Friday 25 April 2014

Smartphones and the great Digital Divide Smartphones and the great Digital Divide

Q1: Even thought 44 percent of African Americans and Latinos own a smartphone while only 30 percent of white, non-Hispanics do, many people contend that this isn’t really closing the great digital divide because African Americans and Latinos use their smartphones more for entertainment then empowerment. Build an argument to support the previous statement.


When a person only uses smartphone for entertainment, the smartphone is actually not function as a smartphone but only act as a game player or a television. This could not help to closing the great digital divide as many people now have a television and game player in their house. To closing the great digital divide, African Americans and Lat shall be teach to use the smartphone smart enough, such as as a GPS, phone, tablet, working tool and etc. only when the smartphone is function as what it should, the great digital divide cab be closed.


Q2: When accessing the Internet, what can you do on a desktop or laptop computer that you can’t do on a smart phone? If smartphone have fever Internet capabilities (than desktop and laptop computers), can you necessarily link an increase in smartphone ownership within a U.S. based economically disadvantaged group of people to closing the great digital divide? Why or why not?


Smartphone have a similar function as laptop and destop. The only thing that I can think of that smartphone cannot support is those program with JAVA version and smartphone do not have a physical keyboard. However, even smartphone yet to complete as laptop, as long as most of the disadvantage group owned and use smartphone, they still can learn a lot of thing thru online at anytime any place, the great digital divide surely can be closer.




Q3: How does an increase in smartphone ownership in a third-world geographic region like Africa close the digital divide for contries in that region? If you owned a U.S. business and wanted to start doing business in Africa, what would be essential part of your marketing stretagy.


Smart phone is much cheaper and smaller the normal laptop or destop, this make poor people have a chance to use this device. However, without internet, smartphone will become not smart enough. If I would be doing business in such region, I will target to provide cheaper online provider which come with cheap smartphone so that they can owned a smartphone which can online.



Q4: If you look at smartphone ownership by household income, you’ll notice a fairly sizable dip for the category of $ 50,000.00 - $ 75,000. To what do you attribute this? Justify your answer?


This is mainly because category of $ 50,000.00 - $ 75,000 considers a middle low income range where people with this range are more concern on buying house and property. Their income is enough to support only for basic living with having a house or property. In such, technology device become secondary important or luxury thing for such group.


Q5: Finally, will greater access to the internet case a closing of the great digital divide? You can answer Yes, No or same. Whatever the case, build an argument for your answer.


The answer can be yes or no. theoretically, greater access to the internet can close the great digital divide. However, it is much depend on what you have use internet for. If you use it for knowledge purpose, then the gap can be closed but if only for entertainment, the gap will not close much. But having greater access to the internet is a very important step to close the gap.

Just how big is the impact of technology on society

Q1: Visit University Oxford Press at http://global.oup.com/?cc=us. For all years after 2010, find the new word of the year and all the runner-up words perform the simple analysis we presented in the final paragraph above. How has technology impacted the English language in the years after 2010?


2011:


New Word of the year: squeezed middle







2012:


New Word of the year : omnishambles







2013:


New Word of the year: selfie





Runners-up:


· Bedroom tax


· binge-watch


· bitcoin


· olinguito


· schmeat


· showrooming


· twerk




From the above data, we found out that the new word of the year has mostly related with technology.




Q2: While technology has certainly impacted our language in the last several years, so has the environment, perhaps to an even greater extent than technology. Why have so many environment-related words inserted themselves into our language?




More and more people are well educated and we all know that environment is the 2nd mother of us. People hoping to build up the mind set of environment friendly and the best way is created more new word to educate public, for example, bio-plastic, Bio-petrol and etc. This is the main reason that environment-related words inserted themselves into our language




Q3: Create some new technology-related words. Think about the things you do with technology or have witnessed other people doing with technology. Create list of at least five new technology-related words. For each, describe how you derived them and also provide their definition.




1) Foodbook: since people love to take picture of food before start eating and post in Facebook, this word describe people who doing it.


2) Balktag: always tag all other people instantly in facebook post.


3) Touchbook: the combination of tablet and netbook


4) Pencard: pendrive which in card design


5) Watchphone: watch that can call others.




Q4: What about text message abbreviations, emotions, and chat slang terms. Which have been formally recognized by University Oxford Press as a part of the English language? Is it good or bad that these are becoming a part of our formal language? Justify your answer.


“Oxford dictionary adds “twerk,” “derp,” “selfie,” “phablet,” and more voguish vocabulary”




More and more text message abbreviations, emotions, and chat slang terms has been recognize by University Oxford Press. This is good thing in term of the world is accepting new world but this is also bad where there are not any grammer in the new language. It can be easily use and lower the usage of the word but in the same time the whole paragraph is messy and hard to understand as no structure. Unless this problem can be slove, the new language shall not be formalize as one part of the English language.

Sony Reels from Multiple Hacker Attacks

Q1: Do some research on the Sony PDN debacle. What are the new cost estimates for the incident? How many customers have left Sony because of the incident? Have there been any reports of fraudulent use of identities obtained from the hack? Has Sony’s PlayStation Network being hacked again?







From the research, it is estimate that the cost of the incident is about USD 318 per customer. And due to the incident, almost 9% of customer have left Sony and change to other game services provider such as Xbox. However, no particular news showing that there been any reports of fraudulent use of identities obtained from the hack but Sony had been hack again in year 2012 October.



Q2: Gaming and virtual services on the Internet, like Sony’s PSN, World of Warcraft, and Second Life, boast millions of users. For each user, this service must store credit card information. What must these organizations do to protect the private information of their customers? Is it even reasonable to assume that any organization can have protection measures in place to stop the world’s best hackers?


The organization could:


1. Encrypt the private information.


2. Put stronger firewall or maybe layering the firewall.


3. Hired a team of member which knows how to deal with situation when being hack by hackers.


It is important to have such protection as the private information somehow is very private and must be protect from theft. A lot of fraud can occur if the customer identity had been stolen.



Q3: If an extremely intelligent hacker is caught by a law enforcement agency, should that hacker be prosecuted and sent to jail? Is there perhaps way that the hacker might be “turned’ for the good of the digital world? What would that be?


It is depends on what kind of fraud had been done by the hacker. If the hacker had stole the identity and create a big problem to the society, he/she shall be sentence and send to jail. However, if the hacker is only hack for fun and did not make big harm to others, he can be advice to become the talent of protecting cyber world from being hacking. Only those know hacking system well person can know how to stop them. In fact, a lot of antivirus system or firewalls are created by intelligent hackers.



Q4: Every survey taken of business regarding data breaches has found that many businesses are reluctant to publicly announce a data breach. Further, most business will downplay the significance of the breach. Why do organizations behave like this? What is there to gain by not operating in a transparent fashion? Is this an ethical issue, a legal issue or both?


Company reluctant to publicly announce a data breach is due to they want to protect their company good will. And there are very limited law that enforces company to announce to public is such incident happen. It is all depend on the ethical issue whether the company wanted to protect their client or the company names.



Q5: What’s your personal identity theft story? Has someone used your credit card fraudulently? How many phishing emails have you received in the last year? How often do you check your credit card report?


I am been lucky where I do not have any identity theft story. I have receiving phishing email almost every week but I choose to junk them. I have been checking my credit card report every week.

Sexting Now Almost Commonplace




Q1: Adult sexting is perfectly legal, as it is the sharing of sexually explicit content between tewo consenting adults. But what about teen sexting, should that be legal? If a 16-year-old boy sends a sext to his 16-year-old partner, should that be xonsidered child pornography? Why or why not?


Adult sexting is not legal in some country as this involves morality issue. However, teen sexting is definitely not allow as teenage or children are not mature to know what they are doing and what is the risk behind sexting. They have a lot of imagination about sex but they are lack of the knowledge. If teen sexting is allowed, there might have certain people hunting teenage for sexting and might even cheat for having real sex with the teenage people. This will cause a lot of society problem.



Q2: If you refer back to Figure 8.1 on page 228, where would you place adult sexting – a minor ethical violation, a serious ethical violation, or a very serious ethical violation? What circumstances – consequences, society’s opinion, likelihood of effect, time to consequences, relatedness, and reach of result – might move adult sexting from a minor ethical violation to serious ethical violation and then finally on a very serious ethical violation?


I will rate adult sexting as a minor ethical violation. This is because both adults are mature enough to decide what they wants to do and it will not harm other people. However, if the sexting is being stole and publish in public, it will move to serious ethical violation as this involve copy rights and bad intention as other people such as teenage could watch the sexting easily. Furthermore, if the sexting is containing a spyware or virus, it could become a very serious ethical violation as this could even harm other online user and stole their personal data while the person is watching the texting.



Q3: Consider the whole notion of power being tied to sexting, flirting, and cheating. From a psychological point of view why might this be true? Do some research into Tiger Woods’s troubles woth extra-marital affairs. Could his cheating be tied to his position of power? Is “power” and the temptations that go with it an excuse for such behavior?


The reason behind of having sexting, flirting, and cheating is because of greedy. People wants to have more than one partner to show the status and power. They feel proud that they can do things that others cannot do. But actually they are just greedy and not confident with themselves. Just like tiger wood, when he is having cheat, he can perform well but after the cheat being know by others, his performance become very poor. This is all because of self confident level. Temptation is one of the reason to have such behavior as people hope to know more and wanted to find fun. But as a mature adult, you should responsible to what you had done and do not use temptations as an excuse.



Q4: What role can and should employers play in limiting (perhaps eliminating) sexting in the workplace? What about employee-to-employee sexting? What about employee-to-customer sexting? Regarding the latter, what sort of legal liability does an organization have if an employee sends an unwanted and unwelcome sext to another employee or to a customer?


First, Human governments is a good idea to limiting (perhaps eliminating) sexting in the workplace. As a human, we should governs ourselves. Sexting in the workplace is very unhealthy as it could affect the working performance. Sexting in the workplace is same as having affair in work place and it could crash of interest especially between superior and subordinated. Company could also set a rule that forbidden the sexting inside work place. Besides, sexting with customer might end up become sexual harrestment to the customer and customer could have legal suit to the company and affect the company goodwill. So this also should not be allowed no matter it is agree by customer or not.



Q5: These are purely for you to answer yourself. Have you ever participated in sexting? Have you receive a sext? Has learning more about ethics and the nonprivacy of technology enabled communications reshaped your thinking about participating in quesrtionable activities like sexting?


All the answer is no and never. I have never participate in any form of sexting.

Denver Health Operation with a Private Cloud and thin Clients

Q1: Privacy laws and regulations require medical facilities to take measurable steps to ensure the confidentiality of patient information. From this case study, can you tell what Denver Health has done to ensure the confidentiality of its patient information?





1) The patient information is store in a private Cloud and is not accessible by public.
2) Only authorize people with thin client can log into the private Cloud.
3) The thin client is being password encrypted.



Q2: Think about your school. How could it use the ThinIdentity solution to support the technology needs of (1) faculty and (2) students such as yourself?


The school can benchmark the ThinIdentity solution into its Information system. School will store student data in a private cloud and only those with thin client have the access to the private cloud and each thin client can only access to personal information. The person with thin client can add data to the private cloud and store it safely.





Q3: In Thinking about cloud computing (Focusing on the public cloud), what role it play in business continuity planning for Denver Health? That is, how could the public cloud act as a backup for Denver Health’s private cloud?






Denver Health could store same copy of data in their private cloud into the public cloud. If the data in private cloud is missing, Denver health could recover it from public cloud. It is just same theory of storing data into another hard disk.


Q4: If Denver Health were to give each patient a smart card, log-on name, and password, which functions, features, and information could benefit patients? What security would have to be in place to ensure that patient have access to only their own information?


Each of every patient shall have a unique matrix in order to control their power of excess. There will need to have several tier protection to ensure that patient have access to only their own information. Denver Health could also put a lot of server as the protection of the data and each patient can only log on into certain server.




Q5: How could Denver Health extend the ThinIdentity solution beyond its brick-and-mortar walls? How would it work (ie, need to change) to have doctors and nurses log on from home or use a mobile device such as a Blackberry or iphone?


Denver Health could make it server being connect by other user other then those connected by using Web server. First the Denver Health server have to connect online and then the doctor Blackberry or iphone could connected with the server thru online.

Public "Personal" Clouds

Q1: Do some research on Amazon’s Cloud Drive. What is the amount of free storage space? What is the annual cost for additional storage? What about Apple’s iCloud? Is it still free? Does Microsoft charge anything for use of its SkyDrive cloud service?




The Amazon’s Cloud Drive give first 5 GB storage free and charge additional USD 0.50 per year for every extra GB.


It is show that iCloud is not free. It only provides 5GB free and after that user can upgrade to certain storage capacity with a one lump sum payment.


Skydrive offer 7GB free and additional charges are depending to the capacity by annually basis. For example, 20GB for USD 10 per year, 50GB for USD 25 per year and 100 GB for USD 50 per year.




Q2: Putting all your personal information in the cloud means letting go of some control over information like your tax files, personal photos that you might not want anyone else to see, term papers you’re currently writing, and so on. What is your level of concern for the security of these personal digital assets in the cloud? Explain why your level of concern is high or low.


My level of concern is high as there is a lot of information that I do not hope to publish in public. Since the service providers offer such product with fees, it is their duty to make sure my data being protected. Besides, my data shall be protected under data protection act so that I could store my data in cloud safely.




Q3: As we move more of our personal storage needs to the cloud, will computers really need disk storage space? Is it possible that we’re in the early stages of an outrageous industry transformation? Who are the major manufacturers of disk storage for personal computers and laptop?


In future, computer might not need to have personal storage. However, since there are a lot of people need to store some data privately, the personal storage will not disappear from the world. However, offering storage in cloud is the early stages of an outrageous industry transformation where people have the choice of storing data online and the data will much easy to be recover if the data had been accidently deleted.


Currently, the major disk storage for personal computers and laptop provider is kingstam.




Q4: If you choose to store all your personal information in the cloud, you’ll need a personal continuity plan, much like organizations have business continuity plans in case of some sort of disaster. Suppose that right now you begin storing all your personal information, what will you also back up onto a flash drive? How often would you perform the backup information on your computer’s hard drive?


As a lay person, the data that I might back up might be related to money and tax. I might not backup data other than money related as, most of the data is not that important that I cannot survive if I lose it. I might back up those needed data only once a month as I believe that it is not so easy that the service provider will lost my data as there also need to protect their good will.




Q5: Do some research on personal cloud providers. What sort of service level agreement (SLA) do they offer? Are you willing to store your information with a personal cloud provider that offer no SLA? Why or why not.


Example of personal cloud providers SLA:


  • Codifies the specific parameters and minimum levels required for each element of the service, as well as remedies for failure to meet those requirements.
  • Affirms your institution’s ownership of its data stored on the service provider’s system, and specifies your rights to get it back.
  • Details the system infrastructure and security standards to be maintained by the service provider, along with your rights to audit their compliance.
  • Specifies your rights and cost to continue and discontinue using the service.


Basically the personal cloud providers will agree to store your data safely. If a personal cloud providers did not have SLA, which is mean that the data you store in that personal cloud providers will not have strong protection. It is much like keeping money in unlicensed banking system where you would probably lost your data or your data might be stole by a third person. So my opinion is, better pay more for security purpose rather than store data in personal cloud providers without SLA.

Tablets Take Their Place in the PC Market

Q1: Computers, using some AI techniques like those we discussed in Chapter 4, can learn. In the classroom while a child is using a tablet PC to learn the basics of addition, how can software be developed to aid in the learning process? Does this mean that teachers are no longer needed for some subjects? Are teachers needed in earlier grades while computer-based training can take over in later grades? Why or why not?



By having tablet, Children no longer need to carry a lot of books which are very heavy. Children only need to bring a tablet and install a lot of e-book into the tablet and they can read whenever they want. 3D software shall be implemented so that when children asking for explanation, object can be shown in 3D instead of 2D and this will let the learning process become fun and fast. However, in our opinion, the development of tablet PC does not mean that we are no longer need teacher. The development of Tablet is only reducing the burden of the teacher. Teacher become the guide for the children to know where there can find answer/solution to their question. Beside, tablet could not guide attitude of a children, and it is still teacher responsible to make sure children learn knowledge as well as having good morality/attitude. However, a mature adult can learn knowledge by just computer-based training as long as the AI of the tablet is good enough to demo the learning material effectively and efficiency. The success of the learning course will be depending on how well the adult can governs himself.



Q2: End – user systems, like those that allow patrons to orders meals on an ipad, must be “idiot proof.” That is, systems must be usable without training and created in such a way, for example, that a patron at one table can’t accidently change the order of a patron at another table. What does this mean for system development? Can complex and complicated end-user systems be developed and deployed on tablet PCs so that people can use the system without training and without intervention by knowledgeable person such as waiter or waitress?





The reason of having user friendly system patron is because there are a lot of people especially those baby boomers are lack of technology knowledge. However, this kind of problem can be solve if there is an AI that can read every people mind or listen to the order by end user. If this kind of end user system had been created, the depended on waiter/waitress will be very minimum.




Q3: What security issues are involved in allowing people to pay with tablet PCs? Does this payment process make it easier for someone to steal your credit card information? Are you comfortable using a restaurant – supplied technology to enter your credit card information? Why or Why not?


As tablet PCs is just recently created, there are a lot of system issues yet to be solved. One of the issues the security issues. It is much easier where the credit card info being stole compare to normal computer as there are a lot of spyware being created and lack of system securities being intro. However, I am still comfortable to use restaurant – supplied technology to enter my credit card information as nowadays, bank securities are quite complete and as long as I alert with every transaction done by my credit card, the chances of my credit card info being steal are same as normal computers.



Q4: What will happen to offshore outsourcing for software development? Can outsourcing firms in India or China, for example, be expected to develop software systems for use in U.S. schools? Can those same firms be expected to develop systems that meet FAA rules and restrictions?





The answer wills certainly a yes. By having globalization, the technology advancement gap between each country is very small. India and China will certainly have the resources to develop software for use in US school and the cost will be much lower due to the low living expences in such country. As long as there are certain quality governs rules being setup, the system generated can meet FAA rules and restrictions.