Compliance: Institutional and Human Interoperability

The key message this week from Interop by Palfrey and Gasser was the challenge presented is the issue of compliance by all institutions in Ontario to accommodate the needs of disabled and vulnerable members of society. The United Nations states “Internet Access is a Human Right.” The following article and embedded video provide more insight.

http://mashable.com/2012/07/06/internet-human-right/

When you get right down to it the planning and training necessary to be able to provide accommodations to information, internet and websites in Ontario have nothing to do with technologies and data. They have everything to do with human and institutional interoperability. The next YouTube video explains to a larger degree.

As I reviewed the Accessibility Wizard, I realized that it emphasized that not all institutions were the same but rather that the goal was for all institutions and humans who work in those institutions to work together to accomplish shared goals. In this case, to make accommodations in whatever way individuals require to access information, maintain their safety and acquire employment. Take the Accessibility Wizard to see how your organization can be more accessible. https://www.appacats.mcss.gov.on.ca/eadvisor/start.action

The question becomes what can the Ontario government do to increase institutional and human interoperability in an accessibility program that aims to bring so many diverse institutions into a common goal?

Privacy, Security and Intellectual Property

Privacy, Security and Intellectual Property

Week Four: The pitfalls of too much interoperability

The fourth chapter in Interop has pointed out the potential pitfalls of too much interoperability when designing programs or websites. The three different versions of flawed designs by Sony (PlayStation Network), Google (Buzz) and Facebook (Beacon) pointed out the increasing need to determine how much and what kind of interoperability is appropriate from a corporate perspective. The links provided below are all privacy issues that as a result from public demand stricter regulations were implemented.

http://www.wired.com/threatlevel/2012/09/beacon-settlement-approved/

http://en.wikipedia.org/wiki/Facebook_Beacon

http://www.savethemoney.co.uk/sony-hit-with-huge-data-loss-after-playstation-hack/

I was struck by the Big Data and information security piece the power and potential for any organization that can effectively analyze and process all the data that is now available. I could not help wondering if indeed ‘Big Brother’ is just around the corner?

The key message in this YouTube video for me is that big data would be of great benefit for those who are equipped to analyze them. Given the vast amounts of data that even the average organization cannot process and analyze, it seems that only the largest corporations and government agencies will truly benefit from the trends in big data. Having said that however, we have seen that applications are invariably developed that make each new data set more accessible to more people. I cannot even comprehend 4.8 zetobytes so I think it would take a very amazing application to help me deal with ‘big data’. In the long run, ‘big data’ could very well be a net positive. I could not help being concerned when the video mentioned that ‘big data’ could help a government plan for civil unrest or a pandemic. I wondered – what if the civil unrest was a legitimate protest over government abuse of power. ‘What if’ planning for a pandemic was not used to try and stop the spread of a disease. I think it would be careless to not be a little concerned. I love this explanation of Big Data. I enjoy how the story unfolds.

More about Big Data in this YouTube video:

Closer to home, I was dismayed with the extent that my computer can attract cookies that I would not have suspected could be there. My personal action is to become more aware of my personal computer security. For an example, since I do not use Java script, I have since removed Java. I learned of the vulnerabilities it has as a result of its written program being incomplete. And the vulnerabilities had not been fixed since the article of January 11, 2013. The vulnerabilities allowed malware/malicious code to left on my system, and putting my at risk for identity theft or lesser inconveniences.

A tweet by Charles Williams @ComputerOneStop
http://www.prweb.com/releases/2013/1/prweb10383840.htm

Why The Java Bug Is A Big Deal http://www.forbes.com/sites/toddganos/2013/01/12/why-the-java-bug-is-a-big-deal/

How to turn off Java on your browser – and why you should do it now
http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/

It is essential that intellectual property be made more secured and protected in an age when knowledge and ideas that can transform knowledge into practical applications of all kinds from the arts to science are the ultimate products of the digital age. It is so much easier today to steal such property than it ever has been before. On the other hand there is also increased opportunity to uncover such theft by anyone who chooses to digitally dig into it. Just consider the case of the resignation of the Director of Education of the largest school boards in Canada, Mr. Chris Spence, who was nailed for plagiarism by a regular individual who looked into a rather innocuous Edoc that he had written in the Toronto Star and it then snowballed.

http://www.thestar.com/news/gta/2013/01/13/chris_spences_online_reputation_takes_a_hit_amid_plagiarism_crisis_can_it_be_recovered.html

Do all these issues that will increasingly have an impact on virtually every person in the world who owns a computer mean that future empowerment will be based on an individual’s and organization’s ability to grasp the need for and take appropriate action to protect, secure, and design programs that deal with interoperability and security threats?