Sunday, November 20, 2011

Chapter 8: Errors, Failures and Risk

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 8: Errors, Failures, and Risk

1. (Knowledge)Tell three interesting elements of this chapter:
a. A big reason for the problems with the elections of 2000 was that many of the names who voted in Florida had the same names as convicted felons, therefore a recount was in order (Baase, 409).
b. Devices such as Blackberries and portable gaming systems case repetitive strain injury, which is a pain in the joint area (typically by the hand) which can be very crippling (Baase, 411).
c. “Fly-by-wire” planes make it so that pilots indirectly tell the plane where to go by inputting commands; they don’t like this, as there is a lack of familiarity and it feels as if the plane has a “mind of its own” (Baase, 422)

2. (Comprehension) Summarize what is being discussed within this chapter?

With technology, it is hard to have a system that is completely error proof. However, this can also lead to devastating effects. From things such as billing errors (A woman being charged 6.3 million dollars instead of $63 for her electric bill) (Baase, 407), to an error election where a recount is needed as names match up with those of convicted felons, errors in technology have a clear and sometimes threatening effect (Baase, 409). The factors that cause this are a large population, automated processing without human common sense, overconfidence in the accuracy of the data, errors in data entry, the failure to update and correct errors, and a lack of accountability for errors (Baase, 410). Repetitive strain injury is caused by mini-keyboards and buttons on small devices, and while companies are trying to make these devices less straining on people, it is still up to the person to use the technology reasonably (Baase, 412). Even errors such as weather data not appearing can do something as extreme as ground every airplane and cancelling flights (Baase, 413). Voting on electronic terminals comes with its own issues; one county lost 4,000 votes because the system’s memory was full, and one county in Texas gained 100,000 votes out of the blue. Another concern is whether or not one can hack these terminals or not (Baase, 416). Many systems are abandoned, such as a supply management system a British food retailer invested $500 million into. Robert Charette estimates that 5-15% of these projects are scrapped for their inadequacy, which can be quite costly (Baase, 419). A legacy system is an out-of-date system still in use while fitted to work with modern systems – an example is the 3x5 card used by airlines to mark a reservation. Of course, older software fails more often, uses older computer language, and is hard to find replacement parts for. Companies keep legacy systems due to cost issues, the learning curve of new technology doesn’t apply, and the transfer of info to the new system may be disruptive (Baase, 420). “Fly-by-wire” planes, where the pilot inputted commands for the plane to follow, resulted in four crashers, as there was a lack of familiarity with pilots, as well as errors by the plane itself (In one case, the plane wouldn’t let the pilot break as he dismounted, as it didn’t know that he had dismounted) (Baase, 422). While there’s criticism, since new technology, there have been 76% more trades in the stock market and air travel accidents have decreased 60% from ten years earlier. It is also hard to tell if the technology itself is causing problems, or human skepticism of technology itself is also to blame (Baase, 424). Therac-25 is a radiation therapy machine that has accounted for massive overdoses and 6 deaths between 1985 and 1987. While only 100-200 rads were supposed to be administered, patients got between 13,000 and 25,000 (Baase, 425). A big issue with its hardware was that it eliminated hardware safety features, and because of this it frequently malfunctioned and underdosed, error messages were so common they were ignored, and not even the manual explained the strange error messages (Baase, 426). The Set-Up period was supposed to read a zero reading from the device to start it up, though it didn’t matter anyways, as after 256 nonzeros, the machine would incorrectly read zero anyways. Only some parts of the machine understood human edits, where the other parts never acknowledged them (Baase, 427). Errors in technology have an impact in our lives, whether it simply results in a silly typo or a machine that overdoses with radiation.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation I run into is with the GPS (and other location-based services) in my phone. For the most part, it runs smoothly, can help me get to point A to B painlessly and is fast. However every now and then it won’t load correctly (or at all), it will give me an overly painful and incorrect route to get where I want to go, and sometimes it won’t even correctly tell me where I currently am (at one time it told me I was somewhere in the nation’s capital). While this doesn’t hinder me much, I can easily see how it can be devastating to someone planning a cruise on it or trying to find somebody’s house.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

One thing that strikes me is that while the blame is put on technology, human error also plays a part, as it does in almost every scenario. Regarding the Therac-25 scenario, technicians ignored “error” messages simply because they always showed up, and in another scenario technicians overdosed their patients simply because they mistook curies and millicuries (levels of radiation dosage) (Baase, 429). Human error also shows itself, as with technology that does not work correctly, it must take a human that did not put enough effort in the program to ensure everything worked, even including something as simple as making sure information in the credit bureau is correct and up-to-date (Baase, 408). We can wag our fingers at technology all we’d like, but the fact of the matter is that there will always be someone who did not test the technology as well as they could have, which can amount for the errors in technology.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with the fact that technology can bring devastating errors, some as serious as crashing a plane because something is not being inputted correctly, and some can even bankrupt businesses (Such as the Warehouse Manager program mentioned on page 414 which gave false prices and in actuality made everything much slower). I have concluded that as painful and time-consuming as it may be, we must do our very best to make sure absolutely every kink is worked out in technology, as some people rely on this technology with their lives. We must not become overconfident in the success of the technology and always make sure everything is working perfectly, as this will severely lower the error ratio that we are used to seeing.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

While it is a very relevant issue in today’s society, I am hopeful that as time goes on and technology becomes more sophisticated that it won’t be as much of an issue (though that doesn’t mean we shouldn’t continue to second-guess the technology for safety’s sake). With technology that dictate whether we live or not (such as those pertaining to radiation therapy), we must always check every system as much as possible and make sure it is working correctly, as if we don’t it doesn’t seem much better than human experimentation due to negligence. There will always be errors, regarding technology as well as everything else, but we should still do everything we can to make as little errors as possible.



Therac-25

One resource on the web that I found particularly useful detailed exactly everything that happened in the Therac-25 situation. It details how the machine works, it’s problems, why they happened, as well as detailed accounts of the victims. It seems that a lot of the problems Therac-25 is so popular for stem from the fact that AECL went ahead and made the software do everything whereas it only regulated some functions in earlier models. Making it more user-friendly, eventually led to many of the problems that occurred with it (Especially in the case where the operator only pressed the up arrow and enter to change the mode, and continued to do so when an “Error-54” message showed up). It’s also interesting to see how AECL flat out ignored the issue until the FDA began to investigate them; before the fifth incident, their excuses would range from an electrical issue in the facility to it simply being “impossible” that it would malfunction. Even when they attempted to make it safer, they didn’t know what made it unsafe in the first place. More information on Therac-25 can be found at http://users.csc.calpoly.edu/~jdalbey/SWE/Papers/THERAC25.html

References

Baase, Sara. "Chapter 8: Errors, Failures, and Risk." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Porrello, Anne. "Death and Denial: The Failure of the THERAC-25, A Medical Linear Accelerator." Cal Poly - Computer Science and Software Engineering. Web. 19 Nov. 2011. .

Sunday, November 13, 2011

Chapter 6: Part Two

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6: Crime (Sections 6.4 and 6.5)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Embezzlement is an important factor in employee crime, an example being Volkswagen, which lost over 200 million dollars in a fraud committed by high level employees (Baase, 333).
b. A “logic bomb” is software that destroys critical files; while sometimes for sabotage, some employees do this so they can be paid more to fix the problem (Baase, 333).
c. The Electronic Communications Privacy Act prohibits interception of email and reading of said email without a court order, however employers are given this power, and the act is much more lenient on them (Baase, 340).

2. (Comprehension) Summarize what is being discussed within this chapter?

With computers, employee crime has become much more common. Embezzlement, the fraudulent appropriation of property by a person to whom it has been entrusted, is easier to accomplish with computers (Baase, 332). The anonymity and complexity of computers makes this a far easier task to accomplish. Sabotage is also possible through a tool called a logic bomb, or software that destroys files such as the payroll. Rotating desks and ID checkpoints have been used to counter these crimes, though it still goes on (Baase, 333). Employee monitoring has also become much simpler, and as Cindia Cameron says, “technology now allows employers to cross the line from monitoring the work to monitoring the worker.” In the past time clocks and assembly line speeds dictated worker productivity – now computers make it more accurate and detailed. Cameras that link to individual computer monitors and keystroke counting are just a few of the measures put in place to supervise employees (Baase, 335). Recorded calls and beeping to signal a lack of work taking place has deemed this type of job an “electronic sweatshop” by critics. This monitoring may cause loss of independence, stress, low morale, and a general feeling of being a machine to employees (Baase, 336). Lewis Maltby wants to regulate employee monitoring, calling it a “blessing in disguise” to employers, as it would cause more long term loyalty and productivity (Baase, 337). E-mail privacy has also become an issue, especially if the employee uses the address for more personal reasons (Baase, 339). However it does have its practical uses, such as to check for offensive material, illegal software, and to investigate harassment claims. The Electronic Communications Privacy Act prohibits the interception of -email and reading of e-mail without a court order, however employers are excluded from this (Baase, 340). Online web surfing is also heavily blocked, though for more reasonable objectives; this keeps the employee productive and working for their money, and also protects against the threat of viruses (Baase, 343). Technology plays a large part in the workplace, and not only brings up issues of internet crime, but privacy as well.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One example of employee embezzlement involves Kimberly Sziraki, an individual who took 1.6 million dollars from the Merced nut processing plant that she worked at. Facing a maximum of 17 years in prison, Sziraki stole this money from the company within three years, mainly to feed her online gambling addiction. The most interesting part of this is that she was a manager at this plant. It goes to show that it doesn’t matter what position of power you are in, embezzlement still happens, and may even be easier for higher power workers. More info can be found at: http://www.mercedsunstar.com/2010/06/11/1456054/kimberly-sziraki-pleads-no-contest.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

On page 334, it is stated that “Computers don’t steal – people do”. By this argument, embezzlement is just human greed made easier through new technology. This eases and agitates some concerns about technology and crime in the workplace, as the technology itself is not the problem and is not looking to harm people – at the same time, this makes a crook even more powerful than what they could be without the technology.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree that embezzlement makes it much easier to commit corporate fraud; as Baase states on page 333, the anonymity and complexity of computers makes this a much simpler task. One example of this is Volkswagen, and its $200 million loss to employees partaking in a foreign exchange fraud. With logic bombs, sabotage is also easier, as while it may be just for the sake of sabotage, it may be so the employee is paid to fix the problem they created, which may be a form of embezzlement in itself. I agree with Lewis Maltby in the sense that excessive employee monitoring is problematic, and a regulation of it will increase loyalty and productivity in the end (Baase, 337). E-mail monitoring, while somewhat justified, should have parameters; simple criticisms of the company should not get one terminated. There should be filters put into place that only allows the employee to e-mail coworkers at work, as private e-mails may distract from work and also allow viruses to enter the workspace.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is relevant in today’s society as technology is continuing to have a massive effect on our careers. Embezzlement is a serious workplace crime that is committed without people knowing in some cases, as it is very easy to hide. Workplace monitoring is considered unethical in some instances, and even a blow to productivity. As food for thought, I believe that workplace monitoring may actually help to decrease embezzlement cases (except for in the case of management committing it), however it may not work at that level due to criticisms that will emerge of said monitoring becoming even more powerful than it was previously considered.






References

Patton, Victor. "Kimberly Sziraki Pleads No Contest in $1.6 Million Embezzlement Case."Merced Sun-Star. 11 June 2010. Web. 12 Nov. 2011. .

Baase, Sara. "Chapter 6: Work." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Sunday, November 6, 2011

Chapter 6: Work

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6: Work

1. (Knowledge)Tell three interesting elements of this chapter:
a. Telecommuting is the practice of working at a distance from an office or factory via computers, and has been increasingly common.
b. Old jobs are simply replaced with new jobs requiring the use of technology, and a flexible and educated economy will gain many jobs from this.
c. Offshoring refers to the displacement of work to companies/workers in other countries for a lower wage, and many believe this threatens job security for US workers.

2. (Comprehension) Summarize what is being discussed within this chapter?

With the computer age, work has been vastly redefined, and gained its own advantages and disadvantages. Many are worried that there is vast unemployment due to the increased efficiency of computers (Baase, 308). There is a clear impact on employment, as between the periods of 1983-1993 37% of bank teller jobs were lost to new technologies. As said by an Exchange official, “What was once done by our people is now done by technology” (Baase, 309). This stems from the idea that with more efficiency, less people need to work on the task. However, one can argue that productivity has increased dramatically (long distance calls increased from 9.8 billion to 94.9). With the loss of old jobs comes new ones aimed at using newer technology (Baase, 310). A net increase of 17.8 million jobs has occurred, demonstrating a flexible economy. In order to maintain this growth we must stay flexible and educated (Baase, 312). While after 1970 wages declined by 10%, fringe benefits also increased by 17% (Baase, 313). The standard of living has also increased, as it has become quicker to have the money for necessities such as food, and has also improved the quality of housing (Baase, 314). Safer environments were made, as cars are safer and materials such as radioactive dye were replaced with ultrasound. Working hours have declined since the earlier periods before this technology. However for many of these new jobs a college degree is required, therefore the benefits are not distributed as evenly to those who aren’t educated or cannot afford the education (Baase, 315). Some worry about the devalue of human intelligence as computers will now do most of the smart work (Baase, 318). Offshoring, the practice of hiring companies/workers from other countries for a lower wage, has become common practice. As of 2004, 12% of all information and technology companies offshored, more commonly to India. However it has its merits; this offshoring is what helped Ireland gain the financial boom that it so needed (Baase, 319). Knowledge work, or offshoring of more skilled work, has also become a large issue (Baase, 320), and while only 50 or so jobs are lost a month to offshoring now, experts believe it will only become a more common practice (Baase, 321). Other problems arise, such as irregular hours to workers in India, the inflation of the amount US companies need to pay Indian workers, and general disdain for call centers by the US population (Baase, 322). Needless to say, there are sides for both arguments regarding whether it is justified or just plain immoral. Searching for jobs online has become much easier with the rise of sites such as Monster.com, and training is very easy to come by (Baase, 325). Telecommuting, the practice of working for a company from home, has been on the rise, as these workers don’t even have to live in the same city as their employers. Obvious benefits are increased productivity, savings due to smaller company offices, and more employee satisfaction overall (Baase, 328). There are dissenters, and these people believe that productivity is actually decreased due to lack of supervision, that people are working too long or hard, and that it is generally more stressful. Some believe this also cause a sense of isolation for the individuals who partake in it. Using a computer for both personal and work-related objectives can be dangerous if a hacker were to gain access to this information (Baase, 329). Kotkin believes that this encourages the individual to engage more in their local community, however others still believe alienation is a more plausible outcome (Baase, 330). On the other hand, this makes small independent businesspeople able to create an at-home business that can make it big (Baase, 331). Some examples of this are eBay, Google and MySpace. Others believe that large companies are also profiting via actions such as merging with other companies and buyouts with small companies that may threaten their security (Baase, 332). Nonetheless, it is easy to see how drastically new information technology has affected the notion of work.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
One situation I have experienced is the outsourcing of jobs by General Motors automotive company. For many years, GM has been offshoring to China, Mexico, South Korea, Japan as well as many others. GM has been drastically cutting its labor, my father being one of the many people who were laid off and forced to find other jobs. One article I found online was particularly useful in both explaining what it’s currently doing, as well as public dissent towards it: http://www.economicpopulist.org/content/gm-offshore-outsourcing-us-jobs



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

On page 310, Baase says that new technologies don’t destroy jobs, but rather create new, more advanced jobs to look forward to. I feel that this has been the case throughout history and people may just not realize it; Gutenberg’s printing press was probably critiqued in the sense that it would replace people who wrote articles that were not as efficient, but it is without a doubt labor has only increased since. The same goes to the weaving machines Baase mentions on page 309 – they were burned as people thought it would destroy their jobs, however since there has been no horrible numbers showing a decrease in the amount of jobs.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with the idea that new jobs can thrive with new technology as long as the people stay educated and the economy stays flexible. On page 310 it is explained how the two goals of reduction of resources and increase of standard living have been met, which is proof enough that technology is not the demon we see it as compared to the job industry. One great example is the retail industry; in the technology age, it grew 3% in only 3 years, while jobs as a whole increased by 6% (Baase, 311). I believe as long as we stay flexible we should not be wary of new technology, but to embrace it.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is relevant in today’s society, as more and more we are seeing jobs more involved online, and automated tellers and checkouts are becoming exponentially common. My stepfather telecommutes from his home office, and I can see the positive outcomes this chapter describes, such as more involvement in his community (he has a lot of time to go out and do what he needs to get done), and he seems much happier with his job than his old one of ten years back, where he worked in a small cubicle. Utilitarianism, while somewhat of a gray-area concerning offshoring, is an interesting way to look at it; does it support the number of dollars given (in which case the US would be the main concern), or does it concern the amount of dollars saved (shifting the interest to India)? After reading this chapter I am interested to see where the job economy goes, and whether the US as a whole will be able to keep up with its demands with higher technology that is created.




References

Baase, Sara. "Chapter 6: Work." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Oak, Robert. "GM Offshore Outsourcing U.S. Jobs." The Economic Populist. 9 May 2009. Web. 06 Nov. 2011. .

Sunday, October 23, 2011

Chapter 5: Crime

Name Robert Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. There is both white-hat hacking and black-hat hacking. White-hat refers to those who do it for the simple thrill or to expose threats to companies, while black-hat refers to those who hack to commit a felony (Baase, 257).
b. Hacktivism has become an important term since hacking began, referring to the hacking of a site for a political cause; it is very subjective on whether this is a crime or not because of the political aspect (Baase, 263).
c. Some companies hire those who have hacked them, as they can help the company fix massive loopholes in their security system (Baase, 268).

2. (Comprehension) Summarize what is being discussed within this chapter?

With computer technology, theft of information has become much more severe; while robbing a bank would get someone near 5,000 dollars, computer crimes go past $100,000 (Baase, 253). Hacking was originally a positive term referring to those who exposed systems for their flaws for the sheer fun of it, but once hackers realized the potential of this in the digital age it was viewed with more disdain. The New Hackers Dictionary describes a hacker as a person “who enjoys exploring the details of programmable systems and how to stretch their capabilities; …one who programs enthusiastically (even obsessively)” (254). Hacking as many websites as one could soon became a goal. In the 1980’s a German hacker broke into US computers in order to sell information to the Soviets. Social engineering – fooling people into disclosing info – became a key part of finding out the information on a person (255). Hackers refer to malicious hackers as “crackers”, and white and black-hat hackers helps to explain the differences between the two groups (257). Security Researches are hackers who expose flaws to show them to the company, even though the company may be slow to respond (258). Viruses such as the “Love Bug” have caused over 10 billion dollars in damage. Denial-of-service attacks overload websites to shut them down; 15-year old “mafiaboy” did this while finding a script to do so on a site intended for “script kiddies”. Zombies are computers that the hacker has complete control of, which can have dangerous consequences (260). Hacktivism is hacking to promote a political cause; one example of this is when three teenagers hacked into an atomic research center in India to protest their use of nuclear weapons. However these goals became an easy cover for more dangerous hackers to hide their work. Hacktivism is debatable concerning its legality, as politics are completely subjective, and what may look like a statement to one person may look like a felony to another (263). The Computer Fraud and Abuse Act of 1986 protects areas where the federal government has jurisdiction, as well as computers connected to the internet. The Patriot Act expanded on the CFAA, including with it the costs of responding to the attack, assessing the damage and restoring systems, as well as increasing the harshness of penalties - a 1st offense became 10 years of incarceration instead of 5). The government can also spy on suspected hackers without a warrant (265). Through computer forensics, experts can track hackers through tracking their ISPs and hidden serial numbers in Microsoft Office, though hackers eventually wised up (267). Unfortunately due to the complexity of computer systems and the constant updates in software, it is hard for the web to be fully secure (269). The Defense Information Systems Agency reported 500,000 attacks on the Defense Department, 65% of which were successful and less than 1% were detected (270). Firewalls were created to monitor incoming information and filter out suspicious items, though hackers have been known to find loopholes in these as well (271). People have thought of criminalizing the scripts that cause damage themselves, however this would make research very difficult, and also violates freedom of speech, which becomes an issue (273). Identity theft is easier than ever through card numbers, SSN and files, and a security company executive even says that, “A complete identity sells for less than $20” (273). Phishing is a common tactic where millions of emails are sent to fish for info used to impersonate someone and steal money and goods; this is a form of social engineering as a lot of trickery is involved to extort it from the victim (274). There is also pharming, which is similar except that it lures people to a false website. There are other methods as well, such as recording keystrokes and Trojan Horses, defined as malicious software hiding in an apparently innocent program which is downloaded willingly (275). There have been measures to prevent fraud, such as software in banks that look for fraudulent activity and secure payment sites such as PayPal (277). In 1998 it became a federal crime to use another person’s identification with the intent to commit a felony. Other preventions of fraud are expressed through fraud alerts, which are flags on a person’s credit report that forces a bureau to call you for confirmation if a new account is opened (280). Through biometrics – biological characteristics unique to an individual – protecting information has been thought of as much more effective, providing measures such as fingerprint and retina scanners (281). However it has been proven that these systems can be fooled, and if a criminal were to get this specific of information the results may be devastating (282). Hackers and thieves make the internet a sketchy place to be, as there is little you can do to stop a hacker besides hope for the best that your trust is placed in the correct websites.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One situation of potentially dangerous hacking deals with Mark Zuckerberg, CEO of Facebook himself. In the early years of Facebook, it has been found that Mark would use login information to hack into peoples’ private email accounts, and while the purposes were unclear it is still unethical. It is also found that he hacked into ConnectU, a competitor, and changed information to his liking (More on the incident can be found at http://articles.businessinsider.com/2010-03-08/tech/29969831_1_facebook-mark-zuckerberg-business-ethics). I have also recently experienced an event dealing with identity theft; about a month ago my mother bought from a less than secure website, and about a week later her card was cancelled. Someone had gotten a hold of her information and went above and beyond her credit limit to buy extravagant items (thankfully the bank caught on and did not hold her liable). Nevertheless, this is an example of how easy it really is to have your information stolen.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

The chapter talks about fraud through the internet, but it also makes a good point about fraud in general. On page 281, Baase states that a good chunk of identity theft occurs when a wallet or checkbook is stolen, not just when info is given out on the internet, so even outside of the internet one must be wary of their surroundings. While there will always be hackers, I believe all sites should incorporate PayPal as the default payment option; on page 277 Baase goes into how secure PayPal is and how it is the most secure payment site on the web. If all shopping sites were to default to PayPal, I believe it can stop a lot of identity theft.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I believe that hacking and identity theft are very real – and scary – realities, not to mention one that will always be as advanced as the technology that tries to protect people from it. Hackers are known for their tenacity and love for exposing flaws, so when new technology comes out that makes everything more secure, criminals on the internet will find new ways to go around it, or they’ll come out with new technology (such as skimmers) to make their job even easier than before.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very relevant to today’s society, as a large chunk of society owns a credit card (and everyone has an SSN), so everybody is susceptible to identity fraud. Hackers can make the internet – as well as the computers they hack – their plaything no matter how hard we try to protect it sometimes. As people who use the internet, we constantly run the risk of being attacked by these digital criminals, and when we become privy to one of their tactics, they will simply come up with a new one. This shows how exceptionally important it is to keep personal information to yourself at all costs, even if it means alienating yourself from online shops and using paper money more often.





References

Baase, Sara. "Chapter 5: Crime." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.


Blodget, Henry. "Facebook CEO Mark Zuckerberg Needs To Address The Hacking Incidents." The Business Insider. 08 Mar. 2010. Web. 22 Oct. 2011. .

Sunday, October 16, 2011

Chapter 4: Steal This Film II

Rob Feind Class time: 11am

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):
o I thought it was interesting how at one point the Pirate Bay was compared to Google, as a good point was made. Essentially, the Pirate Bay simply indexes what people decide to put on it, as Google does with websites, which I considered a very interesting argument.
o Another intriguing point is how 18th century publishers using printing presses had very similar issues. The fact that they weren’t allowed to copy certain works (and would be apprehended if they did) rings true to this situation, and questions the same parts of freedom of speech that persecution of internet piracy does.
o At the end, the movie mentions that 35% of internet traffic is due to internet piracy. Not only does this show how significant this is to today’s society, it also shows that piracy is becoming an unstoppable force and will be impossible to be fully persecuted against as time goes on.



2. Foundation (UNDERSTANDING):
a. What is the Pirate Bay?
The Pirate Bay is a peer-to-peer file hosting site where people can share virtually anything, from music to games to movies. While it has legitimate purposes, many people use it to pirate movies.
b. What do they stand for (what is their mission)?
Their mission is to connect people and help share information as freedom of speech intends. They also encourage the promotion of work that otherwise wouldn’t be known (such as the “Grime” movement), hoping to connect more ideas as time goes on.
c. What is their purpose for making and distributing this film as a free download?
Their purpose was to inform more people about piracy and the issues and debates surrounding it. They were also making an important statement by distributing it for free, as that is exactly what they push for with such file hosting sites, declaring it a necessary freedom.



3. Provide 3 referenced connections to Baase readings (LINKING).
a. The Rio mp3 player was mentioned in the movie as well as A Gift of Fire; in the movie it was mentioned how it couldn’t be prosecuted for being the medium of mp3 files, and the link is made to the Pirate Bay not being able to be prosecuted for being the medium of all works found on the internet. (Baase, 214)
b. The issue of Napster being shut down was mentioned in both the movie and the book. In both sources, it is mentioned that this was the first attempt for file sharing online, and even though it was shut down, it started the movement to share all types of files on the internet through peer-to-peer sites. (Baase, 209)
c. Sony’s video recorder being under fire is also mentioned in both of these sources. Both sources mention how the movie industry wanted to come down hard on this technology as they thought it would ruin the industry even though it was only used for private reasons. (Baase, 207)




4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):
a. Peter Sunde – Co-owner of the Pirate Bay, and one of the ones on trial. He firmly believes that he has the right to host everything for everyone, and to do otherwise would infringe on our freedom of speech.
b. Rick Prelinger – The owner of a vast internet archive site. Prelinger acknowledges how important intellectual property on the internet is, as he is in a similar business. He also discusses how despite all the issues, suits won’t solve anything as there are too many users who partake in internet piracy.
c. Erik Dubelboer – Owner of mininova, another renowned file sharing site. Dubelboer believes that suits will realistically do nothing to stop peer-to-peer hosting; he thinks they are too aggressive, and are rarely actually effective.
d. Rasmus Fleischer – A part of the Bureau of piracy, Rasmus discusses how the WTO would place trade sanctions against Sweden if they did not take action against the Pirate Bay. He firmly believes this is another effort by America to try and police the world.
e. Frederik Neij – Another owner of the Pirate Bay. In court he mentioned how his hosting site is no more different than Google, as they index in very similar fashions. “If we are guilty, then Google is guilty.”



5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):
a) Peter Sunde – Co-Owner of the Pirate Bay, a strong advocate for file hosting and ending corporate greed.
b) Frederik Neij – Another advocate of the Pirate Bay with Sunde, Neij doesn’t see what he does as inherently wrong, as they are only providing a medium for users to share information with each other.
c) Yochai Benkler – A Yale professor, he argues that the spread of information is something we are entitled to, and more importantly, something he thinks will be unstoppable as file sharing continues to grow in strength.



4. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main ideas being discussed are that file sharing and hosting is becoming an increasingly significant issue, as well as one that government agencies are constantly trying to crack down on. On one note this persecution is justified, as in A Gift of Fire, it is stated that affecting the market and the work as well as hosting the files themselves (unless the site takes actions to remove the content, which the Pirate Bay had no intention of doing) are reasons enough to make the activity look illegal (Baase, 205-206). However, Baase also put forth the idea that these peer-to-peer sites and tools only act as a medium for people to post information, and because of this should not be frowned upon as some such as the movie industry do (Baase, 211).



5. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a tool used by people to download files on the internet that would otherwise have copyright protection, such as music, movies, games, etcetera. This has greatly changed society, as even as some of the interviewees in the movie have said, people rarely ever buy CDs anymore and some don’t even see it as something you should spend money on now.



6. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

I see connections as it is mentioned that 35% of internet traffic is due to piracy; I myself know several people who use these peer-to-peer hosting sites and applications (In fact, 9/10 people I know), so this statistic seems correct, if even a bit small. There is another connection in society in the sense of the Digital Rights Management materials Baase mentions; these are a normal part of iTunes, and while it keeps music from being stolen, it still has issues with new computers, operating systems and etcetera (Baase, 215).


7. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)

I personally believe that such piracy on the web may cause some artists to show a decline in creativity due to the easy spread of things and lack of money involved, however at the same time I picture it increasing creativity for young independent artists who are simply trying to gain a fan base. With increasing technology I do believe that copyrights will become a thing of the past, as in the video it is even told that file sharers are growing by the day, and even at today’s numbers it is impossible for authorities to shut something like the Pirate Bay down. I believe the Information Age will make Intellectual Property very irrelevant.



8. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

Downloading to me is not entirely stealing somebody’s intellectual property; as an example I’ll use a band. Because of the fair-use doctrine, one can argue that it deprives the members of their income as people are downloading albums for free, and that in turn lowers their value on the market (Baase, 206). However at the same time this is creating a larger fan base for the band, and while CD’s are being downloaded, that means more people will attend concerts of theirs, buy band merchandise, and maybe even buy an album regardless to show appreciation. Considering most money that is made from albums goes to the record company instead of the artist, this isn’t always necessarily stealing someone’s intellectual property, as the band is still getting money out of it in the long run.



9. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

In 50 years, I feel that intellectual property will either be completely impossible to enforce, or that the government will have strong enough restrictions on the internet to stop sites that BitTorrent once and for all. At the rate it is going, it’s plausible to believe that the government won’t be able to do anything about the copying of intellectual property and that file sharing may even send us into a new era with new concepts of this being introduced. However, it is also possible that the government will get tougher on these sites and start shutting them down, making sure torrent sites are not used, and those who create or use them will be persecuted. In that scenario, I see our internet becoming similar to that of China’s or India’s, though I do not personally believe we will take that route.



10. Do you agree with what is being said within movie? Explain. (EVALUATION)

I am conflicted with the message being sent in the movie. In a sense I do believe that hosting files on sites such as the Pirate Bay is the ultimate form of freedom of speech, and creators of such sites are only trying to link people together, help indie groups be heard, and show us what the internet is truly capable of. At the same time, I do believe a publisher is entitled to their rightly earned money and recognition, and torrent sites may take this away. Also, for some this will definitely cause a drop in creativity in works, which is something that is understandable regarding the nature of file sharing.



11. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)

I cannot say my opinion has shifted, as I have always thought that people have come down too hard on peer-to-peer applications and sites, and that whatever they do is their own business. I say if people want to share movies, music, games and more over the internet, they should be allowed to do so, despite others seeing it as immoral or unfair to the publisher.

Saturday, October 15, 2011

Chapter 4: Musicians Look Por Pay In An MP3 World

Laura Sydel makes a point that with the spread of music on the internet, sales in music have gone down tremendously. As Attorney Don Passman says, "You can't compete with free", and Sydel believes that this will also lower the value of music that will be created in the future, considering that if artists know it'll be available for free on the internet, they won't work as hard at it (For the 2 billion songs iTunes sells a year, 15 billion a year are pirated). What differs in this audio segment is that Laura Sydel argues that this may actually help some artists. The video becomes different from the Lars Ulrich standpoint when she mentions Jonathan Coulton, a low-key artist who posts his music online. Coulton says that he gets a fanbase from doing this, a benefit which many artists overlook. He also says that he has much more freedom than if he were to sign with a record label, and while he isn't making fortunes, he has made enough to quit his day job.

Chapter 4: Chuck D and Lars Ulrich

While Erik Schmidt sees property rights as fundamental in today's world, he wants publishers to be represented but also wants to encourage the use of such intellectual properties. He believes all this info should be available to people but made out in a way so that people would not mind paying for it (he gives iTunes as an example, as they charge a small amount per song and it's enough for people to want to use it). Chuck D has no problem with the sharing of music on the internet. He argues that while the invention of radio and cassette players also threatened intellectual property, it has done nothing wrong. In fact, he argues that putting music on the internet is a great way to expose people to music which may even be the next big thing, and he believes people should not be restricted from that. Lars Ulrich believes differently and wants this restricted. He says that while it isn't about money, it is about control, and that the publisher (in this case Metallica) should have the rights to distribute it and give it to the public, much like albums they sell. In his eyes this may devalue his own work and in turn the market prices for his work, which is a key issue at stake.