Академический Документы
Профессиональный Документы
Культура Документы
McGraw-Hill/Irwin
Technology Defined
Technology referring to the practical applications of science and knowledge to commercial and organizational activities
Private investment:
Venture capitalists are investors who provide capital to start-up companies that do not have access to public funding They have long targeted technological innovation, with the aim of making outsized returns
12-3
Business investment:
Business firms have invested directly in technology through their research and development (R & D) operations. These investments have often benefited the business, as well as produced innovations that have moved their industries forward
The combination of government, private investor, and business investment in technology has continued to drive innovation forward. But, ultimately, technology continues to evolve because of peoples insatiable desire for it.
12-4
12-5
Figure 12.2
12-6
12-7
12-8
Social Networking
A system using technology to enable people to connect, explore interests, and share activities around the world Examples of the more popular social networking sites on the Internet include Facebook, MySpace, YouTube, and Twitter
Each of these popular social networking Internet sites have their ethical challenges
12-9
New generation of blogs, called vlogs, or video Web logs appeared in mid-2000s
All that was needed was access to a digital camera that could capture moving images and high-speed Internet access
12-10
Organizations and individuals have adopted use of spam blockers, but sometimes difficult to sort out bad emails
Government has attempted to monitor, control and prosecute spammers using Internet for illegal activity U.K. and Italy also has anti-spam legislation
12-11
Practice of duping computer users into revealing their passwords or other private data under false pretenses
The Anti-Phishing Working Group, a U.S. industry association, reported in 2008 an 827 percent increase in password stealing, from 3,362 cases in January 2008 to 31,173 cases in December 2008 In 2009, about 1 in 300 e-mails contained some form of a phishing attack, an increase of more than 30 percent from the previous year
12-12
Domain name system (PNS) poisoning, is a hacking technique that redirects a users computer from a legitimate Web site to another site by altering the users computer or router
Pharming attacks were first reported in the 1990s, but e-mail and wireless computing have provided hackers and criminals with many more opportunities
All the user has to do is click the links or view the message to activate the pharming attack on their computer or router
12-13
12-14
12-15
Progress in narrowing the digital divide in developing countries has been slower, but still evident
Programs have been developed to narrow the global digital divide University of Michigan and Google One Laptop per Child (OLPC)
12-16
CHAPTER 13 26/11/11
McGraw-Hill/Irwin
Protecting Privacy
The potential for breaches of privacy are everywhere Employees have access to new technologies at work and companies may be monitoring usage, raising employee concerns about invasions of privacy
Businesses have adopted privacy policies to explain what use of the companys technology is permissible and how it will monitor employee activities
More aggressive efforts by cyber criminals resulted in a rise of attacks on information security Recent technological advancements have increased the number of ways that privacy violations may occur
12-18
Platform for Privacy Preference Project (P3P) provides users with software that enables them to define what information they are willing to divulge on the Internet Since 2008, representatives from the United States and 27 European countries have gathered annually for Data Privacy Day The event, which brings together privacy professionals, government leaders, academics and students, and business executives, was designed to raise awareness and generate discussion about data privacy practices and rights
12-19
The Childrens Online Privacy Protection Act of 1998 (COPPA) requires commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13
It will be difficult to achieve international government control of privacy, especially as it pertains to the Internet The management of privacy may need too come from the Internet companies themselves
12-20
Theose responsible for creating and spreading computer zombies, viruses, and worms are called a computer hackers Although businesses are spending millions of dollars to protect the information they sore from hackers and other criminals, some organizations have discovered that their own employees can be their worst security leak
12-21
12-22
Responsible for managing technology, including its many security issues. CIOs must increasingly see the big corporate picture Part of job is enabling or driving business innovation through use of technology
12-23
Internet Pornography
Some countries aggressively monitor sites for objectionable material Companies such as Verizon, Sprint, and Time Warner Cable have begun to help parents control their children's access to pornography by agreeing to block access to Internet bulletin boards and Web sites nationwide that disseminate child pornography
12-24
Theft of intellectual property, artistic performance, or copyrighted material exploded with the entrance of the Internet and global connectivity Whether it is computer-based software, musical recordings, video movie productions, or electronic versions of books, piracy is on the rise and victims are retaliating turning to governments for enforcement and protection of their rights, or seeking collaborative solutions to this ethical challenge
12-25
12-26
Human genome
When Celera Genomics Group announced that it completed the first sequencing of human DNA makeup, the achievement was hailed as the most significant scientific breakthrough since landing on the moon A new era of medicine, as well as great opportunity for biotechnology companies, appeared to be born with the decoding of the human genome
12-27
Cloning
Clearly stem cell research leading to the possibility of human cloning and the human consumption of food cloned from animals are important issues and will likely increase in prominence in the near future
Bioterrorism
Terrorist groups see the use of deadly bioengineered diseases and poisons, such as smallpox, anthrax, and bubonic plague, as effective tools
12-28
12-29