Sunday, September 25, 2011

Chapter 2: Privacy

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 2 (2.1-2.2, 2.3.2-2.3.6, 2.4.2, 2.5.3-2.5.4)

1. (Knowledge)Tell three interesting elements of this chapter:
a. The three aspects of privacy involve freedom from intrusion, control of information about oneself, and freedom from surveillance; all 3 of these combined can make privacy hard to fully sustain (Baase, 45)
b. CODIS, a database tracking DNA in crimes, has become much more broad; for example, something that typically only involved the worst of crimes now also records people who simply commit a misdemeanor (Baase, 60)
c. Privacy is something the government constantly dismisses; in 2002 the NSA scanned 7,000 peoples’ international calls and emails (Baase, 123)

2. (Comprehension) Summarize what is being discussed within this chapter?

Privacy is an important factor as technology gets more sophisticated. However, people also give it up for convenience and personal service (Baase, 45). Personal info can be swapped – sometimes without consent – through intentional uses of it (for law enforcement), unauthorized use by “insiders”, theft of info, or even through negligence of one’s own actions (Baase, 46). Secondary use is when you use info at hand for a different purpose than otherwise specified (ie: checking a buyer’s transaction history to see if he had bought anything suspicious recently), and is considered an infringement of privacy (Baase, 51). The Privacy Act of 1974 tried to make things easier, though there are many loopholes that surround it (Baase, 58). Video surveillance is increasing, as in Britain alone there are known to be about 4 million cameras outside watching everyone go about their business (Baase, 73). However, while some may see this as an invasion of privacy, it also helped the government catch known bombers in the area (Baase, 74). Location tracking and GPS services are also becoming increasingly popular, especially so advertisers know how to reach the consumer, and also pinpoint what exactly they could want (Baase, 83). While sites will do their best to protect their users, hackers can use spyware to steal information anyways, for example, Time Warner’s files on 600,000 of its employees (Baase, 86-87). Regarding transactions, they are something done by two parties, and both parties have a role in deciding how private the transaction can be, and can negotiate accordingly (Baase, 109). Regulations can strengthen privacy, but are very costly (Baase, 112). The free-market and consumer-protection viewpoints show insight into privacy and technology; while the first gives the consumer more responsibility and the option to opt-into privacy statements with the other party, the latter views privacy as a much needed right and strongly believes consumers should simply get as much privacy as possible (Baase, 114-115). The government can also easily be put in the hot seat, as the NSA has had many issues dealing with security and privacy, from the 1920’s on (Baase, 123-124). The government also gets paranoid during wartime, suspecting things even as simple as flower arrangements to be attempts to spy or relay personal info (Baase, 126). Also, encryption brings an attempt to make info much more secure and private to the internet, but at the same time this can help lawbreakers stay under the radar (ie: a pedophile finding ways to encrypt the child pornography on their drive) (Baase, 129). Privacy is a very touchy subject with technology and the internet, as it is hard to define, and even harder to protect.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A specific example that can be used and applied to the text is the hacking of the database of the US Pentagon. A couple months back, the US Pentagon was hacked into, putting over 24,000 sensitive files in danger. It was believed that there was a country involved, though no further comments were made. This alone proved that the US government databases themselves can be hacked, and has put officials in a new state of worry, as they now know that they are very vulnerable. More about the Pentagon fiasco can be read here.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

An idea, while tried before, would be to try and make an updated Privacy Act for each year that passes. Given that technology is something that is constantly changing and laws need to reflect such (as stated in Baase’s first chapter), this act should routinely be updated with the addition of new technology so that past loopholes may be closed. Hackers will still nevertheless be able to get into networks, but this will give the internet users more security and more privacy from advertising agents and the government – also, if said hackers are caught, strict punishments may be put in the bill so that they cannot commit the crime again. This will also prove an example to other hackers who see others prosecuted at a heavy level.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being said when it is stated that people need to be careful of what they post on the internet – even though some privacy issues can’t be helped, it is important to make sure we know what we are putting online so that we don’t help contribute to the problem (Baase, 91). One other point the author makes that is an interesting one is that our generation is no longer used to privacy and acts accordingly (92). This is increasingly noticeable in the sense that major areas have cameras around everyday street corners and people don’t mind them (Baase, 72). People also get advertised to through location tracking services, which while reducing their privacy, helps them get what they are interested in buying, which helps to make them more comfortable with their privacy being obstructed (Baase, 83). I have concluded that it never hurts to be a bit secretive; you don’t have to post your phone number, address, etcetera on Facebook. It is important to monitor what is on your record on the internet.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe this topic is very relevant in today’s society, as internet shopping, searching, and blogging are very popular in this day and age, and they are all ways for someone to learn more about you if they were to look up this information about you. I am viewing the topic in the way that I am, as at my job a large topic brought up by customers is identity theft, how often it’s happened to them and how it is becoming increasingly popular – my job also uses a “suggested sell” model which helps customers buy things related to what they have bought previously, which is touched on largely in the chapter.



References

International Business Times. "Pentagon Seeks Cyber Security Strategy After Massive Hack of 24,000 Files - International Business Times." International Business Times. 14 July 2011. Web. 25 Sept. 2011. .

Baase, Sara. "Chapter 2: Privacy." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 45-129. Print.

Tuesday, September 20, 2011

Chapter 1: Unwrapping the Gift

Name: Robert Feind                                                                                                      Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 1: UNWRAPPING THE GIFT 
 1.1 The Ubiquity of Computers and the Rapid Pace of Change (p.2-3)
1.2 New Developments and Dramatic Impacts (p.4-5)
1.3 An Introduction to Some Issues and Themes (p.21-27)
1.4 Ethics (p.28-34)


1.       (Knowledge)Tell three interesting elements of this chapter:
a.       It is interesting how it is told how rapidly technology has changed; for example, the 1991 space shuttle had a 1 megahertz computer on it, whereas in 2006 a 500 gigahertz processor was made for common PCs by IBM and Georgia Tech (pg 3).
b.        There are many standards of ethics, therefore it’s very hard to call someone unethical just because they don’t follow the same standards one would expect; as an example,  Deontological theories say the ethical thing is to always follow the rules whereas Utilitarianism says it’s to make your fellow man happy even at the expense of breaking some rules sometimes (pg 31-32).
c.        The law must change just as rapidly as technology does or there may be some major discrepancies; a privacy law in Pennsylvania had not been updated to include camera phones, therefore a man taking pictures up a woman’s skirt did not get a conviction any worse than disorderly conduct (pg 25).  

2.       (Comprehension) Summarize what is being discussed within this chapter?

Chapter 1 (Unwrapping the Gift) provides a basic introduction to what the book will be about. It explains how rapidly technology is accelerating and that even from 10 years from now technology could even be beyond our comprehension (pg 2-4). It also makes things much more accomplishable, such as the commission of a new bridge (pg 4). However, there is a trade-off we must acknowledge. For every advantage technology gives us there is a disadvantage that comes along with it. For example, with the invention of the ATM made money transactions quick and easy, though there’s the possible issues of identity theft, unemployment of actual tellers and clear alienation that comes along with it (pg 21-22). Technology, while growing quickly, is something we must also keep up with, meaning laws must be adjusted and privacy issues must be addressed (pg 25). The subject of ethics also comes into play, informing us that we must view the ethics of certain companies and establishments wisely, as these ethics affect the new technology that may be put into place (pg 34). An example of this is the issue of the Ford Pinto, a car made in the 60’s with obvious defects that were never fixed due to cost-effectiveness – more can be read of that here. In conclusion, technology is a mixed blessing, one that makes much easier for us, but can also raise some serious concerns.




3.       (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?

One example of this I have seen is a scandal involving the  Sony Playstation 3 that happened a couple of months back. The Playstation Network (PSN) has made it very easy for users to go online and purchase a game right onto their console without even having to leave the house. However a hacker had entered into the PSN and effectively stole a large amount of peoples’ accounts (which included many credit cards on file, not to mention personal information).  While Sony fixed the problem and reimbursed those affected, the effect remains the same.



4.       (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

One thing in the book compares technology and its ups and downs with something as simple as fire. Much like computers, there are trade-offs to fire – it can cook our food, heat our homes and even light the way to a dark area, however at the same time it can burn down buildings, destroy property and even kill (Baase, 2). Technology can easily be related back to Bloom’s Taxonomy, as it follows all the steps encompassed in it (knowledge, comprehension, application, analysis, synthesis and evaluation). If one is faced with a problem involving making something work better they will try to create something to do so, go through many steps of trail-and-error to see how well it solves the problem, they will turn it into a habitual action/improvement if proven to work correctly, they will learn the technology to make it even easier to use, and then evaluate how well it works, making possible revisions and improvements for future endeavors.

5.       (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what the article states, as while technology is a great gift, it comes with many things to consider. For example, the ATM example stating how easy it is to use – though at the same time how easy it is for others to steal your card information and identity – is a prime example (Baase, 22). Also, while the internet is a great way for everyone to connect, it also includes all the vices of modern society, including but not limited to crime, copyright infringement and gambling (Baase, 25). From this I can draw the conclusion that everything must be looked at carefully; even if something seems like a really great thing, it will always come with some bad things to consider following it, and vice versa. This chapter has given the reader clear reason why they should always be careful of what they’re doing, whether on cyberspace or not.


6.       (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

This topic is extremely relevant for today’s society, as technology continues to grow at an exponential rate, so what we know now may pale in comparison to what comes into play decades from now. After reading this chapter I will be more skeptical of technology and everything that encompasses it. As with everything, there are some things you should know before delving too far into technology.




References

The Engineer. "Ford Pinto ENGINEERING.com." ENGINEERING.com | The Engineer's Ultimate Resource Tool. The Engineer. Web. 20 Sept. 2011. <http://www.engineering.com/Library/ArticlesPage/tabid/85/articleType/ArticleView/articleId/166/Ford-Pinto.aspx>.

Baase, Sara. "Chapter 1: Unwrapping the Gift." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 2-34. Print