Final+May+2010+Exam+Review


 * HOW TO USE THIS REVIEW**

[|Exam study guide] (this is the Google document put together by Phil and Bridget to highlight what we covered well and what wasn't really covered at all).

//Place the information you found about the topic you are covering for our in class revision in the appropriate section below. If you have a topic that crosses over, place relevant info in the other sections as needed. Be sure to make a note as to what the original topic was the detail links to.//

toc =Section 1: Social and Ethical Issues=

** 1.11 People and Machines **
- RFID in hospitals à RWE
 * Health **

Benefits of using RFID Systems:
http://www.activewaveinc.com/applications_hospitals.php - Databases in hospitals - Machine surgeons – they perform tasks that normal surgeons cannot do, such as precise snipping or operations too small for the human hand to handle. [|http://news-releases.uiowa.edu/2010/march/030310robotic-surgery.html /] [] - Xray – MRI - Internet - Computer Labs - Transform learning style – students now use a lot of technology to help them learn. - Tele-learning - students away from school can still participate by learning at home by logging on to their school’s server and retrieve homework there, or communicate with their teachers. - Simulations – students can learn through simulations, giving them that crucial learning through experience. - Wifi in house – improves standard of living as all wifi enabled devices can use the wifi to communicate with each other and possibly through the user as well. - Wifi out in malls, public areas –increases standard of living as there is internet available for everyone all over the place. - Home security systems –improves standard of living as people in homes are protected by home security systems that will contact authorities when alarmed, and warn the inhabitants. - Internet - Expert systems used in banks à econ crisis as they granted too many loans out to people who could not pay them back à RWE - However it is also due to the knowledge engineers setting the ‘bar’ too low
 * Continuously track each patient's location
 * Track the location of doctors and nurses in the hospital
 * Track the location of expensive and critical instruments and equipment
 * Restrict access to drugs, pediatrics, and other high-threat areas to authorized staff
 * Monitor and track unauthorized persons who are loitering around high-threat areas
 * Facilitate triage processes by restricting access to authorized staff and "approved" patients during medical emergencies, epidemics, terrorist threats, and other times when demands could threaten the hospital's ability to effectively deliver services
 * Use the patient's RFID tag to access patient information for review and update through a hand-held computer
 * Education **
 * Arts, Ent, Les **
 * Business **

1271134094

People and Machines
[] []
 * Who controls the design of technology and the pace of its introduction?**
 * The ones who invested in developing the new technology.
 * The design of the technology is designed for optimal profit. The designers commonly sacrifice user-friendly designs for the sake of cutting costs
 * User-Centered Design: A modern philosophy that the user should take center stage when designing new hardware
 * Design Prinicples:
 * Early focus on user(s) and task(s): Establish how many users are needed to perform the task(s) and determine who the appropriate users should be; someone that has never used the interface, and will not use the interface in the future, is most likely not a valid user. In addition, define the task(s) the users will be performing and how often the task(s) need to be performed.
 * Empirical measurement: Test the interface early on with real users who come in contact with the interface on an everyday basis. Keep in mind that results may be altered if the performance level of the user is not an accurate depiction of the real human-computer interaction. Establish quantitative usability specifics such as: the number of users performing the task(s), the time to complete the task(s), and the number of errors made during the task(s).
 * Iterative design: After determining the users, tasks, and empirical measurements to include, perform the following iterative design steps:
 * 1) Design the user interface
 * 2) Test
 * 3) Analyze results
 * 4) Repeat


 * How safe and effective is the design?**
 * Effectiveness is determiend by how much the work produced in a time period has increased after the implementation of a new system.
 * safety towards environment by taking caution on materials used when creating hardware.
 * New productions have less toxic materials and lowered radiation emissions compared to several years back.


 * Is technology going to extend human faculties and make work easier and more pleasant, or are machines going to displace humans and lead to mass unemployment? **


 * AI and Expert Systems and robotics used in manufacturing and production.
 * A lot of blue collar jobs are eliminated from production due to robotics (assembly lines)
 * Humans designers cannot be replaced.
 * Creative and Innovative jobs are on higher demand with more money invested into developing future talents


 * Is technology used appropriately, or should a better, possibly non-technological alternative be found? Which areas of human endeavor are best served by IT systems?**
 * Economic Crisis caused by Expert systems

[]
 * Which social and ethical issues arise from a comparison of people and machines in the following areas: stamina, memory, accuracy, speed, analysis, synthesis, judgment, innovation, creativity?**
 * Computer systems are superior in Stamina, memory, accuracy, analysis and speed
 * Humans are superior in judgement making, innovation and creativity
 * Innovation and creativity is the driving force of IT, as it spawns from it.

1271133129

** 1.2 Integrity **
By definition, Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver license data resulting in arrests of innocent people.

Relation to other Social/Ethical Issues - Reliability o Notable difference from reliability: § Reliability refers more to the operation of hardware and how easily it breaks down § Integrity refers specifically to the accuracy of data, numbers, and information - Security o Integrity of data and information must be protected through proper means of security, such as passwords, encryption, firewalls, etc.

Most significant IT Systems involved: - Applications o Databases and spreadsheets § The integrity of the information inputted into databases, servers, spreadsheets, etc. is called into question o Modeling and simulations § The information/data programmed into models and simulations are significant in that they must be accurate to properly simulate a realistic event/scenario. - Robotics o Similar to modeling and simulations, the data in the robot’s programming is important in ensuring the robot properly performs its task. - Artificial Intelligence and Expert Systems o The programming, resources, and data input must be up-to-date and accurate in order for expert systems to work properly. o Refer to Expert Systems and American Banks activity.

Areas of Impact: - Business and employment o Databases and spreadsheets § Input data § Security of these data from unauthorized change · Hackers · firewalls - Health o Medical apparatus and equipment § Data collected from these equipment: are they accurate and free of error? 1271648838

** Authenticity **
Authenticity can be defined as "establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto at work. A more advanced example would be the use of encrypted digital signatures in a business transaction."

__Social and Ethical Issues__ - Integrity - Security - Control - People and Machines. - Privacy and Anonymity
 * The process of authenticating a user is often used as a security measure, which is protecting sensitive information (banking accounts, online accounts, social networking accounts).
 * Using authentication can control how many users have access to, for example, a company's network/ information files.
 * Through the use of several authentication processes, machines are always used to aid this process.
 * Through authentication, the privacy of people can be protected (social networking sites for example), as other people will not be able to access their private information.

__Areas of Impact__ - Business and Employment - Health - Education - Arts, Entertainment and Leisure - Politics and Government
 * Used to protect networks, files, information and to get into a company building or area.
 * Used to protect patient data (when using electronic medical records).
 * Used to protect information (grades and tests for teachers, files and such for students). Example, login on school computers.
 * To protect copyrighted information, and also for accounts on online games (CoD, WoW).
 * Used to protect information and files, as well as locations. Used in identification at airports and as individuals.

__Examples of authentication technology__ - Encryption "The scrambling of data so that only an authorized user has access to it is known as __ encryption __ and the unscrambling of data so that only a registered user has access to it is known as __decryption __ ." - Digital signature "Electronic signature means an electronic sound, symbol or process attached to or logically associated with a contract or other record and executed or adopted by a person with the intend to sign the record."  - Speech recognition Speech recognition would be the process of inputting a users voice into a recorder which has the authenticated sounds saved, and based off of the comparison of the two voices, the system will allow access or deny access.
 * Encryption confuses the system by transforming the information into random symbols and letters/ numbers, so that it can not be read by an unauthorized user. Once in individual enters to correct code (example: password/username combination), then the data is un-scrambled and the user is allowed access.
 * Digital signatures use encryption techniques to prevent hackers and unauthorized users from accessing the information it is protecting.
 * Digital signatures could also include a pin, password, or a digital version of a handwritten signature.
 * 1) The voice input to the microphone goes to the sound card.
 * 2) The output from the sound card—digital audio—is processed using FFT (Fast Fourier Transform)
 * 3) Further fine-processed using HMMs and other techniques.
 * 4) The built-in database is used for analyzing what’s been spoken.
 * 5) There’s a reverse feedback to the database at the final stage for the purpose of adaptation.
 * 6) The final recognized output then goes back to the CPU.

Biometrics - Face recognition Face recognition software matches the picture of an individuals face to those stored in its database. Using the distances between eyes, nose to mouth, length of face and width (and more), the software is able to authenticate a user.

- Iris and Retinal Recognition Due to the fact that no irises are alike, this recognition software uses a grid system, which evaluates the pattern in the iris and compares the pattern to those stored in its database.
 * 1) First a person stands within a range of one and three feet away while the wide angle camera can focus and calculate the position of the user's eye.
 * 2) A second camera then zooms into the eye and captures a black and white image.
 * 3) After the iris system has one's iris in focus, it overlays a circular grid (zone of analysis) on the image of the iris and identifies where areas of light and dark fall.
 * 4) Finally, the captured image or 'eye print' is checked against a previously stored 'reference template' in the database.

- Finger printing An individual's fingerprint is unique, and this is used in the same was as iris/facial recognition. The user is asked to press their finger against a pad which registers and compares the patterns.

** Equality of Access **
IT has the potential to offer universal access to information, regardless of distance, age, race, gender or other personal characteristics. However, because of the above characteristics, and cost, certain individuals or groups can be barred from access. For example, while telelearning brings previously unavailable opportunities to everyone’s doorstep, the cost of hardware, software or course fees might place the learning beyond the reach of an average person. Thus causing inequality Within education the use of technology is often implemented. However, for those with less access to the technology are limited in the usage of certain materials. Costs or area of location can cause inequality in terms of the usage For example: wikispaces, online classrooms, certain sources of information Usage of technology in the science and environment can be beneficial with the addition of materials, such as various programs that can help make calculations that give data and allow us to make changes accordingly to solve the issues that come up. For example: carbon footprint, forecasting. Usage of technology in politics has greatly increased recently. Take obama’s usage of Youtube for his election, and its benefits. As more and more people begin to use technology, the government also began to use technology in order to sway people to their perspective. However not everyone has the money or technical skills to use this and thus inequality occurs. As health facilities increase and begin to implement technology, countries that are less privileged began to fall further behind. Hospitals have begun to implement various tools in their surgeries or ways of organizing their patient records. However, due to costs this may cause others to not be able to enjoy these benefits. In other cases distance may be the issue, such as in the use of telemedicine. Despite its reach to those areas that are isolated, there will always be areas that cannot be accessed. As the expansion and creation of technology increase, the arts as well entertainment becomes greatly impacted. Programs that further our imagination and the possibilities are ever increasing, and more and more people want to become a part of it. However, for arts, certain programs being how they are require hardware specs to be quite high. Thus, the users without top of the line computers may be unable to run it. On the other hand, it could also be unaffordable to some due to its costs. The same goes for games, however location can be an issue at times. For example: Within china, some online games do not function as well as they should, due to china’s great firewall. This makes the game highly inconsistent and thus the users in china do not have equal access as those in other parts of the world. 1271820334
 * Education**
 * Science and the Environment**
 * Politics and the Government**
 * Health**
 * Arts, Entertainment, and Leisure**

=Section 2: IT Systems in a Social Context=

**2.2.6. Tutorials, Training, and Wizards (Assistants)**

 * 1271128459**


 * Tutorials** are software or media designed to lead a person viewing the tutorial through any process of steps that leads to learning knowledge. It is specifically useful in that the person using the tutorial learns at his or her own pace. Some tutorials are text based, for example, tutorials made by artists on the internet that teach other people how to design or create a project on a program, such as use Photoshop, whereas some tutorials are applications that include buttons, flash interactions, such as those official Photoshop tutorials available on Adobe.com. Some tutorials are as simple as Read Me files, usually within a file named README.txt, with instructions on how to use the material inside the file.


 * Training** software are software designed for more formal purposes such as for a specific task or skill in a job. Many companies or organizations use training software to train its employees when a change in the organization occurs.


 * Wizards** are supplied software on any suitable media, which leads the installer through the any needed process for the software, such as installation, or uninstallation.

There are several **social and ethical issues** outlined in the syllabus that we should know concerning tutorials, training, and wizards. IT companies, such as Microsoft, need to consider cultural and global diversity when preparing training and tutorial software. Many tutorials are offered in various languages. Many companies are also switching from hiring teachers to 'train' employees, to mass distributing tutorials so that money and time is saved.

media type="custom" key="5899063" //*all news articles in slideshow are from Wired.com//



=Section 3: Areas of Impact=

**Business and Employment**
//Spyware and Datamining:// http://docs.google.com/View?id=dfzbsgx6_64d2vp5rdt

//Transportation @http://docs.google.com/View?id=dfwx93zf_202gxfpxxd9 //

Science and the Environment
//Weather Forecasting// []

The high-resolution Weather Research and Forecasting model (WRF) is the first model to serve as both the backbone of the nation's public weather forecasts and a tool for cutting-edge weather research.* Errors in nighttime temperature and humidity across the eastern United States are cut by more than 50%.* The model depicts flight-level winds in the subtropics that are stronger and more realistic, thus leading to improved turbulence guidance for aircraft.* The model outperformed its predecessor in more than 70% of the situations studied by AFWA.* WRF incorporates data from satellites, radars, and a wide range of other tools with greater ease than earlier models.

//**Computer forecasting:**// Forecasters take their observations and plug the numbers into complicated equations. Several ultra-high-speed computers run these various equations to make computer "models" which give a forecast for the next several days. Often, different equations produce different results, so meteorologists must always use the other forecasting methods along with this one. That's why when it comes to forecasting, machines can't do it alone; you always need humans involved. Using all the above methods, forecasters come up with their "best guess" as to what weather conditions will be over the next few days. · **Weather satellites ** help meteorologists predict the weather or see what's happening at the moment. Typical weather satellites include the TIROS, COSMOS and GOES satellites. The satellites generally contain cameras that can return photos of Earth's weather, either from fixed geostationary positions or from polar orbits. [] · Weather Channel Interactive has announced a partnership with MySpace that will provide MySpace users with [|weather forecasts]on the main site and their personal pages. This would make it more convenient for people to plan their days ahead of time when they can easily see weather forecast on a social networking site. Read More [] · For the Beijing 2009 summer Olympics, the Beijing weather bureau purchased an IBM supercomputer to help forecast rain and pollution during the games. It cost several million dollars. This would help to plan the game schedules according the weather reports, so outdoor events would not be surprised by any weather changes. [] · EXAMPLES à  Weather Applications- Weather Pro on Apple’s iPhone, connected to the Germany’s Meteo group online and is supplied with data from it for 24 hours. [] · <span style="color: black; font-family: 'Calibri','sans-serif'; font-size: 10pt; line-height: 115%;">Weather forecasting has improved due to the development of forecasting software that enables supercomputers to peer into the future with the help of computer models that show a particular weather system is likely to act · <span style="font-family: 'Calibri','sans-serif'; font-size: 10pt; line-height: 115%;">NDBC (National Data Buoy Center) à <span style="color: black; font-family: 'Calibri','sans-serif'; font-size: 10pt; line-height: 115%;"> The National Data Buoy Center (NDBC) is an agency within the National Weather Service (NWS) of the National Oceanic and Atmospheric Administration (NOAA). NDBC's technology development is ongoing. Coollects envrinomental data through buoys in the ocean. It strives to add new capabilities, improve performance, contain costs, and increase system effectiveness. New sensors and systems can be tested and evaluated in NDBC's automated environmental laboratory complex, which includes a state-of-the-art wind tunnel and large temperature chamber. NDBC subjects new and rebuilt sensors to extensive field testing before installation on remote stations to ensure they will operate properly. Real-time data are available for the last 45 days (at least the last 24 hours for non-NDBC stations) in tabular form (better for use with spreadsheets, graphics programs etc.). · <span style="font-family: 'Calibri','sans-serif'; font-size: 10pt; line-height: 115%;">Accuweather is a world wide weather forecaster located in the United States, CNN gets their forecast from Accuweather which gets their weather data through analogue data from buoys, temperature, etc…

1270775444

Health
//Diagnostic and therapeutic tools:// **Robotic surgery:** The following article states, how there’s an increase in the use of robots for surgeries, where the doctors are working a robot’s arms with remote controls. It also mentions some of the advantages (reach places human hands can’t, shorter hospital stays, lower transfusion rates and fewer respiratory and surgical complications). However it also mentioned some disadvantages (about $1,500 to $2,000 more per patient, takes twice as long as traditional surgery). [] By using an 3D image, which illuminates the viewfinder, a doctor can use a joystick to control a pair of robotic arms. An example can be Dr. Nikhil Shah, who’s performing cancer surgery by this method.<span class="wiki_link"> [] and [] Explaining the principles of “da Vinci surgical system”, which is designed to facilitate complex surgery using a minimally invasive approach. [] i-Limb is a bionic hand with independently moving fingers, containing a computer chip. The following article gives an example of a Iraq veteran using this prosthetic device. [] C-leg is another example of a prosthetic device using microprocessor-controlled knees, which the user is able to speed up, slow down, take on hills etc. [] Several devices today are used for diagnosing and observing patients. An example can be Corventis, which has cardiovascular device solutions which has proprietary algorithms, wireless capabilities and continuous service to support healthcare providers. Example of two devices could be PiiX and zLink. [] Another example could be portable ultra scanners, eg. vScan machine. However the images aren't as good as those produced by traditional ultrasound. [] Furthermore Computer-Aided Detection (CAD) is the use of computers to bring suspicious areas on a mammogram to the radiologists attention. An example of a device that uses CAD could be “ImageChecker”, which scans the mammogram with a laser beam and converts it into a digital signal that is processed by a computer. Suspicious areas can then be highlighted. [] Social and Ethical Issues --> RELIABLITY - people rely on weather reports to plan their day accordingly. - the weather in the morning may not be the same as the weather at night - sensors can't be placed in every area in the world. thus placed in major cities. Weather may not be the same in towns surrounding the city - misintepretation of data/ error in computer simulation - weather changed can come in shocks --> example Tsunami Sri Lanka - not alerted.
 * Prosthetic devices:**
 * Diagnostic software:**
 * Therapeutic devices:** An example of a device used to monitor diabetes patients and their glucose leves, Continuous Glucose Monitoring (CGM) [] [] Article about the iShoe, preventing elder people from falling, and thus helps their balance, by using digital sensors to track a person’s balance patterns.
 * Drug Development and marketing:** Article about how people more often seek health information on the Internet. Often the information is unreliable, and in connection with drug development and marketing the article also states the fact that drug companies sometimes changes information on pages such as Wikipedia, to make their drug look better. []

Equality of Access --> Developing countries may not have the finance or the technology to purchase simulations or super computers to forecast weather. - short of the luxury of knowing the weather beforehand. 1271242629

=What Exams Haven't Asked= · environmental issues related to the disposal of obsolete hardware and computer supplies • health issues and ergonomics related to the use of hardware //• increase in teleworking and the virtual office //
 * 2.1.1 Systems fundamentals **

//privacy of information in different cultures// • social consequences of outdated or incorrect data stored in databases
 * 2.2.2 Databases and spreadsheets **

• effects of DTP on the right to publish, for example, freedom of the press, free exchange of ideas • ergonomics/health impacts of word processing and DTP in the workplace
 * 2.2.4 Images, sound and presentations **
 * · ** use of virtual actors in films

• social impact of reliance on simulations to examine issues of public policy //• ethical considerations involved in deciding when to use models or simulations to ensure human safety. //
 * 2.2.5 Modelling and simulations **

· the need for IT companies to consider global and cultural diversity when preparing training and tutorial software
 * 2.2.6 Tutorials, training and wizards (assistants) **

//• social impact of dependence on the Internet // • social impact of the domination of English as the main web language • ethical considerations of IT-rich versus IT-poor nations as a result of differing access
 * 2.3 Communication systems **

• effect on the environment of personal communications devices // · social impact and ethical considerations of: distance learning, digital entertainment, global media and public information systems. //
 * 2.3.2 Personal and public communications **


 * 2.4 Integrated systems **

· social impact of human interaction with robots, for example, artificial pets, robots for the disabled and elderly · reliability of robotic devices, particularly in life-threatening situations.
 * 2.4.1 Robotics **

· ethical issues related to military applications of AI, for example, smart weapons, reconnaissance, decision making · · responsibility for the performance of an expert system—knowledge engineer, informant, programmer, company that sold it, the buyer/consumer
 * 2.4.2 Artificial intelligence and expert systems **

• Transportation: reservation systems, luggage processing, navigation, scheduling and distribution, traffic simulation, smart roads and cars, fuel efficiency and traffic safety systems
 * Area's of Impact:**
 * 3.1 Business and employment**

• School library systems: catalogues, security systems, online research • Modification of hardware and software for special needs: voice recognition software, text-to-speech, special input and output devices, Internet resources //• Telelearning: isolated and remote areas; use in hospitals, prisons, retirement homes//
 * 3.2 Education**

• Diagnostic and therapeutic tools: robotic surgery, prosthetic devices, diagnostic software, drug development and marketing
 * 3.3 Health**

• Toys and games: CD or online games, online gambling //• Film: digital actor simulations, characters and animation//
 * 3.4 Arts, entertainment and leisure**

//• Forecasting//
 * 3.5 Science and the environment**

//• Political process: voting and elections, lobbying, open government and free movement of information// • Rebel and terrorist use of IT
 * 3.6 Politics and government**