Twitter

Information Technology in a Global Society studies the Social and Ethical impacts of IT on different Areas like Business and Employment, Health, Education, Entertainment, Art, Politics, and Science.

Monday, November 17, 2008

Barack Obama running for Prime Minister of Israel ... or is he?!!!


















Benjamin Netanyahu (who is running for Prime Minister of Israel) has copied, well just about everything off of Barack Obama's website and made it very similar. 

One of Benjamin's top advisors said: "Imitation is the greatest form of flattery. We’re all in the same business, so we took a close look at a guy who has been the most successful and tried to learn from him."

learn, ok thats fine. But what happened to intellectual property and copyrights!?

Friday, November 14, 2008

Our New President Elect Really Gets it!

A weekly broadcast on youtube by OBAMA, that 'ought to catch the attention of the new generation.

Is your ISP (Internet Service Provider) Spying on you?

ISP's infringing our privacy by allowing Ad Agency's to install spying software that tracks our surfing habits online.

Online Games that will save the world!

Massively Multiplayer Online Games are becoming a common method to simulate reality.
How about a Massively Multiplayer Online Earthquake Simulation based on real life scenarios played out to see what would happen when the Big one hits?

If Cows could speak, what would they say?

RFID tags on cattle to keep track of diseases they say. Not too far fetched to think that we may be RFID tagged in the future so that God knows who could keep track of our movements. So much for Privacy!

Come on NASA! I'm not drinking my own Urine

Nasa designs a space simulator to mimic the environment on a space shuttle. Astronauts are running on treadmils and their sweat is being condenesed into containers along with their piss for recycling since water is scarce on a space shuttle. Sometimes, i just hate technology.

YUK!

Saturday, November 8, 2008

I think, therefore I Browse!



Fact or Fiction? Partially paralyzed users were able to move a computer mouse on a screen using mind power. FACT! Believe it or not, but a brain cap with over 60 electrodes interprets brain activity to enable disable people to better interact with PC's through thought.

Google CEO Shares his thoughts on Information Technology

Google CEO, Eric Schmidt shares very valuable information at a recent Bloomberg summit in October of this year (2008). Here is an interesting viewpoint:

If the camera phone allows you to be a Paparatzi, blogs allow you to be a reporter, and youtube turns you into a film maker, WHAT HAPPENS TO PRIVACY?

The TALIBANATOR ::: Robots Disguised as Insects



The military will not cease to impress. As part of the advancement of micro-munitions, Imagine little micro-controlled flying insects with mini C4 explosives fitted to take out snipers, or members of the Taliban, watch out for the TALIBANATOR, "I'LL BE BACK!".

Social & Ethical Issues ::: Explained

The widespread use of IT raises questions about social and ethical issues that shape the world today. The use of IT has brought both advantages and disadvantages, both costs and benefits to the world as we know it today.

Reliability

Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if it is entered incorrectly or if it becomes outdated. For example, a medical record that becomes dissociated from the patient it refers to becomes unreliable. The reliability of machines, software and data determines our confidence in their value.

Integrity

Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver licence data resulting in arrests of innocent people.

Security

Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society’s confidence in the information contained in the systems.

Privacy and Anonymity

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity, which might be called for in some contexts but is dangerous in others. For example, discussion of a delicate subject might require anonymity, or at least privacy. On the other hand, anonymity could also conceal the perpetrators of criminal, terrorist or computer hacking acts.

Authenticity

Authenticity means establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.

Intellectual property

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections. On the other hand, the same methods create opportunity for inexpensive dissemination of information.

Followers

Creative Commons License
This work by Osama Alshurafa is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.