Privacy, Security and Intellectual Property
Week Four: The pitfalls of too much interoperability
The fourth chapter in Interop has pointed out the potential pitfalls of too much interoperability when designing programs or websites. The three different versions of flawed designs by Sony (PlayStation Network), Google (Buzz) and Facebook (Beacon) pointed out the increasing need to determine how much and what kind of interoperability is appropriate from a corporate perspective. The links provided below are all privacy issues that as a result from public demand stricter regulations were implemented.
I was struck by the Big Data and information security piece the power and potential for any organization that can effectively analyze and process all the data that is now available. I could not help wondering if indeed ‘Big Brother’ is just around the corner?
The key message in this YouTube video for me is that big data would be of great benefit for those who are equipped to analyze them. Given the vast amounts of data that even the average organization cannot process and analyze, it seems that only the largest corporations and government agencies will truly benefit from the trends in big data. Having said that however, we have seen that applications are invariably developed that make each new data set more accessible to more people. I cannot even comprehend 4.8 zetobytes so I think it would take a very amazing application to help me deal with ‘big data’. In the long run, ‘big data’ could very well be a net positive. I could not help being concerned when the video mentioned that ‘big data’ could help a government plan for civil unrest or a pandemic. I wondered – what if the civil unrest was a legitimate protest over government abuse of power. ‘What if’ planning for a pandemic was not used to try and stop the spread of a disease. I think it would be careless to not be a little concerned. I love this explanation of Big Data. I enjoy how the story unfolds.
More about Big Data in this YouTube video:
Closer to home, I was dismayed with the extent that my computer can attract cookies that I would not have suspected could be there. My personal action is to become more aware of my personal computer security. For an example, since I do not use Java script, I have since removed Java. I learned of the vulnerabilities it has as a result of its written program being incomplete. And the vulnerabilities had not been fixed since the article of January 11, 2013. The vulnerabilities allowed malware/malicious code to left on my system, and putting my at risk for identity theft or lesser inconveniences.
A tweet by Charles Williams @ComputerOneStop
Why The Java Bug Is A Big Deal http://www.forbes.com/sites/toddganos/2013/01/12/why-the-java-bug-is-a-big-deal/
How to turn off Java on your browser – and why you should do it now
It is essential that intellectual property be made more secured and protected in an age when knowledge and ideas that can transform knowledge into practical applications of all kinds from the arts to science are the ultimate products of the digital age. It is so much easier today to steal such property than it ever has been before. On the other hand there is also increased opportunity to uncover such theft by anyone who chooses to digitally dig into it. Just consider the case of the resignation of the Director of Education of the largest school boards in Canada, Mr. Chris Spence, who was nailed for plagiarism by a regular individual who looked into a rather innocuous Edoc that he had written in the Toronto Star and it then snowballed.
Do all these issues that will increasingly have an impact on virtually every person in the world who owns a computer mean that future empowerment will be based on an individual’s and organization’s ability to grasp the need for and take appropriate action to protect, secure, and design programs that deal with interoperability and security threats?