Wednesday, April 25, 2012

Chapter 6: Work, Guest speaker Ken Fick, CPA, MBA

1) I know that people say that traveling for work takes away from being there for a family. Is there one big thing that you were able to do or be home for because you telecommunicate that you would have missed if you were away working that really makes telecommuning worth it?

2) Not working in an office means that you don't get to be around coworkers or other people outside of your family as often. Do you ever miss being around other people and socializing in the work place?

Monday, April 23, 2012

Chapter 6: Work 6.1-6.3

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1-6.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. Telecommuting (the working at a distance from the office or factory due to computers and telecommunication devices) has become increasingly popular.
b. Computer’s take away jobs because they make tasks easier and more efficient.
c. The offshoring of jobs has become a major means of business. Some say the pros outweigh the benefits and others disagree.

2. (Comprehension) Summarize what is being discussed within this chapter?
Technology has a great impact on the economy and employment. A truly successful technology eliminates the need for some jobs while creating others. Our skill levels as a society has needed to increase in order to keep up with being able to fulfill the jobs of maintaining the technology. More and more people are telecommuting and are able to work from home and not travel to work. Businesses tend to offshore jobs for reasons of benefits of different companies and places working for them. Very few jobs have been lost solely because of offshoring.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
When referring to the offshoring of jobs, I generally think of calling a help hotline and being transferred to some Middle East country and not being able to understand the person I’m speaking to. I’ve had to call a help line for an order I placed online for accessories for my phone. The person I spoke with had such a thick accent I could not understand a word they were saying. After struggling for several minutes I hung up and emailed the customer service instead. In order to prevent this they should be interviewed to see how well they are understood.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I would compare offshoring to buying products from overseas rather than keeping the business in the U.S. This is an issue because it is boosting the economies of countries overseas rather than the economy of the U.S. In some ways, yes offshoring may be cheaper for business, but the business should be looking and to also benefit the economy as much as it can.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that the education and skills needed to work now is much greater than before. I think that technology is ever changing and we have to keep up with it and change as well. I think offshoring may not generally take jobs away from us, but it takes away job opportunities. We should be giving these jobs to fellow Americans and helping out our own economy.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think what is being said is true because it talks about the jobs available and the economy now. Technology is constantly changing and we need to be able to keep up with it changing. I’m viewing this like I am because I personally experience the constant changing of technology and the jobs that have been taken away due to technology.

References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

Sunday, April 15, 2012

Chapter 5: Hactivism

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5-5.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. The F.B.I. arrested 14 people linked to this “Anonymous” group, the Britian’s Scotland Yard arrested one, and the Dutch police arrested four.
b. There are tools and software as well as tips on the internet for help with hacking
websites and other computers.
c. The Zetas (a powerful Mexican drug cartel) supposedly kidnapped but then released a member of “Anonymous”.

2. (Comprehension) Summarize what is being discussed within this chapter?
An internet group known as “Anonymous” has created a big ruckus online with police as well as other online companies and the Mexican drug cartel known as the “Zetas”. 14 people in the U.S. were arrested in response to a cyber-attack on PayPal in 2010. They have also attacked other credit card companies such as MasterCard and Visa. Barrett Lyon states the biggest issue is that it is too easy for people to download programs and software used for hacking. It’s nearly impossible to arrest everyone who hacks. A man named Barrett Brown has been seen as the face of “Anonymous” and has been seeking public attention. He also published a book about the group “Anonymous”.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A solution that could help with these issues is banning the public viewing of information on hacking. Posting hacking tools and software on the internet should be banned. Relating this to a problem I experienced would be having my email account. I had my email account hacked before and a mass email was sent out to my contact list attaching a virus. In this situation I had to delete my email account and create a new one.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
If I was to relate hacking to something that did not relate to technology I would compare it to cracking combinations safes. This is also a threat to security and safety. In high school kids crack these locks in order to steal things out of the lockers of others. My solution to help with the hacking issue would be the same as for cracking combination safes. There should not be information online with tips and techniques to make it easier for anyone to do it. This is an online
video I found in under a minute to learn how to crack a combination lock.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that hacking is becoming a major issue. The biggest concern is that almost everyone everywhere can easily learn how to hack. If it is true that someone from the “Anonymous” group was kidnapped then it shows how real the threat of public safety is for those who hack. I think that this group may be mostly looking for attention but are capable of at least causing an inconvenience shown by their attacks on PayPal and other companies. After reading this I realized the magnitude that the hacking issue is. I did not realize it was so an issue on such a high level.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do think that this is a serious topic in today’s society because technology plays such a major role in our lives. Technology is everywhere and we as a society put so much faith and trust into society. After reading these articles I will begin to pay more attention to how much personal information and trust I put into technology. It is clear that hacking is a big issue and now I know how easy it is for anyone to hack.


References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

Chen, Adrian. "It Pays to Be the Face of
Anonymous." Gawker. Hackers, 04 11 2011. Web. 15 Apr 2012. .

Neuman, Scott. "Hacking Made Easier, Thanks to
User-Friendly Tools." NPR Online. N.p., 2011. Web. 15 Apr 2012.


Smith, Catharine. "Anonymous, LulzSec Respond To FBI
Arrests Of Suspected Hackers ." Huff Post Tech. The Huffington
Post, 21 7 2011. Web. 15 Apr 2012.
.

Sunday, April 8, 2012

Chapter 4: Part 1 Intellectual Property

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 4.3-4.7

1. (Knowledge)Tell three interesting elements of this chapter:
a. iPods, cell phones, and blank DVDs are taxed extra high in an attempt to reimburse
copyright holders form expected losses from illegal copying.
b. “Fair use” states that there is a legal limit of size someone can use copyrighted
material with it being still legal. In other words, someone can borrow a clip from a song or music that is copyrighted and have it be legal.
c. Piracy is not as big of an issue in America as it is in other countries, such as Japan and Armenia.

2. (Comprehension) Summarize what is being discussed within this chapter?
The effort to stop intellectual property theft is ongoing and has been around since software has been around and illegally distributed. The three ways of enforcing legal distribution are banning, suing, and taxing. The question of what is and is not considered “fair use” of file viewing and sharing is a gray area. People say unauthorized file-sharing is good because it lets people try out author’s music before they buy it. Free software is loved by some, and hated by others. Some think all software should be free and others think it should be a profit organization.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be
specific and explain?
I think that in order to solve this problem, the government should intervene and limit the ways and companies that can allow the distribution of music. There should be a monopoly in the music distribution industry with smaller branches off of it and they should allow trial samples, clips, of the music to be downloaded so that customers can try out the author’s music before they buy it.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can relate piracy of music and movies to copyrighting of words and thoughts. Copyrighting and plagiarizing someone else’s work is also highly illegal and strictly enforced. Stealing of someone’s ideas is just as bad as physical materials. A solution to this is the use of turnitin.com. This is a great website for detecting plagiarism. It references the student’s work and compares it to material online. All works should be referenced through this to prevent further plagiarism.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because piracy is such a huge issue in America. Since 1999, music sales have drop 47%. (“Riaa”). Music industries are losing a lot of money because of this. I think that the music industry has a right to be upset with the piracy rates and should want change.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that this topic is relevant in today’s society. I think it is because the piracy rates in the U.S. are still extremely high. I think that more people should but CDs legally as well as movies because it’s legal, and also to support the artists. I personally buy CDs because I want to support the artists that I listen to. The ethical debate comes into play in this section because what is and isn’t ethical with file-sharing is debatable. It isn’t ethical to steal music. After reading this, I think that more people should buy CDs and software legally.


References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

Indvik, L.. "U.S. Internet Piracy Is on the Decline [STATS]." mashable.com. N.p., 2011. Web. 24 Apr 2012. .


Unknown. "For Students Doing Reports." Riaa.
Recording Industry Association of
America, 2012. Web. 8 Apr 2012.
.

Wednesday, April 4, 2012

Chapter 3: Part 2

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.4-3.6

1. (Knowledge)Tell three interesting elements of this chapter:
a. John Helsingius developed the first anonymous emailer in Finland. Grew to roughly 500,000 users and became very popular.
b. The CIA funded an anonymizer start-up to spy secretly. This would allow them to spy on us secretly and we would never know.
c. Phone companies were forced to lease phone lines to the competition at neutral low
prices because of net neutrality.

2. (Comprehension) Summarize what is being discussed within this chapter?
Within the chapter, campaign restrictions are discussed. The ways that campaign money is spent is monitored and regulated. The way that information is spread is also regulated. The Federal Election Commission administers election laws. In 2006 the FEC began charging a fee for online campaign regulation. It began possible to send emails anonymously in 1993. The CIA uses an anonymous IP address when spying on the society. Net Neutrality is a variety of proposals for restrictions on how telephone companies interact with their customers and how they set pricing.

3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I have experienced a specific problem with anonymity in society before. I experienced the misuse and abuse of anonymous emailing. My mother a few years ago kept receiving harassing emails from anonymous emails. A way to solve this issue would be requiring something specific related to the person who is creating the anonymous email account when the account is created so that there is something that links that individual to the emails account.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can compare the anonymity (3.5) to the sending and receiving of letters with no return address or that are unlabeled. The anonymous letter sending is sometimes dangerous because this is how bombs and threatening letters are sent. To solve this problem, you should be required to show ID at every post office that you use to send mail.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with what is being said about regulating the campaign money usage and advertising. It would get out of hand because it would be everywhere you looked and it could be sometimes offensive to other political parties if it was not regulated. I do not agree with what is said about anonymity because I think that there should be stricter laws about it. After experiencing the negative side effects of this personally, I think that we as a society need more restrictions on what can be done anonymously. I also agree with net neutrality because without it, big businesses would dominate and destroy littler companies and then they would have no competition for their prices.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that these topics are relevant in today’s society. Some topics may not be
as important, especially to some people, but they all are discussing present issues that are ever-changing. I have never been involved in politics and do not ever wish to get involved in politics therefore I do not care very much about the government campaign regulations. Net neutrality and anonymity I both have experienced the negative side effects from so I very them conservatively. I may think about anonymity and net neutrality more after reading this. I may think about big businesses leasing lines at neutral costs to competition more and think about who competes with who.



References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

Monday, April 2, 2012

Chapter 3: Video and Prezi

My Prezi is mostly about government censorship and filtering. I included some information about censorship for other countries around the globe. I also mention how big businesses have taken over the media market and the effects they have had.


http://prezi.com/hdfbjnovow3g/government-online-filters-and-big-businesses/?auth_key=1cee812c1433700b1dc6c91b605df24de4a807fa

Sunday, March 11, 2012

Chapter 3: Part 1 Freedom of Speech

Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. The court case Miller v. California established what is not legal under the 1st Amendment because it is defined as obscene.
b. The CAN-SPAM Act put limitations and restrictions on email spam which was supported as much as it was opposed. In addition to this, California passed a law banning spam to cell phones and pagers and now most states ban it. (http://www.theinternetpatrol.com/how-to-stop-sms-text-spam-and-how-to-report-sms-txt-msg-spam/)
c. In 2002, China banned the use of Google online, also then banning Wikipedia websites which only lasted around a year.

2. (Comprehension) Summarize what is being discussed within this chapter?
One of the main objectives of the government has been to create a lawful set of rules and limitations to protect children on the internet. Children are now more at risk than before with all of the inappropriate materials on there. The Communications Decency Act (CDA) was deemed unconstitutional, so the Child Online Protection Act (COPA) was passed to protect children online. There has been a battle of censorship for many years. The biggest question when the topic of censorship is brought up is what is and is not violating the 1st Amendment. Spam has also become a major issue with the advancement of technology. Limitations have also been placed on spamming.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
In high school I experienced a similar situation involving a violation of internet usage and inappropriate materials on the internet. I had a hall monitor in middle school that was fired and arrested for looking at child porn and other obscene materials on the computer. This is in correlation with the fact that people have access to way too much online. Even with the limitations and restrictions with what can be posted online, there are ways around it and not everything can be censored. I think that something that may help this problem is much swifter and harsher punishments to violating the obscene materials law.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

The issue of spam mail is very similar with the problem society has with “junk mail” or “bulk mail”. The United States Postal Service (USPS) sends out 177 billion letters a year, 47% of which is considered unwanted. (http://blog.sendblaster.com/tag/statistics/) Almost one in two letters is spam. The main reason for this is because the USPS does not want to stop this. This is because the USPS is making money on the sending of spam mail. (http://blog.sendblaster.com/tag/statistics/) Understand this, it seems as if society cannot stop the receiving of spam mail whether it’s online or not. There are higher powers preventing society from being “spam free”.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with that is being said, but to an extent. I think that the censorship laws and restrictions are necessary and need to be enacted. The censorship laws in my opinion should be strict, but the punishments that follow need to be stricter and harsher as well. There will always be ways around the laws and filters, but if society is too afraid to find these loop-holes there would be fewer instances. I now see how hard it is to govern something like this. I see how it has been a trial and error and that the government has proposed different agencies and laws that have been overturned and deemed as unconstitutional.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think that this topic becomes more and more relevant every time a new advancement in technology takes place. I think this because with more power comes more responsibility. Just because we can do something does not mean we should. We can post suggestive and inappropriate things online for others to view, but that doesn’t mean we should. Children should not have access to things online that they would not have access to or allowed to view or go to if it weren’t for the internet. I think that after reading this, it has become more clear the issues with the internet and children and the power of the 1st Amendment. It is extremely difficult to lawfully limit the power of the people. 


References

Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.

"Infographic: Email vs Snail Mail." Statistics. 4 Oct. 2010. Web. 11 Mar. 2012. .

"Junk Mail and the U.S. Post Office - EcoFuture Resources on How to Get Rid of Junk Mail, Spam, and Telemarketers." EcoFuture (TM) Environmental Resources. Frew Ebel, 2 Oct. 2004. Web. 11 Mar. 2012. .

Mitchell, Anne P. "How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam  by Anne P. Mitchell, Esq. - 25 Comments, Last Updated02/26/2012 - 50,958 Views since Last Count." How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam. The Internet Patrol, 26 Feb. 2012. Web. 11 Mar. 2012. .