Monday, November 21, 2011

Chapter 8: Errors, Failures, and Risk

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of FIre
Sections read: 8.1 & 8.2

1. (Knowledge)Tell three interesting elements of this chapter:

a. I couldn’t believe when I read about the sex offenders getting murdered because their addresses were posted online for the world to see, especially in the cases where the person attacked wasn’t actually the offender. (pg. 408)

b. When Baase talked about the problems that happened in voting systems on page 416, and I knew what she was talking about, I thought it was interesting because I felt a sense of connection to the information because I lived through it.

c. I thought learning about the Therac-25 was interesting because my father owns a cancer care treatment center, and they use a machine for radiation treatment similar to the Therac-25. I couldn’t imagine if there was a fatal result what would happen if that occurred at my father’s center. (pg. 425-430)

2. (Comprehension) Summarize what is being discussed within this chapter?

In chapter 8, Baase in the first section explains numerous situations where something has gone wrong because of a technological problem whether it either failed or caused errors. Baase categorizes each problem by the cause, the seriousness of the effects, or the application area. Baase begins by explaining some errors that have happened for individuals. This has included billing errors from businesses or credit agencies, and misread public data. She then gives examples of some failures and errors that have occurred to complete systems. Examples she uses are AT&T losing service for an extended period of time, a system called Warehouse Manager that completely messed up system information for dozens of companies around the United States, the problems in the voting systems, with hard to read ballots, or not properly stored machines, or missing ballots. Problems that have occurred in airports, with delayed opening, and failures in baggage systems, the waste of money on abandoned systems, old systems that won’t be able to be used anymore because they don’t have a “legacy”, and the problems that pilots had in whether or not to trust a completely computer run airplane (pg. 405-424). Section 8.2 focused specifically on a case dealing with a radiation machine called the Therac- 25. This machine was supposed to help patients with cancer get their radiation treatments to help cure them. The machine had bugs and glitches that weren’t tested and would give patients overdoses in radiation, and constantly show errors on the machine screen. This case ended up taking the lives of three people due to radiation overdose (pg. 425-430).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One situation I have personally experienced was one Baase used in a positive light. Automatic interlock brakes when your car is sliding or skidding in the snow. Every single year when the roads are packed with snow I always drive carefully with my snow tires and four wheel drive on. However, that isn’t always enough. Sometimes your car can just hit a patch of black ice and your car goes sliding. Thankfully, my automatic interlock sliding brakes turn on and stop my car from running into another one or causing an accident. I am very thankful for this computerized system in my car and the amount of accidents it has saved me from. I do agree with Baase when she says that this is one piece of technology that has not failed us yet.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Several times a month, my family receives mail in our mailbox that is not for us. It may either be the family that lived here before us, or maybe a neighbor or ours, or someone who we don’t know at all. The error made here is one made by a person that has nothing to do with technology. The mailman has made a mistake in putting the wrong mail in the wrong mailbox. This error in judgment may not be on purpose, but it is still an error. So if sometimes our family does receive the wrong bill because it is completely not ours that would not be an actual billing error like Baase explained in the book that would be a human error in receiving the wrong mail.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within chapter 8 because these technological errors Baase is describing are some things that people have to deal with every day. Whether it is a personal problem, such as an incorrect bill, or a problem that affects more people, such as the plane crashes that occurred due to faulty systems, or the deaths from the Therac-25, we live in a society based on technology. Trying to escape these problems are inevitable, they can only be found and hopefully corrected. I don’t think the answer is trusting technology, I think it is beating it. Finding the problems, or glitches, or bugs, and fixing them before they can do harm to our society.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is definitely relevant in today’s society because as I stated earlier, at least with the Therac-25 case, my father has a radiation treatment machine just like that one in his cancer treatment center. If the same errors were happening in 1985-1987 today, there would be a major problem. The online ethics center for engineering and research saw this case as one with risks and errors made by the program software and the manufacturer’s attitude (http://www.onlineethics.org/Resources/19049/therac25.aspx). The ignorance of the error messages and the low risk assessment’s factored into the death and overdose of radiation for the patients, and they should be held morally responsible for the deaths of those three people. The look of the Therac-25 model is similar to the one used in my father’s treatment center, but thankfully the results for my father have been dramatically different than that of the Therac-25 (http://50quidsoundboy.net/?p=71).




References

http://www.onlineethics.org/Resources/19049/therac25.aspx

http://50quidsoundboy.net/?p=71

Saturday, November 12, 2011

Chapter 6-Part 2: Work

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.4 and 6.5

1. (Knowledge)Tell three interesting elements of this chapter:

a. I learned that embezzlement means, “fraudulent appropriation of property by a person to whom it has been entrusted.” (pg. 332)

b. I couldn’t believe when I read that 47% of retail losses are from retail store employees. I have never stolen anything in my life, let alone from my place of employment. (pg. 337)

c. I didn’t know that some places of employment took such extreme measures to keep track of their employees by using electronic surveillance badges to know their every location. (pg. 337)

2. (Comprehension) Summarize what is being discussed within this chapter?

In section 6.4, Baase discusses embezzlement, fraud and different ways an employee can sabotage their workplace using technology (pg. 332-335). In section 6.5 Baase goes into the different techniques companies use to monitor their employees. Baase explains the three most common issues in the three areas of electronic monitoring; details of performance, location and performance of scattered employees, and e-mail, voice mail, and Web surfing. Throughout these sections, Baase implicates the ethics involved with an employee’s right to privacy and an employer’s protection of property rights (pg. 335-344).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

At my work I have personally experienced my employer monitoring the web activity of employees at the workplace. If an employee tries to go on an unrelated website to work on one of the work computers the web page will not open. My employer has made it so certain websites are restricted access while connected to their internet and at their workplace. As Baase states on page 343, some people may feel this restricted access as an invasion of privacy because then your employer will know what websites you are going on. I agree with those who feel this monitoring is acceptable because going online at your workplace is on their property and on their time they are paying their employees for.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

In chapter 6, Baase talks about retail theft and embezzlement by employees. Not in relation to computers, technology, or the internet, theft by employees at their workplace in general is still a pressing issue today. I have heard from friends at their workplaces who have stolen food if they work at a grocery store, or liquor at a liquor store, or appliances at a home store. None of these thefts have to do with technology directly but are still wrong. On page 334 Baase gives some reasons of why people may do this and I do this that they are related, mostly financial or just because the person wants to get back their boss.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the second part of chapter 6 because employee crime and employee monitoring are issues people still have to deal with today. Employers and employees have always had to deal with these issues because no workplace has ever been perfect. The issues have evolved with the technology, so now that there are new ways to steal from an employer, such as embezzlement, or to monitor your employees, such as looking through their e-mails and websites, the issue has only become more advanced.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe that this topic is relevant in today’s society because if you look at the rising statistics of today’s employee theft you will see the rate is consistently growing. According to The Schulman Center for Compulsive theft, spending, and hoarding, 75% of employees steal from their work and do so repeatedly, 30% of corporate bankruptcies resulted from employee theft, and 60% of inventory losses were due to employee theft. The FBI believes that employee theft is the fastest growing crime in America (http://www.theshulmancenter.com/facts.htm). These statistics show the seriousness of employee theft is America’s society today. The ethical issue raised by employee monitoring is the crossing the line between an employer protecting their property rights, and an employee protecting their privacy rights (Baase, pg. 342).




References

http://www.theshulmancenter.com/facts.htm

Monday, November 7, 2011

Chapter 6-Part 1: Work

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift Of Fire
Sections read: 6.1, 6.2, 6.3

1. (Knowledge)Tell three interesting elements of this chapter:

a. When I read that between 1993 and 2002, 309.9 million jobs ended, but in the same period of time 327.7 million jobs were added, I wouldn’t know whether or not to think this would be a positive or negative action because of the difference within the jobs. (pg 311)

b. I agree with Baase on page 315 when she states that the new technologically advanced jobs of the 21st century require at least a college degree with job training for a worker to be successful at that job.

c. When Alan Blinder states that 28-42 million jobs have the potential to become off shore jobs it makes me wonder if in the future that will happen and that amount of people will become unemployed in the United States. (page 321)

2. (Comprehension) Summarize what is being discussed within this chapter?

In sections 6.1 and 6.2 of this chapter, Baase begins by describing and listing all of the current and past jobs that have been taken over by technology. Baase explains that with the destruction of millions of jobs, there has been an equal or greater amount of creation of jobs. She gives the reader different explanations such as a countries economy, or social development that have factored into the change of jobs. Offshoring is an important section that explains how companies are taking their business to different countries for cheaper and leaving Americans unemployed. Baase gives both pros and cons and the ethics coincided with offshoring (pgs 308-327). In section 6.3 Baase introduces telecommuting, which is basically a mobile job, whether it be at home or one that can be done from a computer anywhere. She talks about the pros, cons, and restrictions within this business (327-332).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One thing potential employees may find frustrating, but potential employers find helpful is the availability of a potential employees profile on a social networking site. I’ve seen this done personally because my father is the owner of a medical management company and he checks potential employees Facebook’s to see if they are suitable candidates for a job. This issue has become widespread throughout the United States directly affecting whether or not a person may or may not get a job. Some employers are open about using this tactic, which is why that research has shown that 24% of employers have hired a person based on their profile, while 33% have not (http://www.pcworld.com/businesscenter/article/151044/employers_admit_checking_facebook_before_hiring.html).


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Baase consistently saying different examples throughout the chapter of jobs that have been taken over by technology ignited me thinking about certain jobs that don’t have to do with technology and wondering how and if those jobs could ever be taken over. One example would be classical music. I used to play the string bass and piano and there is no way a person can get that same sound of an orchestra by technology without people actually playing their instruments. People then wouldn’t get to enjoy sounds from orchestras such as the Buffalo Philharmonic Orchestra. Another job that I don’t think technology should completely take over is the teaching industry. Too many students learn more effectively from people rather than computers.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because just living my everyday life I can see what is being said affecting me personally. Just this past weekend I had a problem using my debit card out of town and the first number sent me to a machine operator, and the second to a foreign person. Whether or not that person was in a different country is unknown but that supports what Baase was talking about with businesses offshoring. It is obvious for people to see how technology is changing the future of the job market and business sector.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I absolutely think all topics within this chapter are relevant in today’s society. People can look right in front of them or in the newspaper, or on the television and see the changing market within today’s business economy. It is clear to know that the rate of unemployment is an issue that has been fluctuating for the past ten years now because of the recession within this country which has affected almost each individual person.



References

http://www.pcworld.com/businesscenter/article/151044/employers_admit_checking_facebook_before_hiring.html

Sunday, October 23, 2011

Chapter 5: Crime

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 5.1-5.3

1. (Knowledge)Tell three interesting elements of this chapter:

a. On page 253 Baase states that, “the average loss from a computer fraud is more than $100, 000,” and I thought with the amount of news I hear about the number would be much larger including white collar crimes.

b. A sentence Baase wrote that truly made me think was, “We have the freedom to speak but not the right to compel others to listen.” (pg. 264)

c. On page 274 Baase explains that phishing is, “sending millions of emails fishing for information to use to impersonate someone and steal money and goods.”

2. (Comprehension) Summarize what is being discussed within this chapter?

The first part of this chapter goes through the life of hacking and how it started back in the 1960’s as a positive term to what it has been developed to today with its negative light. With each phase of the development there are numerous examples of how hacking has been portrayed and how it has shifted. (pg. 253-263) The next sections are about political hacking which is primarily used to send messages to government agencies of countries, the penalties of young hackers which have included nothing more than probation, community service, financial restitution, or detention and the security measures that go hand in hand with hacking. (pg. 263-273) Lastly, Baase talks about identity theft and credit card fraud and different techniques used by hackers to get and use people’s information (273-282).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A specific example that I have experienced is on my laptop before I’ve clicked an advertisement on the side of a website page and received a virus just from clicking that. The virus that downloaded on my computer was a message that would pop up in a window and every time I clocked exit on the window a new one with the same exact message would pop up. Clearly the advertisement had a virus in it. Baase states on page 261 that, “banner ads can contain viruses.” To get rid of the virus my father had no run an anti-virus software on my computer. Now to help my laptop from not getting any more viruses I have McAfee Security Scan Plus that regularly checks and protects my computer from getting a virus.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

In the chapter Baase talks about hacktivism, or political hacking. This is the use of hacking for a political cause. An example that Baase used was how someone posted a pro-drug message on a U.S. police department antidrug website. (pg. 263) Actions like this remind me of protests in past years, except now people are using the internet and technology to relay their message. In previous years, methods of activism didn’t involve any type of technology. Protestors would have sit-ins, or rally’s, or march’s to convey their political message to the government or whomever they were “speaking” to. A famous example of this type of protest would be Martin Luther King Jr. during the Civil Rights Movement and how he staged speeches and march’s to protest civil rights. Dr. Martin Luther King Jr. devoted his life to speaking out towards civil rights and doing so in a nonviolent way (http://www.mlkonline.net/bio.html)

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with everything that’s being said within this chapter because hacking, whether it isn’t harmful or it is completely devastating, is something that people who live in this day and age have to deal with. Every day in the news you hear about people who have gotten their identity stolen or a major virus that is going around businesses etc., and as this technology keeps changing people have to keep changing the way they deal with it as well. Hackers find new ways so the government has to find new ways to stop them.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is obviously relevant in today’s society because hacking wouldn’t be around if we didn’t have the technology we’ve worked up to in this society. This issue is one that will keep expanding as technology keeps growing, and governments and protection agencies are going to have to find alternative routes of stopping the hacking and potential hacking. They will have to find a way to always be one step ahead of the hackers.

Sunday, October 16, 2011

Chapter 4: Steal This Film II

Your Name Victoria Terhaar Class time: 12 pm

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):

o Is there any way that the founders of The Pirate Bay do make a profit from their website? Are there ads that they collect revenue from?

o If the internet is the same in all countries then why are the laws that countries are supposed to abide by for it different?

o I think the government should take a different approach other than suing The Pirate Bay to try and control them. Possibly try to fight technology with technology?



2. Foundation (UNDERSTANDING):

a. What is the Pirate Bay?

The Pirate Bay is one of the largest peer to peer file sharing websites known throughout the world. On this website a person can download music, movies, games, computer application for free. This website is run from Sweden where it is legal.

b. What do they stand for (what is their mission)?

The mission of The Pirate Bay is to keep available the free and accessible download of movies, music, computer applications and games, and other entertainment to the public. They are set in their beliefs that what they are doing is legal under the Swedish law and other countries shouldn’t be able to interfere with their company.

c. What is their purpose for making and distributing this film as a free download?

Their purpose is to not seem like a hypocrite and have free movies for download on the Pirate Bay website, but not have their movie be a free download. I also think that it helps solidify the Pirate Bay’s argument because they are fine with having their movie available to the public for free which is legal in Sweden anyways.


3. Provide 3 referenced connections to Baase readings (LINKING).

a. The Napster case relates to the film the court ruled that the large scale copying on the website was illegal copyright infringement, not fair use, and that is what the MPAA wanted to sue The Pirate Bay for. (pg. 210)

b. The MGM v. Grokster case deals with the new challenge of copying files among users on the internet without a central service, and that is partly how Bram Cohen’s site BitTorrent works, using a decentralized service to share large files. (pg. 211)

c. I feel that one question that Baase asked in the reading, “Should we ban or restrict software, a technology, a device, or research because it has the potential for illegal use, or should we ban only the illegal uses?” applies to the film because the main issue this film deals with is the illegality of certain websites and their actions. So should the websites be restricted because of what is happening on them, or just what is taking place within the websites? (pg. 215)



4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):

a. Bram Cohen was included in this film because he was the inventor of BitTorent and that is the website where The Pirate Bay gets the shared files from.

b. Dan Glickman was included in this film because he was the chairman of the MPAA and that is the company that was suing The Pirate Bay for copyright infringement.

c. Sebastian Lutgert was included in this film because he is a supporter of pirate cinema and he contributes to the argument backing up the legal downloading of files on the internet.

d. Yochai Benkler of Yale Law School was included in this film because he isn’t biased towards anyone one side of The Pirate Bay, he looks at the arguments from both points of view.

e. Fred Von Lohmann was included in this film because he is an attorney for EFF and he looks at the criminal and civil aspects of the case in a legal matter.



5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):

a) Peter Sunde- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay

b) Fredrik Neij- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay

c) Gottfrid Svartholm- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay



4. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main ideas being discussed within this movie are the fight between old and new ways of distributing information and what should and shouldn’t be illegal and the idea of whether piracy infringes on people’s intellectual property rights. A connection between Baase and this film is with the Fair Use Doctrine, it allows it to in some particular circumstances be alright to use copyrighted material, and in the film it is alright to use copyrighted material in Sweden but not in the United States (pg. 206). Another connection between Baase and the film is that both pieces of work appreciate the history of copyright infringement laws and intellectual property rights because both take time to mention how it is the laws exist today (pg. 203-206).

5. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a new peer to peer file sharing website that allows a person to download large files from different countries and different people. This site makes downloads harder to track to a single user because it allows user to download from each other simultaneously. This technologic advancement has changed society in the way that it has helped people be able to download large files faster by being connected to more people throughout the world at one time.

6. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

I see connection to the main point of this film in my everyday life because I constantly see and hear about people watching movies on the internet, or I hear names of different websites where people are able to download music for free. A specific example would be when I first heard about the website Netflix, and that website has certain movies and television shows a person can watch instantly.

7. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectual Property in the Information Age? ? (ANALYSIS)

I think the future of distribution, production and creativity is that it is going to become even more digitized than it already is. This world is becoming smaller every day and more jobs are being sacrificed to technology and I feel that at least distribution and production industries are going to become completely over the internet because of the convenience and cheapness. The creativity field will become more complex within their work but the actual creative process will stay the same because people love entertainment the way it is. I think there is no future for intellectual property in the information age because illegal downloading and file sharing is taking over the internet at a rapid pace and I feel that the government is going to have to come up with something new to protect people’s work.

8. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

I do feel that downloading legally is not stealing someone’s intellectual property, however if the download is illegal then it is stealing of someone’s intellectual property. This is because what a person may come across and download illegally off of the internet is another person’s work. People like to have control over their work and if it is a form of entertainment, distribute it how they see fit. Downloading illegally means stealing because the person who put time and effort into the thing that is being downloaded isn’t getting credit for their work.

9. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

I think that because technology is always evolving, the governments in the United States and around the world are going to have to find ways to deal with copyright infringement and Intellectual property rights without all the lawsuits that have been happening in recent years. Fifty years from now I can see everything in the entertainment industry being really cheap for its customers because the government is going to have to find a compromise between illegal free downloading and selling their products for too expensive. Maybe the entertainment industry will begin working with the websites they’re trying to get rid of to make an even larger profit instead of suing each other and losing money on both ends,


10. Do you agree with what is being said within the movie? Explain. (EVALUATION)

I somewhat agree with what is being said within this movie because I do believe that there is a history to this issue, that it did begin with the printing of material and people needing to be in control of that information. The founders of The Pirate Bay seem very stuck in their views of keeping their download’s free and I don’t agree with that when the free downloads are available in countries where that is illegal. Illegal actions should be punished in appropriate ways and the raid of The Pirate Bay computers only gave the website more publicity.

11. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching and thinking about this film? (EVALUATION)

My view has not really shifted on this topic after watching this film because I feel that just as technology is evolving, the laws that surround the technology needs to evolve with it. I agree with the fact that copyright infringement and Intellectual Property theft should be illegal because people take time and energy to produce the material and should get compensated for their work. With learning that these actions aren’t illegal in Sweden does open up some ideas about how countries need to work together to find a common ground on how to deal with public file sharing.

Chapter 4: Musicians Look Por Pay In An MP3 World

1. Next, what is the argument made in Laura Sydel's audio segment Musicians Look For Pay In An MP3 World?

The argument made in Laura Sydel’s segment was that if people are downloading their music for free and the entertainment industry isn’t making a profit off of their product, how are the workers within that industry supposed to make a living?

2. How are the ideas expressed in the Sydel segment it different from the Chuck D and Lars Ulrich video?

The ideas expressed in Sydel’s segment were about making a profit and the money involved in copyright infringement, she focused on the economic side of this issue. Chuck D and Lars Ulrich were less concerned with the economic issue and more concerned with the power and control issue. Ulrich kept repeating how the control of the industry was at stake and Chuck D spoke about power going back into the hands of the people.

3. What point does Sydel make that is the same or different than the Chuck D and Lars Ulrich video?

A point made by all three people was that they all know that no one can stop the rapid changing pace of technology, but before it gets out of control, someone needs to figure out a way to control it. A solution needs to be found about how to control the illegal downloading and file sharing but still giving people what they want in convenient, cheap entertainment.

Friday, October 14, 2011

Chapter 4: Chuck D and Lars Ulrich

1. In 1-2 sentences, explain Eric Schmidt's point of view on Intellectual Property.

Eric Schmidt believes that copyright has evolved but for him intellectual property is fundamental and Google at least is critically dependent upon it. He thinks that the world is a better place when the largest number of people can see the most amount of information and pay for it.

2. What is Chuck D's slant on Intellectual property?

Chuck D supported Napster and the free exchange of music because he felt there is an evolving source of technology to share, distribute, and expose music and instead of fighting it he felt people should accept it and the fact that their intellectual property rights will change with the changing technology. One reason he felt this way was because for some artists it was there only source of exposure. A second reason was because when FM radio and the cassette tape first came out people thought negatively about those things and that they were going to hinder the entertainment industry when really they boosted the industry.

3. Explain the reason why might Lars Ulrich express the opinion he has. Base your answer on facts from this chapter.

Lars Ulrich’s opinion of this new technology, Napster, is that since people fall behind evolving technology, they need to set parameters so people don’t lose control of what is happening right in front of them. His debate is that with people’s perception of the internet and what their rights are as a user, they think that they own whatever comes across their screen on their computer. Lars feels that is wrong because of intellectual property rights, the artist etc., is the actual owner and needs to have control over their material. Intellectual property rights are supposed to protect the rights of an artist, in this case, to compensate for what they create and make their work valuable and intangible. Making their work illegally part of the public domain would be a violation of the Fair Use Doctrine.

Chapter 4: Intellectual Property (part 1)

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 4.1, 4.2, 4.3.1, 4.3.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. Intellectual –property protection is the protection of the creative expression of ideas, not the protection of the physical property the ideas are expressed within. (pg. 200)
b. I thought it was interesting that because of piracy issues, the entertainment industry is losing billions of dollars a year. I thought because of websites like Netflix, and iTunes that are flourishing the industry wouldn’t be losing that large of an amount of money. (pg. 202)
c. Because I was only eleven when Napster was issued to be shut down I didn’t know that it was due to illegalities within their business. I found it interesting to learn the actual reason why the program was shut down was because it provided copyright infringing activities. (pg. 211)

2. (Comprehension) Summarize what is being discussed within this chapter?

The first part of chapter four covers what intellectual property is and how it is being affected by changing technology. According to Baase, intellectual property is the intangible creative work, not the particular physical form it comes in, of a book, article, play, song, work of art, software, or movie. Intellectual property is protected by copyrights or patents, and has to keep evolving as technology is evolving (pg. 198-203). There have been court cases working to try and protect people’s intellectual property rights, and from those came the Fair Use Doctrine (pg. 206) and millions of dollars in compensation for h entertainment industry. In section 4.3 Baase talked about issues that concern copying and sharing of digitized entertainment and software and some lawsuits that arose from that issue.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Cheating on a test or copying of another person’s homework or school assignment happens almost every day in a school system. The stealing of another person’s answers on a test, or even one kid willingly giving another kid the answers to his test or homework, could be considered stealing of one’s intellectual property. I’ve seen numerous times since I started middle school children cheating on tests or copying each other’s homework. Because kids are supposed to be coming up with their own answers to teacher’s questions I would consider their answers their own intellectual property.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A specific example of intellectual-property protection in society could be plagiarism within schools, both high school and colleges. Students these days are getting lazier with citing information they use from copyrighted work in their own essays, projects, etc. This use of another person’s creative expression of ideas without citing correctly or at all could be considered stealing of intellectual property or “illegal” and teachers and professors are trying to find successful ways to keep students from doing this. The following link shows how serious of a matter plagiarism is taken at Buffalo State College (http://library.buffalostate.edu/research/plagiarism.php).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because whether a person’s property is a physical, tangible material, or digitized, or intellectual, I do feel a person has the right to their own property and if it is being stolen should be compensated for it. One thing I don’t agree with is the banning of media and devices that make the likelihood of copyright infringement decrease only because that one reason. If a software or device can be useful to people but also has potential for illegal use, it should still be completely run out before choosing whether or not to ban the item (pg. 215).


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe this topic is completely relevant in today’s society because no matter what the situation people always want to get the money for the work they do, and if there is illegal intellectual property stealing, or file sharing or copying then the originator of the material doesn’t get compensated for their work. Therefore, if there is a chance someone can get paid they will take matters to court and sue whoever necessary to get their money, or keep their rights, and to keep that from happening again.

Friday, October 7, 2011

Chapter 3: Questions from Dr. RSM

In your own words define the phrase ‘least restrictive means’ . Why or why not? 2-4 referenced sentences.

In my own words, ‘least restrictive means’ is when the government has control over a medium of communication, but does so by infringing on their First Amendment rights as little as possible. Governments outside the United States are notorious for not using ‘least restrictive means’ and doing whatever they feel is necessary to censor the material being communicated throughout their country (pg., 170). An example of the United States trying to uphold ‘least restrictive means’ on censorship of public material would be deeming acts such as the Communications Decency Act unconstitutional because it infringed on people’s First Amendment rights (pg. 151)

Why is this term important? How does it effect Freedom of Speech. Why or why not? 2-4 referenced sentences.

This term is important because it coincides with a person’s First Amendment rights. ‘Least restrictive means’ should protect a person’s freedom of speech by allowing them to communicate their ideas without interruption from the government unless necessary. Ethical concerns should help keep large companies and individual websites censored enough without restricting rights by people knowing there should be sensitivity towards certain material on the internet. For example, hopefully a person would think twice before posting information on how to commit suicide because they should know it could affect a person negatively (pg. 169).

Do you consider the Internet an appropriate tool for young children? Why or why not? 2-4 referenced sentences.

I do consider the Internet an appropriate tool for young children as long as it is monitored by their parents in the correct way. It is important for children to learn as many different perspectives about as many different topics as possible so they can develop their own opinions and thoughts as they grow older. Having access to the World Wide Web allows them to do that. As long as parents are filtering out the unwanted material, they should trust their children to use the Internet appropriately (pg. 155).

Chapter 3: Questions from Baase p 189

3.1 Briefly explain the differences between common carriers, broadcasters, and publishers with respect to freedom of speech and control of content.

According to Baase (2008), common carriers are only a medium of communication to the masses. Carriers disregard socioeconomic status and are made to provide their service to everyone. The laws of the United States prohibit carriers from controlling the content of the material that passes through their systems and take no responsibility for any illegal content that passes through their system. Examples of common carriers include postage mail and telephone services (pg. 146). In broadcasting mediums such as television or radio, the government has more control over the content they provide to the public. The government controls and regulates the content of material to the public. This poses more restricted First Amendment freedoms than for common carriers because the government can threaten to shut down a station or take away a broadcasting license if they don’t agree with the material (pg. 145-146). Publishers of print media such as newspapers or books have the strongest protected First Amendment freedoms. The only censorship, besides after the content being published, goes through the publisher of the material not the government (pg. 145).

3.2 Describe two methods parents can use to restrict access by their children to inappropriate material on the web.

One method a parent can use to restrict access by their children to inappropriate material on the web is to use software filters to restrict specific categories of websites such as sex or violence. A parent could create their own list of banned websites, or the opposite, a list of websites the child can visit. With this software, a parent can also see a log of the websites a child had previously visited (pg. 155). A second method is for a parent to personally set up an email account for their child and decide the list of addresses that email can accept (pg. 160). A general protection method for parents to use is to put their computer in their living/family room of their house so they can monitor their children’s use of the internet.

3.8 One of the arguments used to justify increased government control of television content is that television is “invasive.” It comes into the home and is more difficult to keep from children. Do you think this argument is strong enough to outweigh the First Amendment? Give reasons. Is this argument more valid for the Internet than for television, or less valid for the Internet than for television? Give reasons.

I do believe the argument is strong enough to outweigh the First Amendment rights. With television being a popular form of communication of education, violence, morals, and shaping the thoughts of children all over the United States, I feel that someone has to send the right message to those children who are the future of our country. As long as the government has a checks and balances system to make sure all viewpoints of appropriate material is shown, it should be able to infringe on the broadcasting industries First Amendment rights. I believe this argument is more valid for the Internet than television because for a person to be on television they have to have some sense of what is appropriate for people to see and are most likely censored by their broadcasting station, as well as the government. For a person to put inappropriate material on the Internet they don’t need to have their ideas or material examined by a higher up, the material goes straight to the Internet and can be done by any person at any time. This is why the government needs to step in and control the content of material visible to children, whether or not in may outweigh a person’s First Amendment rights.

Chapter 3: Freedom of Speech

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. While reading about protection of First Amendment rights, I thought the “chilling effect” was interesting because it is and was often used in actual court cases to dismiss cases. This is, “when a government action or law causes people to avoid legal speech and publication out of fear of prosecution.” (pg 148)
b. I was surprised by all of the acts passed by Congress to protect minors from inappropriate information on the internet that were later deemed unconstitutional such as the Communications Decency Act. (pg 151-153)
c. I was drawn to the material about special interest policies because of the situation in New York State banning advertising out-of-state wines directly to consumers in the state. I’m relieved this policy was deemed unconstitutional because some of the best wine comes from California. (pg 167)

2. (Comprehension) Summarize what is being discussed within this chapter?

Within chapter 3, Baase talks about the protection of freedom of speech under the First Amendment for users of the internet and how it has changed with the internet people dealt with years ago to the new developments arising with technology today. One example she uses to explain the changing principles is pornography, and another is spam email. Baase uses different acts and laws that have been passed throughout the years to help her readers understand the rights of free speech that are protected. Examples include the Child Online Protection Act (pg 154) and the CAN-SPAM Act (pg 165).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

While searching through the internet while I was younger I remember typing on Google’s search engine looking for Dick’s Sporting Goods and inappropriate websites and images coming up after the search. This is an example of a child doing an innocent search and being exposed to material that is offensive to minors. Because of the name of the store having the same body part as a man, I don’t believe that could have been avoided. However, Baase’s information about filters may make a parent believe that if they do use a filter for their children’s computer, they could avoid them viewing inappropriate material advertised on the internet by blocking a certain list of websites or choosing a category of websites to filter. (pg 155)


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
A child seeing pornographic material has been a problem since it first appeared. Video rental shops, gas stations, convenient stores, book stores, all have magazines or videos of erotic material and not all of them have restricted areas for people over the age of 18. This is a problem in people’s material life just as it is in their internet lives, are parents trying to protect their children from obscene material. The Children’s Internet Protection Act deemed constitutional is a technological way to protect children in schools and libraries from accessing sites with obscene material. (pg 158) A solution in stores would be to not have the “harmful” material in stores where children are allowed. Even if the section is blocked off by a curtain, a child could still linger in there. Baase restates the information she has researched First Amendment and free speech on the internet and uses quotes from the actual materials (knowledge). She then goes on to apply the levels of free speech and their effectiveness to different actions on the internet, such as spam mail and pornography (application).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because I do believe every person, no matter their means of communication, has the right to freedom of speech. Every specific issue has certain restrictions that need to be addressed, but overall people created the internet as a means of communication and shouldn’t be punished for using it. Determining the right restrictions, as seen through this chapter with the Child Pornography Prevention Act, the Communications Decency Act, the Child Online Protection Act, and other stated throughout the chapter, take trial and error to provide fair regulations for all. (pg 152-158) With these trials I feel people are slowly getting to terms that can be accepted by most to control what is being put or distributed on the internet without restricting their freedom.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is clearly relevant in today’s society seeing as people will always have a right to defend their First Amendment Rights. The ethical evaluations that can be assumed from this chapter are those that deal with sensitive material people should consider censoring or not making available to everyone because it could pose a potential risk for a person, help them make a difficult negative decision, such as commit suicide, or help a terrorist make a bomb. (168-169) The Washington Post published an article explaining how al Qaeda activists use the internet to communicate about special operations and planned bombings. This is an example of internet websites that have an ethical responsibility to keep their country safe.



References

http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html

Tuesday, September 20, 2011

Chapter 1

Name Victoria Terhaar                                                                                                Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 1.1, 1.2, 1.3, 1.4

1.       (Knowledge)Tell three interesting elements of this chapter:
a.       The first electronic computer were first built in the 1940’s and now only 70 years later Georgia Tech developed a 500-gigagertz chip that is more than 100 times faster than a computer.  (pg 3)
b.       Bloggers get invitations to fashion shows and press credentials for news coverage because they can have up to 100,000-500,000 readers per day. (pg 6)
c.        The number of bank tellers rose from 301,000-600,000 by 2006 which is a major increase when most people believe unemployment of bank tellers rose during that time. (pg 22)

2.       (Comprehension) Summarize what is being discussed within this chapter?

The first two sections, 1.1 and 1.2, were discussing the introduction of the computer and technology and the effects they have had on our time.  Baase was using numbers to help people get the right perception of how fast technology is advancing.  She was explaining things like the first computer in the 1940’s, Neil Armstrong walking on the moon in 1969, and airplanes going 500 miles per hour (pg 2-3).  In sections 1.3 she was introducing us to the issues we’ll be reading about throughout the book. Baase was helping us understand the different issues such as freedom of speech and professional ethics, by applying them to ATM/online banking (pg 21-24).  In section 1.4 she got into the issue of ethics saying it means to do the right thing.  She was talking about the different views such as deontological or consequential, and how the issue with ethics is objectivity (pg 28-32).


3.       (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

I think a similar situation in society, one in which a person can have technology possibly hinder their everyday life when it is supposed to be making it easier for them (in reference to the ATM section in Baase’s book), is people going on auctioning websites like eBay or craigslist.  Doing this is supposed to make it so a person can buy things they’d like in the comfort of their own home from all throughout the U.S., make buying things convenient for them.  However, some of the overpowering negatives aspects to this industry are the possibility of getting your personal information stolen or someone hacking into your account and using it to buy merchandise.  This websites can also increase the amount of crime in a society.  There have been cases where murder has happened because of false information on these websites.  A masseuse was killed after being lured to a hotel room with the thought of giving her services.  (http://abcnews.go.com/US/story?id=7384549&page=1).  Solutions that could help people in these situations may be for extensive background checks on people making accounts on these websites, a more in depth process of buying/selling products on these websites.


4.       (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

When Baase is talking about the themes throughout the book, one she specifically mentions is adapting to new technology. (pg 25)  When she goes into detail about this theme she references certain times and situations where there were occurrences and society had to change its rules to adapt to the new technology to protect people’s privacy or people’s rights.  A situation like having to adapt to something new can be found in many aspects of a person’s life.  For example if someone was to move to a new city, they would have to adapt to the different pace of that city, the attitudes of the people, their new schedule and change their life so it fits into that new pattern. 

5.       (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within chapter 1 of Baase’s book.  In the first part of the chapter she is speaking about the evolution and reliance that computers have had on society.  With speaking of the evolution, Baase uses numbers to support her findings such as, “blogging began slowly, shortly after 2000, and took off in the early 2000s with the help of several developments…” (pg 5)  Because Baase uses these statistics to support her writing I do agree with what is being said within the first two sections of the chapter we read.  I also do agree with what she is speaking about in the third and fourth sections of the chapter because I believe the ATM example showed the reader technologies have many positives and negatives, and sometimes people have to sacrifice having some negatives for a more helpful positive.  I believe this is true with every technology, not just ATMs.  Ethical issues that Baase talks about affect people in their everyday lives because ethics go hand in hand with morals and doing the right thing.  Most every decision people make has benefits and consequences and someone is doing either the right or wrong thing in someone’s eyes. 


6.       (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

I do believe every topic Baase covered in the first chapter is relevant in society today.  I believe that because from my own experiences today I have experienced some of the advantages and disadvantages of an ATM or online banking. I have dealt with my own ethical things and what I feel is the right thing to do. I was in a situation where I was unsure whether or not to lend all of my notes/quizzes/material from a previous class to a friend and I was unsure what the right thing to do because I didn’t know if that would be like cheating.  I think some ethical evaluations that were made were ones looking at the different structures of ethical arguments.  Baase talked about deontological which is about sticking to rules while making a decision, or utilitarian views which is looking at the actions and then consequences, or just a person embracing their natural rights and doing whatever they feel is right. (pg 28-33)