Wikileaks publishes CIA chief’s personal information

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, Fraud, IT and Politics, IT Security.

“WikiLeaks on Wednesday published personal information of CIA Director John Brennan after a brazen hack attack of the top spy’s personal email account.” says CNN Source: CNN Date: October 21st, 2015 Link: Discussion 1) The CIA is saying that the hacking of the Director of the CIA’s e-mail “is something that could happen to anyone”.  Do you… Read more »

Would you tell Apple when you’ve had sex?

Posted by & filed under App Economy, Big Data, Consumer Technology, Cyber Security, Ethical issues, Healthcare.

  When Apple released its iOS9 mobile operating system it included a new feature – the ability for women to log their sexual activity alongside details of their menstrual cycles.  An earlier version of its HealthKit software – which tracks everything from electrodermal activity to chromium intake – had lacked the facility.  Other apps existed… Read more »

US court backs Google book-scanning project

Posted by & filed under Competitive Advantage, E-Commerce, Ethical issues, Search Engine.

Google can continue to scan millions of books for an online library without violating copyright laws, the US court of appeal ruled recently. Source: BBC Business Date: October 19th, 2015 Link: Discussion 1) The critical part of this ruling in favor of Google and against the authors/publishers is:  “Google’s division of the page into tiny snippets… Read more »

Smartphones can be “taken over”

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, IT Security, Politics.

Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden has said.  The former intelligence contractor has said that UK intelligence agency GCHQ had the power to hack into phones without their owners’ knowledge.  Mr Snowden said GCHQ could gain access to a handset by sending… Read more »

Medical devices vulnerable to hackers

Posted by & filed under Cyber Security, Ethical issues, Fraud, Healthcare, IT Security.

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online, according to researchers.  Some 68,000 medical systems from just one large unnamed US health group have been exposed. Source: BBC Technology News Date: October 2nd, 2015 Link: Discussion 1) The article says that “The researchers used Shodan – a search engine… Read more »

Will our emotions change the way adverts work?

Posted by & filed under Augmented Reality, E-Commerce, Entertainment, Ethical issues, IT Trends.

A bus stop poster which evolved over time depending on how people responded to it has recently been tested in London.  It is part of a wider area of research into how our emotional responses and biometric data could teach advertisers how to target people according to their mood. Source: BBC Technology Date: September 16th, 2015 Link:… Read more »

Google may have your voice on file

Posted by & filed under Business Intelligence, Cloud Computing, Cyber Security, Ethical issues, Privacy.

Google makes it easy to search the web by just speaking into your smartphone. But did you know your voice is actually being recorded and stored on Google’s servers? Source: HLN Date: September 3rd, 2015 Link: Discussion 1) When you were conducting a voice search on Google, do you recall giving Google permission to store… Read more »

Are we addicted to technology?

Posted by & filed under Career, Ethical issues.

“The thing many of my patients have in common is the fact that they are in front of screens all the time. Even when they try to sleep at night. It has become so pervasive,” says Dr Ramlakhan who works at the privately run Nightingale Hospital, and is a member of its technology addiction treatment… Read more »