Page 151 - Trust in ICT 2017
P. 151

Trust in ICT                                                2


            However, open data also raises some concerns. The potential threat to privacy is probably the foremost risk.
            There is no personal data to be shared with any third party. However, it is questionable whether this can be
            achieved by the use of multiple sources of data which can be combined to yield information about individuals.
            Risks on Internet and digital technologies

            Digital communication has a number of specific characteristics that make it so popular. Digital media are
            primarily characterized by an exceptional ease of receiving and sending messages. A message sent by e-mail
            or in the form of short message service (SMS) is received almost instantaneously regardless of geographic
            distance. Experts warn that specific characteristics of digital communication entail risks that may easily be
            overlooked  or  be  underestimated  and  that  affect  young  people  in  particular.  The  Internet  and  digital
            technologies can enable some authorities to monitor telephone conversations, to close down a website, to
            ban  the  illegal  use  of  a  radio  frequency  or  even  to  filter  out  specific  flows  of  spams  or  advertisement
            messages. The access of a large number of users to information resources is full of promise, but it can also
            cause  irreparable  damage  and  create  unpredictable  dangers.  The  growth  of  knowledge  societies  might
            precisely be one of the most effective means to reduce risks.
            As far as technological hazards are concerned, the man-machine system has always proved unpredictable
            and fallible, whereas the nature of the system is to function normally. The drawbacks and risks in the system
            may be passed off while the inescapable failure down takes place. The network development gives increasing
            importance to knowledge. It relies on technological dependency which accentuates risks and threats. Misuse
            of  knowledge  can  be  utilized  by  terrorists.  The  potential  consequences  of  misuse  of  knowledge  may
            accelerate terrorist activities. Scientists and engineers have a duty to protect the public safety from those
            hazards.

            Greater openness, combined with hiding one's real identity and impersonating a false one, increases the risks
            of people making contacts with malicious individuals and becoming victims of deception. In more extreme
            cases, young people may fall prey to "sexual predators", become members of cults, be exposed to dangerous
            ideologies, and start gambling or carrying out illegal activities, etc. With all emerging technologies, there are
            potentials for misuse. Risks associated with user interactive actions include cyberbullying and abuse by online
            predators.  They  also  include  identity  theft  and  exposure  to  inappropriate  contents  including  self-harm,
            racism, and adult pornography, etc. The risks to children and young people watching video games may be
            subject to be reviewed by governments. In order to understand the potential risks and encourage safe and
            responsible use of the Internet, there are crucial steps of risk management to be taken to keep children and
            young people safe online. The ICT experts may develop the safeguarding processes and relevant technologies
            to protect children and young people.
            Security and privacy on cloud computing

            Cloud computing poses privacy concerns because the service providers can access the data that is on the
            cloud at any time. It could accidentally or deliberately alter or even delete some portions of the data. Many
            cloud providers can share data and information with third parties while a requisite for the purposes of law
            and order should be needed. This should be permitted in privacy policies that users have to agree to before
            they start using the cloud services. Solutions to privacy include policy and legislation as well as end users'
            choices for how the data is stored. Users can encrypt data that is processed or stored within the cloud to
            prevent unauthorized access. There is the risk that end users do not understand the issues involved when
            signing on to a cloud service (for example, persons sometimes do not read the many pages of the terms of
            service agreement, and just click "Accept" without reading).

            In a cloud computing platform being shared by different users, there may be a possibility that information
            belonging to different copyright owners resides on the same data server. Therefore, information leakage may
            arise by mistake when information belonging to one customer is given to others. Additionally, hackers are
            spending substantial times and efforts looking for ways to penetrate the cloud. There are some real Achilles'
            heels in the cloud computing infrastructure that are making big holes for bad guys to get into. Because data
            from hundreds or thousands of companies can be stored on large cloud servers, hackers can theoretically
            gain control of a huge database of information through a single attack.




                                                                                                         143
   146   147   148   149   150   151   152   153   154   155   156