This is just a set of thoughts referring to a recent security incident called the ‘NSA Hack,’ which in my view profoundly impacted the privacy on a global scale.
Following post talks about the results of my SonicWall Phishing IQ Test. I also go over some of the notes I’ve taken during the test. [Read more…]
The following short post is my perspective on the adequacy of the personal privacy laws and standards in Canada.
The issue of unclear law around the ‘fair use’ is well illustrated by the copyright situation, where Google Inc. introduced two new search products called Google Book Search and Google Image Search. These were the products, through which Google started digitizing the text and images of copyrighted and public domain books and for the first time expanded beyond indexing the online world of websites. It is also one of the most prominent cases where Google Inc. throughout many lawsuits with Authors Guild, always claimed ‘fair use’ as the reason for digitally scanning and storing million of books online. According to Judge Sprizzo (2017) presiding over one of the lawsuits, the Google claimed that they were simply only showing the “snippets” of the books. Do I think Google had a valid claim to fair use in the lawsuit? [Read more…]
Studies such as (Urbaczewski, A., & Jessup, L. M., 2002) suggest that controlling internet access (at least initially) is not beneficial for productivity, stating “evidence exists of a productivity vacuum occurring immediately following the installation of Internet access on worker desktops.”
Consider a global organization with operations and subsidiaries in several countries. Is it a proper course of action for a global enterprise to adjust the business code of ethics when executing the business internationally? The following article presents my opinion on the matter. [Read more…]
This post analyses my views on ethical responsibilities of IT professional in the fictitious, ethically ambiguous scenario. [Read more…]
The following article explores the technological convergence of Intelligent Personal Assistant (IPA). More specifically, it analyzes the emerging technology of Smart Voice-Enabled Wireless Speakers and how the IPA technology transitioned from smartphones to built-in, dedicated home devices. The trend is changing the way in which machine learning and artificial intelligence are used, and the article explores the new and evolving technology in the context of its overall social impact. [Read more…]
The purpose of the mobile technology is to make our life easier, and there is no dispute that there are numerous benefits as well as challenges that came with the dramatic uptake in use of mobile smartphones. In this article, I concentrate on some of the top social and cultural benefits and difficulties that came with the ascent of mobile technology. [Read more…]
In this post, I look at the alleged Russian hacking of the United States elections and the ethicality of such unauthorized intervention from the viewpoint of privacy concerns and social impact of such cyber attack. [Read more…]
The following article is a step by step guide on how to sync Fitbit data into a Google spreadsheet. [Read more…]
A little bit of research on Browser support for functions keys. The keys marked with OK are available to programmers, the rest is dedicated to the browser specific functionality. [Read more…]
Web administrators transitioning the existing WordPress sites (and image resources) to Amazon S3 have couple of paid plugins to choose from to ease the move to S3. However, most of the WordPress plugins come at a pretty hefty prices, some as high as couple of hundred dollars. The following guide outlines the step by step option that is completely free of charge. [Read more…]
Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet. Over the years, I have seen TOR installed in a variety of different environments, and I think it’s important to mention that outside of using Tor Browser for anonymous web browsing, there are various other ways of using TOR. In the following article, I outline one of these TOR options. [Read more…]
The following article analyses how anonymization methods and various other obfuscation techniques fare in their undertaking to defend against the privacy concerns. [Read more…]