Sunday, 24 February 2013

Civil Rights


With the creation of the internet, many aspects of real life were changed as these aspects were also made possible on the internet. One example of this would be online E-commerce. However, for online services such as E-commerce to work, customers needed to provide their personal details. This then led to many issues such as covert data and the misuse of data. The response to this problem was various laws and acts including the Data Protection Act 1998.


Data Protection Act

The Data Protection Act was based around the civil rights of users online and because of this, the act only concerns personal data and not business data. However, the act doesn't just cover online data but also paper based data*. As part of the civil rights of the users, companies are held responsible for the data of all their customers/users and therefore have to follow eight separate principles of the Data Protection Act:

  1. Personal data can only be processed fairly and legally
  2. Personal data can only be obtained for legal reasons
  3. Personal data must remain adequate and relevant
  4. Personal data must always remain accurate according to the user
  5. Personal data must not be kept any longer than necessary
  6. The user has the right to see their personal data held and also to correct or remove any incorrect data held
  7. Personal data must remain secure
  8. Personal data must not be transferred outside the country unless adequate protection of that data can be guaranteed


 As well as these principles, companies must also inform an information commissioner about:

  1. Any data they wish to store
  2. The uses for that data
  3. How long the data is to be kept for
  4. Who they may pass that data onto


The customer’s civil rights are important to the act as the sixth principle focuses on the civil rights that apply to that customer. In terms of the Data Protection Act, the customer has the right to:

  1. View their personal data held by the company
  2. Change any incorrect data held
  3. Remove their personal data held, if it is causing distress to them
  4. Refuse their personal data being given out to direct marketing (junk mailing) companies
  5. Inform the Data Protection Commission if the company holding their data has broken one of the principles of the Data Protection Act
  6. Claim compensation if the company has been proven to break one of the principles


 However, the principles of the act do not apply in situations such as these:

  1. National Security is under threat
  2. A police investigation is taking place
  3. Examination results are yet to be published by the examining body


Examples of Privacy Issues

Because the Data Protection Act keeps the personal data of customers private, data protection is often associated with privacy. The information age has also seen various issues concerning the privacy of people today.

One example of these issues would be the use of CCTV. While CCTV cameras are very effective at finding crime and offenders, some say that CCTV causes privacy issues. Some would also say that too much CCTV means that people are constantly being ‘watched’ and therefore, they have little or no privacy. However, others would argue that CCTV is necessary for keeping the public safe from crime.





Concerns over privacy issues have been raised since the police have increased the number of CCTV cameras









Another example of privacy issues in the world today would be the uses of number plate recognition. Like the use of CCTV, number plate recognition is also very effective at catching criminals and fining those speeding. However, some would say that number plate recognition also watches drivers constantly and therefore give them no privacy. Some also say that number plate data is passed on for other purposes. Despite this, number plate recognition is also necessary for keeping roads safe.

As a popular website, Twitter has also been associated with privacy issues online. The use of slander and libel on the website are one example of privacy issues concerning Twitter. As Twitter is a microblogging website, it is easy for slander and libel to be effective towards the victim. This is why there have been many slander/libel cases on Twitter with one example being the Love/Simorangkir case.







Websites such as Facebook are also effected by slander and libel







*Before the use of electronic storage such as computers, data was recorded on paper and stored in filing cabinets.

Crime Prevention


The information age has also had an effect on policing and crime prevention. The police have taken advantage of the computer and its abilities to help identify criminals and offences easier. This forms one main aspect of crime prevention. However, the other aspect involves cybercrime, a whole range of crime that was made possible with the popularity of the computer in the world today.


Police Database work

Database work involving computers is one aspect of crime prevention. Much of this database work is done using a national crime computer. A crime computer is a police database that holds information about committed crimes such as stolen vehicles and property. This can be useful as any piece of data can be retrieved to help solve a police investigation (the investigation can be linked to criminals who have committed similar offences before as a national crime computer contains this data).

The E-FIT (Electronic Facial Identification Technique) is another method of criminal identification that began in the 1980’s. Because of the E-FIT, police can create an electronic image of the face of a wanted criminal from information given by eyewitnesses. The E-FIT can also be shown to the public to help track down the criminal.




The TV programme Crimewatch shows E-fits and other types of evidence to the viewers. A phone number is available should anyone be able to provide the police with any extra information





Although computers are an advantage to identifying and tracking criminals, they are also used as a form of communication between different police forces. The information age has meant that local or international police forces can communication between each other. This can also prove useful as criminals can be on the run to different areas after committing a crime. However, if police communication is successfully used, then that criminal can be tracked wherever they are.

The information age has also had an effect on the equipment the police carry. Examples of police equipment include batons, air wave radios and handcuffs.  Among this equipment used by police, the Personal Digital Assistant (PDA) is one example of this effect. The PDA is a mobile computer device which is similar to the average smartphone. Like ordinary smartphones, a PDA can make phone calls, connect to the internet and also features touchscreen technology. Overall, the information age has had an effect on the advance in police equipment technology.

Tagging is also a method used by the police to track criminals as well as stolen items. One example of criminal tagging would be the use of an ankle monitor. This involves a monitor attached to the offender’s ankle. The monitor then alerts the police if the offender is ‘trespassing’ in a certain area (such as the home of a past victim). This then allows the police to take any further action towards to the criminal.

Stolen products can also be tracked by a serial number unique to the product. When a stolen product has been found, the police can use the serial number to find out more about the product such as where it was stolen from. The method of tracking can be used for many different types of products such as cars. In this case, the police can use the number plate of the car and a number plate database to track the stolen car and then take further action. This is another aspect of crime prevention in the information age.

Microchipping is similar to human tagging except microchips can also be used for animals. For humans, the process of microchipping involves implanting a circuit device (microchip) into the body. The microchip contains information such as ID and medical details which can be located on a microchip database.

However, police mainly use microchipping for the tracking of stolen animals. Cats, dogs and horses for example can also have a microchip implanted into their bodies. Like human microchipping, an animal microchip contains a unique ID number but also contain owner details as well. If a stolen animal was to be found, the police or animal carers (veterinaries or animal shelters) can use the microchip information to locate the owner of the animal and therefore return them.






Dogs are one example of a commonly microchipped animal










Although various types of car crime are a significant problem for the police, the information age has mean that computers can be used to the advantage of the police in terms of car crime. One example of this would include number plate recognition. Also linked in with the national crime computer database, number plate recognition can be used to identify certain cars in the case of car crime. An example of this would be identifying the number plate of a stolen car. The police can use the recognised number plate to track that specific car.

Number plate recognition is also used for other reasons. This would include the use of speed cameras. Speed cameras use number plate recognition to identify cars breaking the speed limit. The number plate of the speeding car is identified and police then take further action towards the driver and/or the car.

Police can also use databases to monitor car data. Examples of this include tax, car insurance and MOT. The police can use this database to track the payments made towards tax, insurance and MOT. Using this database and the national crime computer, police can fine those who don’t pay these taxes.

Forensics is a major area of police work that has been affected by the information age. Today, forensic police use advanced technology that helps towards finding those responsible. One examples of this advanced technology includes forensic equipment such as electron microscopes. Using this technology allows forensic scientists and police to discover evidence against the criminal responsible.






An example of forensic police investigation a crime scene






Cybercrime

However, the use of computers in the world today has created a new aspect of crime known as cybercrime. One common example of cybercrime is the theft of data using computers. This involves editing or deleting data (usually done through the use of a removable data storage device) without permission of the owner. The theft of data is common among employees in a business as they can easily access the company data and use it to their advantage. Because of this, many users and businesses use firewalls and other types of computer security systems to avoid the threat of data theft.

Another form of data theft would be hacking. This involves identifying the weaknesses of a computer security system and then using those weaknesses to pass the system itself. At this point, the hacker can access data, money and other important information about a business. However, some people hack computers for reasons other than data or money. Some hackers like to test the strength of security systems while some hack into computers just for the achievement of doing so.

Money can also be stolen through computers in other ways and is another common form of cybercrime. Identity theft is an example of cybercrime that allows offenders to take money from victim’s accounts. This is done by using information such as a victim’s name, ID or credit card details to impersonate the victim. The offender can then use these details to commit crimes such as taking the victim’s money from their account. Not only is the victim stolen from but he/she can also be held ‘responsible’ the offender’s actions or crimes.











A pie chart showing the proportions of different types of identity theft crimes









There are also a number of methods to gaining the personal details of victims. One of these methods includes online scamming. This involves a scammer who seems to be a legit user. Therefore he/she attracts victims and tricks them into giving away their personal details. Using these details, the scammer can then access the victim’s money or trick them into giving it away.

One common form of scamming includes phishing. The scammer is still trying to get hold of the user’s personal details except this time, the scammer asks for the details using forms of electronic communication (mainly E-mail). Phishing can trick many victims as the form of phishing used looks realistic and legit. If a user gives their details away to the E-mail or website, the scammer can then use the details for their advantage.

One common form of phishing would be the use of fake websites. The fake website is run by the scammer and is used to collect the details of victims that believe the website is actually real. Some real websites and companies can also be copied so that the user further believes in the website’s legitimacy. Malware infected websites are also used by scammers to find out the details of the victims.

Illegal downloading of online material is one of the most common forms of cybercrime today. The reason for this is that the crime is not treated as seriously as other cybercrimes such as identity theft. The process of illegal downloading involves downloading material such as music and movie illegally. This mainly causes problems as legal sales of music and movies (for example) fall and therefore resulting in a loss for some companies. Because of this, piracy laws have been toughened, public awareness has risen and more action has been taken against illegal sites.










A screenshot of a news article about Sony’s plans to prevent pirated console games. Other companies such as Apple also block access to pirated material









Another form of cybercrime is the issues of copyright. The idea of copyright protects a user’s work from being copied without credit. However, there are a number of copyright issues on the internet. One of these issues includes plagiarism, which involves copying someone else’s work whilst claiming it as your own. Despite the number of copyright issues online, various actions have been taken against them. One example of this is the plagiarism checker, which finds copied material between two sources.

Sunday, 3 February 2013

Entertainment part 2


(Note: this post about entertainment concerns life in the information age. My other post shows entertainment as an online service).

The information age has also seen the increase in popularity and use of entertainment that is offline as well as online. Today, offline entertainment still remains popular with examples such as television, gaming and cinema.


TV programmes

Although the television set has been available from the late 1920’s, the popularity of television rose after the World War II especially in America with 55% of the population owning a television set by 1954. The technology of the television set improved over time with colour television sets appearing during the late 60’s/early 70’s. Today, programmes on TV are still popular with hundreds of programmes and channels available to the user. There are also a number of different genres of programmes such as comedies and documentaries. TV services such as Sky mean that the user can find the exact programmes they want to watch by using features such as search and programme categories.





A Sky box allows television viewers to choose from many programmes and channels






Radio

Radio is another example of a popular form of entertainment available today. Despite this, radio programmes date back to 1897 when Nikola Tesla used radio frequency as a form of commination. Radio programmes became popular during the 1920’s with many channels broadcasting music, news and other forms of entertainment. This high level of popularity lasted until the 1950’s when more people could afford a television set instead. However, people continue to listen to radio programmes and other forms of radio technology developed over the second half of the 20th century. Examples of these other forms include wireless networking and mobile communication. Today, many people listen to the radio as a form of entertainment with music and charts being the most popular form of radio entertainment.






During the 1950’s, the radio was popular and cheaper alternative to a television set







Gaming

Gaming is also another form of offline entertainment with apps and consoles being the most popular today. Gaming apps began with the release of the Iphone in 2007 and of the Apple App Store in the following year. Other companies followed with Blackberry and Nokia launching their app stores in 2009. The downloadable apps were instantly popular with 10 billion being downloaded from Apple App Store as of 2011.

Before online and app gaming, console gaming was a main form of entertainment which is still popular today. Console gaming began in the 70’s with simple games such as Pong. Because of the instant commercial success, more companies, consoles and games appeared during the late 70’s/early 80’s. The 1980’s also saw an increase in gaming popularity after console became more accessible to users. This also introduced rivalry between companies such as Nintendo and SEGA. The 1990’s was an even better decade for console gaming with more consoles being introduced (Examples include the Sony PlayStation and the Nintendo 64). These consoles also introduced discs instead of cartridges and 32bit and 16bit instead of 8bit. Like previous decades, the 2000’s saw further improvements to console gaming. Today, console gaming include online play and despite this, original console gaming still remains popular.







Super Mario Bros remains the most successful video game franchise ever after its creation in 1985







Music

Music is another form of entertainment that is popular with many people today. Listening to music as a form of entertainment began back in 1920’s/30’s with early forms of vinyl and LP records. The record consists of an acetate disc which is coated in vinyl and other metals such as silver. The vinyl records were popular with their users and remain the main choice for music entertainment until the 1980’s when the CD (Compact Disc) was made and sold.

The CD became the first digital form of music entertainment. The digital format meant that there were many advantages to the CD. The compression of music was the main advantage as this allowed many music files to be stored together in mp3 format. Apple experimented with the idea of music compression and this lead to the Apple IPod. The ability to store thousands of songs made the IPod revolutionary for its time. However, the idea of portable music players had already been thought of by Sony with the Walkman. Players such as the Walkman and IPod were mainly responsible for the increased popularity of music entertainment. Music isn’t the only form of entertainment to take advantage of the mp3 format. One example would be E-readers using a similar storage to mp3 to store text files.





The convenience and popularity of the Ipod was one of the main reasons for the success of Apple today








Movies

A popular form of entertainment, movies (or films) began in the late 19th/early 20th century and consisted of a short, unedited clip shot though a certain type of camera. Movies had become especially popular during the late 70’s/early 80’s with the invention of the laserdisc.

The laserdisc was a type of storage disc that allowed users to watch movies at home after their cinema release. However, the idea of using laser technology for watching movies was expensive and many people preferred the VHS system. Because of this, most movies were made into VHS tapes instead. VHS remained popular until the early 2000’s, when the DVD format was widely released.

The DVD was a similar form of storage to the CD, which was based on the laserdisc. However, DVDs and CDs were cheaper than the laserdisc format. Eventually, the MPEG system introduced the ability to compress many movies into MP4 format. This compression was similar to the music compression of the MP3 format. Despite the lower quality, many people used the MP4 system instead of buying DVDs because of the ability to store movies and the convenience of the MP4 format. Today, both DVDs and MP4 are popular for watching movies.


Cinema

A popular form of entertainment and viewing movies, cinema has also been affected by the information age. Like movies, cinema and filmmaking began with the introduction of film cameras. Over time, cinema and filmmaking became more than recording clips with a camera. Computer technology opened the possibilities of making more complex movies which were not possible using a camera only.

Although there have been many uses for CGI, the impact made on cinema is arguably the largest and most significant. Not only did CGI allow the impossible to be done in terms of acting and filming, but it also introduced realistic effects and the option of convenience for filmmakers. For example, CGI may be used for a stunt although it is possible in real life with a stuntman. However, using CGI may be easier in this case.

The idea of 3D film as opposed to 2D film has also been used in cinema. 3D film used to consist of 2 cameras next to each other showing the same film. This would give a ‘layered’ effect to the film. Using filtered film and viewing glasses, the viewer would see the film with a 3D effect. Today, 3D film uses polarised light to improve the 3D viewing experience.







An example of modern 3D glasses without the red/blue filters







Recently, filmmakers have been experimenting with the number of frames per second. Originally, films were made at a rate of 24 fps (frames per second). Therefore, to improve the quality of the overall film, 48 fps can be used instead. ‘The Hobbit’ became the first film to used 48 fps per second after many years of the standard number of 24 frames. The success of ‘The Hobbit’ may mean that more films will use 48 frames in the future.