Sunday, October 31, 2010

Public Information System 1/11/2010

We have so far looked at some public information systems. Some of them are Mobile phone technologies, videoconferencing technologies, teleconferencing technologies, telecommuting systems and digital television.

Others include traffic control systems, security systems, public transfer information systems

Your task is to get an article or examples on any of the three above. Example is " find out the types of traffic control systems, how do they work, what are their impacts and outline some ethical and social issues related". (20 Mins). Make brief notes

Share your findings to each 20 minutes.

17 comments:

Unknown said...

Security Sytems:

•These are computer systems used in the public domain to ensure that the security of a community is not infringed by violators.

•The cameras are placed in public areas like street cameras and highway cameras

•Others such as Interpol- global police force technology that enables criminals to be captured when they attempt to seek asylum in another country.

Unknown said...

I was researching on traffic control systems on air. so i thought about the question
Q: How do pilots communicate with air traffic control when flying over the ocean? what traffic contol devices and systems do they use??
A: Domestically, pilots communicate using VHF (Very High Frequency) radios, but they don't work over long distances. Over the ocean, we use HF (High Frequency) radios for verbal communications. But many pilots communicate in writing via Controller Pilot Data Link Communications (CPDLC), a sort of satellite "e-mail" between the cockpit crew, air traffic control and the airlines'.
Pilots also can use verbal satellite communications if necessary (when installed) but this is mostly for backup in the event of failure of other methods of communication.
A feature called Select Call (SELCAL) removes the necessity for pilots to maintain a listening watch on HF and to tune in only when necessary. It enables air traffic control to send a signal to the airplane that alerts the pilots to incoming communication. The pilots then initiate a call on HF to the appropriate facility.
Once out over the ocean or other remote areas where VHF is no longer being used to communicate with air traffic control, pilots switch to maintain a listening watch on a specified VHF air-to-air frequency so we can speak to each other should the need arise. For instance, if we're in turbulence, we can ask around and see if there is a smoother altitude. Before we change altitudes, however, of course we need to get clearance through whatever oceanic air traffic control center with which we're in contact.

Tasin said...

When looking at security systems, there are many classifications. Such as infrastructure security, IT security, Hospital Security etc.

However types of security systems include:

1)Biometric Security Systems:
- Face recogniction
- Voice
-Retina
-Iris
-Fingerprint
- Hand geometry

2) Acoustic Sensor. Usually placed near windows and doors.

3) Sensors- Include Infrared to detect heat signals,
and motion to show movement.

4)Wireless security Systems as well.

Unknown said...

The use of CCTV camera's in the United Kingdom(from an article by Security Technology News Articles called 'CCTV Use & Abuse')

-it is a nationwide surveillance system used predominantly in the United Kingdom, especially after the terrorist attacks in the US on Sept 11 2007

-UK residents are generally thankful for the CCTV cameras because crimes like child abduction and terrorism were caught on camera and action was taken

-the image of the 'Big Brother' has developed due to this technology where some people feel as though they are being watched

- To the public a "CCTV system" is the camera mounted on a pole or a wall, watching over them. To a CCTV installer or supplier a "CCTV System" is also the monitors and other control room equipment


-

Unknown said...

Social and Ethical Issues:

•Privacy and anonymity- information on a person is easily accessible to the general public and it becomes more common for people to get stalked. The information present may then be used for a different purpose than that if ensuring security measures.

•Security- criminals are caught more often due to this technological system and therefore crimes do not go unpunished. Furthermore, citizens are given a sense of security and they are then able to go about their lives without the fear of being attacked.

Unknown said...

Social and Ethical Issues:

•Privacy and anonymity- information on a person is easily accessible to the general public and it becomes more common for people to get stalked. The information present may then be used for a different purpose than that if ensuring security measures.

•Security- criminals are caught more often due to this technological system and therefore crimes do not go unpunished. Furthermore, citizens are given a sense of security and they are then able to go about their lives without the fear of being attacked.

Unknown said...

Home Security System:
1.) The Security System Monitors for Intrusion - it uses magnetic contacts installed on window and door frames that are programmed to be in close proximity to the windows and doors at all times, hence they can detect when a window or door is opened. Human presence is detected utilising motion detectors that emit infra-red beams. These beams bounce back around the room to get an approximation of the size of the room. hence if there is a presence in the room the bouncing back beams will have a different pattern. Therefore, an intrusion is detected.
2.) The Security System Sounds an Alarm - an alarm signal is received by the security system's control unit, it generally sounds an alarm. However in some cases there are silent alarms whereby the system's owner or the monitoring company is notified directly.
3.) The Security System Sends a Notification - After the alarm is triggered, the security system's control center notifies either the system's owner or a monitoring company of the alarm status.

Anonymous said...

I have a whole page of stuff, can you guys post your email add's here so I can send it to each of you?
[Or is this too public a place? :p]

Immaculate said...

Public Transfer Information Systems:

are methodologies that businesses, companies, and different types of organization use to post information/ notices to the public. The information is used to the public's advantage, especially the ones invloved in businesses as it will give them advise and certain information on the business that they are persuing and the free information will apply to their use.

*Example of article coming son*

Unknown said...

salima, it is too risky to write our emails on the blog as it is a very public place and anyone can access it.
so just find another way to get our email adds. :)

Rishad said...

SECURITY SYSTEM INCREASES ARRESTS AT UNIVERSITY
Jan 28, 2009 2:44 PM
http://securitysolutions.com/news/security-system-arrests/

Rishad said...

SECURITY SYSTEM INCREASES ARRESTS AT UNIVERSITY
Jan 28, 2009 2:44 PM
http://securitysolutions.com/news/security-system-arrests/

Rishad said...

How do they work?
The system employs the use of digital cameras connected wirelessly to the internet in order to stream live video to the university Police communications centre security central desk.
These cameras can be controlled remotely in order to monitor specific areas or observe surroundings, enabling police to monitor these areas. In addition, the system stores footage for later viewing – this can be crucial when being used as incriminating evidence.
People have been notified of the security system, thus acting as a deterrent for criminal/obscene activities such as theft, drug usage, weapons possession, and enabling police to react to cases where the safety and wellbeing of people on campus is jeopardized.

What are their impacts?
Positive:
- Reduced incidences of theft
- Quicker emergency response
Negative:
- Loss of privacy in public areas and toilets

Outline some ethical and social issues related

Although not everyone will be happy with the idea of 24 hour surveillance, the system has improved the safety and security standards of the campus – at the cost of privacy of individuals in certain places.
Conflict also can arise because of reliability issues: when presenting video footage as incriminating evidence, because with today’s technology – it is very easy to steal another person’s identity by editing the video footage.

Sajni said...
This comment has been removed by the author.
Sajni said...

Traffic control systems
-Each traffic signal performs the same task of regulating whose turn it is to go and who must wait.
1.Types of Traffic control systems (TCS)
-Air TCS
-Road TCs
-Rail TCS
These traffic control systems vary depending on the location and traffic flow and varied objectives.
-Some signal systems, known as fixed time systems, provide the same amount of time to serve each group of users and in the same sequence.
-Other systems respond to the volume of vehicles and pedestrians present at the intersection and provide varying amounts of time to serve these users.
-Some signals operate independently and respond to the traffic demands at that intersection alone, while others operate together in a system so that traffic can be moved with as few stops or as little delay as possible.
Other examples of air TCS include:
• Control Command Center (CCC) - The CCC oversees all air traffic control
• Air route traffic control centers (ARTCC) - Manages traffic within all sectors of its area.
• Air traffic control tower (ATCT) - ATCTs handle all takeoff, landing, and ground traffic.
Read more: http://www.brighthub.com/engineering/electrical/articles/67234.aspx#ixzz145LGP0pr

2.How do they work?
http://science.howstuffworks.com/transport/flight/modern/air-traffic-control.htm - watch the video

Summary – they use radar for services– essentially from an antanea a radio beam is transmitted and bounced of an aircraft and is returned to the radar and is represented on a rador display showing the position and altitude. Many number of controllers used depending on the location of the aircraft.

Read this page for exact details on how it works. http://science.howstuffworks.com/transport/flight/modern/air-traffic-control1.htm
Analysis and Design of the Road Traffic Control System/Introduction - http://en.wikibooks.org/wiki/Analysis_and_Design_of_the_Traffic_Control_System/Introduction

Due to increased air travel, increased pressure has been kept on the Air traffic control systems to handle the nearly 50,000 flights per day. To handle these flights and avoid delays and collisions, the FAA and NASA have developed modern software, upgraded existing host computers and voice communications systems and instituted full-scale GPS (global positioning system) capabilities to help air traffic controllers track and communicate with aircraft.
CAN U IMAGINE WHAT WOULD HAPPEN IF THIS SYSTEM FAILS…
Just a thought - Yes they are many controllers but only the ground controller takes charge of landings and take offs at a particular airports…
Social and Ethical issues ( road TCS and AIR TCS)
Control – too much dependence on the automated traffic control systems, and if it is not reliable and/or fails then people / traffic flow would not be manageable, and would cause great chaos and accidents
Reliabilty – if any of the sensors or devices fail then there are likely chances that there will be safety issues.
Safety – There is ensured safety in terms of accidents and injuries when traffic is controlled, however this safety is imposed to risks when the system fails is hacked or stops working.
Efficiency – there is enhanced efficiency when the a TCS is in place as less time is lost in traffic. Or minimizes delays.

Sajni said...
This comment has been removed by the author.
Sajni said...
This comment has been removed by the author.