Wednesday, April 25, 2012

Chapter 6: Work, Guest speaker Ken Fick, CPA, MBA

Question 1:

Based off the articles we read relating to telecommuting, it seems that those who telecommute and are in management positions fear as though they may not have as much knowledge on their employee's work. Do you ever fear a lack of control over your employee's work and work quality when you telecommute?

Question 2:

Based off these same articles, there also seems to be disdain for those who are privy enough to telecommute to work.  Have you received any attitude of this nature by your colleagues who may not be able to telecommute?

Monday, April 23, 2012

Chapter 6: Work


Tom Burtless                                                                                        Class time:11 – 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1 – 6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a.  Computers were thought to eliminate a lot of jobs, however due to technology, employment increased 6% overall between 2003 and 2006.
b. The unemployment rate was 4% in 2000, which is lower than throughout most of the century.
c.  Roughly 55% of woman-owned business are home-based businesses.
2. (Comprehension) Summarize what is being discussed within this chapter?
In this chapter, Baase talks about how computers, the internet, and technology in general have changed the employment frontier.  Baase first discusses the fears had by many that computers and other sorts of technology would eliminate a lot of jobs.  And while they did eliminate some, they created a variety of others.  From there, Baase touches on off-shoring and outsourcing jobs.  Baase talks about how white collar jobs like engineering and IT positions have been off-shored, and the ethical ramifications behind this practice.  Baase closes out 6.2 talking about how a variety of online resources have now been made available for people to not only obtain new jobs but find out more about the company they work for. However, having a large range of social networking leaves you vulnerable for companies to see what you can be like outside of work.   In 6.3 Baase talks about how telecommuting has changed the work environment, and the benefits/problems that have come along with it. 

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and EXPLAIN?
In 6.3, Baase discusses the benefits and problems of telecommuting and the allowance of technology to create jobs at home.  This part of the chapter reminded me growing up and my best friend Ben’s parents whom both worked at home with separate businesses.  His mom owned an interior design company and his dad owned a radio show.  Now both of their companies relied heavy on computers(his dad recorded his radio show on a Mac, and his mom had a client base on her Mac as well).  When I would go over there we would run through his house as kids do, and make a mess of things.  However, we could never go into the rooms that housed their computers for fear of damaging them.  Baase discusses a benefit of telecommuting or working at home as being able to be around your children more (p. 328  Baase, 2008).  However, what if a child (like me or my friend) breaks a laptop that has a client list or a new radio show?  I never thought about it too much back then, but reading through this section all I could think about was the potential damage my friend and I could’ve caused his entire family by the click of a button. 

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy.
The idea of off-shoring and hiring engineers and IT personal in other countries is a similar situation to what outsourcing did to factory and manufacturing jobs (p.319 Baase, 2008).  With both situations of outsourcing manufacturing jobs and off-shoring knowledge work jobs, the solution lays within the company’s hands.  They decide the importance of supporting our own local economy or obtaining a (potentially) larger profit.  This is an ethical question raised by Baase with many variables(p.322 – 333 Baase, 2008).  A new idea that can be added to this section of this chapter would be to consider entire industries being outsourced.  Consider an app development company.  App development companies don’t require physical files, it just requires software and coding files. What if an industry like app development completely moves out of our country and to another country because companies want to save money and they can just obtain all the files and resources over the Internet?  What if instead of just job positions entire IT and knowledge work industries move overseas? 

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with the position Baase takes on job creation through computers.  Instead of employment declining, it rose from 2003 to 2006 by 6% (p.311 Baase, 2008).  Over ten million people worked in information technology jobs in the U.S. in 2004 (p.311 Baase, 2008).  Clearly this shows that computers are not causing a massive raise in unemployment as feared by many (p.308 Baase, 2008).  After reading this chapter, I’ve drawn conclusions that computers can not only enhance company production and proficiency but have caused increases in employment and employment opportunities. 

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Half the things discussed in this chapter are only relevant in today’s society.  Discussions of telecommuting and how social networking has changed the frontier of job hunting/job positing only apply to recent years.  All the other items discussed are relevant to today’s society as well.  I view this topic as relevant to today’s society because computers are so integrated into everything we do.  Cash registers at retail stores are no longer simple adding machines, they are fully fledged computers.  Most if not all office jobs now require computer skills (Allabaugh).    One of the ethical evaluations made in this chapter was questioning if U.S. companies should hire offshore employees?  After reading this chapter, I’ve gained a greater understanding of off-shoring and the threat it has to local employment that I considered to be protected against outsourcing.  


References
Allabaugh, Denise. "Computer Skills Become Essential Tool for Job Seekers." The Times - Tribune. 1 Apr. 2012. Web. 23 Apr. 2012. <http://thetimes-tribune.com/news/business/computer-skills-become-essential-tool-for-job-seekers-1.1293372>.

Monday, April 16, 2012

Chapter 5: Crime part 1

Tom Burtless Class time:11 – 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5.1 – 5.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. The average loss from a computer fraud is more than $100,000.
b. The term cracker came out of the 1960’s as describing someone who would break into systems without authorization.
c. Two boys, aged 16 and 17 carried out the most organized and systematic attack the Pentagon has seen to date in 1998.
2. (Comprehension) Summarize what is being discussed within this chapter?

Within section 5.1 and 5.2, Baase is discussing hacking. In 5.1 Baase talks about the definition of hacking and gives a brief introduction. Secton 5.2 builds off of this introduction, going into more of the aspects of hacking. Baase then goes into how hacking has been perceived and used over the years, discussing it as being a fun activity to turning into a way for people to steal and deface many websites all over the world. Baase also discusses laws in relation to hacking and Hacktivism.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and EXPLAIN?

A solution  would be to hire on hackers (in either government or business positions) that can easily bypass certain security systems. Hiring someone who knows how to infiltrate a system can rebuild it or help strengthen its weaknesses. A TED video goes into this a bit more, along with the profiling of hackers (the link to the video: http://www.ted.com/talks/misha_glenny_hire_the_hackers.html).  While Baase says that this can be determined as rewarding hackers, it can be seen as a potential asset to companies and to helping hackers transform their work into good.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy.

For the situation described at the start of the chapter, online criminals (who steal credit card information) on average can gain $100,000 from computer fraud (p. 253, Baase 2008). Baase also says that a robber who enters a bank will usually make $2,500 to $5,000 dollars on average. This shows the drastic difference in a heist used without technology versus a heist used with technology. Theft at gun point or other in person criminal acts can be directly seen. Acts of stealing credit card and other information may not be seen right away, and are much harder to track back to the source.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I believe some hacking, such as the case of Anonymous, can be justified. I believe in their cause. However, hacking for purely financial gain is something that I do disagree with, as Baase describes it in the book. Stealing credit cards and bank account information has no justification other than showing the intelligence of some people in being able to bypass security systems. I do relate my opinion on this to what I stated for number 3 in that some of these hackers are very intelligent and should be hired by the government or businesses instead of being thrown in jail. 

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

This topic has a lot of relevance in today’s society. With a group like Anonymous garnering much popularity, the topic of hacking is becoming a bigger discussion piece. I view it as being relevant because I believe in what Anonymous is fighting for. I believe in hacking for the sake of political change. However, there are many ethical questions that go along with hacking. For the situation of Anonymous, when do you decide you’ve gone too far? When does a political or hacktivism turn into complete Internet anarchy? Is it right for our government to not try and gain information through hiring these hackers? After reading this chapter, I’ve learned how much hacking can effect and how much financial loss it really causes. The fact that a 15 year old caused 1.7 billion dollars’ worth of damage is staggering (p.260 Baase, 2008). The only thing more staggering than this is the fact that he obtained scripts to do so that are widely available on the Internet. To be honest, a consistent thought I had while reading this chapter was if I could possibly hack a security system. How easy is it to perform these tasks? A lot of the examples that Baase list are of teenagers performing this extremely large hacks. How easy is it to access these scripts?

Sunday, April 15, 2012

Chapter 5: Crime HACTIVISM

Tom Burtless Class time:11 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Authors: Catharine Smith, Scott Neuman, Adrian Chen
Dates of Publication: July 21st, 2011, September 16th, 2011, November 4th 2011
Articles: Huffington Post, NPR, and Gawker
1. (Knowledge)Tell three interesting elements of these articles:
a. Even after having members arrested, Anonymous hackers still believe that “your threats to arrest us are meaningless to us as you cannot arrest an idea.”
b. Anonymous has released easy to use hacking program that allows anyone in helping to cripple a website.

c. Barrett Brown is seen by the Anonymous collective as a “famewhore” riding Anonymous to lucrative book deals.

2. (Comprehension) Summarize what is being discussed within these articles?

In the Huffington Post article, Catharine Smith discusses the resilience of the hacking group Anonymous even though members of their group have been arrested. The article also discusses why Anonymous believes in what it does, and why they feel justified in hacking the websites that they do. The second article from NPR talks about how easy it is to join the hacking society through using simple programs. The article also branches how the different Anonymous hacks have gained popularity and that the targets do not usually expect the hack. The final article, from Gawker, talks about Barrett Brown and his lucrative book deal from Amazon which delves into him being the “face” of Anonymous. The article shows a heavy bias against Barrett Brown and claiming a lot of what he has to say to be “bull shit”.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

I think what Anonymous has been promoting in terms of online freedom and over all lack of government control is something that can be compared to what the Occupy Wall Street has been trying to do for financial equilibrium. Both movements are fighting for a revolution in our country and to change things that have become embedded in our society.  Anonymous fights for freedom of speech, and Occupy Wall Street fights for financial equilibrium.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A new idea that I can add to the articles presented for this reading would be another article about a traitor to Anonymous. Sabu, the head of LulSec, has been working with the FBI to have many hackers that have been part of Anonymous arrested (Biddle). In the article, the author discusses how the legendary hacker was brought to turning in fellow hackers because of his children (Biddle). Sabu did not want to go to jail and leave his children fatherless (Biddle). This shows that even high ranking people within this online revolution can be brought against the ideas they believe so dearly. It raises a lot of questions about the organization and its future.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what these articles state, especially the first Huffington Post article. The principles that Anonymous list as being unacceptable that are carried out by our government outrank the ones listed by our FBI. As read in previous chapters of A Gift of Fire, our government has torn down our privacy and online freedom (in some regards). I agree with the principles that Anonymous promote because they care about citizens and people, while some of the policies that the government have enforce(and currently do) do not seem to do that.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in todays society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

Giving that these articles only come from a couple months ago, and that Anonymous is still a very prevalent group in our culture, this is definitely a relevant topic in society. In reading these articles and having some prior knowledge of Anonymous, a word that consistently comes to mind is revolution. This group has stood up for so much, for the first time in so long, in the name of protecting our freedom and saying no to big business and our government. While I have my reservations of what the groups intentions may be sometimes, they report news that can be backed up by other sources that promote awareness of what our government is doing. However, there is a decent amount of ethical questioning that occurs in reading through these articles. With a group entitled Anonymous, how do you know who is really behind everything? How many people are like Barrett Brown who seems to be riding off the fame and claiming what Anonymous believes in?


References
Biddle, Sam. "LulzSec Leader Betrays All of Anonymous." Gizmodo. 6 Mar. 2012. Web. 15 Apr. 2012.

Friday, April 6, 2012

Watching/Thoughts: Steal this Film

Tom Burtless Class time: 11 A.M.

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):

1.This move has made me had a greater sense of pride in the piracy I have engaged in over the past few years.
2.How to popular/mainstream artists, musicians, authors, and film makers look at the idea behind piracy?
3.How will the movie or music industry embrace peer to peer technology the similar way they have embraced technology they resented before?




Foundation (UNDERSTANDING):
What is the Pirate Bay?

Pirate Bay is a website in which you can get torrent files from, to use in a torrent application such as BitTorrent or uTorrent. These torrent files connect you to a variety of peers who have the file that you are trying to obtain. Through this connection, you obtain the file or files (whether it be software, music, or movies).

What do they stand for (what is their mission)?

They stand for the distribution of information, through sharing it and spreading it as far possible.


What is their purpose for making and distributing this film as a free download?

To show how copying and distributing information has changed in our society. By adding to that in offering this movie for free, they show their point. Media and the people behind mass media today are trying to stop the sharing of information through the ways discussed in the film, and Pirate Bay embraces it.


Provide 3 referenced connections to Baase readings (LINKING).

1.Baase discusses Napster in section 4.2, which is heavily discussed in the movie (p.209, Baase 2008).

2.Baase talks about different audio labels utilized DRM technologies to try to prevent piracy, but they inevitably were hacked and put to extinction. This proves the resilience discussed in the movie of people to obtain information (p.216-217, Baase 2008).

3.In section 4.3 Baase discusses the retaliation made by the media industries towards individuals and groups of people trying to share movies and music. The movie discusses this same topic at the start of the film (p.213-214, Baase 2008).






There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):

1.Yochai Benkler - He is a representative from Yale Law School. He gives a perspective of the legislative background to the ideas and complications of piracy and modern day media distribution.

2.Aaron Swartz - He is a co founder of reddit.com, which is a huge website/forum in the Internet. He gives a perspective on the change that the Internet can bring, and how peer to peer type technology will be a staple for the information age.

3.Fred von Lohmann - He is an attorney. He gives a perspective similar to Yochai and Howard in which he talks about how new technology has been met with legal ramifications.

4. Howard Rheingold - He talks about the history of media, and its resilience to change. He discusses how has new technology has been introduced, Hollywood and the like have been resistant to adapt or include it. They end up trying to ban said technology, or give it a negative connotation.

5.Dan Glickman - He is the chairman of the MPAA, and discusses how media companies know that piracy cannot be stopped. However, they attempt to make it as difficult as possible. Glickman gives the perspective of the other side of the coin, in which piracy is not looked at in such a positive light.






Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):

1. Rick Prelinger - He runs a website of free movies called Prelinger Archives, that are available to anyone who visits his site. The goal is to preserve films of historic significance.

2. Sebastian Lutgert - He discusses his views on piracy from the point of view of a film maker, someone who creates these works of art that are being disturbed through peer to peer sharing.

3. Lawrence Liang - He is part of the Alternative Law Forum, and gives background into the social and legal implications of modern day piracy.




What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main idea being discussed within this film is that the sharing of information has existed since the dawn of man. Along with that, the desire to stop the sharing of information has existed since the dawn of man. Printing presses, cable television, sheet music, the video recorder once all had the negative connotations that peer to peer file sharing websites and methods have today. Over time, however, Hollywood and the like have learned to adapt to these new media types and embrace them. Baase discusses the issues of industry and legislation trying to adapt to new technologies and methods of sharing in section 4.2 (p. 204, Baase, 2008). Baase discusses the hardships that both people who try to share information and those who owned intellectual property had endured.


What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a peer to peer client, where you can upload and download files by connecting to another person (or seed). When you download a torrent file from a website like pirate bay, you connect to another peer (or variety of peers) to receive the end file that you desire. These files can be anything from software to television shows. After you have downloaded that file, you are then a peer for someone else who is trying to download said file. It has changed our society by allowing anyone with an Internet connection the ability to download a wide variety of media at the click of a mouse. While this has positive ramifications(an independent artist can put out his/her new album, or an software designer can show off a new program they have built), there are negative ones. People take copyrighted material and put it on peer to peer networks, allowing others to have media or software they have not paid for.

Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

Growing up in this early stages of the Information Age, I watched my brother utilize Napster right as it came out. Developing and early interest in technology and file sharing, I was using Kazaa, Bearshare, Morpheus and torrrenting/vpn client programs to obtain music and movies. However, anything I downloaded (in terms of music) would be bands that I have paid to see live or have bought a t-shirt of. Eventually I bought most of the music I have downloaded to support the artists I had grown to love. What file sharing had done for me is expose me to a variety of artists that would inevitably impact the rest of my life. It also allowed me to try out different artists before deciding whether it was worth my purchase. It was nice to see that online media retailers utilized this type of strategy, such as iTunes, which allows a preview of an album or song before you buy it. Baase touches on the innovations made by companies like this and how they took advantage of digital online marketplaces for media (p.224, Baase 2008).



Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)

I think that the future of media is right before our eyes. A popular band named Radiohead distributed their second last album "In Rainbows" on their website before it hit retailers. They offered their fans the option to pay whatever they wanted to buy the album. Instead of putting in stores, they offered their fans or consumers the option to pay what they wanted to. I think things like this are the future for all types of media. Its turned away from the producers and has focused on the consumers. Musicians and artists publicly announce that their fans should download their works for free because they just want them to hear the new music they have been creating. It is moving away from large record labels and towards artists taking independent control. As Baase discusses in 4.3, large companies are applying a digital approach to selling and distributing media. Baase talks about how iTunes and Amazon have now started to offer digital services that piggyback off the idea of digitally consuming media (p.224, Baase 2008).


Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

I don't believe it is. As Baase states in 4.1, "The key to understanding intellectual-property protection is to understand that the thing protected is the intangible creative work- not its particular physical form." Downloading someones album or movie isn't to change or copy the plots or ideas or musical notations, its to share that form of someones intellectual property.



How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

I don’t think people will pay for the end product of Intellectual property in 50 years, but they may pay for people to make new media and distribute it. I offer an example posed by the website Kickstarter. A game development company put out a Kickstarter campaign, which is essentially a donation website in which you can contribute to a variety of projects. Each project has to meet a set goal before it charges the people who donate, so the project can move forward. The game company, Harebrained Scheme, put out a request for $400,000 to build a sequel to their game Shadowrun. They reached this goal within 28 hours (Link to article: http://www.develop-online.net/news/40435/Shadowrun-Returns-on-Kickstarter). If you browse through Kickstarter projects, you’ll find a variety of musicians, movie makers, authors and so on who have started up projects to make new media. Perhaps this will be the way of the future; you pay for the types of media you want to see created. I think people 50 years from now will still share media and “pirate.” However, I think people will continue to financially support media outlets in the ways listed above.


Do you agree with what is being said within movie? Explain. (EVALUATION)

I do agree with what is being said in this movie. Creation of media is not strictly about financial goals or gains. Meeting a variety of musicians and going to a variety of concerts, I have heard a very similar statement repeated over and over again. That statement is, “I don’t care how you obtain our albums/recordings, but listen to us and download our whole discography!” Now while this may not be the case for every musician out there, it is for a decent amount. Being a musician myself and having had put out several albums, I could care less if people pay for it. But if people enjoy it and share it with all their friends, that is something to be celebrated. With that, even the MPAA knows that piracy cannot be stopped. Humans will always find a way to share information.


Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)

My opinion has been reinforced that media is not always about a profitable gain, but rather the desire to spread media. Culture, in regards to media, needs to celebrate its creation. By passing this media along, more people are involved and more people are connected. When I show a friend a song I like, or a movie I enjoy, it is because I want them to share that same experience of enjoyment and approval. Copying material isn’t out of the desire to avoid payment, it’s the desire to share, enjoy and connect to culture. I had never thought of connecting modern day piracy to that of the creation of sheet music or the print press. After the explanations of these comparisons I know have a greater understanding of how the idea behind piracy or copying of intellectual property is something that has existed before the dawn of computers.

Tuesday, April 3, 2012

Chapter 3: Freedom of Speech (Part 2)

Tom Burtless Class time:11 – 11:50

KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.4 – 3.6

1. (Knowledge)Tell three interesting elements of this chapter:

a. The McCain-Feingold Act actually detoured ordinary people from publicly expressing their views about politics.

b. Companies use lawsuits, based off what users say about them in varieties of forums and chat rooms, in order to identify these people and intimidate them.

c. AT&T agreed to follow net neutrality principles in 2007 for 2 years.

2. (Comprehension) Summarize what is being discussed within this chapter?

Within 3.4, Political Campaigning is being covered. Baase goes into details of how laws about political campaigns and contributions have had to be re-examined with the addition of such things to the internet. The FEC had been assigned to define what was deemed financially viable and beneficial to a political campaign. In 3.5, the author discusses anonymity. Baase talks about the benefits and disadvantages to allowing people to be anonymous in the internet. While it can help in situations such as hiding identity on an alcoholics anonymous forum, anonymity can be harmful if used on another message board to host and display child pornography. Section 3.6 discusses net neutrality and the deregulation of the internet. Net neutrality is the promotion that telecommunication companies must treat all information the same no matter who's connection it goes through. It promotes the idea that anyone should be allowed to access any piece of information on the internet.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

In the case of anonymity, consider an action figure forum. While action figures may be seen as something strictly for children, there are adults and older men who collect them as well. If a forum exists where there are both older adults and young children how is this forum to be moderated/watched? Should the older adults be allowed to contact the younger children? What blocks should be put in place so that young children cannot view potentially offensive material on said forum? What if an older adult tried to contact the child about potentially trading action figures? What would the implications of this be? There a lot of little niche communities that exist on the internet that make it harder and harder to make direct legislation about what information and how information should be kept anonymous.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

The situation of remaining anonymous when giving up personal information is something that not only exists on the internet, but in real life. The idea behind Alcoholics Anonymous reflect a similar situation as to what the author portrays in the book. Baase discusses how people who go on forums to talk about gambling problems or substance abuse use fake aliases so their personal information is not leaked out (p.180, Baase 2008). People in A.A. only use first names (or potentially fake names) so they protect their identities. The implications of this information leaking out could be disastrous for the person in question.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

The topics portrayed are a little to too widespread to give an overall agreement or disagreement. The viewpoints portrayed in political campaigning and anonymity are ones I do agree with. Based off what Baase says at the end section 3.4, even the Supreme Court deemed that rules about political campaigning as defined in the McCain-Feingold Act were unconstitutional (p. 179, Baase 2008). The fact that this act prohibited a movie critical about president Bush during his time in office, and wouldn't allow Amazon or eBay to display ads for new books by candidates shows that it need to be adjusted (though it was thrown out all together) (p.177, Baase 2008). Anonymity on the internet I agree with, but within certain confines. Users who are on forums discussing personal matters, as the way described at the end of section 3.5.3, should be able to disclose information without having their real names put on the internet (p. 185, Baase 2008). However, people who post child pornography should have their real names exposed for engaging in illegal activity as described in section 3.5.1 (p.181, Baase 2008).

On the topic of net neutrality, I disagree with Baase.  An article from ARS Technica discusses how Comcast is unveiling an on demand service exclusive to the X-box 360 (Lee). This exclusive service does not count towards the 250 gigabyte monthly cap already set in place by Comcast for when users stream on demand content on their laptops or other devices (Lee). This service has net neutrality supporters up in arms, saying that "raises questions not only of the justification for the caps but, more importantly, of the survival of an Open Internet (Lee)." While I do agree with the fundamental idea that all content on the internet should travel equally through all broadband lines, I differ on this opposition made by net neutrality supporters. In order to get this service from Comcast on the X-Box 360, you need not only Comcast on demand service but an X-Box Live gold membership (which costs $59.99 a year). Is it unfair for people who pay so much for these services to be denied something exclusive? I do not believe so.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is only relevant in today's society. The internet is always growing, and doesn't seem to be stopping. The legislation put onto the internet is something of dramatic concern. The internet is massive landscape with a wide variety of information, so its hard to make laws that cover every single aspect. There are many ethical issues involved with these sections. Is it right for companies to give out user name's real names on forums or messaging programs (p.184, Baase 2008)? Should internet service providers have to create a level playing field for the services they put out versus other companies? Should internet service providers treat specific content differently than other content? These are questions that are hard to answer, which have many sides to them. New ideas I had after reading this chapter were thoughts that different internet service providers could provide different content (or treat content differently). It never even crossed my mind that different providers may block or favor certain things on the internet over others.

References

Lee, Timothy B. "Law & Disorder." Ars Technica. 26 Mar. 2012. Web. 03 Apr. 2012. <http://arstechnica.com/tech-policy/news/2012/03/net-neutrality-concerns-raised-about-comcasts-xbox-on-demand-service.ars?clicked=related_right>.

Monday, April 2, 2012

Chapter 3: Video's and Prezi

My Prezi discusses the topic of freedom of speech, and how censorship in different countries across the world are limiting their citizens from viewing certain thing on the internet. Whether for reasons of offending other citizens, or attempts by the government to control what people see, freedom of speech is limited in a lot of areas around the world. My Prezi also relates 5 videos that were watched regarding the topic above to the book "A Gift of Fire" by Sara Baase.

The link to my Prezi is below:


http://prezi.com/qc8xvx387_g_/freedom-of-speech/