Sunday, October 23, 2011

Chapter 5: Crime

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 5.1-5.3

1. (Knowledge)Tell three interesting elements of this chapter:

a. On page 253 Baase states that, “the average loss from a computer fraud is more than $100, 000,” and I thought with the amount of news I hear about the number would be much larger including white collar crimes.

b. A sentence Baase wrote that truly made me think was, “We have the freedom to speak but not the right to compel others to listen.” (pg. 264)

c. On page 274 Baase explains that phishing is, “sending millions of emails fishing for information to use to impersonate someone and steal money and goods.”

2. (Comprehension) Summarize what is being discussed within this chapter?

The first part of this chapter goes through the life of hacking and how it started back in the 1960’s as a positive term to what it has been developed to today with its negative light. With each phase of the development there are numerous examples of how hacking has been portrayed and how it has shifted. (pg. 253-263) The next sections are about political hacking which is primarily used to send messages to government agencies of countries, the penalties of young hackers which have included nothing more than probation, community service, financial restitution, or detention and the security measures that go hand in hand with hacking. (pg. 263-273) Lastly, Baase talks about identity theft and credit card fraud and different techniques used by hackers to get and use people’s information (273-282).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A specific example that I have experienced is on my laptop before I’ve clicked an advertisement on the side of a website page and received a virus just from clicking that. The virus that downloaded on my computer was a message that would pop up in a window and every time I clocked exit on the window a new one with the same exact message would pop up. Clearly the advertisement had a virus in it. Baase states on page 261 that, “banner ads can contain viruses.” To get rid of the virus my father had no run an anti-virus software on my computer. Now to help my laptop from not getting any more viruses I have McAfee Security Scan Plus that regularly checks and protects my computer from getting a virus.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

In the chapter Baase talks about hacktivism, or political hacking. This is the use of hacking for a political cause. An example that Baase used was how someone posted a pro-drug message on a U.S. police department antidrug website. (pg. 263) Actions like this remind me of protests in past years, except now people are using the internet and technology to relay their message. In previous years, methods of activism didn’t involve any type of technology. Protestors would have sit-ins, or rally’s, or march’s to convey their political message to the government or whomever they were “speaking” to. A famous example of this type of protest would be Martin Luther King Jr. during the Civil Rights Movement and how he staged speeches and march’s to protest civil rights. Dr. Martin Luther King Jr. devoted his life to speaking out towards civil rights and doing so in a nonviolent way (http://www.mlkonline.net/bio.html)

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with everything that’s being said within this chapter because hacking, whether it isn’t harmful or it is completely devastating, is something that people who live in this day and age have to deal with. Every day in the news you hear about people who have gotten their identity stolen or a major virus that is going around businesses etc., and as this technology keeps changing people have to keep changing the way they deal with it as well. Hackers find new ways so the government has to find new ways to stop them.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is obviously relevant in today’s society because hacking wouldn’t be around if we didn’t have the technology we’ve worked up to in this society. This issue is one that will keep expanding as technology keeps growing, and governments and protection agencies are going to have to find alternative routes of stopping the hacking and potential hacking. They will have to find a way to always be one step ahead of the hackers.

Sunday, October 16, 2011

Chapter 4: Steal This Film II

Your Name Victoria Terhaar Class time: 12 pm

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):

o Is there any way that the founders of The Pirate Bay do make a profit from their website? Are there ads that they collect revenue from?

o If the internet is the same in all countries then why are the laws that countries are supposed to abide by for it different?

o I think the government should take a different approach other than suing The Pirate Bay to try and control them. Possibly try to fight technology with technology?



2. Foundation (UNDERSTANDING):

a. What is the Pirate Bay?

The Pirate Bay is one of the largest peer to peer file sharing websites known throughout the world. On this website a person can download music, movies, games, computer application for free. This website is run from Sweden where it is legal.

b. What do they stand for (what is their mission)?

The mission of The Pirate Bay is to keep available the free and accessible download of movies, music, computer applications and games, and other entertainment to the public. They are set in their beliefs that what they are doing is legal under the Swedish law and other countries shouldn’t be able to interfere with their company.

c. What is their purpose for making and distributing this film as a free download?

Their purpose is to not seem like a hypocrite and have free movies for download on the Pirate Bay website, but not have their movie be a free download. I also think that it helps solidify the Pirate Bay’s argument because they are fine with having their movie available to the public for free which is legal in Sweden anyways.


3. Provide 3 referenced connections to Baase readings (LINKING).

a. The Napster case relates to the film the court ruled that the large scale copying on the website was illegal copyright infringement, not fair use, and that is what the MPAA wanted to sue The Pirate Bay for. (pg. 210)

b. The MGM v. Grokster case deals with the new challenge of copying files among users on the internet without a central service, and that is partly how Bram Cohen’s site BitTorrent works, using a decentralized service to share large files. (pg. 211)

c. I feel that one question that Baase asked in the reading, “Should we ban or restrict software, a technology, a device, or research because it has the potential for illegal use, or should we ban only the illegal uses?” applies to the film because the main issue this film deals with is the illegality of certain websites and their actions. So should the websites be restricted because of what is happening on them, or just what is taking place within the websites? (pg. 215)



4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):

a. Bram Cohen was included in this film because he was the inventor of BitTorent and that is the website where The Pirate Bay gets the shared files from.

b. Dan Glickman was included in this film because he was the chairman of the MPAA and that is the company that was suing The Pirate Bay for copyright infringement.

c. Sebastian Lutgert was included in this film because he is a supporter of pirate cinema and he contributes to the argument backing up the legal downloading of files on the internet.

d. Yochai Benkler of Yale Law School was included in this film because he isn’t biased towards anyone one side of The Pirate Bay, he looks at the arguments from both points of view.

e. Fred Von Lohmann was included in this film because he is an attorney for EFF and he looks at the criminal and civil aspects of the case in a legal matter.



5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):

a) Peter Sunde- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay

b) Fredrik Neij- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay

c) Gottfrid Svartholm- Co-founder of The Pirate Bay and was found guilty in the trial against Pirate Bay



4. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main ideas being discussed within this movie are the fight between old and new ways of distributing information and what should and shouldn’t be illegal and the idea of whether piracy infringes on people’s intellectual property rights. A connection between Baase and this film is with the Fair Use Doctrine, it allows it to in some particular circumstances be alright to use copyrighted material, and in the film it is alright to use copyrighted material in Sweden but not in the United States (pg. 206). Another connection between Baase and the film is that both pieces of work appreciate the history of copyright infringement laws and intellectual property rights because both take time to mention how it is the laws exist today (pg. 203-206).

5. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a new peer to peer file sharing website that allows a person to download large files from different countries and different people. This site makes downloads harder to track to a single user because it allows user to download from each other simultaneously. This technologic advancement has changed society in the way that it has helped people be able to download large files faster by being connected to more people throughout the world at one time.

6. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

I see connection to the main point of this film in my everyday life because I constantly see and hear about people watching movies on the internet, or I hear names of different websites where people are able to download music for free. A specific example would be when I first heard about the website Netflix, and that website has certain movies and television shows a person can watch instantly.

7. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectual Property in the Information Age? ? (ANALYSIS)

I think the future of distribution, production and creativity is that it is going to become even more digitized than it already is. This world is becoming smaller every day and more jobs are being sacrificed to technology and I feel that at least distribution and production industries are going to become completely over the internet because of the convenience and cheapness. The creativity field will become more complex within their work but the actual creative process will stay the same because people love entertainment the way it is. I think there is no future for intellectual property in the information age because illegal downloading and file sharing is taking over the internet at a rapid pace and I feel that the government is going to have to come up with something new to protect people’s work.

8. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

I do feel that downloading legally is not stealing someone’s intellectual property, however if the download is illegal then it is stealing of someone’s intellectual property. This is because what a person may come across and download illegally off of the internet is another person’s work. People like to have control over their work and if it is a form of entertainment, distribute it how they see fit. Downloading illegally means stealing because the person who put time and effort into the thing that is being downloaded isn’t getting credit for their work.

9. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

I think that because technology is always evolving, the governments in the United States and around the world are going to have to find ways to deal with copyright infringement and Intellectual property rights without all the lawsuits that have been happening in recent years. Fifty years from now I can see everything in the entertainment industry being really cheap for its customers because the government is going to have to find a compromise between illegal free downloading and selling their products for too expensive. Maybe the entertainment industry will begin working with the websites they’re trying to get rid of to make an even larger profit instead of suing each other and losing money on both ends,


10. Do you agree with what is being said within the movie? Explain. (EVALUATION)

I somewhat agree with what is being said within this movie because I do believe that there is a history to this issue, that it did begin with the printing of material and people needing to be in control of that information. The founders of The Pirate Bay seem very stuck in their views of keeping their download’s free and I don’t agree with that when the free downloads are available in countries where that is illegal. Illegal actions should be punished in appropriate ways and the raid of The Pirate Bay computers only gave the website more publicity.

11. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching and thinking about this film? (EVALUATION)

My view has not really shifted on this topic after watching this film because I feel that just as technology is evolving, the laws that surround the technology needs to evolve with it. I agree with the fact that copyright infringement and Intellectual Property theft should be illegal because people take time and energy to produce the material and should get compensated for their work. With learning that these actions aren’t illegal in Sweden does open up some ideas about how countries need to work together to find a common ground on how to deal with public file sharing.

Chapter 4: Musicians Look Por Pay In An MP3 World

1. Next, what is the argument made in Laura Sydel's audio segment Musicians Look For Pay In An MP3 World?

The argument made in Laura Sydel’s segment was that if people are downloading their music for free and the entertainment industry isn’t making a profit off of their product, how are the workers within that industry supposed to make a living?

2. How are the ideas expressed in the Sydel segment it different from the Chuck D and Lars Ulrich video?

The ideas expressed in Sydel’s segment were about making a profit and the money involved in copyright infringement, she focused on the economic side of this issue. Chuck D and Lars Ulrich were less concerned with the economic issue and more concerned with the power and control issue. Ulrich kept repeating how the control of the industry was at stake and Chuck D spoke about power going back into the hands of the people.

3. What point does Sydel make that is the same or different than the Chuck D and Lars Ulrich video?

A point made by all three people was that they all know that no one can stop the rapid changing pace of technology, but before it gets out of control, someone needs to figure out a way to control it. A solution needs to be found about how to control the illegal downloading and file sharing but still giving people what they want in convenient, cheap entertainment.

Friday, October 14, 2011

Chapter 4: Chuck D and Lars Ulrich

1. In 1-2 sentences, explain Eric Schmidt's point of view on Intellectual Property.

Eric Schmidt believes that copyright has evolved but for him intellectual property is fundamental and Google at least is critically dependent upon it. He thinks that the world is a better place when the largest number of people can see the most amount of information and pay for it.

2. What is Chuck D's slant on Intellectual property?

Chuck D supported Napster and the free exchange of music because he felt there is an evolving source of technology to share, distribute, and expose music and instead of fighting it he felt people should accept it and the fact that their intellectual property rights will change with the changing technology. One reason he felt this way was because for some artists it was there only source of exposure. A second reason was because when FM radio and the cassette tape first came out people thought negatively about those things and that they were going to hinder the entertainment industry when really they boosted the industry.

3. Explain the reason why might Lars Ulrich express the opinion he has. Base your answer on facts from this chapter.

Lars Ulrich’s opinion of this new technology, Napster, is that since people fall behind evolving technology, they need to set parameters so people don’t lose control of what is happening right in front of them. His debate is that with people’s perception of the internet and what their rights are as a user, they think that they own whatever comes across their screen on their computer. Lars feels that is wrong because of intellectual property rights, the artist etc., is the actual owner and needs to have control over their material. Intellectual property rights are supposed to protect the rights of an artist, in this case, to compensate for what they create and make their work valuable and intangible. Making their work illegally part of the public domain would be a violation of the Fair Use Doctrine.

Chapter 4: Intellectual Property (part 1)

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 4.1, 4.2, 4.3.1, 4.3.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. Intellectual –property protection is the protection of the creative expression of ideas, not the protection of the physical property the ideas are expressed within. (pg. 200)
b. I thought it was interesting that because of piracy issues, the entertainment industry is losing billions of dollars a year. I thought because of websites like Netflix, and iTunes that are flourishing the industry wouldn’t be losing that large of an amount of money. (pg. 202)
c. Because I was only eleven when Napster was issued to be shut down I didn’t know that it was due to illegalities within their business. I found it interesting to learn the actual reason why the program was shut down was because it provided copyright infringing activities. (pg. 211)

2. (Comprehension) Summarize what is being discussed within this chapter?

The first part of chapter four covers what intellectual property is and how it is being affected by changing technology. According to Baase, intellectual property is the intangible creative work, not the particular physical form it comes in, of a book, article, play, song, work of art, software, or movie. Intellectual property is protected by copyrights or patents, and has to keep evolving as technology is evolving (pg. 198-203). There have been court cases working to try and protect people’s intellectual property rights, and from those came the Fair Use Doctrine (pg. 206) and millions of dollars in compensation for h entertainment industry. In section 4.3 Baase talked about issues that concern copying and sharing of digitized entertainment and software and some lawsuits that arose from that issue.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Cheating on a test or copying of another person’s homework or school assignment happens almost every day in a school system. The stealing of another person’s answers on a test, or even one kid willingly giving another kid the answers to his test or homework, could be considered stealing of one’s intellectual property. I’ve seen numerous times since I started middle school children cheating on tests or copying each other’s homework. Because kids are supposed to be coming up with their own answers to teacher’s questions I would consider their answers their own intellectual property.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A specific example of intellectual-property protection in society could be plagiarism within schools, both high school and colleges. Students these days are getting lazier with citing information they use from copyrighted work in their own essays, projects, etc. This use of another person’s creative expression of ideas without citing correctly or at all could be considered stealing of intellectual property or “illegal” and teachers and professors are trying to find successful ways to keep students from doing this. The following link shows how serious of a matter plagiarism is taken at Buffalo State College (http://library.buffalostate.edu/research/plagiarism.php).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because whether a person’s property is a physical, tangible material, or digitized, or intellectual, I do feel a person has the right to their own property and if it is being stolen should be compensated for it. One thing I don’t agree with is the banning of media and devices that make the likelihood of copyright infringement decrease only because that one reason. If a software or device can be useful to people but also has potential for illegal use, it should still be completely run out before choosing whether or not to ban the item (pg. 215).


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe this topic is completely relevant in today’s society because no matter what the situation people always want to get the money for the work they do, and if there is illegal intellectual property stealing, or file sharing or copying then the originator of the material doesn’t get compensated for their work. Therefore, if there is a chance someone can get paid they will take matters to court and sue whoever necessary to get their money, or keep their rights, and to keep that from happening again.

Friday, October 7, 2011

Chapter 3: Questions from Dr. RSM

In your own words define the phrase ‘least restrictive means’ . Why or why not? 2-4 referenced sentences.

In my own words, ‘least restrictive means’ is when the government has control over a medium of communication, but does so by infringing on their First Amendment rights as little as possible. Governments outside the United States are notorious for not using ‘least restrictive means’ and doing whatever they feel is necessary to censor the material being communicated throughout their country (pg., 170). An example of the United States trying to uphold ‘least restrictive means’ on censorship of public material would be deeming acts such as the Communications Decency Act unconstitutional because it infringed on people’s First Amendment rights (pg. 151)

Why is this term important? How does it effect Freedom of Speech. Why or why not? 2-4 referenced sentences.

This term is important because it coincides with a person’s First Amendment rights. ‘Least restrictive means’ should protect a person’s freedom of speech by allowing them to communicate their ideas without interruption from the government unless necessary. Ethical concerns should help keep large companies and individual websites censored enough without restricting rights by people knowing there should be sensitivity towards certain material on the internet. For example, hopefully a person would think twice before posting information on how to commit suicide because they should know it could affect a person negatively (pg. 169).

Do you consider the Internet an appropriate tool for young children? Why or why not? 2-4 referenced sentences.

I do consider the Internet an appropriate tool for young children as long as it is monitored by their parents in the correct way. It is important for children to learn as many different perspectives about as many different topics as possible so they can develop their own opinions and thoughts as they grow older. Having access to the World Wide Web allows them to do that. As long as parents are filtering out the unwanted material, they should trust their children to use the Internet appropriately (pg. 155).

Chapter 3: Questions from Baase p 189

3.1 Briefly explain the differences between common carriers, broadcasters, and publishers with respect to freedom of speech and control of content.

According to Baase (2008), common carriers are only a medium of communication to the masses. Carriers disregard socioeconomic status and are made to provide their service to everyone. The laws of the United States prohibit carriers from controlling the content of the material that passes through their systems and take no responsibility for any illegal content that passes through their system. Examples of common carriers include postage mail and telephone services (pg. 146). In broadcasting mediums such as television or radio, the government has more control over the content they provide to the public. The government controls and regulates the content of material to the public. This poses more restricted First Amendment freedoms than for common carriers because the government can threaten to shut down a station or take away a broadcasting license if they don’t agree with the material (pg. 145-146). Publishers of print media such as newspapers or books have the strongest protected First Amendment freedoms. The only censorship, besides after the content being published, goes through the publisher of the material not the government (pg. 145).

3.2 Describe two methods parents can use to restrict access by their children to inappropriate material on the web.

One method a parent can use to restrict access by their children to inappropriate material on the web is to use software filters to restrict specific categories of websites such as sex or violence. A parent could create their own list of banned websites, or the opposite, a list of websites the child can visit. With this software, a parent can also see a log of the websites a child had previously visited (pg. 155). A second method is for a parent to personally set up an email account for their child and decide the list of addresses that email can accept (pg. 160). A general protection method for parents to use is to put their computer in their living/family room of their house so they can monitor their children’s use of the internet.

3.8 One of the arguments used to justify increased government control of television content is that television is “invasive.” It comes into the home and is more difficult to keep from children. Do you think this argument is strong enough to outweigh the First Amendment? Give reasons. Is this argument more valid for the Internet than for television, or less valid for the Internet than for television? Give reasons.

I do believe the argument is strong enough to outweigh the First Amendment rights. With television being a popular form of communication of education, violence, morals, and shaping the thoughts of children all over the United States, I feel that someone has to send the right message to those children who are the future of our country. As long as the government has a checks and balances system to make sure all viewpoints of appropriate material is shown, it should be able to infringe on the broadcasting industries First Amendment rights. I believe this argument is more valid for the Internet than television because for a person to be on television they have to have some sense of what is appropriate for people to see and are most likely censored by their broadcasting station, as well as the government. For a person to put inappropriate material on the Internet they don’t need to have their ideas or material examined by a higher up, the material goes straight to the Internet and can be done by any person at any time. This is why the government needs to step in and control the content of material visible to children, whether or not in may outweigh a person’s First Amendment rights.

Chapter 3: Freedom of Speech

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. While reading about protection of First Amendment rights, I thought the “chilling effect” was interesting because it is and was often used in actual court cases to dismiss cases. This is, “when a government action or law causes people to avoid legal speech and publication out of fear of prosecution.” (pg 148)
b. I was surprised by all of the acts passed by Congress to protect minors from inappropriate information on the internet that were later deemed unconstitutional such as the Communications Decency Act. (pg 151-153)
c. I was drawn to the material about special interest policies because of the situation in New York State banning advertising out-of-state wines directly to consumers in the state. I’m relieved this policy was deemed unconstitutional because some of the best wine comes from California. (pg 167)

2. (Comprehension) Summarize what is being discussed within this chapter?

Within chapter 3, Baase talks about the protection of freedom of speech under the First Amendment for users of the internet and how it has changed with the internet people dealt with years ago to the new developments arising with technology today. One example she uses to explain the changing principles is pornography, and another is spam email. Baase uses different acts and laws that have been passed throughout the years to help her readers understand the rights of free speech that are protected. Examples include the Child Online Protection Act (pg 154) and the CAN-SPAM Act (pg 165).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

While searching through the internet while I was younger I remember typing on Google’s search engine looking for Dick’s Sporting Goods and inappropriate websites and images coming up after the search. This is an example of a child doing an innocent search and being exposed to material that is offensive to minors. Because of the name of the store having the same body part as a man, I don’t believe that could have been avoided. However, Baase’s information about filters may make a parent believe that if they do use a filter for their children’s computer, they could avoid them viewing inappropriate material advertised on the internet by blocking a certain list of websites or choosing a category of websites to filter. (pg 155)


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
A child seeing pornographic material has been a problem since it first appeared. Video rental shops, gas stations, convenient stores, book stores, all have magazines or videos of erotic material and not all of them have restricted areas for people over the age of 18. This is a problem in people’s material life just as it is in their internet lives, are parents trying to protect their children from obscene material. The Children’s Internet Protection Act deemed constitutional is a technological way to protect children in schools and libraries from accessing sites with obscene material. (pg 158) A solution in stores would be to not have the “harmful” material in stores where children are allowed. Even if the section is blocked off by a curtain, a child could still linger in there. Baase restates the information she has researched First Amendment and free speech on the internet and uses quotes from the actual materials (knowledge). She then goes on to apply the levels of free speech and their effectiveness to different actions on the internet, such as spam mail and pornography (application).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because I do believe every person, no matter their means of communication, has the right to freedom of speech. Every specific issue has certain restrictions that need to be addressed, but overall people created the internet as a means of communication and shouldn’t be punished for using it. Determining the right restrictions, as seen through this chapter with the Child Pornography Prevention Act, the Communications Decency Act, the Child Online Protection Act, and other stated throughout the chapter, take trial and error to provide fair regulations for all. (pg 152-158) With these trials I feel people are slowly getting to terms that can be accepted by most to control what is being put or distributed on the internet without restricting their freedom.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is clearly relevant in today’s society seeing as people will always have a right to defend their First Amendment Rights. The ethical evaluations that can be assumed from this chapter are those that deal with sensitive material people should consider censoring or not making available to everyone because it could pose a potential risk for a person, help them make a difficult negative decision, such as commit suicide, or help a terrorist make a bomb. (168-169) The Washington Post published an article explaining how al Qaeda activists use the internet to communicate about special operations and planned bombings. This is an example of internet websites that have an ethical responsibility to keep their country safe.



References

http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html