Sunday, November 20, 2011

Chapter 8: Errors, Failures and Risk

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 8: Errors, Failures, and Risk

1. (Knowledge)Tell three interesting elements of this chapter:
a. A big reason for the problems with the elections of 2000 was that many of the names who voted in Florida had the same names as convicted felons, therefore a recount was in order (Baase, 409).
b. Devices such as Blackberries and portable gaming systems case repetitive strain injury, which is a pain in the joint area (typically by the hand) which can be very crippling (Baase, 411).
c. “Fly-by-wire” planes make it so that pilots indirectly tell the plane where to go by inputting commands; they don’t like this, as there is a lack of familiarity and it feels as if the plane has a “mind of its own” (Baase, 422)

2. (Comprehension) Summarize what is being discussed within this chapter?

With technology, it is hard to have a system that is completely error proof. However, this can also lead to devastating effects. From things such as billing errors (A woman being charged 6.3 million dollars instead of $63 for her electric bill) (Baase, 407), to an error election where a recount is needed as names match up with those of convicted felons, errors in technology have a clear and sometimes threatening effect (Baase, 409). The factors that cause this are a large population, automated processing without human common sense, overconfidence in the accuracy of the data, errors in data entry, the failure to update and correct errors, and a lack of accountability for errors (Baase, 410). Repetitive strain injury is caused by mini-keyboards and buttons on small devices, and while companies are trying to make these devices less straining on people, it is still up to the person to use the technology reasonably (Baase, 412). Even errors such as weather data not appearing can do something as extreme as ground every airplane and cancelling flights (Baase, 413). Voting on electronic terminals comes with its own issues; one county lost 4,000 votes because the system’s memory was full, and one county in Texas gained 100,000 votes out of the blue. Another concern is whether or not one can hack these terminals or not (Baase, 416). Many systems are abandoned, such as a supply management system a British food retailer invested $500 million into. Robert Charette estimates that 5-15% of these projects are scrapped for their inadequacy, which can be quite costly (Baase, 419). A legacy system is an out-of-date system still in use while fitted to work with modern systems – an example is the 3x5 card used by airlines to mark a reservation. Of course, older software fails more often, uses older computer language, and is hard to find replacement parts for. Companies keep legacy systems due to cost issues, the learning curve of new technology doesn’t apply, and the transfer of info to the new system may be disruptive (Baase, 420). “Fly-by-wire” planes, where the pilot inputted commands for the plane to follow, resulted in four crashers, as there was a lack of familiarity with pilots, as well as errors by the plane itself (In one case, the plane wouldn’t let the pilot break as he dismounted, as it didn’t know that he had dismounted) (Baase, 422). While there’s criticism, since new technology, there have been 76% more trades in the stock market and air travel accidents have decreased 60% from ten years earlier. It is also hard to tell if the technology itself is causing problems, or human skepticism of technology itself is also to blame (Baase, 424). Therac-25 is a radiation therapy machine that has accounted for massive overdoses and 6 deaths between 1985 and 1987. While only 100-200 rads were supposed to be administered, patients got between 13,000 and 25,000 (Baase, 425). A big issue with its hardware was that it eliminated hardware safety features, and because of this it frequently malfunctioned and underdosed, error messages were so common they were ignored, and not even the manual explained the strange error messages (Baase, 426). The Set-Up period was supposed to read a zero reading from the device to start it up, though it didn’t matter anyways, as after 256 nonzeros, the machine would incorrectly read zero anyways. Only some parts of the machine understood human edits, where the other parts never acknowledged them (Baase, 427). Errors in technology have an impact in our lives, whether it simply results in a silly typo or a machine that overdoses with radiation.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation I run into is with the GPS (and other location-based services) in my phone. For the most part, it runs smoothly, can help me get to point A to B painlessly and is fast. However every now and then it won’t load correctly (or at all), it will give me an overly painful and incorrect route to get where I want to go, and sometimes it won’t even correctly tell me where I currently am (at one time it told me I was somewhere in the nation’s capital). While this doesn’t hinder me much, I can easily see how it can be devastating to someone planning a cruise on it or trying to find somebody’s house.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

One thing that strikes me is that while the blame is put on technology, human error also plays a part, as it does in almost every scenario. Regarding the Therac-25 scenario, technicians ignored “error” messages simply because they always showed up, and in another scenario technicians overdosed their patients simply because they mistook curies and millicuries (levels of radiation dosage) (Baase, 429). Human error also shows itself, as with technology that does not work correctly, it must take a human that did not put enough effort in the program to ensure everything worked, even including something as simple as making sure information in the credit bureau is correct and up-to-date (Baase, 408). We can wag our fingers at technology all we’d like, but the fact of the matter is that there will always be someone who did not test the technology as well as they could have, which can amount for the errors in technology.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with the fact that technology can bring devastating errors, some as serious as crashing a plane because something is not being inputted correctly, and some can even bankrupt businesses (Such as the Warehouse Manager program mentioned on page 414 which gave false prices and in actuality made everything much slower). I have concluded that as painful and time-consuming as it may be, we must do our very best to make sure absolutely every kink is worked out in technology, as some people rely on this technology with their lives. We must not become overconfident in the success of the technology and always make sure everything is working perfectly, as this will severely lower the error ratio that we are used to seeing.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

While it is a very relevant issue in today’s society, I am hopeful that as time goes on and technology becomes more sophisticated that it won’t be as much of an issue (though that doesn’t mean we shouldn’t continue to second-guess the technology for safety’s sake). With technology that dictate whether we live or not (such as those pertaining to radiation therapy), we must always check every system as much as possible and make sure it is working correctly, as if we don’t it doesn’t seem much better than human experimentation due to negligence. There will always be errors, regarding technology as well as everything else, but we should still do everything we can to make as little errors as possible.



Therac-25

One resource on the web that I found particularly useful detailed exactly everything that happened in the Therac-25 situation. It details how the machine works, it’s problems, why they happened, as well as detailed accounts of the victims. It seems that a lot of the problems Therac-25 is so popular for stem from the fact that AECL went ahead and made the software do everything whereas it only regulated some functions in earlier models. Making it more user-friendly, eventually led to many of the problems that occurred with it (Especially in the case where the operator only pressed the up arrow and enter to change the mode, and continued to do so when an “Error-54” message showed up). It’s also interesting to see how AECL flat out ignored the issue until the FDA began to investigate them; before the fifth incident, their excuses would range from an electrical issue in the facility to it simply being “impossible” that it would malfunction. Even when they attempted to make it safer, they didn’t know what made it unsafe in the first place. More information on Therac-25 can be found at http://users.csc.calpoly.edu/~jdalbey/SWE/Papers/THERAC25.html

References

Baase, Sara. "Chapter 8: Errors, Failures, and Risk." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Porrello, Anne. "Death and Denial: The Failure of the THERAC-25, A Medical Linear Accelerator." Cal Poly - Computer Science and Software Engineering. Web. 19 Nov. 2011. .

Sunday, November 13, 2011

Chapter 6: Part Two

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6: Crime (Sections 6.4 and 6.5)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Embezzlement is an important factor in employee crime, an example being Volkswagen, which lost over 200 million dollars in a fraud committed by high level employees (Baase, 333).
b. A “logic bomb” is software that destroys critical files; while sometimes for sabotage, some employees do this so they can be paid more to fix the problem (Baase, 333).
c. The Electronic Communications Privacy Act prohibits interception of email and reading of said email without a court order, however employers are given this power, and the act is much more lenient on them (Baase, 340).

2. (Comprehension) Summarize what is being discussed within this chapter?

With computers, employee crime has become much more common. Embezzlement, the fraudulent appropriation of property by a person to whom it has been entrusted, is easier to accomplish with computers (Baase, 332). The anonymity and complexity of computers makes this a far easier task to accomplish. Sabotage is also possible through a tool called a logic bomb, or software that destroys files such as the payroll. Rotating desks and ID checkpoints have been used to counter these crimes, though it still goes on (Baase, 333). Employee monitoring has also become much simpler, and as Cindia Cameron says, “technology now allows employers to cross the line from monitoring the work to monitoring the worker.” In the past time clocks and assembly line speeds dictated worker productivity – now computers make it more accurate and detailed. Cameras that link to individual computer monitors and keystroke counting are just a few of the measures put in place to supervise employees (Baase, 335). Recorded calls and beeping to signal a lack of work taking place has deemed this type of job an “electronic sweatshop” by critics. This monitoring may cause loss of independence, stress, low morale, and a general feeling of being a machine to employees (Baase, 336). Lewis Maltby wants to regulate employee monitoring, calling it a “blessing in disguise” to employers, as it would cause more long term loyalty and productivity (Baase, 337). E-mail privacy has also become an issue, especially if the employee uses the address for more personal reasons (Baase, 339). However it does have its practical uses, such as to check for offensive material, illegal software, and to investigate harassment claims. The Electronic Communications Privacy Act prohibits the interception of -email and reading of e-mail without a court order, however employers are excluded from this (Baase, 340). Online web surfing is also heavily blocked, though for more reasonable objectives; this keeps the employee productive and working for their money, and also protects against the threat of viruses (Baase, 343). Technology plays a large part in the workplace, and not only brings up issues of internet crime, but privacy as well.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One example of employee embezzlement involves Kimberly Sziraki, an individual who took 1.6 million dollars from the Merced nut processing plant that she worked at. Facing a maximum of 17 years in prison, Sziraki stole this money from the company within three years, mainly to feed her online gambling addiction. The most interesting part of this is that she was a manager at this plant. It goes to show that it doesn’t matter what position of power you are in, embezzlement still happens, and may even be easier for higher power workers. More info can be found at: http://www.mercedsunstar.com/2010/06/11/1456054/kimberly-sziraki-pleads-no-contest.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

On page 334, it is stated that “Computers don’t steal – people do”. By this argument, embezzlement is just human greed made easier through new technology. This eases and agitates some concerns about technology and crime in the workplace, as the technology itself is not the problem and is not looking to harm people – at the same time, this makes a crook even more powerful than what they could be without the technology.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree that embezzlement makes it much easier to commit corporate fraud; as Baase states on page 333, the anonymity and complexity of computers makes this a much simpler task. One example of this is Volkswagen, and its $200 million loss to employees partaking in a foreign exchange fraud. With logic bombs, sabotage is also easier, as while it may be just for the sake of sabotage, it may be so the employee is paid to fix the problem they created, which may be a form of embezzlement in itself. I agree with Lewis Maltby in the sense that excessive employee monitoring is problematic, and a regulation of it will increase loyalty and productivity in the end (Baase, 337). E-mail monitoring, while somewhat justified, should have parameters; simple criticisms of the company should not get one terminated. There should be filters put into place that only allows the employee to e-mail coworkers at work, as private e-mails may distract from work and also allow viruses to enter the workspace.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is relevant in today’s society as technology is continuing to have a massive effect on our careers. Embezzlement is a serious workplace crime that is committed without people knowing in some cases, as it is very easy to hide. Workplace monitoring is considered unethical in some instances, and even a blow to productivity. As food for thought, I believe that workplace monitoring may actually help to decrease embezzlement cases (except for in the case of management committing it), however it may not work at that level due to criticisms that will emerge of said monitoring becoming even more powerful than it was previously considered.






References

Patton, Victor. "Kimberly Sziraki Pleads No Contest in $1.6 Million Embezzlement Case."Merced Sun-Star. 11 June 2010. Web. 12 Nov. 2011. .

Baase, Sara. "Chapter 6: Work." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Sunday, November 6, 2011

Chapter 6: Work

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6: Work

1. (Knowledge)Tell three interesting elements of this chapter:
a. Telecommuting is the practice of working at a distance from an office or factory via computers, and has been increasingly common.
b. Old jobs are simply replaced with new jobs requiring the use of technology, and a flexible and educated economy will gain many jobs from this.
c. Offshoring refers to the displacement of work to companies/workers in other countries for a lower wage, and many believe this threatens job security for US workers.

2. (Comprehension) Summarize what is being discussed within this chapter?

With the computer age, work has been vastly redefined, and gained its own advantages and disadvantages. Many are worried that there is vast unemployment due to the increased efficiency of computers (Baase, 308). There is a clear impact on employment, as between the periods of 1983-1993 37% of bank teller jobs were lost to new technologies. As said by an Exchange official, “What was once done by our people is now done by technology” (Baase, 309). This stems from the idea that with more efficiency, less people need to work on the task. However, one can argue that productivity has increased dramatically (long distance calls increased from 9.8 billion to 94.9). With the loss of old jobs comes new ones aimed at using newer technology (Baase, 310). A net increase of 17.8 million jobs has occurred, demonstrating a flexible economy. In order to maintain this growth we must stay flexible and educated (Baase, 312). While after 1970 wages declined by 10%, fringe benefits also increased by 17% (Baase, 313). The standard of living has also increased, as it has become quicker to have the money for necessities such as food, and has also improved the quality of housing (Baase, 314). Safer environments were made, as cars are safer and materials such as radioactive dye were replaced with ultrasound. Working hours have declined since the earlier periods before this technology. However for many of these new jobs a college degree is required, therefore the benefits are not distributed as evenly to those who aren’t educated or cannot afford the education (Baase, 315). Some worry about the devalue of human intelligence as computers will now do most of the smart work (Baase, 318). Offshoring, the practice of hiring companies/workers from other countries for a lower wage, has become common practice. As of 2004, 12% of all information and technology companies offshored, more commonly to India. However it has its merits; this offshoring is what helped Ireland gain the financial boom that it so needed (Baase, 319). Knowledge work, or offshoring of more skilled work, has also become a large issue (Baase, 320), and while only 50 or so jobs are lost a month to offshoring now, experts believe it will only become a more common practice (Baase, 321). Other problems arise, such as irregular hours to workers in India, the inflation of the amount US companies need to pay Indian workers, and general disdain for call centers by the US population (Baase, 322). Needless to say, there are sides for both arguments regarding whether it is justified or just plain immoral. Searching for jobs online has become much easier with the rise of sites such as Monster.com, and training is very easy to come by (Baase, 325). Telecommuting, the practice of working for a company from home, has been on the rise, as these workers don’t even have to live in the same city as their employers. Obvious benefits are increased productivity, savings due to smaller company offices, and more employee satisfaction overall (Baase, 328). There are dissenters, and these people believe that productivity is actually decreased due to lack of supervision, that people are working too long or hard, and that it is generally more stressful. Some believe this also cause a sense of isolation for the individuals who partake in it. Using a computer for both personal and work-related objectives can be dangerous if a hacker were to gain access to this information (Baase, 329). Kotkin believes that this encourages the individual to engage more in their local community, however others still believe alienation is a more plausible outcome (Baase, 330). On the other hand, this makes small independent businesspeople able to create an at-home business that can make it big (Baase, 331). Some examples of this are eBay, Google and MySpace. Others believe that large companies are also profiting via actions such as merging with other companies and buyouts with small companies that may threaten their security (Baase, 332). Nonetheless, it is easy to see how drastically new information technology has affected the notion of work.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
One situation I have experienced is the outsourcing of jobs by General Motors automotive company. For many years, GM has been offshoring to China, Mexico, South Korea, Japan as well as many others. GM has been drastically cutting its labor, my father being one of the many people who were laid off and forced to find other jobs. One article I found online was particularly useful in both explaining what it’s currently doing, as well as public dissent towards it: http://www.economicpopulist.org/content/gm-offshore-outsourcing-us-jobs



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

On page 310, Baase says that new technologies don’t destroy jobs, but rather create new, more advanced jobs to look forward to. I feel that this has been the case throughout history and people may just not realize it; Gutenberg’s printing press was probably critiqued in the sense that it would replace people who wrote articles that were not as efficient, but it is without a doubt labor has only increased since. The same goes to the weaving machines Baase mentions on page 309 – they were burned as people thought it would destroy their jobs, however since there has been no horrible numbers showing a decrease in the amount of jobs.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with the idea that new jobs can thrive with new technology as long as the people stay educated and the economy stays flexible. On page 310 it is explained how the two goals of reduction of resources and increase of standard living have been met, which is proof enough that technology is not the demon we see it as compared to the job industry. One great example is the retail industry; in the technology age, it grew 3% in only 3 years, while jobs as a whole increased by 6% (Baase, 311). I believe as long as we stay flexible we should not be wary of new technology, but to embrace it.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is relevant in today’s society, as more and more we are seeing jobs more involved online, and automated tellers and checkouts are becoming exponentially common. My stepfather telecommutes from his home office, and I can see the positive outcomes this chapter describes, such as more involvement in his community (he has a lot of time to go out and do what he needs to get done), and he seems much happier with his job than his old one of ten years back, where he worked in a small cubicle. Utilitarianism, while somewhat of a gray-area concerning offshoring, is an interesting way to look at it; does it support the number of dollars given (in which case the US would be the main concern), or does it concern the amount of dollars saved (shifting the interest to India)? After reading this chapter I am interested to see where the job economy goes, and whether the US as a whole will be able to keep up with its demands with higher technology that is created.




References

Baase, Sara. "Chapter 6: Work." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

Oak, Robert. "GM Offshore Outsourcing U.S. Jobs." The Economic Populist. 9 May 2009. Web. 06 Nov. 2011. .

Sunday, October 23, 2011

Chapter 5: Crime

Name Robert Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. There is both white-hat hacking and black-hat hacking. White-hat refers to those who do it for the simple thrill or to expose threats to companies, while black-hat refers to those who hack to commit a felony (Baase, 257).
b. Hacktivism has become an important term since hacking began, referring to the hacking of a site for a political cause; it is very subjective on whether this is a crime or not because of the political aspect (Baase, 263).
c. Some companies hire those who have hacked them, as they can help the company fix massive loopholes in their security system (Baase, 268).

2. (Comprehension) Summarize what is being discussed within this chapter?

With computer technology, theft of information has become much more severe; while robbing a bank would get someone near 5,000 dollars, computer crimes go past $100,000 (Baase, 253). Hacking was originally a positive term referring to those who exposed systems for their flaws for the sheer fun of it, but once hackers realized the potential of this in the digital age it was viewed with more disdain. The New Hackers Dictionary describes a hacker as a person “who enjoys exploring the details of programmable systems and how to stretch their capabilities; …one who programs enthusiastically (even obsessively)” (254). Hacking as many websites as one could soon became a goal. In the 1980’s a German hacker broke into US computers in order to sell information to the Soviets. Social engineering – fooling people into disclosing info – became a key part of finding out the information on a person (255). Hackers refer to malicious hackers as “crackers”, and white and black-hat hackers helps to explain the differences between the two groups (257). Security Researches are hackers who expose flaws to show them to the company, even though the company may be slow to respond (258). Viruses such as the “Love Bug” have caused over 10 billion dollars in damage. Denial-of-service attacks overload websites to shut them down; 15-year old “mafiaboy” did this while finding a script to do so on a site intended for “script kiddies”. Zombies are computers that the hacker has complete control of, which can have dangerous consequences (260). Hacktivism is hacking to promote a political cause; one example of this is when three teenagers hacked into an atomic research center in India to protest their use of nuclear weapons. However these goals became an easy cover for more dangerous hackers to hide their work. Hacktivism is debatable concerning its legality, as politics are completely subjective, and what may look like a statement to one person may look like a felony to another (263). The Computer Fraud and Abuse Act of 1986 protects areas where the federal government has jurisdiction, as well as computers connected to the internet. The Patriot Act expanded on the CFAA, including with it the costs of responding to the attack, assessing the damage and restoring systems, as well as increasing the harshness of penalties - a 1st offense became 10 years of incarceration instead of 5). The government can also spy on suspected hackers without a warrant (265). Through computer forensics, experts can track hackers through tracking their ISPs and hidden serial numbers in Microsoft Office, though hackers eventually wised up (267). Unfortunately due to the complexity of computer systems and the constant updates in software, it is hard for the web to be fully secure (269). The Defense Information Systems Agency reported 500,000 attacks on the Defense Department, 65% of which were successful and less than 1% were detected (270). Firewalls were created to monitor incoming information and filter out suspicious items, though hackers have been known to find loopholes in these as well (271). People have thought of criminalizing the scripts that cause damage themselves, however this would make research very difficult, and also violates freedom of speech, which becomes an issue (273). Identity theft is easier than ever through card numbers, SSN and files, and a security company executive even says that, “A complete identity sells for less than $20” (273). Phishing is a common tactic where millions of emails are sent to fish for info used to impersonate someone and steal money and goods; this is a form of social engineering as a lot of trickery is involved to extort it from the victim (274). There is also pharming, which is similar except that it lures people to a false website. There are other methods as well, such as recording keystrokes and Trojan Horses, defined as malicious software hiding in an apparently innocent program which is downloaded willingly (275). There have been measures to prevent fraud, such as software in banks that look for fraudulent activity and secure payment sites such as PayPal (277). In 1998 it became a federal crime to use another person’s identification with the intent to commit a felony. Other preventions of fraud are expressed through fraud alerts, which are flags on a person’s credit report that forces a bureau to call you for confirmation if a new account is opened (280). Through biometrics – biological characteristics unique to an individual – protecting information has been thought of as much more effective, providing measures such as fingerprint and retina scanners (281). However it has been proven that these systems can be fooled, and if a criminal were to get this specific of information the results may be devastating (282). Hackers and thieves make the internet a sketchy place to be, as there is little you can do to stop a hacker besides hope for the best that your trust is placed in the correct websites.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One situation of potentially dangerous hacking deals with Mark Zuckerberg, CEO of Facebook himself. In the early years of Facebook, it has been found that Mark would use login information to hack into peoples’ private email accounts, and while the purposes were unclear it is still unethical. It is also found that he hacked into ConnectU, a competitor, and changed information to his liking (More on the incident can be found at http://articles.businessinsider.com/2010-03-08/tech/29969831_1_facebook-mark-zuckerberg-business-ethics). I have also recently experienced an event dealing with identity theft; about a month ago my mother bought from a less than secure website, and about a week later her card was cancelled. Someone had gotten a hold of her information and went above and beyond her credit limit to buy extravagant items (thankfully the bank caught on and did not hold her liable). Nevertheless, this is an example of how easy it really is to have your information stolen.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

The chapter talks about fraud through the internet, but it also makes a good point about fraud in general. On page 281, Baase states that a good chunk of identity theft occurs when a wallet or checkbook is stolen, not just when info is given out on the internet, so even outside of the internet one must be wary of their surroundings. While there will always be hackers, I believe all sites should incorporate PayPal as the default payment option; on page 277 Baase goes into how secure PayPal is and how it is the most secure payment site on the web. If all shopping sites were to default to PayPal, I believe it can stop a lot of identity theft.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I believe that hacking and identity theft are very real – and scary – realities, not to mention one that will always be as advanced as the technology that tries to protect people from it. Hackers are known for their tenacity and love for exposing flaws, so when new technology comes out that makes everything more secure, criminals on the internet will find new ways to go around it, or they’ll come out with new technology (such as skimmers) to make their job even easier than before.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very relevant to today’s society, as a large chunk of society owns a credit card (and everyone has an SSN), so everybody is susceptible to identity fraud. Hackers can make the internet – as well as the computers they hack – their plaything no matter how hard we try to protect it sometimes. As people who use the internet, we constantly run the risk of being attacked by these digital criminals, and when we become privy to one of their tactics, they will simply come up with a new one. This shows how exceptionally important it is to keep personal information to yourself at all costs, even if it means alienating yourself from online shops and using paper money more often.





References

Baase, Sara. "Chapter 5: Crime." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.


Blodget, Henry. "Facebook CEO Mark Zuckerberg Needs To Address The Hacking Incidents." The Business Insider. 08 Mar. 2010. Web. 22 Oct. 2011. .

Sunday, October 16, 2011

Chapter 4: Steal This Film II

Rob Feind Class time: 11am

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):
o I thought it was interesting how at one point the Pirate Bay was compared to Google, as a good point was made. Essentially, the Pirate Bay simply indexes what people decide to put on it, as Google does with websites, which I considered a very interesting argument.
o Another intriguing point is how 18th century publishers using printing presses had very similar issues. The fact that they weren’t allowed to copy certain works (and would be apprehended if they did) rings true to this situation, and questions the same parts of freedom of speech that persecution of internet piracy does.
o At the end, the movie mentions that 35% of internet traffic is due to internet piracy. Not only does this show how significant this is to today’s society, it also shows that piracy is becoming an unstoppable force and will be impossible to be fully persecuted against as time goes on.



2. Foundation (UNDERSTANDING):
a. What is the Pirate Bay?
The Pirate Bay is a peer-to-peer file hosting site where people can share virtually anything, from music to games to movies. While it has legitimate purposes, many people use it to pirate movies.
b. What do they stand for (what is their mission)?
Their mission is to connect people and help share information as freedom of speech intends. They also encourage the promotion of work that otherwise wouldn’t be known (such as the “Grime” movement), hoping to connect more ideas as time goes on.
c. What is their purpose for making and distributing this film as a free download?
Their purpose was to inform more people about piracy and the issues and debates surrounding it. They were also making an important statement by distributing it for free, as that is exactly what they push for with such file hosting sites, declaring it a necessary freedom.



3. Provide 3 referenced connections to Baase readings (LINKING).
a. The Rio mp3 player was mentioned in the movie as well as A Gift of Fire; in the movie it was mentioned how it couldn’t be prosecuted for being the medium of mp3 files, and the link is made to the Pirate Bay not being able to be prosecuted for being the medium of all works found on the internet. (Baase, 214)
b. The issue of Napster being shut down was mentioned in both the movie and the book. In both sources, it is mentioned that this was the first attempt for file sharing online, and even though it was shut down, it started the movement to share all types of files on the internet through peer-to-peer sites. (Baase, 209)
c. Sony’s video recorder being under fire is also mentioned in both of these sources. Both sources mention how the movie industry wanted to come down hard on this technology as they thought it would ruin the industry even though it was only used for private reasons. (Baase, 207)




4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):
a. Peter Sunde – Co-owner of the Pirate Bay, and one of the ones on trial. He firmly believes that he has the right to host everything for everyone, and to do otherwise would infringe on our freedom of speech.
b. Rick Prelinger – The owner of a vast internet archive site. Prelinger acknowledges how important intellectual property on the internet is, as he is in a similar business. He also discusses how despite all the issues, suits won’t solve anything as there are too many users who partake in internet piracy.
c. Erik Dubelboer – Owner of mininova, another renowned file sharing site. Dubelboer believes that suits will realistically do nothing to stop peer-to-peer hosting; he thinks they are too aggressive, and are rarely actually effective.
d. Rasmus Fleischer – A part of the Bureau of piracy, Rasmus discusses how the WTO would place trade sanctions against Sweden if they did not take action against the Pirate Bay. He firmly believes this is another effort by America to try and police the world.
e. Frederik Neij – Another owner of the Pirate Bay. In court he mentioned how his hosting site is no more different than Google, as they index in very similar fashions. “If we are guilty, then Google is guilty.”



5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):
a) Peter Sunde – Co-Owner of the Pirate Bay, a strong advocate for file hosting and ending corporate greed.
b) Frederik Neij – Another advocate of the Pirate Bay with Sunde, Neij doesn’t see what he does as inherently wrong, as they are only providing a medium for users to share information with each other.
c) Yochai Benkler – A Yale professor, he argues that the spread of information is something we are entitled to, and more importantly, something he thinks will be unstoppable as file sharing continues to grow in strength.



4. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

The main ideas being discussed are that file sharing and hosting is becoming an increasingly significant issue, as well as one that government agencies are constantly trying to crack down on. On one note this persecution is justified, as in A Gift of Fire, it is stated that affecting the market and the work as well as hosting the files themselves (unless the site takes actions to remove the content, which the Pirate Bay had no intention of doing) are reasons enough to make the activity look illegal (Baase, 205-206). However, Baase also put forth the idea that these peer-to-peer sites and tools only act as a medium for people to post information, and because of this should not be frowned upon as some such as the movie industry do (Baase, 211).



5. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a tool used by people to download files on the internet that would otherwise have copyright protection, such as music, movies, games, etcetera. This has greatly changed society, as even as some of the interviewees in the movie have said, people rarely ever buy CDs anymore and some don’t even see it as something you should spend money on now.



6. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

I see connections as it is mentioned that 35% of internet traffic is due to piracy; I myself know several people who use these peer-to-peer hosting sites and applications (In fact, 9/10 people I know), so this statistic seems correct, if even a bit small. There is another connection in society in the sense of the Digital Rights Management materials Baase mentions; these are a normal part of iTunes, and while it keeps music from being stolen, it still has issues with new computers, operating systems and etcetera (Baase, 215).


7. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)

I personally believe that such piracy on the web may cause some artists to show a decline in creativity due to the easy spread of things and lack of money involved, however at the same time I picture it increasing creativity for young independent artists who are simply trying to gain a fan base. With increasing technology I do believe that copyrights will become a thing of the past, as in the video it is even told that file sharers are growing by the day, and even at today’s numbers it is impossible for authorities to shut something like the Pirate Bay down. I believe the Information Age will make Intellectual Property very irrelevant.



8. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

Downloading to me is not entirely stealing somebody’s intellectual property; as an example I’ll use a band. Because of the fair-use doctrine, one can argue that it deprives the members of their income as people are downloading albums for free, and that in turn lowers their value on the market (Baase, 206). However at the same time this is creating a larger fan base for the band, and while CD’s are being downloaded, that means more people will attend concerts of theirs, buy band merchandise, and maybe even buy an album regardless to show appreciation. Considering most money that is made from albums goes to the record company instead of the artist, this isn’t always necessarily stealing someone’s intellectual property, as the band is still getting money out of it in the long run.



9. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

In 50 years, I feel that intellectual property will either be completely impossible to enforce, or that the government will have strong enough restrictions on the internet to stop sites that BitTorrent once and for all. At the rate it is going, it’s plausible to believe that the government won’t be able to do anything about the copying of intellectual property and that file sharing may even send us into a new era with new concepts of this being introduced. However, it is also possible that the government will get tougher on these sites and start shutting them down, making sure torrent sites are not used, and those who create or use them will be persecuted. In that scenario, I see our internet becoming similar to that of China’s or India’s, though I do not personally believe we will take that route.



10. Do you agree with what is being said within movie? Explain. (EVALUATION)

I am conflicted with the message being sent in the movie. In a sense I do believe that hosting files on sites such as the Pirate Bay is the ultimate form of freedom of speech, and creators of such sites are only trying to link people together, help indie groups be heard, and show us what the internet is truly capable of. At the same time, I do believe a publisher is entitled to their rightly earned money and recognition, and torrent sites may take this away. Also, for some this will definitely cause a drop in creativity in works, which is something that is understandable regarding the nature of file sharing.



11. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)

I cannot say my opinion has shifted, as I have always thought that people have come down too hard on peer-to-peer applications and sites, and that whatever they do is their own business. I say if people want to share movies, music, games and more over the internet, they should be allowed to do so, despite others seeing it as immoral or unfair to the publisher.

Saturday, October 15, 2011

Chapter 4: Musicians Look Por Pay In An MP3 World

Laura Sydel makes a point that with the spread of music on the internet, sales in music have gone down tremendously. As Attorney Don Passman says, "You can't compete with free", and Sydel believes that this will also lower the value of music that will be created in the future, considering that if artists know it'll be available for free on the internet, they won't work as hard at it (For the 2 billion songs iTunes sells a year, 15 billion a year are pirated). What differs in this audio segment is that Laura Sydel argues that this may actually help some artists. The video becomes different from the Lars Ulrich standpoint when she mentions Jonathan Coulton, a low-key artist who posts his music online. Coulton says that he gets a fanbase from doing this, a benefit which many artists overlook. He also says that he has much more freedom than if he were to sign with a record label, and while he isn't making fortunes, he has made enough to quit his day job.

Chapter 4: Chuck D and Lars Ulrich

While Erik Schmidt sees property rights as fundamental in today's world, he wants publishers to be represented but also wants to encourage the use of such intellectual properties. He believes all this info should be available to people but made out in a way so that people would not mind paying for it (he gives iTunes as an example, as they charge a small amount per song and it's enough for people to want to use it). Chuck D has no problem with the sharing of music on the internet. He argues that while the invention of radio and cassette players also threatened intellectual property, it has done nothing wrong. In fact, he argues that putting music on the internet is a great way to expose people to music which may even be the next big thing, and he believes people should not be restricted from that. Lars Ulrich believes differently and wants this restricted. He says that while it isn't about money, it is about control, and that the publisher (in this case Metallica) should have the rights to distribute it and give it to the public, much like albums they sell. In his eyes this may devalue his own work and in turn the market prices for his work, which is a key issue at stake.

Friday, October 14, 2011

Chapter 4: Intellectual Property

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 4.1 – 4.3.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. A copyright is something that protects creative works (books, songs, software, etc), and doesn’t need to be applied for; it always applies to intellectual property (Baase, 198).
b. Piracy is a billion dollar industry that copies this property illegally, and also deals with “cracks” for property with copyright protection (Baase, 202).
c. The fair-use doctrine allows the use of copyrighted material that contributes to the creation of a new piece of work that isn’t likely to deprive the author of their income; fair uses are for “criticism, comment, news reporting, teaching, scholarships and research” (Baase, 206).

2. (Comprehension) Summarize what is being discussed within this chapter?

Copyrights protect creative works of people who decide to publish them. One can also apply for a patent which protects software and allows them to be the publisher for a set amount of years (Baase, 198). These are mainly to protect the compensation that publisher deserves. The public domain is when a copyright expires, meaning its information is available to all the public (Baase, 199). In general, it was meant to protect creative expression. With the invention of CDs/DVDs, scanners and whatnot, copying this info has become much easier (Baase, 201). New digital technology gives us the power to both be copyrighters and to infringe upon others (Baase, 202). Piracy – high volume, unauthorized copying of digital property – has been made much easier in the past decade, and is a billion dollar industry (Baase, 202). Of course, with new technology copyright laws constantly need to be amended. The No Electronic Theft Act of 1997 made it illegal to distribute and copies of something worth over 1,000 dollars and distributed within 6 months. The Digital Millennium Copyright Act of 1998 prohibits circumventing copyright protection systems, and also protects web sites if they try to remove illegal material (Baase, 204). This is controversial, as it outlaws software that may otherwise have legitimate purposes. The fair-use doctrine allowed use of copyrighted material that wouldn’t deprive the publisher of the income they deserve. It also gave 4 factors to consider – The purpose and nature of its use, the nature of the original work, the amount and significance of the portion used, and the effect on the market and original work’s value (Baase, 206). In Sony v. Universal City Studios, Sony was sued because people used Sony’s Betamax cassettes to tape programs on TV; because it was for noncommercial, private uses, Sony won the case (Baase, 208). Napster wasn’t so lucky; they were sued for providing the transfer of unauthorized songs, resulting in a negative impact of music sales. Napster lost the case and shut down (Baase, 209-211). In MGM v. Grokster, movie studios sued Grokster and StreamCast, owners of a widely known peer-to-peer network, however they only provided the software, not the actual files to download, and in doing so also served a legitimate purpose. Distribution of file sharing software is legal, but companies can still sue these software publishers if they chose to do so (Baase, 211). While companies use many measures to stop unauthorized copying (dongles, serial numbers, etc), people found this extraneous, and others nevertheless found ways to “crack” it. The Business Software Alliance “polices” the internet for pirates, and has since busted many companies for pirated software (Baase, 213). Digital Rights Management (DRM) gives publishers many ways to protect their property, however there are many issues with how well it works (one being DRM movies won’t run on Linux), and people can still “crack” it if desired (Baase, 216-217). DeCSS was created to let DRM-protected movies run on Linux, and while people used it to illegally distribute material, it is still deemed legal for that reason alone (Baase, 218). As technology expands it gets even harder for companies to protect what is theirs, and see conflict through the entire process.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One case that pertains to this that is still fairly fresh is that of thepiratebay.org. The Pirate Bay is one of the leading peer-to-peer sites on the internet to date, and accounts for a lot of the piracy issues on the web. Similar to Napster, The Pirate Bay provides the source for pirates to download music, games, software, and more. While they did nothing to take it off the site, all four owners were taken to trial and received guilty verdicts of a year and prison and astronomical fines. People view this case with caution, as they believe this will only create more trials and make it more complex a situation than it needs to be. Nevertheless, thepiratebay.org is still up and running as of today despite these rulings (More information can be found here - http://torrentfreak.com/the-pirate-bay-trial-the-verdict-090417/).



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

This issue seems a lot like the issue of plagiarism of essays and books, however with the internet it has become much broader. Unfortunately for publishers, it doesn’t seem like they will ever have the upper hand in the copyright wars. No matter what they do, be it DRM, CSS or even the threat of lawsuits, people will continue to download and share illegally, find cracks to expose loopholes in otherwise protected systems, and maybe even make a buck off of it. It seems that the people who share cannot get in trouble, but the internet hosts can, which seems trivial. I feel that with the creation of the internet there will always be problems with copyrights.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being said in the article, as it explains how increasingly hard it is to protect copyrights as technology expands. People who “crack” are very good at what they do and will find a loophole whenever the opportunity presents itself. Such is the case of the creator of DeCSS; as it was used for practical reasons (so that Linux users can view copyright-protected material), it still proves the point (Baase, 218). I simply don’t believe that this issue will go away, as no matter the security precautions, hackers will always find a way to exploit it, and this will continue to occur.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is extremely relevant, as a large portion of the world downloads music illegally through peer-to-peer programs such as Frostwire and torrent sites, and excluding the hosts, there are absolutely no repercussions. I can relate in this way in that while I have stopped since, I am one of the many million who would download music in this way, and in the many years I have done it there were no consequences; not to mention the fact that I knew many people who did the same and experienced similar results. I can conclude that copyrights may inevitably become a thing of the past due to the internet, and while I do not know if that is necessarily a good or bad thing, it will be interesting to see the transition.





References

Baase, Sara. "Chapter 4: Intellectual Property" A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

TorrentFreak. "The Pirate Bay Trial: The Official Verdict - Guilty." TorrentFreak. 17 Apr. 2009. Web. 14 Oct. 2011. .

Friday, October 7, 2011

Chapter 3: Questions from Dr. RSM

In your own words define the phrase ‘least restrictive means'.
"Least restrictive means" refers to the fact that the government should use the least amount of intrusion in the internet, and idea supported by the Supreme Court's decision concerning the Communications Decency Act (Baase, 147). A lot of people believe in this principle as they see the internet as nothing more than a "participatory form of mass speech", and therefore requires a very little amount of government intrusion (147).

Why is this term important? How does it effect Freedom of Speech. Why or why not?
This term is very important, being that it recognizes that the government cannot do much to limit freedom of speech on the internet. For one, the Telecommunications Act recognizes that the common carrier is not the publisher of information on the net, and therefore cannot be prosecuted against by the government (Baase, 147). Freedom of speech is affected, as for other forms of media such as broadcasting devices, government control is extensive (146). However, the internet is arguably even more expansive than these broadcasting companies, however because of the publishing issues they are better protected under the first amendment.

Do you consider the Internet an appropriate tool for young children? Why or why not?
I do not consider the Internet an appropriate tool for children. Despite the possible learning that can be done, there is still shady material on the web; after all, there are 400,000 pornography sites, and the fact that it's growing daily makes it very hard for any internet filter to keep it all out of the hands of children (Baase, 150). In one case, a child even accessed pornography at a library, and was able to save it and print out copies for his friends (157). The internet is a very intriguing tool, but I believe it is much better suited for a more mature audience.

Chapter 3: Questions from Baase p 189

3.1 - Briefly explain the differences between common carriers, broadcasters, and publishers with respect to freedom of speech and control of content.
Common carriers are a medium of information (telephone, internet, etc), and many believe it should be restricted the least in terms of freedom of speech. It is highly protected by the first amendment, and content cannot be controlled, as the common carrier is not the publisher and has no legal responsibility (Baase, 146). Broadcast (TV and radio) are heavily regulated by the FCC, and they will threaten to revoke licenses for questionable material (146). They argue this is because the material can easily reach children at home, therefore content must be controlled (146). Print media (newspapers and magazines) have a few limitations. While advertisements and content are dictated by the publisher, there are very few restraints put on it by the government, though they were regulated more heavily in the past (145).

3.2 - Describe two methods parents can use to restrict access by their children to inappropriate material on the web.
The Child Online Protection Commission advocates for site filters - while they may not block everything and are entirely subjective, they nevertheless help filter out bad information, and may still help restrict inappropriate material (Baase, 154). They can also set up their child's email account with specialized settings; for example, they can specify which email addresses can actually send email to their children, or they may have the option to not even set up an email address for them at all, dramatically decreasing spam, scams and otherwise harmful material (160).

3.8 - One of the arguments used to justify increased government control of television content is that television is "invasive". It comes into the home and is more difficult to keep from children. Do you think this argument is strong enough to outweigh the First Amendment? Give reasons. Is this argument more valid for the Internet than for television, or less valid for the Internet than television? Give reasons.
I do not believe this is enough to outweigh the first amendment, as there is still a way to monitor what your children are watching. These days it's very simple to put a password on specific channels so that children don't have the option to view them; they may even need a password to even view any channel at all. Also, racier shows are usually on much later at night, so that a minor would usually be in bed before the show was even close to airing. I believe this is more valid for the internet than television, as while shows may have very questionable content, literally anybody can post anything they want on the internet with the click of a button. There is some very obscene material on the web, and if a child were to stumble onto it, results could be concerning.

Chapter 3: Freedom of Speech

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 3.1.1 – 3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. While the government has extensive control over television and radio broadcasting (Baase, 146), they struggle to exert the same control over an entity such as the internet.
b. Some governments can easily filter out what can be searched on the internet; for example, Saudi Arabia blocks sites on the Bahai Faith and sites dealing with the holocaust (Baase, 172).
c. Some large companies decide to work with countries who impose strict filters on its people, such as when Google made it’s Chinese counterpart, google.cn (Baase, 174)

2. (Comprehension) Summarize what is being discussed within this chapter?

Freedom of speech is a very important issue with the internet, and there are valid arguments for both restricting and upholding it. While the government has stopped regulating books as much, they have a strong grip on broadcasting such as TV and radio (Baase, 145). With the introduction of common carriers (such as the internet), this became troublesome; the government couldn’t control the content, due to the carriers having no legal responsibility for what is poster (146). The Telecommunications Act of 1996 was made, stating this exact principle (147). When the Communications Decency Act of 1996 was declared unconstitutional, it was to be said the internet needs the least amount of government intrusion possible (147). The issue of pornography on the internet has also stirred much controversy, though Wired magazine says it’s already in magazines and just as accessible to anyone (149). Miller v. California of 1973 declared what is obscene; it must depict sexual activity whose depiction is strictly prohibited by law, it depicts the act in an offensive manner, and it has no serious literary/artistic/social/political/scientific value (151). While the Communications Decency Act made it a crime to made such info to minors, a child could easily find it online, and the bill was deemed unconstitutional (152). Under this idea, even things such as Shakespearian plays or the bible could be banned from the internet (153). The Child Online Protection Commission came along, advocating filters – and unlike the other ideas this one had some decent support (154). Nevertheless, filters don’t always work, and it even lets things such as filesharing get past it (156). The Children’s Internet Protection Act passed, asking schools and libraries to install filters, and in return they would get funded for it (the reason it was deemed constitutional) (158). Info on questionable material (ie: bomb making) is alright, as long as the author isn’t directly advocating for illegal activity (159). Spam is an increasing problem, and it was estimated in 2006 over 30 billion were sent per day (161). After Cyber Promotions, a notorious email selling site, put a suit against AOL for blocking their spam, AOL made further battles to stop the reach of spammers (AOL won the suit) (161). “Challenge-Response” spam filtering is a technique where the spam sender has to do a simple task to send the email, so it proves it’s a real person and not an automated account (163). There was also the idea of attaching a small price to emails to “certify” them, which some believe is a surefire way to help slow down spam (164). The CAN-SPAM Act of 2004 stated that commercial emails must have a valid header info, return address and physical post address; deceptive subject lines are prohibited (165). Certain software also raised some issues; software like Quicken and Nolo Press were blocked by courts, as it helps people do things that only experts otherwise could (167). Posting and selling sensitive materials can also cause controversy; when yahoo took their “adult” merchandise down due to people complaining, people also started complaining once it was taken down (168). A general rule of thumb is to use discretion and consider unintended readers, potential risks, and ways to limit the access to users only (169). Legality and accessibility to info in other countries is a touchy subject, as it’s an easy way to circumnavigate laws. In 1995, German prosecutors told CompuServe to block access to indecent articles; these were not only cut off from Germany, but the rest of the world as well (170). Yahoo had a similar issue for selling Nazi memorabilia which is illegal in France and Germany; however they still saw it (171). Censorship in other countries is commonplace and serves the government, for example in China not only must you register your internet with the police, but they filter a lot of material (democracy, religious sites, Google, Wikipedia, etc) (173). Companies like Google give in and comply to these restrictions, which angers many human rights organizations (174). In short, while the first amendment protects our freedom of speech, there are ongoing problems on the internet that deal with this and need to be addressed.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

After looking into it, there is one online freedom of speech issue that is compelling. Katherine Evans was suspended for 2 years for posting a hate profile for her teacher, which was found to have no especially rude or harmful material, and didn’t disrupt much. The Supreme Court is now ruling in the student’s favor, but it nevertheless is food for thought when it comes to noticing how free we really are to say what we want on the web. (More info here)



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

This is easily relatable outside of the web, as we have had freedom of speech issues in just about every time period. Tiananmen Square is a solid example, a group of students protesting against the Chinese government were quickly thwarted by the government – and quite violently at that. I believe that freedom of speech on the internet should be the same as it is in the real world; you are free to express whatever your thoughts are as long as they don’t put anybody in danger (A hate speech gone violent) or cause public disorder (Yelling “bomb” on an airplane).


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Baase seems to think that freedom of speech online is not only very important, but heavily protected in the 1st amendment. I agree with this, as even as one opinion is different from yours or you may see objectionable material, it isn’t a problem unless it physically hurts or threatens you. As Voltaire says, “I disapprove of what you say, but I will defend to the death your right to say it.” (149) This material has helped me realize that while this may be true, the internet may still be too racy for children, which is why monitoring them online or using filters is still a good idea, even if they don’t work 100% of the time. Adult content should be restricted, but other than that freedom of speech is essential to preserve.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is extremely relevant to today’s society, as the internet is a new technology, and we clearly don’t have an exact formula for figuring out what is and is not okay to say and show on the internet. I believe in years to come we will have a more solid legal idea of it, but for now we are very conflicted. This section has taught me how necessary it is for me to be wary of what I post on the internet, as well as what I search, buy and view.






References

Baase, Sara. "Chapter 3: Freedom of Speech." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 144-75. Print.

Kravets, David. "Student’s Facebook Tirade Against Teacher Is Protected Speech."Wired.com. Wired, 16 Feb. 2010. Web. 06 Oct. 2011. .

Sunday, September 25, 2011

Chapter 2: Privacy

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 2 (2.1-2.2, 2.3.2-2.3.6, 2.4.2, 2.5.3-2.5.4)

1. (Knowledge)Tell three interesting elements of this chapter:
a. The three aspects of privacy involve freedom from intrusion, control of information about oneself, and freedom from surveillance; all 3 of these combined can make privacy hard to fully sustain (Baase, 45)
b. CODIS, a database tracking DNA in crimes, has become much more broad; for example, something that typically only involved the worst of crimes now also records people who simply commit a misdemeanor (Baase, 60)
c. Privacy is something the government constantly dismisses; in 2002 the NSA scanned 7,000 peoples’ international calls and emails (Baase, 123)

2. (Comprehension) Summarize what is being discussed within this chapter?

Privacy is an important factor as technology gets more sophisticated. However, people also give it up for convenience and personal service (Baase, 45). Personal info can be swapped – sometimes without consent – through intentional uses of it (for law enforcement), unauthorized use by “insiders”, theft of info, or even through negligence of one’s own actions (Baase, 46). Secondary use is when you use info at hand for a different purpose than otherwise specified (ie: checking a buyer’s transaction history to see if he had bought anything suspicious recently), and is considered an infringement of privacy (Baase, 51). The Privacy Act of 1974 tried to make things easier, though there are many loopholes that surround it (Baase, 58). Video surveillance is increasing, as in Britain alone there are known to be about 4 million cameras outside watching everyone go about their business (Baase, 73). However, while some may see this as an invasion of privacy, it also helped the government catch known bombers in the area (Baase, 74). Location tracking and GPS services are also becoming increasingly popular, especially so advertisers know how to reach the consumer, and also pinpoint what exactly they could want (Baase, 83). While sites will do their best to protect their users, hackers can use spyware to steal information anyways, for example, Time Warner’s files on 600,000 of its employees (Baase, 86-87). Regarding transactions, they are something done by two parties, and both parties have a role in deciding how private the transaction can be, and can negotiate accordingly (Baase, 109). Regulations can strengthen privacy, but are very costly (Baase, 112). The free-market and consumer-protection viewpoints show insight into privacy and technology; while the first gives the consumer more responsibility and the option to opt-into privacy statements with the other party, the latter views privacy as a much needed right and strongly believes consumers should simply get as much privacy as possible (Baase, 114-115). The government can also easily be put in the hot seat, as the NSA has had many issues dealing with security and privacy, from the 1920’s on (Baase, 123-124). The government also gets paranoid during wartime, suspecting things even as simple as flower arrangements to be attempts to spy or relay personal info (Baase, 126). Also, encryption brings an attempt to make info much more secure and private to the internet, but at the same time this can help lawbreakers stay under the radar (ie: a pedophile finding ways to encrypt the child pornography on their drive) (Baase, 129). Privacy is a very touchy subject with technology and the internet, as it is hard to define, and even harder to protect.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A specific example that can be used and applied to the text is the hacking of the database of the US Pentagon. A couple months back, the US Pentagon was hacked into, putting over 24,000 sensitive files in danger. It was believed that there was a country involved, though no further comments were made. This alone proved that the US government databases themselves can be hacked, and has put officials in a new state of worry, as they now know that they are very vulnerable. More about the Pentagon fiasco can be read here.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

An idea, while tried before, would be to try and make an updated Privacy Act for each year that passes. Given that technology is something that is constantly changing and laws need to reflect such (as stated in Baase’s first chapter), this act should routinely be updated with the addition of new technology so that past loopholes may be closed. Hackers will still nevertheless be able to get into networks, but this will give the internet users more security and more privacy from advertising agents and the government – also, if said hackers are caught, strict punishments may be put in the bill so that they cannot commit the crime again. This will also prove an example to other hackers who see others prosecuted at a heavy level.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being said when it is stated that people need to be careful of what they post on the internet – even though some privacy issues can’t be helped, it is important to make sure we know what we are putting online so that we don’t help contribute to the problem (Baase, 91). One other point the author makes that is an interesting one is that our generation is no longer used to privacy and acts accordingly (92). This is increasingly noticeable in the sense that major areas have cameras around everyday street corners and people don’t mind them (Baase, 72). People also get advertised to through location tracking services, which while reducing their privacy, helps them get what they are interested in buying, which helps to make them more comfortable with their privacy being obstructed (Baase, 83). I have concluded that it never hurts to be a bit secretive; you don’t have to post your phone number, address, etcetera on Facebook. It is important to monitor what is on your record on the internet.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe this topic is very relevant in today’s society, as internet shopping, searching, and blogging are very popular in this day and age, and they are all ways for someone to learn more about you if they were to look up this information about you. I am viewing the topic in the way that I am, as at my job a large topic brought up by customers is identity theft, how often it’s happened to them and how it is becoming increasingly popular – my job also uses a “suggested sell” model which helps customers buy things related to what they have bought previously, which is touched on largely in the chapter.



References

International Business Times. "Pentagon Seeks Cyber Security Strategy After Massive Hack of 24,000 Files - International Business Times." International Business Times. 14 July 2011. Web. 25 Sept. 2011. .

Baase, Sara. "Chapter 2: Privacy." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 45-129. Print.

Tuesday, September 20, 2011

Chapter 1: Unwrapping the Gift

Name: Robert Feind                                                                                                      Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 1: UNWRAPPING THE GIFT 
 1.1 The Ubiquity of Computers and the Rapid Pace of Change (p.2-3)
1.2 New Developments and Dramatic Impacts (p.4-5)
1.3 An Introduction to Some Issues and Themes (p.21-27)
1.4 Ethics (p.28-34)


1.       (Knowledge)Tell three interesting elements of this chapter:
a.       It is interesting how it is told how rapidly technology has changed; for example, the 1991 space shuttle had a 1 megahertz computer on it, whereas in 2006 a 500 gigahertz processor was made for common PCs by IBM and Georgia Tech (pg 3).
b.        There are many standards of ethics, therefore it’s very hard to call someone unethical just because they don’t follow the same standards one would expect; as an example,  Deontological theories say the ethical thing is to always follow the rules whereas Utilitarianism says it’s to make your fellow man happy even at the expense of breaking some rules sometimes (pg 31-32).
c.        The law must change just as rapidly as technology does or there may be some major discrepancies; a privacy law in Pennsylvania had not been updated to include camera phones, therefore a man taking pictures up a woman’s skirt did not get a conviction any worse than disorderly conduct (pg 25).  

2.       (Comprehension) Summarize what is being discussed within this chapter?

Chapter 1 (Unwrapping the Gift) provides a basic introduction to what the book will be about. It explains how rapidly technology is accelerating and that even from 10 years from now technology could even be beyond our comprehension (pg 2-4). It also makes things much more accomplishable, such as the commission of a new bridge (pg 4). However, there is a trade-off we must acknowledge. For every advantage technology gives us there is a disadvantage that comes along with it. For example, with the invention of the ATM made money transactions quick and easy, though there’s the possible issues of identity theft, unemployment of actual tellers and clear alienation that comes along with it (pg 21-22). Technology, while growing quickly, is something we must also keep up with, meaning laws must be adjusted and privacy issues must be addressed (pg 25). The subject of ethics also comes into play, informing us that we must view the ethics of certain companies and establishments wisely, as these ethics affect the new technology that may be put into place (pg 34). An example of this is the issue of the Ford Pinto, a car made in the 60’s with obvious defects that were never fixed due to cost-effectiveness – more can be read of that here. In conclusion, technology is a mixed blessing, one that makes much easier for us, but can also raise some serious concerns.




3.       (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?

One example of this I have seen is a scandal involving the  Sony Playstation 3 that happened a couple of months back. The Playstation Network (PSN) has made it very easy for users to go online and purchase a game right onto their console without even having to leave the house. However a hacker had entered into the PSN and effectively stole a large amount of peoples’ accounts (which included many credit cards on file, not to mention personal information).  While Sony fixed the problem and reimbursed those affected, the effect remains the same.



4.       (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

One thing in the book compares technology and its ups and downs with something as simple as fire. Much like computers, there are trade-offs to fire – it can cook our food, heat our homes and even light the way to a dark area, however at the same time it can burn down buildings, destroy property and even kill (Baase, 2). Technology can easily be related back to Bloom’s Taxonomy, as it follows all the steps encompassed in it (knowledge, comprehension, application, analysis, synthesis and evaluation). If one is faced with a problem involving making something work better they will try to create something to do so, go through many steps of trail-and-error to see how well it solves the problem, they will turn it into a habitual action/improvement if proven to work correctly, they will learn the technology to make it even easier to use, and then evaluate how well it works, making possible revisions and improvements for future endeavors.

5.       (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what the article states, as while technology is a great gift, it comes with many things to consider. For example, the ATM example stating how easy it is to use – though at the same time how easy it is for others to steal your card information and identity – is a prime example (Baase, 22). Also, while the internet is a great way for everyone to connect, it also includes all the vices of modern society, including but not limited to crime, copyright infringement and gambling (Baase, 25). From this I can draw the conclusion that everything must be looked at carefully; even if something seems like a really great thing, it will always come with some bad things to consider following it, and vice versa. This chapter has given the reader clear reason why they should always be careful of what they’re doing, whether on cyberspace or not.


6.       (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

This topic is extremely relevant for today’s society, as technology continues to grow at an exponential rate, so what we know now may pale in comparison to what comes into play decades from now. After reading this chapter I will be more skeptical of technology and everything that encompasses it. As with everything, there are some things you should know before delving too far into technology.




References

The Engineer. "Ford Pinto ENGINEERING.com." ENGINEERING.com | The Engineer's Ultimate Resource Tool. The Engineer. Web. 20 Sept. 2011. <http://www.engineering.com/Library/ArticlesPage/tabid/85/articleType/ArticleView/articleId/166/Ford-Pinto.aspx>.

Baase, Sara. "Chapter 1: Unwrapping the Gift." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 2-34. Print