Wednesday, April 25, 2012

Chapter 6: Work, Guest speaker Ken Fick, CPA, MBA

Question 1:

Based off the articles we read relating to telecommuting, it seems that those who telecommute and are in management positions fear as though they may not have as much knowledge on their employee's work. Do you ever fear a lack of control over your employee's work and work quality when you telecommute?

Question 2:

Based off these same articles, there also seems to be disdain for those who are privy enough to telecommute to work.  Have you received any attitude of this nature by your colleagues who may not be able to telecommute?

Monday, April 23, 2012

Chapter 6: Work


Tom Burtless                                                                                        Class time:11 – 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1 – 6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a.  Computers were thought to eliminate a lot of jobs, however due to technology, employment increased 6% overall between 2003 and 2006.
b. The unemployment rate was 4% in 2000, which is lower than throughout most of the century.
c.  Roughly 55% of woman-owned business are home-based businesses.
2. (Comprehension) Summarize what is being discussed within this chapter?
In this chapter, Baase talks about how computers, the internet, and technology in general have changed the employment frontier.  Baase first discusses the fears had by many that computers and other sorts of technology would eliminate a lot of jobs.  And while they did eliminate some, they created a variety of others.  From there, Baase touches on off-shoring and outsourcing jobs.  Baase talks about how white collar jobs like engineering and IT positions have been off-shored, and the ethical ramifications behind this practice.  Baase closes out 6.2 talking about how a variety of online resources have now been made available for people to not only obtain new jobs but find out more about the company they work for. However, having a large range of social networking leaves you vulnerable for companies to see what you can be like outside of work.   In 6.3 Baase talks about how telecommuting has changed the work environment, and the benefits/problems that have come along with it. 

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and EXPLAIN?
In 6.3, Baase discusses the benefits and problems of telecommuting and the allowance of technology to create jobs at home.  This part of the chapter reminded me growing up and my best friend Ben’s parents whom both worked at home with separate businesses.  His mom owned an interior design company and his dad owned a radio show.  Now both of their companies relied heavy on computers(his dad recorded his radio show on a Mac, and his mom had a client base on her Mac as well).  When I would go over there we would run through his house as kids do, and make a mess of things.  However, we could never go into the rooms that housed their computers for fear of damaging them.  Baase discusses a benefit of telecommuting or working at home as being able to be around your children more (p. 328  Baase, 2008).  However, what if a child (like me or my friend) breaks a laptop that has a client list or a new radio show?  I never thought about it too much back then, but reading through this section all I could think about was the potential damage my friend and I could’ve caused his entire family by the click of a button. 

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy.
The idea of off-shoring and hiring engineers and IT personal in other countries is a similar situation to what outsourcing did to factory and manufacturing jobs (p.319 Baase, 2008).  With both situations of outsourcing manufacturing jobs and off-shoring knowledge work jobs, the solution lays within the company’s hands.  They decide the importance of supporting our own local economy or obtaining a (potentially) larger profit.  This is an ethical question raised by Baase with many variables(p.322 – 333 Baase, 2008).  A new idea that can be added to this section of this chapter would be to consider entire industries being outsourced.  Consider an app development company.  App development companies don’t require physical files, it just requires software and coding files. What if an industry like app development completely moves out of our country and to another country because companies want to save money and they can just obtain all the files and resources over the Internet?  What if instead of just job positions entire IT and knowledge work industries move overseas? 

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with the position Baase takes on job creation through computers.  Instead of employment declining, it rose from 2003 to 2006 by 6% (p.311 Baase, 2008).  Over ten million people worked in information technology jobs in the U.S. in 2004 (p.311 Baase, 2008).  Clearly this shows that computers are not causing a massive raise in unemployment as feared by many (p.308 Baase, 2008).  After reading this chapter, I’ve drawn conclusions that computers can not only enhance company production and proficiency but have caused increases in employment and employment opportunities. 

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Half the things discussed in this chapter are only relevant in today’s society.  Discussions of telecommuting and how social networking has changed the frontier of job hunting/job positing only apply to recent years.  All the other items discussed are relevant to today’s society as well.  I view this topic as relevant to today’s society because computers are so integrated into everything we do.  Cash registers at retail stores are no longer simple adding machines, they are fully fledged computers.  Most if not all office jobs now require computer skills (Allabaugh).    One of the ethical evaluations made in this chapter was questioning if U.S. companies should hire offshore employees?  After reading this chapter, I’ve gained a greater understanding of off-shoring and the threat it has to local employment that I considered to be protected against outsourcing.  


References
Allabaugh, Denise. "Computer Skills Become Essential Tool for Job Seekers." The Times - Tribune. 1 Apr. 2012. Web. 23 Apr. 2012. <http://thetimes-tribune.com/news/business/computer-skills-become-essential-tool-for-job-seekers-1.1293372>.

Monday, April 16, 2012

Chapter 5: Crime part 1

Tom Burtless Class time:11 – 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5.1 – 5.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. The average loss from a computer fraud is more than $100,000.
b. The term cracker came out of the 1960’s as describing someone who would break into systems without authorization.
c. Two boys, aged 16 and 17 carried out the most organized and systematic attack the Pentagon has seen to date in 1998.
2. (Comprehension) Summarize what is being discussed within this chapter?

Within section 5.1 and 5.2, Baase is discussing hacking. In 5.1 Baase talks about the definition of hacking and gives a brief introduction. Secton 5.2 builds off of this introduction, going into more of the aspects of hacking. Baase then goes into how hacking has been perceived and used over the years, discussing it as being a fun activity to turning into a way for people to steal and deface many websites all over the world. Baase also discusses laws in relation to hacking and Hacktivism.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and EXPLAIN?

A solution  would be to hire on hackers (in either government or business positions) that can easily bypass certain security systems. Hiring someone who knows how to infiltrate a system can rebuild it or help strengthen its weaknesses. A TED video goes into this a bit more, along with the profiling of hackers (the link to the video: http://www.ted.com/talks/misha_glenny_hire_the_hackers.html).  While Baase says that this can be determined as rewarding hackers, it can be seen as a potential asset to companies and to helping hackers transform their work into good.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy.

For the situation described at the start of the chapter, online criminals (who steal credit card information) on average can gain $100,000 from computer fraud (p. 253, Baase 2008). Baase also says that a robber who enters a bank will usually make $2,500 to $5,000 dollars on average. This shows the drastic difference in a heist used without technology versus a heist used with technology. Theft at gun point or other in person criminal acts can be directly seen. Acts of stealing credit card and other information may not be seen right away, and are much harder to track back to the source.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I believe some hacking, such as the case of Anonymous, can be justified. I believe in their cause. However, hacking for purely financial gain is something that I do disagree with, as Baase describes it in the book. Stealing credit cards and bank account information has no justification other than showing the intelligence of some people in being able to bypass security systems. I do relate my opinion on this to what I stated for number 3 in that some of these hackers are very intelligent and should be hired by the government or businesses instead of being thrown in jail. 

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

This topic has a lot of relevance in today’s society. With a group like Anonymous garnering much popularity, the topic of hacking is becoming a bigger discussion piece. I view it as being relevant because I believe in what Anonymous is fighting for. I believe in hacking for the sake of political change. However, there are many ethical questions that go along with hacking. For the situation of Anonymous, when do you decide you’ve gone too far? When does a political or hacktivism turn into complete Internet anarchy? Is it right for our government to not try and gain information through hiring these hackers? After reading this chapter, I’ve learned how much hacking can effect and how much financial loss it really causes. The fact that a 15 year old caused 1.7 billion dollars’ worth of damage is staggering (p.260 Baase, 2008). The only thing more staggering than this is the fact that he obtained scripts to do so that are widely available on the Internet. To be honest, a consistent thought I had while reading this chapter was if I could possibly hack a security system. How easy is it to perform these tasks? A lot of the examples that Baase list are of teenagers performing this extremely large hacks. How easy is it to access these scripts?

Sunday, April 15, 2012

Chapter 5: Crime HACTIVISM

Tom Burtless Class time:11 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Authors: Catharine Smith, Scott Neuman, Adrian Chen
Dates of Publication: July 21st, 2011, September 16th, 2011, November 4th 2011
Articles: Huffington Post, NPR, and Gawker
1. (Knowledge)Tell three interesting elements of these articles:
a. Even after having members arrested, Anonymous hackers still believe that “your threats to arrest us are meaningless to us as you cannot arrest an idea.”
b. Anonymous has released easy to use hacking program that allows anyone in helping to cripple a website.

c. Barrett Brown is seen by the Anonymous collective as a “famewhore” riding Anonymous to lucrative book deals.

2. (Comprehension) Summarize what is being discussed within these articles?

In the Huffington Post article, Catharine Smith discusses the resilience of the hacking group Anonymous even though members of their group have been arrested. The article also discusses why Anonymous believes in what it does, and why they feel justified in hacking the websites that they do. The second article from NPR talks about how easy it is to join the hacking society through using simple programs. The article also branches how the different Anonymous hacks have gained popularity and that the targets do not usually expect the hack. The final article, from Gawker, talks about Barrett Brown and his lucrative book deal from Amazon which delves into him being the “face” of Anonymous. The article shows a heavy bias against Barrett Brown and claiming a lot of what he has to say to be “bull shit”.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

I think what Anonymous has been promoting in terms of online freedom and over all lack of government control is something that can be compared to what the Occupy Wall Street has been trying to do for financial equilibrium. Both movements are fighting for a revolution in our country and to change things that have become embedded in our society.  Anonymous fights for freedom of speech, and Occupy Wall Street fights for financial equilibrium.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A new idea that I can add to the articles presented for this reading would be another article about a traitor to Anonymous. Sabu, the head of LulSec, has been working with the FBI to have many hackers that have been part of Anonymous arrested (Biddle). In the article, the author discusses how the legendary hacker was brought to turning in fellow hackers because of his children (Biddle). Sabu did not want to go to jail and leave his children fatherless (Biddle). This shows that even high ranking people within this online revolution can be brought against the ideas they believe so dearly. It raises a lot of questions about the organization and its future.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what these articles state, especially the first Huffington Post article. The principles that Anonymous list as being unacceptable that are carried out by our government outrank the ones listed by our FBI. As read in previous chapters of A Gift of Fire, our government has torn down our privacy and online freedom (in some regards). I agree with the principles that Anonymous promote because they care about citizens and people, while some of the policies that the government have enforce(and currently do) do not seem to do that.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in todays society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

Giving that these articles only come from a couple months ago, and that Anonymous is still a very prevalent group in our culture, this is definitely a relevant topic in society. In reading these articles and having some prior knowledge of Anonymous, a word that consistently comes to mind is revolution. This group has stood up for so much, for the first time in so long, in the name of protecting our freedom and saying no to big business and our government. While I have my reservations of what the groups intentions may be sometimes, they report news that can be backed up by other sources that promote awareness of what our government is doing. However, there is a decent amount of ethical questioning that occurs in reading through these articles. With a group entitled Anonymous, how do you know who is really behind everything? How many people are like Barrett Brown who seems to be riding off the fame and claiming what Anonymous believes in?


References
Biddle, Sam. "LulzSec Leader Betrays All of Anonymous." Gizmodo. 6 Mar. 2012. Web. 15 Apr. 2012.

Friday, April 6, 2012

Watching/Thoughts: Steal this Film

Tom Burtless Class time: 11 A.M.

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):

1.This move has made me had a greater sense of pride in the piracy I have engaged in over the past few years.
2.How to popular/mainstream artists, musicians, authors, and film makers look at the idea behind piracy?
3.How will the movie or music industry embrace peer to peer technology the similar way they have embraced technology they resented before?




Foundation (UNDERSTANDING):
What is the Pirate Bay?

Pirate Bay is a website in which you can get torrent files from, to use in a torrent application such as BitTorrent or uTorrent. These torrent files connect you to a variety of peers who have the file that you are trying to obtain. Through this connection, you obtain the file or files (whether it be software, music, or movies).

What do they stand for (what is their mission)?

They stand for the distribution of information, through sharing it and spreading it as far possible.


What is their purpose for making and distributing this film as a free download?

To show how copying and distributing information has changed in our society. By adding to that in offering this movie for free, they show their point. Media and the people behind mass media today are trying to stop the sharing of information through the ways discussed in the film, and Pirate Bay embraces it.


Provide 3 referenced connections to Baase readings (LINKING).

1.Baase discusses Napster in section 4.2, which is heavily discussed in the movie (p.209, Baase 2008).

2.Baase talks about different audio labels utilized DRM technologies to try to prevent piracy, but they inevitably were hacked and put to extinction. This proves the resilience discussed in the movie of people to obtain information (p.216-217, Baase 2008).

3.In section 4.3 Baase discusses the retaliation made by the media industries towards individuals and groups of people trying to share movies and music. The movie discusses this same topic at the start of the film (p.213-214, Baase 2008).






There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):

1.Yochai Benkler - He is a representative from Yale Law School. He gives a perspective of the legislative background to the ideas and complications of piracy and modern day media distribution.

2.Aaron Swartz - He is a co founder of reddit.com, which is a huge website/forum in the Internet. He gives a perspective on the change that the Internet can bring, and how peer to peer type technology will be a staple for the information age.

3.Fred von Lohmann - He is an attorney. He gives a perspective similar to Yochai and Howard in which he talks about how new technology has been met with legal ramifications.

4. Howard Rheingold - He talks about the history of media, and its resilience to change. He discusses how has new technology has been introduced, Hollywood and the like have been resistant to adapt or include it. They end up trying to ban said technology, or give it a negative connotation.

5.Dan Glickman - He is the chairman of the MPAA, and discusses how media companies know that piracy cannot be stopped. However, they attempt to make it as difficult as possible. Glickman gives the perspective of the other side of the coin, in which piracy is not looked at in such a positive light.






Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):

1. Rick Prelinger - He runs a website of free movies called Prelinger Archives, that are available to anyone who visits his site. The goal is to preserve films of historic significance.

2. Sebastian Lutgert - He discusses his views on piracy from the point of view of a film maker, someone who creates these works of art that are being disturbed through peer to peer sharing.

3. Lawrence Liang - He is part of the Alternative Law Forum, and gives background into the social and legal implications of modern day piracy.




What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main idea being discussed within this film is that the sharing of information has existed since the dawn of man. Along with that, the desire to stop the sharing of information has existed since the dawn of man. Printing presses, cable television, sheet music, the video recorder once all had the negative connotations that peer to peer file sharing websites and methods have today. Over time, however, Hollywood and the like have learned to adapt to these new media types and embrace them. Baase discusses the issues of industry and legislation trying to adapt to new technologies and methods of sharing in section 4.2 (p. 204, Baase, 2008). Baase discusses the hardships that both people who try to share information and those who owned intellectual property had endured.


What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a peer to peer client, where you can upload and download files by connecting to another person (or seed). When you download a torrent file from a website like pirate bay, you connect to another peer (or variety of peers) to receive the end file that you desire. These files can be anything from software to television shows. After you have downloaded that file, you are then a peer for someone else who is trying to download said file. It has changed our society by allowing anyone with an Internet connection the ability to download a wide variety of media at the click of a mouse. While this has positive ramifications(an independent artist can put out his/her new album, or an software designer can show off a new program they have built), there are negative ones. People take copyrighted material and put it on peer to peer networks, allowing others to have media or software they have not paid for.

Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

Growing up in this early stages of the Information Age, I watched my brother utilize Napster right as it came out. Developing and early interest in technology and file sharing, I was using Kazaa, Bearshare, Morpheus and torrrenting/vpn client programs to obtain music and movies. However, anything I downloaded (in terms of music) would be bands that I have paid to see live or have bought a t-shirt of. Eventually I bought most of the music I have downloaded to support the artists I had grown to love. What file sharing had done for me is expose me to a variety of artists that would inevitably impact the rest of my life. It also allowed me to try out different artists before deciding whether it was worth my purchase. It was nice to see that online media retailers utilized this type of strategy, such as iTunes, which allows a preview of an album or song before you buy it. Baase touches on the innovations made by companies like this and how they took advantage of digital online marketplaces for media (p.224, Baase 2008).



Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)

I think that the future of media is right before our eyes. A popular band named Radiohead distributed their second last album "In Rainbows" on their website before it hit retailers. They offered their fans the option to pay whatever they wanted to buy the album. Instead of putting in stores, they offered their fans or consumers the option to pay what they wanted to. I think things like this are the future for all types of media. Its turned away from the producers and has focused on the consumers. Musicians and artists publicly announce that their fans should download their works for free because they just want them to hear the new music they have been creating. It is moving away from large record labels and towards artists taking independent control. As Baase discusses in 4.3, large companies are applying a digital approach to selling and distributing media. Baase talks about how iTunes and Amazon have now started to offer digital services that piggyback off the idea of digitally consuming media (p.224, Baase 2008).


Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

I don't believe it is. As Baase states in 4.1, "The key to understanding intellectual-property protection is to understand that the thing protected is the intangible creative work- not its particular physical form." Downloading someones album or movie isn't to change or copy the plots or ideas or musical notations, its to share that form of someones intellectual property.



How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

I don’t think people will pay for the end product of Intellectual property in 50 years, but they may pay for people to make new media and distribute it. I offer an example posed by the website Kickstarter. A game development company put out a Kickstarter campaign, which is essentially a donation website in which you can contribute to a variety of projects. Each project has to meet a set goal before it charges the people who donate, so the project can move forward. The game company, Harebrained Scheme, put out a request for $400,000 to build a sequel to their game Shadowrun. They reached this goal within 28 hours (Link to article: http://www.develop-online.net/news/40435/Shadowrun-Returns-on-Kickstarter). If you browse through Kickstarter projects, you’ll find a variety of musicians, movie makers, authors and so on who have started up projects to make new media. Perhaps this will be the way of the future; you pay for the types of media you want to see created. I think people 50 years from now will still share media and “pirate.” However, I think people will continue to financially support media outlets in the ways listed above.


Do you agree with what is being said within movie? Explain. (EVALUATION)

I do agree with what is being said in this movie. Creation of media is not strictly about financial goals or gains. Meeting a variety of musicians and going to a variety of concerts, I have heard a very similar statement repeated over and over again. That statement is, “I don’t care how you obtain our albums/recordings, but listen to us and download our whole discography!” Now while this may not be the case for every musician out there, it is for a decent amount. Being a musician myself and having had put out several albums, I could care less if people pay for it. But if people enjoy it and share it with all their friends, that is something to be celebrated. With that, even the MPAA knows that piracy cannot be stopped. Humans will always find a way to share information.


Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)

My opinion has been reinforced that media is not always about a profitable gain, but rather the desire to spread media. Culture, in regards to media, needs to celebrate its creation. By passing this media along, more people are involved and more people are connected. When I show a friend a song I like, or a movie I enjoy, it is because I want them to share that same experience of enjoyment and approval. Copying material isn’t out of the desire to avoid payment, it’s the desire to share, enjoy and connect to culture. I had never thought of connecting modern day piracy to that of the creation of sheet music or the print press. After the explanations of these comparisons I know have a greater understanding of how the idea behind piracy or copying of intellectual property is something that has existed before the dawn of computers.

Tuesday, April 3, 2012

Chapter 3: Freedom of Speech (Part 2)

Tom Burtless Class time:11 – 11:50

KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.4 – 3.6

1. (Knowledge)Tell three interesting elements of this chapter:

a. The McCain-Feingold Act actually detoured ordinary people from publicly expressing their views about politics.

b. Companies use lawsuits, based off what users say about them in varieties of forums and chat rooms, in order to identify these people and intimidate them.

c. AT&T agreed to follow net neutrality principles in 2007 for 2 years.

2. (Comprehension) Summarize what is being discussed within this chapter?

Within 3.4, Political Campaigning is being covered. Baase goes into details of how laws about political campaigns and contributions have had to be re-examined with the addition of such things to the internet. The FEC had been assigned to define what was deemed financially viable and beneficial to a political campaign. In 3.5, the author discusses anonymity. Baase talks about the benefits and disadvantages to allowing people to be anonymous in the internet. While it can help in situations such as hiding identity on an alcoholics anonymous forum, anonymity can be harmful if used on another message board to host and display child pornography. Section 3.6 discusses net neutrality and the deregulation of the internet. Net neutrality is the promotion that telecommunication companies must treat all information the same no matter who's connection it goes through. It promotes the idea that anyone should be allowed to access any piece of information on the internet.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

In the case of anonymity, consider an action figure forum. While action figures may be seen as something strictly for children, there are adults and older men who collect them as well. If a forum exists where there are both older adults and young children how is this forum to be moderated/watched? Should the older adults be allowed to contact the younger children? What blocks should be put in place so that young children cannot view potentially offensive material on said forum? What if an older adult tried to contact the child about potentially trading action figures? What would the implications of this be? There a lot of little niche communities that exist on the internet that make it harder and harder to make direct legislation about what information and how information should be kept anonymous.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

The situation of remaining anonymous when giving up personal information is something that not only exists on the internet, but in real life. The idea behind Alcoholics Anonymous reflect a similar situation as to what the author portrays in the book. Baase discusses how people who go on forums to talk about gambling problems or substance abuse use fake aliases so their personal information is not leaked out (p.180, Baase 2008). People in A.A. only use first names (or potentially fake names) so they protect their identities. The implications of this information leaking out could be disastrous for the person in question.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

The topics portrayed are a little to too widespread to give an overall agreement or disagreement. The viewpoints portrayed in political campaigning and anonymity are ones I do agree with. Based off what Baase says at the end section 3.4, even the Supreme Court deemed that rules about political campaigning as defined in the McCain-Feingold Act were unconstitutional (p. 179, Baase 2008). The fact that this act prohibited a movie critical about president Bush during his time in office, and wouldn't allow Amazon or eBay to display ads for new books by candidates shows that it need to be adjusted (though it was thrown out all together) (p.177, Baase 2008). Anonymity on the internet I agree with, but within certain confines. Users who are on forums discussing personal matters, as the way described at the end of section 3.5.3, should be able to disclose information without having their real names put on the internet (p. 185, Baase 2008). However, people who post child pornography should have their real names exposed for engaging in illegal activity as described in section 3.5.1 (p.181, Baase 2008).

On the topic of net neutrality, I disagree with Baase.  An article from ARS Technica discusses how Comcast is unveiling an on demand service exclusive to the X-box 360 (Lee). This exclusive service does not count towards the 250 gigabyte monthly cap already set in place by Comcast for when users stream on demand content on their laptops or other devices (Lee). This service has net neutrality supporters up in arms, saying that "raises questions not only of the justification for the caps but, more importantly, of the survival of an Open Internet (Lee)." While I do agree with the fundamental idea that all content on the internet should travel equally through all broadband lines, I differ on this opposition made by net neutrality supporters. In order to get this service from Comcast on the X-Box 360, you need not only Comcast on demand service but an X-Box Live gold membership (which costs $59.99 a year). Is it unfair for people who pay so much for these services to be denied something exclusive? I do not believe so.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is only relevant in today's society. The internet is always growing, and doesn't seem to be stopping. The legislation put onto the internet is something of dramatic concern. The internet is massive landscape with a wide variety of information, so its hard to make laws that cover every single aspect. There are many ethical issues involved with these sections. Is it right for companies to give out user name's real names on forums or messaging programs (p.184, Baase 2008)? Should internet service providers have to create a level playing field for the services they put out versus other companies? Should internet service providers treat specific content differently than other content? These are questions that are hard to answer, which have many sides to them. New ideas I had after reading this chapter were thoughts that different internet service providers could provide different content (or treat content differently). It never even crossed my mind that different providers may block or favor certain things on the internet over others.

References

Lee, Timothy B. "Law & Disorder." Ars Technica. 26 Mar. 2012. Web. 03 Apr. 2012. <http://arstechnica.com/tech-policy/news/2012/03/net-neutrality-concerns-raised-about-comcasts-xbox-on-demand-service.ars?clicked=related_right>.

Monday, April 2, 2012

Chapter 3: Video's and Prezi

My Prezi discusses the topic of freedom of speech, and how censorship in different countries across the world are limiting their citizens from viewing certain thing on the internet. Whether for reasons of offending other citizens, or attempts by the government to control what people see, freedom of speech is limited in a lot of areas around the world. My Prezi also relates 5 videos that were watched regarding the topic above to the book "A Gift of Fire" by Sara Baase.

The link to my Prezi is below:


http://prezi.com/qc8xvx387_g_/freedom-of-speech/

Sunday, March 4, 2012

Chapter 2: Privacy Part 2

Tom Burtless Class time:11 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.3 2.5
1. (Knowledge)Tell three interesting elements of this chapter:

a. The young people today are not as concerned by disclosure of personal information or videos of embarrassing behavior.s

b. Public opinion and consumer preferences have a strong impact on decisions businesses make – and on the success or failure of specific products, as well as whole businesses.

c. Within 10 years of the invention of the telephone, people (in and out of government) were wiretapping them.
 
2. (Comprehension) Summarize what is being discussed within this chapter?

Within these sections of chapter 2, the author discusses privacy on a more descriptive level. In section 2.3, Baase covers a wide range of topics. The author begins with discussing target marketing and how people can get automatically put on mailing lists for a variety of companies and organizations. Baase then goes into how people have been offered prizes for information about themselves through surveys filled out on the Internet. Then Baase goes into location tracking, which discusses the pros and cons of how GPS systems can be used. After this the author talks about how data and personal information on millions of people has been stolen (laptops left in taxis, laptops stolen) and used for identity theft and fraud. Baase then goes into privacy and public records, and who has access to what. The author discusses National ID Systems, and how social security numbers have changed in purpose from exclusively deeming who could use the Social Security program to being on almost every credit card form you fill out (amongst other documents). Baase closes out section 2.3 discussing children related to privacy, and how they are at risk for not understanding what can happen when they interact and put information out onto the Internet.

Section 2.4 goes into Protecting Privacy, and the methods people use in an attempt to make their information safe. The author discusses software that can detect spyware and other viruses that may leak out information stored on your computer. The author then discusses encryption, which is a technology that turns data into a file that requires certain software to decrypt. Basically, you can only view the file if you have certain software that decrypts it properly. However, it is possible to decrypt it by figuring out the algorithm used to encrypt it in the first place, so this is not foolproof. The author then goes on to discuss several theories related to rights of privacy. After this, the author debates free market-views versus consumer-protection view, which discusses the differing view of allowing degrees of privacy and having strict regulation on private information. The author concludes 2.4 discussing the European Union’s Privacy Regulation and how it helps with regulating the use with private information. The author also discusses how there are issues with their regulations, and how their regulation system may not work for the wide variety of issues we have in the United States.

Section 2.5 is a brief section that touches on communication privacy. Baase discusses the history of wiretapping, and how laws regarding it have now included email and other digital communication. Baaase also discusses the NSA, and how this agency uses communication devices to detect national threats. However, much controversy has fallen on the NSA because it has tracked thousands of US citizen phone calls and emails. The section and chapter closes out discussing how the United States had banned encryption in the 90’s, not allowing people to protect themselves. However, this ban was lifted in the 2000’s under the guise that encryption on a file must be lifted in a court order is placed on it.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

As discussed in the previous section, a solution for these varying issues of privacy is to fully understand what you are getting into when you sign up for something. That does not just mean the Internet, but anything you subscribe or sign up for. In an article by Robert Vamosi from PCWorld, the author discusses several ways you can protect your online identity from various data mining methods and websites (Vamosi). The author discusses how different websites have varying options for privacy and what you can choose to give to the company (or website) to use. If people are concerned about privacy on the Internet, they need to check the variety of social networking and other websites they are on and make sure they understand what is being used with their information.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

As the author describes in section 2.4, if you were to leave a magazine lying around in a public place, you would have the understanding that you’ve left it out for whomever to obtain (p. 107 Baase, 2008). That doesn’t make it right that someone has stolen your magazine, but you understand that you’ve left yourself open to such an incident. People, with everything that they own, need to realize how careful they have to be if they want to maintain the utmost of privacy. A new idea that I would add to what is being discussed is cloud based information:

Cloud based information is placing all of the information that resides (whether it be videos, photos, documents, emails) on your phone, out into the Internet. There are already privacy issues with the files that exist in your phone or computer’s storage drives. With all the information you have being placed on the cloud (in the Internet), it seems easier to violate people’s privacy. With all this data just being constantly streamed out from smart phones and computers and placed on the Internet, it opens up a new can of worms in what people can access and how quickly they can access it.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree that there is a lot of private information that can be extremely sensitive when thrown out into the world. I also agree with the author’s notion that there are many threats in having such information being placed on the Internet and available so easily. However, I do believe there is an aspect in controlling some information (if not most) that is placed on the Internet about ourselves. Other aspects including stolen and lost data need to be dealt with. Companies need to be held responsible for costumer data being leaked to the public. The fact that information on over millions of people has been stolen or used from large companies is staggering (p. 87 Baase, 2008). The conclusion I draw about this material is that people need to protect their privacy whenever possible. People need to start reading Terms of Service agreements, and looking into privacy settings on the variety of websites they use. Also, that government agencies and companies need to be held responsible for letting information out. 
 
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in todays society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

This is absolutely relevant in today’s society. Privacy is a huge concern among everyone. So much information is being put out into the Internet by everyone all the time. I have family members and friends who have been victims of identity theft and identity fraud. However, they didn’t do much to protect their privacy or hide their identities. They used untrusted websites to purchase items. For situations like this, people need to know how to protect themselves and how to properly use privacy controls. However, with the issue of public records (such as social security numbers, birth dates, and home addresses), there is no clear solution. The problem with that, along with any information put on the Internet about a person is that it is already potentially in someone’s hands. Someone may already have all the information they need to commit identity theft or fraud. 

 These sections have raised some ethical questions. Is it right that the government does not have to disclose information that is lost or stolen about citizens (p. 86 Baase, 2008)? Is it right that there are extensive public records about ourselves available to whomever desires them(within reason) (p. 93 Baase, 2008)? The answer to these questions seems quite obvious, yet both of those situations still exist. After reading this, I will research any company that I give information to and see how they use it and how safe it is to go with such a company. I also will get to know and understand the privacy options of any website I am currently using.
 
References
Vamosi, Robert. "Protect Your Online Privacy (Without Reading All the Fine Print)." ReviewsLink and News on Tech Products, Software and Downloads. PCWorld, 30 Mar. 2011. Web. 04 Mar. 2012. <http://www.pcworld.com/businesscenter/article/221104/protect_your_online_privacy_without_reading_all_the_fine_print.html>.

Wednesday, February 29, 2012

Chapter 2: Video and Reading Connections

Name: Tom Burtless Class time: 11 a.m.
1. Explain data mining:

Data mining is done by collecting personal information from public records, semi-public records and private records. Information Brokers create profiles off of the data from those 3 sources. Scraping is also done on Facebook profiles to get any other possible information. People make money off of selling these profiles and this data (based off of whatever information they can possibly obtain).
2. Relate data mining to privacy issues, specifically citing something you read in Baase, Orwell, etc.
Data mining allows people’s entire lives to be sold on the Internet. Baase discusses in pages 49 to 50 the risks of personal data on the Internet. The first bullet point he makes at the bottom of page 49 states “Anything we do online is recorded, at least briefly, and linked to our computer, if not our name.” Data mining reaps the benefits of this information being constantly recorded. Websites have privacy options, but once you have put information out into the Internet it is likely going to stay there.
3. Explain Ashley Paynes’s situation:
Ashley Payne was forced to resign from her school after an email was sent to her superintendent stating that her Facebook page contained pictures with alcohol and swear words. Ashley Payne’s profile was set private so that only her friends would be able to see her pictures. The email was allegedly sent by a parent, but Ashley did not have any friends that were parents of her students. How a parent would have possibly gotten these pictures is a mystery.

4. Were Ashley Payne’s rights violated? Did the school district have just cause for asking for her resignation? Base your answers off of what you have learned about privacy, show connections to Baase, Orwell, etc and support your opinion.
Based off the article that detailed the email that was sent to the superintendent, it seems as if the school district might have reacted too quickly in asking for Payne’s resignation. In Orwell’s book, citizens of Oceania are not able to think or do anything outside of what Big Brother deems acceptable. Also, citizens are constantly being watched, or at least think they are constantly being watched. In this story, Ashley Payne was being punished for something the school considered unacceptable. However, what Payne posted on the Internet was not directly linked to the school nor was it placed in the classroom. Payne did something that was private, and only supposed to be shared with herself and her friends on Facebook. It seems scary that the school was instantly assume that this teacher, whom never received any prior complaint, would be trying to pedal thoughts of alcohol and swearing to students.
5. Summarize the video “Police surveillance cameras are stopping crime or invading their privacy by Alex Dunbar.”

In this video, 9 surveillance cameras were set in up in Syracuse to see if they could forgo any potential crime. While police officials stated that crime has gone down 33%, many citizens worry about being watched constantly. They also question on how often the cameras would be in use and who would be watching them. The police officials also stated the cameras were only for crime protection.
6. Are police surveillance and traffic cameras are stopping crime or invading your privacy? Base your answers off of what you have learned about privacy, show connections to Baase, Orwell, etc and support your opinion.
7.
I believe that this is half and half. Based off what Baase states about video surveillance in 2.2, it seems a bit scary to rely on this technology given its failure percentage (50% failure/ mismatch of criminals faces in the 2001 SuperBowl). However, given what the police officials stated in the video, if video surveillance is cutting down crime a good percentage, then I think it can be acceptable. However, this is only acceptable if the people behind the cameras are using it only for crime detection and no other purpose.

Sunday, February 19, 2012

A Gift of Fire: Reading/Thoughts Sections 1.3 to 1.4


Tom Burtless Class time:11 – 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 1.3 – 1.4
1. (Knowledge)Tell three interesting elements of this chapter:

a. While technology can improve many aspects of life, it can also create new unforeseen issues. 

b. When new technology is developed, ethics and rules behind the use of that technology new to be developed carefully.

c. Ethics cannot be categorized into one field or another. There are multiple theories of explaining ethics.

2. (Comprehension) Summarize what is being discussed within this chapter?

Within the section 1.3, Baase discusses that there are issues with any new emerging technology. The author uses the example of an ATM, which can have harmful effects from implementation that aren’t usually looked into. She discusses the areas of unemployment, alienation, crime, loss of privacy, and errors within the ATM’s system. Baase then discusses how these issues do have solutions and the reason we accept some issues with that technology is the convenience it provides. The author then moves on to the topic of Themes, in which Baase describes the variety of topics discussed in the book and how they are relevant to technology.
In section 1.4, Baase discusses ethics in relation to technology. Baase presents several outlooks of ethics from the standpoint of Deontological, Ulitarianism, and natural rights. Baase discusses the strengths of each point of view but how all of them have flaws in determining what is ethically right to do. Baase discusses that situations are too complex to be placed under one outlook. The author closes out section 1.4 and chapter one discussing distinctions in ethics. Through out this sub section, the author details several situations where ethical views may be conflicting,

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

A solution to the issues set forth in both section 1.3 and 1.4 revolve around understanding a piece of technology’s true impact on society. In order for all the issues set in place (as discussed in section 1.3) to be resolved, any possible disadvantage of a new technology must be made aware. Is the convenience of shopping on the Internet for clothing worth the local clothing store going out of business and people losing jobs? Is typing your credit card information on that online website going to be safe?
Ethical questions need to be raised whenever a new piece of technology is put into place. How that technology can be used, what it is used for, and who can use it all raise significant ethical questions. If a new computer is built to be used by the military that can launch nuclear missiles, who is to obtain the right to use such a machine? When would the machine need to be used?

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

In section 1.4, the author discusses ethics in great detail. Not only how it relates to technology, but to all human forms of contact. Ethical situations are faced every day in almost every aspect of life. From my own personal experience, I have had to deal with ethically challenging situations.
I work in a retail environment selling electronics to people and am pushed by my management to sell warranty plans. Now, some devices I think might require such a warranty plan. However, I’m pushed to sell ones for devices that I don’t think require one. Is it ethical for me to sell a product that I don’t believe a customer requires?
This situation can be looked at from the Deontological theory, where me lying to the customer if they ask, “Do you think I need this?” is considered unethical. Through utilitarianism, the impact of me telling that customer that they do need the product increases utility to my managers and the company I work for. However, down the line, it may decrease the utility of the customer when they realize they never needed the warranty.
This section applies to Bloom’s taxonomy in the analysis stage, where ethics can most certainly be applied to situations outside technology. The synthesis stage is also crucial in ethics and issues, because people differ in supporting the ideas displayed in the book.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being stated in these sections of the chapter, because with each new development in technology we face more ethical questions and growing issues. I back my statement up with an article from Medical News Today, which discusses a possible link of cell phones to cancer (Nordqvist).
This article raises questions of convenience versus possible health risks. Is our health and well being worth being able to contact or be contacted? This may be a difficult question to ask depending on who you are. Along with that, is it ethical for cell phone companies to sell these products with no cancer-warning label? The new conclusion that I draw from this is that no matter how small or large the technological implication, there can be drastic outcomes. 

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

These topics are relevant now more than ever in society. For instance, on the issue of SOPA, ACTA, and PIPA, there are many ethical questions to be asked. In an article from Wired.com, the author discusses how a group of rebellious hackers named Anonymous hacked a web server in rebellion of ACTA, which is the Anti-Counterfeiting Trade Agreement (Quinn). ACTA, which was designed to protect copyright infringement, has also been link to possibly “curtail freedom of expression on the Internet.” This clearly raises ethical issues within the use of legislation towards the Internet. How can we try to protect but at the same type not disable? How does Anonymous have the ethical grounds to hack a web server because companies are sick of having their products pirated? There are many questions raised in this situation.
After reading this chapter, I will look beyond the immediate gratification of technology. I will look into how technology needs to be dealt with carefully and delicately. Ethically I will try to look at situations from not only a personal perspective, but from all the perspectives defined by Baase.


References
Nordqvist, Christian. "Cellphones Possibly Linked To Cancer Risk In Humans, World Health Organization." Medical News Today: Health News. 31 May 2011. Web. 19 Feb. 2012. .
Quinn, Norton. "Anonymous Promises Regularly Scheduled Friday Attacks | Threat Level | Wired.com." Wired.com. 17 Feb. 2012. Web. 19 Feb. 2012. .