New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar 035158/UE 141 MMM – Spring 2008 Solving Crimes using Referent.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Part I: Making Good Online Choices
Organizing Your Argument The Argumentative Essay.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. LEARNING LOG What is the difference between laws and ethics? Who comes up with the laws? Who comes up with.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
Debit cards Shumate – 5th Period.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Electronic Health Records Danielle P. Berthelot, RHIA Director, Health Information Management and Cancer Registry Privacy Officer Woman’s Hospital.
Security, Privacy, and Ethics Online Computer Crimes.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.
6 October Impact of Computers (Really). Discussion: Computers in the Arts We’ve seen good and bad androids and robots, programs that take over the world,
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
SHERA USHER RFID in Humans. Brief History of RFID RFID can be traced back to WWII Sir Robert Alexander Watson-Watt developed the first active.
GPS Chips and Implants By: Evan Kelly.
Privacy & Personal Information -- Why do we care or do we?
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
The University of Kansas Medical Center Shadow Experience Training.
The Social Effect of Information System
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
 The issue with guns is them being in the wrong hands.  Gun laws are very strict but not strict enough.  Residents with household weapons are also.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
A PowerPoint Presentation by Helen Chelan Johnson.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Genetic Testing. Testing, Testing… 1,2,3 Genetic testing is most often used to analyze human DNA to determine whether an individual’s genetic makeup indicates.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Biometrics.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
Internet Survival Tips for Kids and Teens
By: Asfa Khan and Huda Mukhtar
WHAT IS MONEY?. Money and Monetary Systems Money is everywhere in the world. All economic activity is linked to money. What is Money? How did it develop.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
My Digital Footprint By Alanya Davignon.
INTERNAL CONTROLS What are they? Why should I care?
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Society & Computers PowerPoint
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
GCSE ICT Social effects of information systems. Is ICT a good thing? Many of the old boring jobs can now be done by a computer, which leaves workers to.
Security of, privacy of and access to personal/confidential information/data.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
The Data Protection Act 1998
The Data Protection Act 1998
Other Sources of Information
Presentation transcript:

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent Tracking The implanted chip Werner CEUSTERS Center of Excellence in Bioinformatics and Life Sciences Ontology Research Group University at Buffalo, NY, USA

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Assignment three reasons why it would be a good idea, and three reasons why it would be a bad idea to have each human at birth being implanted with a chip that would identify him/her uniquely and that is readable by sensors within a distance of 35 feet.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U RFID Identification Is Only Skin Deep It seems a week doesn't go by without a news story reporting on some aspect of RFID as if it was a newly-discovered technology—when in fact its origins date back to the 1940s. What is getting everyone's attention these days is how this well-engineered technology is being paired with modern computing and communication technologies to create applications for RFID that were—until just recently—unimagined. One such application is the use of an implantable RFID format for identification and medical information access in people. Scott Silverman, Chairman and CEO, Applied Digital Solutions

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response overview Rar1/29 (Ar)1/15 Ew1/15 (ja)1/14 Bhy1/11 Lt1/22

New York State Center of Excellence in Bioinformatics & Life Sciences R T U The good reasons Finding/tracking individual persons Better access to data Crime prevention Direct identification

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Finding/tracking individual persons everyone can always be traced even if they are lost, kidnapped etc. (rar) it could become a homing beacon for kids and adults who have been kidnapped or are lost for search teams (bhy) it would help in the arrest of criminals and terrorists (rar) find missing people (ra) government or law enforcement can ID suspects at a distance and without being spotted (ew) unlike security cameras that only show you a persons whereabouts, these chips can alert when a person leaves or approaches a certain area (ja) if they were to commit a crime it would be easy to find them (lt) they couldn't just change their appearance and hide from authorities, they would be found (lt)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Better access to data patient identification in hospitals to have more reliable access to critical data (ra) it would help in the arrest of criminals and terrorists (rar) In the case of a medical emergency where the patient would not be able to relay specific medical history information, this could come in handy (ja)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Crime prevention More difficult to commit crimes (ra)? Sense of responsibility so that people do not harm or corrupt the community (rar) Being able to track criminals and other offenders will give people a sense of security in exchange for giving up their privacy (ja)? It could provide security in banks, military bases, and nuclear plants by not allowing certain people into secure areas (bhy) Could aid in the capture and arrest of suspects, felons, and those running away from the law to better keep communities safe (bhy) if they were to commit a crime it would be easy to find them (lt)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Direct identification (No use of fungibility) Reduce the need for carrying passports, birth certificates, ID cards etc. (ew) Quicker and easier identification i.e. reduced lines for international flights, borders checks etc (ew) If they put sensors in airports and on country borders, international travel would be near impossible, or at the very least it would be found out. (lt) ?

New York State Center of Excellence in Bioinformatics & Life Sciences R T U The bad reasons Too costly Privacy loss Health and well-being issues Potential for malfunctioning and abuse Legal issues

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Too costly Economically expensive cause it would be a very tedious and costly job to set up sensors around the world for the system to be efficient (rar) As of now there is not even a nationwide fingerprint database, so for doctors to spend time to try to implant a human chip in every human born may be impossible and can become very costly. (ja) Probably expensive and question of whether or not insurance companies will help pay for the new technology (bhy)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Privacy loss It would invade an individual’s privacy (rar) It would be a huge privacy issue. (lt) This would be an Invasion of Privacy by placing a chip in each human at birth without knowledge of consent. (ja) encroaches on personal freedoms (ra)? Loss of privacy (ra) Government can monitor people without consent (ew) Anyone with the technology can read your personal info (ew) It takes away from the freedom that a person has to go and come as they please and do wherever they want without being tracked by a computer or a sensor (bhy) The people that don't do anything wrong but like to keep their lives private would have a very tough time since they could be detected from 35 feet away, and if they are doing nothing wrong that doesn't seem fair. (lt)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Health and well-being issues The sensory waves and the chips could also have side effects on certain people (rar) It promotes more deeper distrust in individuals in the idea that they have to be electronically monitored (bhy)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Malfunctioning / abuse Abuse of or damage of the chip (ra) Technology can be invented to scramble the sensors and give false readings of information or ID theft (ew) Today many people know how to invade and hack into online databases. If a person was able to hack into this particular database they could retrieve ones credit card information, address, social security number and other personal information that could lead to many problems. (ja)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U  Legal issues They would need to pass a law to implement this, and that would be tough because many people would be against it. (lt)

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Oddities Three reasons why it would be a good idea for babies to be implanted with a chip are: 1.If they were to commit a crime it would be easy to find them. 2.They couldn't just change their appearance and hide from authorities, they would be found. 3.If they put sensors in airports and on country borders, international travel would be near impossible, or at the very least it would be found out.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U New assignment Propose an infrastructure for the implanted chip problem such that there is no privacy issue or loss of freedom without sacrificing any of the benefits stated under ‘good reasons’. Submit by on February 11 at the