meta data for this page
  •  

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
courses:ct60a7000:spring2016:1:nikitavlasov [2016/01/24 22:56]
m7642
courses:ct60a7000:spring2016:1:nikitavlasov [2016/01/24 22:59] (current)
m7642
Line 6: Line 6:
 In this video the lecturer provides quite a meaningful food for the thoughts about people and global digital space relationships. Everybody all over the world unintendedly takes steps into Big Data and ties himself or herself with it. And here lies an issue - how not to be enslaved by it. It can take several forms starting from philosophical questions about lost reality and finishing with business and marketing. Take an example. Every time when someone fills the form or use the client card he or she contributes to the global organization wielding those flows of information and transactions. But where is the extent, the limit of this wielding? In this video the lecturer provides quite a meaningful food for the thoughts about people and global digital space relationships. Everybody all over the world unintendedly takes steps into Big Data and ties himself or herself with it. And here lies an issue - how not to be enslaved by it. It can take several forms starting from philosophical questions about lost reality and finishing with business and marketing. Take an example. Every time when someone fills the form or use the client card he or she contributes to the global organization wielding those flows of information and transactions. But where is the extent, the limit of this wielding?
  
-__**Source 2**__: SUSAN J. HARRINGTON (1989) 'Why People Copy Software and Why People Copy Software and Create Computer Viruses:​Individual Characteristics or Situational ?' ​    +__**Source 2**__: SUSAN J. HARRINGTON (1989) '**Why People Copy Software and Why People Copy Software and Create Computer Viruses:​Individual Characteristics or Situational?​**' ​    
-  * [[Why People Copy Software and Create Computer Viruses- Individual Characteristics or Situational Factors-.pdf]]+  * [[http://​vxheaven.org/​lib/​pdf/​Why%20People%20Copy%20Software%20and%20Create%20Computer%20Viruses:​%20Individual%20Characteristics%20or%20Situational%20Factors%3F.pdf]]
  
 The paper provides deeper look into problem of unethical behaviour in terms of using of software by non-professionals. The division of motivators into individual personal characteristics and situational factors may help companies to protect their developments better from copying and damaging. Moreover it grants us with ability to think critically according to this problem and find better possible solutions with spark of our own point of view. The paper provides deeper look into problem of unethical behaviour in terms of using of software by non-professionals. The division of motivators into individual personal characteristics and situational factors may help companies to protect their developments better from copying and damaging. Moreover it grants us with ability to think critically according to this problem and find better possible solutions with spark of our own point of view.
-__**Source 3**__:​What'​s the future of privacy in a big data world?|PBS NewsHour+ 
 +__**Source 3**__:**What's the future of privacy in a big data world?**|PBS NewsHour 
   * [[https://​www.youtube.com/​watch?​v=t8q3XjoPzdo]]   * [[https://​www.youtube.com/​watch?​v=t8q3XjoPzdo]]
-'​Alright,​ our refridgerators interact with us and maybe with other refridgerators,​ but how to step them interating ​with the strangers?'​ This question from the video ince again raises the question about privacy protection in big data. With almost any device connected to the global net people lose their privae life, that in a certain way can end badly someday. Now it is hot debate about what has to be done to reduce the risks. Is the governments should be aware of it? What else can we lose trying to protect our privacy? Answers to these and more questions could be found in this video.+'​Alright,​ our refridgerators interact with us and maybe with other refridgerators,​ but how to step them interacting ​with the strangers?'​ This question from the video ince again raises the question about privacy protection in big data. With almost any device connected to the global net people lose their privae life, that in a certain way can end badly someday. Now it is hot debate about what has to be done to reduce the risks. Is the governments should be aware of it? What else can we lose trying to protect our privacy? Answers to these and more questions could be found in this video.