Sunday, June 22, 2008

Reflection on 3 scientific paper

THE IMPACT OF SHARED INFORMATION TECHNOLOGY ON ARCHEOLOGICAL SCIENTIFIC RESEARCH


From the title alone “The Impact of Shared Information Technology on
Archeological Scientific Research” we can already know what the study is all about. It basically explained the effect of Information Technology in Archeology. Archeology without IT is not that wide since archeological information are limited only for those who have a copy of it either a book or any printed out documents. Furthermore, limited numbers of pages are printed due to a very expensive printing cost during that time. The only advantage of the traditional way of gathering archeological information is its reliability.

Applying Information Technology in Archeology offers so many advantages. The internet is capable to transmit and transfer large amount of data, making it available to possible user anytime at anywhere. The internet will be a very legitimate resource of information since it offers no limitations in providing that information. But the question in data reliability arise, since archeological information can easily be altered and edited by any user who have been granted an access to that information once it has been shared in the internet.

Reference:
Hermon, Sorin

Ben Gurion University of the Negev, Beer-Sheva, Israel
sorinh@bgumail.bgu.ac.il
Franco Niccolucci
University of Florence, Italy
niccolucci@unifi.it



TECHNOLOGICALLY ENABLED CRIME: SHIFTING PARADIGMS FOR THE YEAR 2000

This study is all about the effect of viruses and other malicious files to our computer and computer system. These viruses are intentionally designed and created for a very particular reason which is to destroy one application or the entire computer system. The present technologies offer all means in transmitting viruses from one computer to another via virus exchange network. This is that causes the creation of so many viruses.
The harm caused by these viruses is measured through its ability to replicate and how it can be passed from one computer to other computer. To avoid our system to more destructive capabilities of viruses, early detection is still the better way. Computer user has a responsibility to protect the computer from these viruses by being able to detect and identify it in early age, to get rid from most harsh to happen in our computer system.
The spread of these viruses is still depend on the ethical aspects in which the primary factor to influenced it even if we say that availability of all resources in transmitting viruses is accessible to anyone. Thus, laws and ethical considerations are still a solution to minimize this unethical act.
Reference:
Sarah Gordon
sgordon@low-level.format.com



AN UNDETECTABLE COMPUTER VIRUS

As a computer user it is our responsibility to protect our computer from viruses and malicious files. One better way to protect our computer system is the ability to detect the virus from its early stage. There are already several detection algorithms available to used for early detection and identifying of viruses. But there is really a case that there’s no way to detect a particular virus that said to have no error-free detection algorithm exist. This might be very harmful for our computer system since this undetectable viruses are free to enter and able to destroy our computer system.
Its sad to know that there's such virus as undetectable virus, but still as a computer user we can think an alternative on how to avoid that undetectable virus to enter to our computer.


Reference:
David M. Chess and Steve R. White

IBM Thomas J. Watson Research Center
Hawthorne, New York, USA
chess@us.ibm.com, srwhite@us.ibm.comR

0 comments: