The technology is dramatically amending our workplaces. In this post, I touch on ethical dilemmas associated with electronic surveillance of employees. [Read more…]
In this article, I offer a couple of thoughts on what I believe to be the three most significant aspects of the successful research. I talk briefly about the definition of research first, then concentrate on describing the main characteristics and their importance. [Read more…]
The following article is a short visual on how to move remote desktop on Windows 10 from the default port 3389 to any other available port.
We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare. Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.
In the following article, I concentrate on some of the often-asked questions topic connected to ethical hacking, the area of computing concerned with the discovery of security vulnerabilities that can potentially be exploited by real hackers. [Read more…]
The CrowdSourcing model allows the internet masses to partake in any profit or non-profit idea, such as solving problems (crowdsolving), finding lost items (crowdsourcing), or become a source of funds to startup businesses (crowdfunding). The following short ‘work-in-progress’ article looks at the history and growth of crowdsourcing and assesses the value of crowdsourcing in Canada. [Read more…]
The following article examines the influence of open learning podcasts on publishing and online income earning. [Read more…]
In this post, I will try to look at the three of the very common risks associated with the ability of business to manage its project costs. I identify risk, the cause and try to suggest a possible risk mitigation strategy. [Read more…]
The following short post is my perspective on the adequacy of the personal privacy laws and standards in Canada.
The issue of unclear law around the ‘fair use’ is well illustrated by the copyright situation, where Google Inc. introduced two new search products called Google Book Search and Google Image Search. These were the products, through which Google started digitizing the text and images of copyrighted and public domain books and for the first time expanded beyond indexing the online world of websites. It is also one of the most prominent cases where Google Inc. throughout many lawsuits with Authors Guild, always claimed ‘fair use’ as the reason for digitally scanning and storing million of books online. According to Judge Sprizzo (2017) presiding over one of the lawsuits, the Google claimed that they were simply only showing the “snippets” of the books. Do I think Google had a valid claim to fair use in the lawsuit? [Read more…]
Studies such as (Urbaczewski, A., & Jessup, L. M., 2002) suggest that controlling internet access (at least initially) is not beneficial for productivity, stating “evidence exists of a productivity vacuum occurring immediately following the installation of Internet access on worker desktops.”
Following post talks about the results of my SonicWall Phishing IQ Test. I also go over some of the notes I’ve taken during the test. [Read more…]
Consider a global organization with operations and subsidiaries in several countries. Is it a proper course of action for a global enterprise to adjust the business code of ethics when executing the business internationally? The following article presents my opinion on the matter. [Read more…]
This post analyses my views on ethical responsibilities of IT professional in the fictitious, ethically ambiguous scenario. [Read more…]
In this post, I look at the alleged Russian hacking of the United States elections and the ethicality of such unauthorized intervention from the viewpoint of privacy concerns and social impact of such cyber attack. [Read more…]