Hidden Dangers Behind the Rapid Advances in Technology; AGENDA It's Brought Us a Brave New World but the Advances in Information Technology Have Also Created Security Problems, Even to Personal Safety, Which Need to Be Tackled, Says Lord Kumar Bhattacharyya, Head of the Warwick Manufacturing Group

The Birmingham Post (England), October 13, 2008 | Go to article overview

Hidden Dangers Behind the Rapid Advances in Technology; AGENDA It's Brought Us a Brave New World but the Advances in Information Technology Have Also Created Security Problems, Even to Personal Safety, Which Need to Be Tackled, Says Lord Kumar Bhattacharyya, Head of the Warwick Manufacturing Group


Byline: Lord Kumar Bhattacharyya

As a society we are becoming increasingly dependent on technology and particularly the internet and communications networks.

We use them at home, at work, throughout commerce and governments across the globe.

Risk is less tangible in cyberspace. People know what it means to lock their front doors, but they do not have the same knowledge when online.

It isn't intuitive; we cannot use the senses upon which we depend in everyday life to help us. For example, a large online gambling company was recently discovered to have had "superusers".

Certain players were able to win large sums of money at poker by knowing the cards their opponents held. Those familiar with card games will recognise that this is a significant advantage.

This only became public knowledge because customers of the company became aware of unusual play by such "superusers".

This triggered an online investigation by members of internet forums and as a result the company concerned has so far repaid some EUR6 million to consumers who lost money at their site. There are some interesting lessons here.

First, the company was incorporated under the jurisdiction of a Canadian Indian tribe, the Kahnawake.

The company was a respected and trusted brand. It was regulated in the same way as its competitors, and consumers' only regulatory remedy was to the Kahnawake gaming commission.

This is not satisfactory to say the least.

Millions were effectively stolen, yet there is no clarity about who benefited, where the money went and no data trail on who lost out. Most remarkably of all, after having announced that their software contained holes that allowed the winning of millions of dollars through underhand means, the sites concerned are still trading and still prospering.

We require a multi-layered approach to addressing these problems. This will involve building technology of higher integrity not pervaded by vulnerabilities to be exploited by those with malicious or criminal intent.

In turn this means we must make security solutions easy to use, not so difficult that users simply turn them off because they are unaware of the protection they offer.

The final step is providing the necessary regulation and checks and balances so we can deter misuse.

One can look at the helpful analogy of the road networks to describe a shared burden of responsibilities. While great responsibility rests with the road users, their safety also relies upon those who design and maintain the road network, with its signs, lights and markings.

Online, I am concerned by the fundamental lack of security education on the part of software and hardware developers, business managers, civil servants and all those that have to interact with digital information.

I believe we need to investigate the programmes developed by the United States.

They have made it a priority to develop centres of national excellence to provide a framework and guidance for students and institutions in information assurance education.

Consider the road example again; we provide awareness campaigns on specific issues and educate principles through driving lessons.

There has been very little work to understand how the internet user comprehends the risk that they are taking and what their actions or inaction can actually mean.

Alongside dealing with the problems of today, now is the time to design in security for the future.

Traditionally, research on e-security has been focused on specific solutions for individual problems which results in individual products for each problem. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Hidden Dangers Behind the Rapid Advances in Technology; AGENDA It's Brought Us a Brave New World but the Advances in Information Technology Have Also Created Security Problems, Even to Personal Safety, Which Need to Be Tackled, Says Lord Kumar Bhattacharyya, Head of the Warwick Manufacturing Group
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.