well what a great first debate on the interesting article Why Privacy Matters even if You have Nothing to Hide. I think we can all agree that the outcome and winners of the argument were those for the fact that privacy is highly important to us even if we have nothing to hide – and […]
http://www.cristinajcordova.com/2012/03/oinks-export-tool-data-privacy-breach-download-the-data-of-any-user-5/ This article is related to the social ethical issue which is privacy. The problem arising from this issue is users can access other users personal information which they uploaded to the website just by changing their usernames. This also brings up privacy and anonymity issues too because other users can access other users without […]
08 Jan
Posted by sillibilliboi as Policues and Standards, Security
The book I have to read for ITGS is ‘Secrets and Lies‘ and I went into this book with no expectations what so ever. This is because I had never heard of this book and know almost nothing on the subject of digital security. But I was surprised at how the first introduction (there are […]
Soon after the start of the Large Hadron Collider’s computers, the GST(Greek Security team) hacked into the computer controlling one of the most important components for the LHC’s experiment to work. Though no real damage has been done by the hackers, this just emphasizes how vulnerable this high tech pieces of machinery are. This, as […]
Adobe Photoshop
apocalypse
Book
brain
cells
Chrome
Copyright
digital
Digital Immigrant
Digital Native
Education
Facebook
Fats Million
Firefox
Google
Image editing
Intellectual Property
ITGS
Jaron Lanier
Lawrence
Lawrence Lessig
Lessig
Marc Prensky
networks
of
people and machines
Photoshop
prensky
Privacy
Protocols
rat
Remix
robot
Schneier
scientist
Security
Spreadsheet
Trust
tweets
twitter
warcraft
world
wow
You Are Not A Gadget
YouTube Artificial Intelligence (36)
Arts Nd Entertainment (12)
Assignment (62)
Authenticity (11)
Blogroll (3)
Business/Employment (12)
Case Study (5)
Control (14)
Database (8)
Deadlines (4)
Delicious Links (213)
Education (30)
Equality (7)
Examinations (5)
Globalisation (15)
Health (10)
Integrity (8)
Intellectual Property (17)
IT Systems (39)
ITGS (1,062)
Just for Fun (37)
Models and Simulations (3)
People and Machines (46)
Policues and Standards (13)
Politics and Government (14)
Portfolios (5)
Presentation No Show (7)
Privacy (30)
Quiz (1)
Reliability (24)
Science Nd Environment (8)
Security (26)
Surveillance (4)
video (3)
Web 2.0 (13)
Wiki (2)
WP Cumulus Flash tag cloud by Roy Tanck and Luke Morton requires Flash Player 9 or better.