Posts

Showing posts from March, 2024

CST Ethics

Image
        1. Activity: Technical analysis – Before the ethical questions can be considered, the students might consider several immediate technical questions that will help inform the discussion on ethical issues. A sample data set or similar technical problem could be used for this analysis. For example:       [ Is it possible to ascertain whether a breach has happened , and data has been accessed? ]   Detecting the Breach: Check for signs that someone might have accessed information they shouldn't have, like unusual activity in system logs or unexpected data transfers.   So, in this situation, if I were investigating a potential breach:   E xamine System Logs: Review system logs for any unusual or irregular activities. Look for login attempts from unfamiliar locations or at odd hours, multiple failed login attempts, or any activities outside the ordinary patterns.   Monitor Data Transfers: Keep an eye on data transfer logs for any unexpected or unusually large data movem

Short Story

  In the not-so-distant future, Jason, a tech-savvy teenager, found himself smitten with a girl named Sarah. "ChatGPT, give me the perfect pick-up line for Sarah," he typed with a sly grin. ChatGPT replied, "How about this one, Jason: 'Is your name Google? Because you have everything I've been searching for.'"       Confident in the AI's wisdom, Jason messaged Sarah with the line. To his delight, she responded positively. The conversation continued, with Jason receiving witty and charming lines from ChatGPT, making him seem like a real smooth talker.       "Hey there, Jason! Your messages have been on fire lately," Sarah complimented.       "Thanks, just trying to keep up with your level of charm," Jason replied, secretly grateful for ChatGPT's assistance .       However, as the days went by, Sarah began to notice that Jason's responses were uncannily polished and lacked the genuine personal touch she appreciated. "