IT+Issues

IT ISSUES CLASSWORK

Notes point person in each group, please email me your notes on the IT system: dbutera2@schools.nyc.gov

2.2.2 Databases and Spreadsheets Social and ethical issues

Reliability- Design, storage, access, presentation. Each of these factors allow for optimum usage of databases and spreadsheets. Integrity- copyright and acknowledgment of sources when collecting data, bias in choice of what and where to collect data, ownership of data, accuracy of data received from the internet, the way in which data is stored and used. Security- Databases with secure access such as passwords, or hosting databases and spreadsheets on a private network. Also, the way in which data is transferred and processed over a secure network from one computer to another. Privacy & Anonymity- Unauthorized use of data, net-etiquette, the dangers of sharing databases and spreadsheets over a secure network. Authenticity- Data must reflect that of what the creator collected and analyzed and must not be the work of another person, data from the internet must be cited and from a reliable source. The integrity of the data must be accessed first before deciding its authenticity, all sources should be cited and accessed. Intellectual Property- The selling, collecting, and redistribution of data should only be done in respect of the creator of the data.

Communications -Reliability: When researching a paper, information can be false, jeopardizing the “facts” in your report. -Integrity: If a shipping address is changed, packages will not arrive to the desired destination. -Security: When connected to the internet, you are always at risk, because as long as you are connected, somebody could connect to you, jeopardizing your security (provided you lack security software, or the hacker is extremely skilled) -** Privacy and anonymity: Sites such as facebook leave your personal information and social activities out for whoever wants to see it, assuming you took no steps to try and make your information private somehow. **
 * Social and ethical issues of the internet **
 * -Authenticity: When logging into a website there is no possible way to determine if the person logging in is actually the owner of the account. As far as the server knows, it is the same person logging in every time based on the credentials, and is unable to distinguish between the owner and a hacker based on just a username and password. **
 * -Intellectual property: when working on a paper, there is an abundance of information available on the internet. This information is very easy to steal and call it your own, as there are not many copyrights on everything on the web. Sometimes it is done accidentally, but sometimes people can copy and paste information and call it their own. **

 I**mages, Sound, PPT, Modeling + Sims, Tutorials** Images, Sound and Presentations 1.1 Reliability- Whether the images, sound, presentations are designed well, operate well, and their data accurately corresponds with the rest of the world. 1.2 Integrity- Images, sound, and presentations can be altered accidentally or tampered with by others. 1.3 Security- Whether images, sound, and presentations are secured by copyrights 1.4 Privacy & Anonymity- Surveillance 1.5 Authenticity- Whether the images, sounds and presentations have an established identity beyond reasonable doubt. 1.6 Intellectual Property- If all data is legally protected. Modeling + Sims 1.1 Reliability- Predictions based upon computer models 1.2 Integrity- There can be faulty of hidden assumptions made by those who created the simulations. 1.3 Security- Issues in means of the use of the simulations in the military. 1.4 Privacy & Anonymity- How the simulations and models are used and who uses them 1.5 Authenticity- One has to know if he or she is using a program that belongs to the person who created it. 1.6 Intellectual Property- Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections Tutorials 1.1 Reliability- If the operation and design of training someone is accurate and corresponds with the rest of the world. 1.2 Integrity- If the training has not been tampered with and the training is accurate. 1.3 Security- The training software should be secured properly so that nobody can interfere or tamper with. 1.4 Privacy & Anonymity- The training software should not give out personal information about its employers. 1.5 Authenticity- The organization or IT company should be an authentic company beyond reasonable doubt. 1.6 Intellectual Property- The intellectual property of the organization should be secured legally by patents and such so that other countries do not steal information.
 * multimedia, slideshows, virtual reality, games,
 * copyright issues
 * biased information
 * reliability of data
 * surveillance and privacy
 * design and creation concepts such as data integrity and storage
 * storage, processing and access concepts such as file formats, loading time, and portability
 * reliability of predictions based on computer models like in global warming
 * security issues involved in military simulations
 * social impact of reliance on simulations to examine issues of public policy
 * balance in responsibility between an individual and an organization for training
 * the need for IT companies to consider global and cultural diversity when preparing training and tutorial software
 * the requirement of organizations to provide training when implementing change


 * Social/Ethical Connection between Robotics & AI **
 * __Reliability__ – we have to rely on the technology involved with Robotics and Artificial Intelligence because it deals with moving parts and if something malfunctions it can be physically dangerous
 * __Integrity__ – with AI in reference to expert systems if the data incorporated into the expert system is false then it can in turn jeopardize the effectiveness of the system to its users
 * __Security__ – AI technology needs to be secure or else it can be harmful to the user who expects the technology to perform specific actions
 * __Privacy/anonymity__ – the user(s) should know who created the expert system, it should be ensured that the data was derived from an expert or group of experts
 * __Authenticity__ – in terms of Robotics since Robots are made to replace and help humans it is imperative that the human using the robot is authenticated, verified for example if a robot’s function is to be an aid to an elderly person then the robot needs to verify and differentiate its user from other people, thereby having an authentic identification of its user in particular
 * __Intellectual Property__ – in reference to an expert system which would be AI, the system and the robot can only reflect the ideas of actual people, therefore the people who create expert systems and robots need to be acknowledged for their contribution to the creation of the expert system or the robot