1) I know that people say that traveling for work takes away from being there for a family. Is there one big thing that you were able to do or be home for because you telecommunicate that you would have missed if you were away working that really makes telecommuning worth it?
2) Not working in an office means that you don't get to be around coworkers or other people outside of your family as often. Do you ever miss being around other people and socializing in the work place?
Wednesday, April 25, 2012
Monday, April 23, 2012
Chapter 6: Work 6.1-6.3
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1-6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. Telecommuting (the working at a distance from the office or factory due to computers and telecommunication devices) has become increasingly popular.
b. Computer’s take away jobs because they make tasks easier and more efficient.
c. The offshoring of jobs has become a major means of business. Some say the pros outweigh the benefits and others disagree.
2. (Comprehension) Summarize what is being discussed within this chapter?
Technology has a great impact on the economy and employment. A truly successful technology eliminates the need for some jobs while creating others. Our skill levels as a society has needed to increase in order to keep up with being able to fulfill the jobs of maintaining the technology. More and more people are telecommuting and are able to work from home and not travel to work. Businesses tend to offshore jobs for reasons of benefits of different companies and places working for them. Very few jobs have been lost solely because of offshoring.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
When referring to the offshoring of jobs, I generally think of calling a help hotline and being transferred to some Middle East country and not being able to understand the person I’m speaking to. I’ve had to call a help line for an order I placed online for accessories for my phone. The person I spoke with had such a thick accent I could not understand a word they were saying. After struggling for several minutes I hung up and emailed the customer service instead. In order to prevent this they should be interviewed to see how well they are understood.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I would compare offshoring to buying products from overseas rather than keeping the business in the U.S. This is an issue because it is boosting the economies of countries overseas rather than the economy of the U.S. In some ways, yes offshoring may be cheaper for business, but the business should be looking and to also benefit the economy as much as it can.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that the education and skills needed to work now is much greater than before. I think that technology is ever changing and we have to keep up with it and change as well. I think offshoring may not generally take jobs away from us, but it takes away job opportunities. We should be giving these jobs to fellow Americans and helping out our own economy.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think what is being said is true because it talks about the jobs available and the economy now. Technology is constantly changing and we need to be able to keep up with it changing. I’m viewing this like I am because I personally experience the constant changing of technology and the jobs that have been taken away due to technology.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1-6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. Telecommuting (the working at a distance from the office or factory due to computers and telecommunication devices) has become increasingly popular.
b. Computer’s take away jobs because they make tasks easier and more efficient.
c. The offshoring of jobs has become a major means of business. Some say the pros outweigh the benefits and others disagree.
2. (Comprehension) Summarize what is being discussed within this chapter?
Technology has a great impact on the economy and employment. A truly successful technology eliminates the need for some jobs while creating others. Our skill levels as a society has needed to increase in order to keep up with being able to fulfill the jobs of maintaining the technology. More and more people are telecommuting and are able to work from home and not travel to work. Businesses tend to offshore jobs for reasons of benefits of different companies and places working for them. Very few jobs have been lost solely because of offshoring.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
When referring to the offshoring of jobs, I generally think of calling a help hotline and being transferred to some Middle East country and not being able to understand the person I’m speaking to. I’ve had to call a help line for an order I placed online for accessories for my phone. The person I spoke with had such a thick accent I could not understand a word they were saying. After struggling for several minutes I hung up and emailed the customer service instead. In order to prevent this they should be interviewed to see how well they are understood.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I would compare offshoring to buying products from overseas rather than keeping the business in the U.S. This is an issue because it is boosting the economies of countries overseas rather than the economy of the U.S. In some ways, yes offshoring may be cheaper for business, but the business should be looking and to also benefit the economy as much as it can.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that the education and skills needed to work now is much greater than before. I think that technology is ever changing and we have to keep up with it and change as well. I think offshoring may not generally take jobs away from us, but it takes away job opportunities. We should be giving these jobs to fellow Americans and helping out our own economy.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think what is being said is true because it talks about the jobs available and the economy now. Technology is constantly changing and we need to be able to keep up with it changing. I’m viewing this like I am because I personally experience the constant changing of technology and the jobs that have been taken away due to technology.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Sunday, April 15, 2012
Chapter 5: Hactivism
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5-5.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. The F.B.I. arrested 14 people linked to this “Anonymous” group, the Britian’s Scotland Yard arrested one, and the Dutch police arrested four.
b. There are tools and software as well as tips on the internet for help with hacking
websites and other computers.
c. The Zetas (a powerful Mexican drug cartel) supposedly kidnapped but then released a member of “Anonymous”.
2. (Comprehension) Summarize what is being discussed within this chapter?
An internet group known as “Anonymous” has created a big ruckus online with police as well as other online companies and the Mexican drug cartel known as the “Zetas”. 14 people in the U.S. were arrested in response to a cyber-attack on PayPal in 2010. They have also attacked other credit card companies such as MasterCard and Visa. Barrett Lyon states the biggest issue is that it is too easy for people to download programs and software used for hacking. It’s nearly impossible to arrest everyone who hacks. A man named Barrett Brown has been seen as the face of “Anonymous” and has been seeking public attention. He also published a book about the group “Anonymous”.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A solution that could help with these issues is banning the public viewing of information on hacking. Posting hacking tools and software on the internet should be banned. Relating this to a problem I experienced would be having my email account. I had my email account hacked before and a mass email was sent out to my contact list attaching a virus. In this situation I had to delete my email account and create a new one.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
If I was to relate hacking to something that did not relate to technology I would compare it to cracking combinations safes. This is also a threat to security and safety. In high school kids crack these locks in order to steal things out of the lockers of others. My solution to help with the hacking issue would be the same as for cracking combination safes. There should not be information online with tips and techniques to make it easier for anyone to do it. This is an online
video I found in under a minute to learn how to crack a combination lock.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that hacking is becoming a major issue. The biggest concern is that almost everyone everywhere can easily learn how to hack. If it is true that someone from the “Anonymous” group was kidnapped then it shows how real the threat of public safety is for those who hack. I think that this group may be mostly looking for attention but are capable of at least causing an inconvenience shown by their attacks on PayPal and other companies. After reading this I realized the magnitude that the hacking issue is. I did not realize it was so an issue on such a high level.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do think that this is a serious topic in today’s society because technology plays such a major role in our lives. Technology is everywhere and we as a society put so much faith and trust into society. After reading these articles I will begin to pay more attention to how much personal information and trust I put into technology. It is clear that hacking is a big issue and now I know how easy it is for anyone to hack.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Chen, Adrian. "It Pays to Be the Face of
Anonymous." Gawker. Hackers, 04 11 2011. Web. 15 Apr 2012..
Neuman, Scott. "Hacking Made Easier, Thanks to
User-Friendly Tools." NPR Online. N.p., 2011. Web. 15 Apr 2012.
Smith, Catharine. "Anonymous, LulzSec Respond To FBI
Arrests Of Suspected Hackers ." Huff Post Tech. The Huffington
Post, 21 7 2011. Web. 15 Apr 2012.
.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 5-5.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. The F.B.I. arrested 14 people linked to this “Anonymous” group, the Britian’s Scotland Yard arrested one, and the Dutch police arrested four.
b. There are tools and software as well as tips on the internet for help with hacking
websites and other computers.
c. The Zetas (a powerful Mexican drug cartel) supposedly kidnapped but then released a member of “Anonymous”.
2. (Comprehension) Summarize what is being discussed within this chapter?
An internet group known as “Anonymous” has created a big ruckus online with police as well as other online companies and the Mexican drug cartel known as the “Zetas”. 14 people in the U.S. were arrested in response to a cyber-attack on PayPal in 2010. They have also attacked other credit card companies such as MasterCard and Visa. Barrett Lyon states the biggest issue is that it is too easy for people to download programs and software used for hacking. It’s nearly impossible to arrest everyone who hacks. A man named Barrett Brown has been seen as the face of “Anonymous” and has been seeking public attention. He also published a book about the group “Anonymous”.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A solution that could help with these issues is banning the public viewing of information on hacking. Posting hacking tools and software on the internet should be banned. Relating this to a problem I experienced would be having my email account. I had my email account hacked before and a mass email was sent out to my contact list attaching a virus. In this situation I had to delete my email account and create a new one.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
If I was to relate hacking to something that did not relate to technology I would compare it to cracking combinations safes. This is also a threat to security and safety. In high school kids crack these locks in order to steal things out of the lockers of others. My solution to help with the hacking issue would be the same as for cracking combination safes. There should not be information online with tips and techniques to make it easier for anyone to do it. This is an online
video I found in under a minute to learn how to crack a combination lock.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree that hacking is becoming a major issue. The biggest concern is that almost everyone everywhere can easily learn how to hack. If it is true that someone from the “Anonymous” group was kidnapped then it shows how real the threat of public safety is for those who hack. I think that this group may be mostly looking for attention but are capable of at least causing an inconvenience shown by their attacks on PayPal and other companies. After reading this I realized the magnitude that the hacking issue is. I did not realize it was so an issue on such a high level.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do think that this is a serious topic in today’s society because technology plays such a major role in our lives. Technology is everywhere and we as a society put so much faith and trust into society. After reading these articles I will begin to pay more attention to how much personal information and trust I put into technology. It is clear that hacking is a big issue and now I know how easy it is for anyone to hack.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Chen, Adrian. "It Pays to Be the Face of
Anonymous." Gawker. Hackers, 04 11 2011. Web. 15 Apr 2012.
Neuman, Scott. "Hacking Made Easier, Thanks to
User-Friendly Tools." NPR Online. N.p., 2011. Web. 15 Apr 2012.
Smith, Catharine. "Anonymous, LulzSec Respond To FBI
Arrests Of Suspected Hackers ." Huff Post Tech. The Huffington
Post, 21 7 2011. Web. 15 Apr 2012.
Sunday, April 8, 2012
Chapter 4: Part 1 Intellectual Property
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 4.3-4.7
1. (Knowledge)Tell three interesting elements of this chapter:
a. iPods, cell phones, and blank DVDs are taxed extra high in an attempt to reimburse
copyright holders form expected losses from illegal copying.
b. “Fair use” states that there is a legal limit of size someone can use copyrighted
material with it being still legal. In other words, someone can borrow a clip from a song or music that is copyrighted and have it be legal.
c. Piracy is not as big of an issue in America as it is in other countries, such as Japan and Armenia.
2. (Comprehension) Summarize what is being discussed within this chapter?
The effort to stop intellectual property theft is ongoing and has been around since software has been around and illegally distributed. The three ways of enforcing legal distribution are banning, suing, and taxing. The question of what is and is not considered “fair use” of file viewing and sharing is a gray area. People say unauthorized file-sharing is good because it lets people try out author’s music before they buy it. Free software is loved by some, and hated by others. Some think all software should be free and others think it should be a profit organization.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be
specific and explain?
I think that in order to solve this problem, the government should intervene and limit the ways and companies that can allow the distribution of music. There should be a monopoly in the music distribution industry with smaller branches off of it and they should allow trial samples, clips, of the music to be downloaded so that customers can try out the author’s music before they buy it.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can relate piracy of music and movies to copyrighting of words and thoughts. Copyrighting and plagiarizing someone else’s work is also highly illegal and strictly enforced. Stealing of someone’s ideas is just as bad as physical materials. A solution to this is the use of turnitin.com. This is a great website for detecting plagiarism. It references the student’s work and compares it to material online. All works should be referenced through this to prevent further plagiarism.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because piracy is such a huge issue in America. Since 1999, music sales have drop 47%. (“Riaa”). Music industries are losing a lot of money because of this. I think that the music industry has a right to be upset with the piracy rates and should want change.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that this topic is relevant in today’s society. I think it is because the piracy rates in the U.S. are still extremely high. I think that more people should but CDs legally as well as movies because it’s legal, and also to support the artists. I personally buy CDs because I want to support the artists that I listen to. The ethical debate comes into play in this section because what is and isn’t ethical with file-sharing is debatable. It isn’t ethical to steal music. After reading this, I think that more people should buy CDs and software legally.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Indvik, L.. "U.S. Internet Piracy Is on the Decline [STATS]." mashable.com. N.p., 2011. Web. 24 Apr 2012. .
Unknown. "For Students Doing Reports." Riaa.
Recording Industry Association of
America, 2012. Web. 8 Apr 2012.
.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 4.3-4.7
1. (Knowledge)Tell three interesting elements of this chapter:
a. iPods, cell phones, and blank DVDs are taxed extra high in an attempt to reimburse
copyright holders form expected losses from illegal copying.
b. “Fair use” states that there is a legal limit of size someone can use copyrighted
material with it being still legal. In other words, someone can borrow a clip from a song or music that is copyrighted and have it be legal.
c. Piracy is not as big of an issue in America as it is in other countries, such as Japan and Armenia.
2. (Comprehension) Summarize what is being discussed within this chapter?
The effort to stop intellectual property theft is ongoing and has been around since software has been around and illegally distributed. The three ways of enforcing legal distribution are banning, suing, and taxing. The question of what is and is not considered “fair use” of file viewing and sharing is a gray area. People say unauthorized file-sharing is good because it lets people try out author’s music before they buy it. Free software is loved by some, and hated by others. Some think all software should be free and others think it should be a profit organization.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be
specific and explain?
I think that in order to solve this problem, the government should intervene and limit the ways and companies that can allow the distribution of music. There should be a monopoly in the music distribution industry with smaller branches off of it and they should allow trial samples, clips, of the music to be downloaded so that customers can try out the author’s music before they buy it.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can relate piracy of music and movies to copyrighting of words and thoughts. Copyrighting and plagiarizing someone else’s work is also highly illegal and strictly enforced. Stealing of someone’s ideas is just as bad as physical materials. A solution to this is the use of turnitin.com. This is a great website for detecting plagiarism. It references the student’s work and compares it to material online. All works should be referenced through this to prevent further plagiarism.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because piracy is such a huge issue in America. Since 1999, music sales have drop 47%. (“Riaa”). Music industries are losing a lot of money because of this. I think that the music industry has a right to be upset with the piracy rates and should want change.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that this topic is relevant in today’s society. I think it is because the piracy rates in the U.S. are still extremely high. I think that more people should but CDs legally as well as movies because it’s legal, and also to support the artists. I personally buy CDs because I want to support the artists that I listen to. The ethical debate comes into play in this section because what is and isn’t ethical with file-sharing is debatable. It isn’t ethical to steal music. After reading this, I think that more people should buy CDs and software legally.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Indvik, L.. "U.S. Internet Piracy Is on the Decline [STATS]." mashable.com. N.p., 2011. Web. 24 Apr 2012.
Unknown. "For Students Doing Reports." Riaa.
Recording Industry Association of
America, 2012. Web. 8 Apr 2012.
Wednesday, April 4, 2012
Chapter 3: Part 2
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.4-3.6
1. (Knowledge)Tell three interesting elements of this chapter:
a. John Helsingius developed the first anonymous emailer in Finland. Grew to roughly 500,000 users and became very popular.
b. The CIA funded an anonymizer start-up to spy secretly. This would allow them to spy on us secretly and we would never know.
c. Phone companies were forced to lease phone lines to the competition at neutral low
prices because of net neutrality.
2. (Comprehension) Summarize what is being discussed within this chapter?
Within the chapter, campaign restrictions are discussed. The ways that campaign money is spent is monitored and regulated. The way that information is spread is also regulated. The Federal Election Commission administers election laws. In 2006 the FEC began charging a fee for online campaign regulation. It began possible to send emails anonymously in 1993. The CIA uses an anonymous IP address when spying on the society. Net Neutrality is a variety of proposals for restrictions on how telephone companies interact with their customers and how they set pricing.
3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I have experienced a specific problem with anonymity in society before. I experienced the misuse and abuse of anonymous emailing. My mother a few years ago kept receiving harassing emails from anonymous emails. A way to solve this issue would be requiring something specific related to the person who is creating the anonymous email account when the account is created so that there is something that links that individual to the emails account.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can compare the anonymity (3.5) to the sending and receiving of letters with no return address or that are unlabeled. The anonymous letter sending is sometimes dangerous because this is how bombs and threatening letters are sent. To solve this problem, you should be required to show ID at every post office that you use to send mail.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with what is being said about regulating the campaign money usage and advertising. It would get out of hand because it would be everywhere you looked and it could be sometimes offensive to other political parties if it was not regulated. I do not agree with what is said about anonymity because I think that there should be stricter laws about it. After experiencing the negative side effects of this personally, I think that we as a society need more restrictions on what can be done anonymously. I also agree with net neutrality because without it, big businesses would dominate and destroy littler companies and then they would have no competition for their prices.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that these topics are relevant in today’s society. Some topics may not be
as important, especially to some people, but they all are discussing present issues that are ever-changing. I have never been involved in politics and do not ever wish to get involved in politics therefore I do not care very much about the government campaign regulations. Net neutrality and anonymity I both have experienced the negative side effects from so I very them conservatively. I may think about anonymity and net neutrality more after reading this. I may think about big businesses leasing lines at neutral costs to competition more and think about who competes with who.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.4-3.6
1. (Knowledge)Tell three interesting elements of this chapter:
a. John Helsingius developed the first anonymous emailer in Finland. Grew to roughly 500,000 users and became very popular.
b. The CIA funded an anonymizer start-up to spy secretly. This would allow them to spy on us secretly and we would never know.
c. Phone companies were forced to lease phone lines to the competition at neutral low
prices because of net neutrality.
2. (Comprehension) Summarize what is being discussed within this chapter?
Within the chapter, campaign restrictions are discussed. The ways that campaign money is spent is monitored and regulated. The way that information is spread is also regulated. The Federal Election Commission administers election laws. In 2006 the FEC began charging a fee for online campaign regulation. It began possible to send emails anonymously in 1993. The CIA uses an anonymous IP address when spying on the society. Net Neutrality is a variety of proposals for restrictions on how telephone companies interact with their customers and how they set pricing.
3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I have experienced a specific problem with anonymity in society before. I experienced the misuse and abuse of anonymous emailing. My mother a few years ago kept receiving harassing emails from anonymous emails. A way to solve this issue would be requiring something specific related to the person who is creating the anonymous email account when the account is created so that there is something that links that individual to the emails account.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I can compare the anonymity (3.5) to the sending and receiving of letters with no return address or that are unlabeled. The anonymous letter sending is sometimes dangerous because this is how bombs and threatening letters are sent. To solve this problem, you should be required to show ID at every post office that you use to send mail.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with what is being said about regulating the campaign money usage and advertising. It would get out of hand because it would be everywhere you looked and it could be sometimes offensive to other political parties if it was not regulated. I do not agree with what is said about anonymity because I think that there should be stricter laws about it. After experiencing the negative side effects of this personally, I think that we as a society need more restrictions on what can be done anonymously. I also agree with net neutrality because without it, big businesses would dominate and destroy littler companies and then they would have no competition for their prices.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I do agree that these topics are relevant in today’s society. Some topics may not be
as important, especially to some people, but they all are discussing present issues that are ever-changing. I have never been involved in politics and do not ever wish to get involved in politics therefore I do not care very much about the government campaign regulations. Net neutrality and anonymity I both have experienced the negative side effects from so I very them conservatively. I may think about anonymity and net neutrality more after reading this. I may think about big businesses leasing lines at neutral costs to competition more and think about who competes with who.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Monday, April 2, 2012
Chapter 3: Video and Prezi
My Prezi is mostly about government censorship and filtering. I included some information about censorship for other countries around the globe. I also mention how big businesses have taken over the media market and the effects they have had.
http://prezi.com/hdfbjnovow3g/government-online-filters-and-big-businesses/?auth_key=1cee812c1433700b1dc6c91b605df24de4a807fa
http://prezi.com/hdfbjnovow3g/government-online-filters-and-big-businesses/?auth_key=1cee812c1433700b1dc6c91b605df24de4a807fa
Sunday, March 11, 2012
Chapter 3: Part 1 Freedom of Speech
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. The court case Miller v. California established what is not legal under the 1st Amendment because it is defined as obscene.
b. The CAN-SPAM Act put limitations and restrictions on email spam which was supported as much as it was opposed. In addition to this, California passed a law banning spam to cell phones and pagers and now most states ban it. (http://www.theinternetpatrol.com/how-to-stop-sms-text-spam-and-how-to-report-sms-txt-msg-spam/)
c. In 2002, China banned the use of Google online, also then banning Wikipedia websites which only lasted around a year.
2. (Comprehension) Summarize what is being discussed within this chapter?
One of the main objectives of the government has been to create a lawful set of rules and limitations to protect children on the internet. Children are now more at risk than before with all of the inappropriate materials on there. The Communications Decency Act (CDA) was deemed unconstitutional, so the Child Online Protection Act (COPA) was passed to protect children online. There has been a battle of censorship for many years. The biggest question when the topic of censorship is brought up is what is and is not violating the 1st Amendment. Spam has also become a major issue with the advancement of technology. Limitations have also been placed on spamming.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
In high school I experienced a similar situation involving a violation of internet usage and inappropriate materials on the internet. I had a hall monitor in middle school that was fired and arrested for looking at child porn and other obscene materials on the computer. This is in correlation with the fact that people have access to way too much online. Even with the limitations and restrictions with what can be posted online, there are ways around it and not everything can be censored. I think that something that may help this problem is much swifter and harsher punishments to violating the obscene materials law.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
The issue of spam mail is very similar with the problem society has with “junk mail” or “bulk mail”. The United States Postal Service (USPS) sends out 177 billion letters a year, 47% of which is considered unwanted. (http://blog.sendblaster.com/tag/statistics/) Almost one in two letters is spam. The main reason for this is because the USPS does not want to stop this. This is because the USPS is making money on the sending of spam mail. (http://blog.sendblaster.com/tag/statistics/) Understand this, it seems as if society cannot stop the receiving of spam mail whether it’s online or not. There are higher powers preventing society from being “spam free”.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with that is being said, but to an extent. I think that the censorship laws and restrictions are necessary and need to be enacted. The censorship laws in my opinion should be strict, but the punishments that follow need to be stricter and harsher as well. There will always be ways around the laws and filters, but if society is too afraid to find these loop-holes there would be fewer instances. I now see how hard it is to govern something like this. I see how it has been a trial and error and that the government has proposed different agencies and laws that have been overturned and deemed as unconstitutional.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think that this topic becomes more and more relevant every time a new advancement in technology takes place. I think this because with more power comes more responsibility. Just because we can do something does not mean we should. We can post suggestive and inappropriate things online for others to view, but that doesn’t mean we should. Children should not have access to things online that they would not have access to or allowed to view or go to if it weren’t for the internet. I think that after reading this, it has become more clear the issues with the internet and children and the power of the 1st Amendment. It is extremely difficult to lawfully limit the power of the people.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
"Infographic: Email vs Snail Mail." Statistics. 4 Oct. 2010. Web. 11 Mar. 2012. .
"Junk Mail and the U.S. Post Office - EcoFuture Resources on How to Get Rid of Junk Mail, Spam, and Telemarketers." EcoFuture (TM) Environmental Resources. Frew Ebel, 2 Oct. 2004. Web. 11 Mar. 2012..
Mitchell, Anne P. "How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam  by Anne P. Mitchell, Esq. - 25 Comments, Last Updated02/26/2012 - 50,958 Views since Last Count." How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam. The Internet Patrol, 26 Feb. 2012. Web. 11 Mar. 2012. .
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. The court case Miller v. California established what is not legal under the 1st Amendment because it is defined as obscene.
b. The CAN-SPAM Act put limitations and restrictions on email spam which was supported as much as it was opposed. In addition to this, California passed a law banning spam to cell phones and pagers and now most states ban it. (http://www.theinternetpatrol.com/how-to-stop-sms-text-spam-and-how-to-report-sms-txt-msg-spam/)
c. In 2002, China banned the use of Google online, also then banning Wikipedia websites which only lasted around a year.
2. (Comprehension) Summarize what is being discussed within this chapter?
One of the main objectives of the government has been to create a lawful set of rules and limitations to protect children on the internet. Children are now more at risk than before with all of the inappropriate materials on there. The Communications Decency Act (CDA) was deemed unconstitutional, so the Child Online Protection Act (COPA) was passed to protect children online. There has been a battle of censorship for many years. The biggest question when the topic of censorship is brought up is what is and is not violating the 1st Amendment. Spam has also become a major issue with the advancement of technology. Limitations have also been placed on spamming.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
In high school I experienced a similar situation involving a violation of internet usage and inappropriate materials on the internet. I had a hall monitor in middle school that was fired and arrested for looking at child porn and other obscene materials on the computer. This is in correlation with the fact that people have access to way too much online. Even with the limitations and restrictions with what can be posted online, there are ways around it and not everything can be censored. I think that something that may help this problem is much swifter and harsher punishments to violating the obscene materials law.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
The issue of spam mail is very similar with the problem society has with “junk mail” or “bulk mail”. The United States Postal Service (USPS) sends out 177 billion letters a year, 47% of which is considered unwanted. (http://blog.sendblaster.com/tag/statistics/) Almost one in two letters is spam. The main reason for this is because the USPS does not want to stop this. This is because the USPS is making money on the sending of spam mail. (http://blog.sendblaster.com/tag/statistics/) Understand this, it seems as if society cannot stop the receiving of spam mail whether it’s online or not. There are higher powers preventing society from being “spam free”.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with that is being said, but to an extent. I think that the censorship laws and restrictions are necessary and need to be enacted. The censorship laws in my opinion should be strict, but the punishments that follow need to be stricter and harsher as well. There will always be ways around the laws and filters, but if society is too afraid to find these loop-holes there would be fewer instances. I now see how hard it is to govern something like this. I see how it has been a trial and error and that the government has proposed different agencies and laws that have been overturned and deemed as unconstitutional.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I think that this topic becomes more and more relevant every time a new advancement in technology takes place. I think this because with more power comes more responsibility. Just because we can do something does not mean we should. We can post suggestive and inappropriate things online for others to view, but that doesn’t mean we should. Children should not have access to things online that they would not have access to or allowed to view or go to if it weren’t for the internet. I think that after reading this, it has become more clear the issues with the internet and children and the power of the 1st Amendment. It is extremely difficult to lawfully limit the power of the people.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
"Infographic: Email vs Snail Mail." Statistics. 4 Oct. 2010. Web. 11 Mar. 2012.
"Junk Mail and the U.S. Post Office - EcoFuture Resources on How to Get Rid of Junk Mail, Spam, and Telemarketers." EcoFuture (TM) Environmental Resources. Frew Ebel, 2 Oct. 2004. Web. 11 Mar. 2012.
Mitchell, Anne P. "How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam  by Anne P. Mitchell, Esq. - 25 Comments, Last Updated02/26/2012 - 50,958 Views since Last Count." How to Stop SMS Text Spam and How to Report SMS Txt Msg Spam. The Internet Patrol, 26 Feb. 2012. Web. 11 Mar. 2012.
Sunday, March 4, 2012
Chapter 2: Part 2
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.3-3
1. (Knowledge)Tell three interesting elements of this chapter:
a. Pretexting is the process of gathering information
by pretending to be someone else that would have a justified right to that
information. Most pretexters pretend to be the person they are trying to obtain
the information about.
b. A new national ID system has been proposed
several times in the last few years.
c. Until the late 19th-century there
was no recognition of an independent right to privacy. The crucial article “The
Right to Privacy” by Samuel Warren and Louis Brandeis sparked the revolution
for change of privacy rights.
2. (Comprehension) Summarize what is being discussed within this chapter?
It is true with the growth of technology; there has been an increase in privacy violations. Generally though, society gives away much of the information without even realizing it. As technology has changed, so has a need for restrictions and limitations on what websites and companies can do with information obtained through technology. Sometimes the information received can be for a good cause such as better search results or more person specific advertisements. Radio
frequency identification tags (RFID tags) can track location of people or objects. The applications of these RFID tags are controversial and can violate the privacy of individuals. Many people, especially younger generations are willing to give our privacy for information on others. A national identification would in a way replace Social Security Numbers (SSN) because since they were invented, SSN have many uses other than just for the Social Security Program. Generally, there is only a violation of privacy when there is also a violation of property. With new sources of communication, new crimes are available, new ways of identity theft, and new regulations are out there as well. An example of this is the National Security Agency which collects and analyzes foreign intelligence information that is related to our national security.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I personally once had a couple thousand dollars spent in my name. I had my social security number taken and with that information they were able to make online purchases with credit cards in my name. Before I had even realized what happened, I was in debt and my bank accounts were drained. This was all because of identity fraud due to new technology. It took almost a year to retrieve all of my money back after fighting with lawyers and my bank.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.
Based off the reading, the impacts of how we communicate and technology have made significant impacts on society. These impacts however, are both positive and negative. We generally give up our privacy and rights for information on others or, because of a general disregard for our on privacy. Unfortunately, we the advances in technology, we sometimes have no choice but to give up some information. The new national ID system could help regulate some uses of private information, but could also be used in situations such as the Nazis in Germany. Our privacy always has and always will come at a cost.
5. (Synthesis)Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said because with the advances of technology, new laws and crimes have become possible. Being a younger adult myself and owning a Facebook, I agree that people tend to disregard the need to keep things private. We as a society are way to open with our private information, especially on social networking websites like Facebook. Often society gives out public information without even realizing it. These websites collect our data without our knowledge without any problems from the government.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I especially agree that this topic is relevant in today’s society. This is very specific to my generation because of the popularity of Facebook in teenagers and young adults. The question of ethics comes into play with this topic because, is it really ethical to give away this much private information? Is it ethical for companies and businesses to take all of this information without the knowledge of the people? I think it is wrong for us to willingly give away as much information as we do.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.3-3
1. (Knowledge)Tell three interesting elements of this chapter:
a. Pretexting is the process of gathering information
by pretending to be someone else that would have a justified right to that
information. Most pretexters pretend to be the person they are trying to obtain
the information about.
b. A new national ID system has been proposed
several times in the last few years.
c. Until the late 19th-century there
was no recognition of an independent right to privacy. The crucial article “The
Right to Privacy” by Samuel Warren and Louis Brandeis sparked the revolution
for change of privacy rights.
2. (Comprehension) Summarize what is being discussed within this chapter?
It is true with the growth of technology; there has been an increase in privacy violations. Generally though, society gives away much of the information without even realizing it. As technology has changed, so has a need for restrictions and limitations on what websites and companies can do with information obtained through technology. Sometimes the information received can be for a good cause such as better search results or more person specific advertisements. Radio
frequency identification tags (RFID tags) can track location of people or objects. The applications of these RFID tags are controversial and can violate the privacy of individuals. Many people, especially younger generations are willing to give our privacy for information on others. A national identification would in a way replace Social Security Numbers (SSN) because since they were invented, SSN have many uses other than just for the Social Security Program. Generally, there is only a violation of privacy when there is also a violation of property. With new sources of communication, new crimes are available, new ways of identity theft, and new regulations are out there as well. An example of this is the National Security Agency which collects and analyzes foreign intelligence information that is related to our national security.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I personally once had a couple thousand dollars spent in my name. I had my social security number taken and with that information they were able to make online purchases with credit cards in my name. Before I had even realized what happened, I was in debt and my bank accounts were drained. This was all because of identity fraud due to new technology. It took almost a year to retrieve all of my money back after fighting with lawyers and my bank.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.
Based off the reading, the impacts of how we communicate and technology have made significant impacts on society. These impacts however, are both positive and negative. We generally give up our privacy and rights for information on others or, because of a general disregard for our on privacy. Unfortunately, we the advances in technology, we sometimes have no choice but to give up some information. The new national ID system could help regulate some uses of private information, but could also be used in situations such as the Nazis in Germany. Our privacy always has and always will come at a cost.
5. (Synthesis)Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said because with the advances of technology, new laws and crimes have become possible. Being a younger adult myself and owning a Facebook, I agree that people tend to disregard the need to keep things private. We as a society are way to open with our private information, especially on social networking websites like Facebook. Often society gives out public information without even realizing it. These websites collect our data without our knowledge without any problems from the government.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I especially agree that this topic is relevant in today’s society. This is very specific to my generation because of the popularity of Facebook in teenagers and young adults. The question of ethics comes into play with this topic because, is it really ethical to give away this much private information? Is it ethical for companies and businesses to take all of this information without the knowledge of the people? I think it is wrong for us to willingly give away as much information as we do.
References
Baase, Sara. A Gift Of Fire, Social, Legal, And Ethical Issues For Computing And The Internet. 3rd. Upper Saddle River NJ: Prentice Hall, 2008.
Monday, February 27, 2012
Chapter 2: Part 1
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.1 and 2.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. Everything that we do online is recorded and linked to our computers like online searches and viewed images.
b. Invisible information gathering is the collecting of someone’s personal information without them knowing.
c. Dataveillance is the use of personal-data systems to collect personal information or monitor people.
2. (Comprehension) Summarize what is being discussed within this chapter?
Since computers have become so popular and advanced, our personal information has become more and more exposed. Society’s privacy is not as protected as it used to be. New technologies pose many threats to our privacy. What people do online is saved and linked to their computer. Both the federal and local governments maintain several databases containing our information. The government can be seen as in violation of “The Privacy Act of 1974”. Data mining programs have been issued to monitor searches to find potential terrorists. The “USA PATRIOT Act” weakened society’s 4th Amendment. The 4th Amendment continues to be weakened through time.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A new solution for this type of problem would be reinforcing the people’s rights stated in the 4th Amendment and The Privacy Act of 1974 and passing another law that specifically limits the power of the government to search someone. This will help keep our rights and keep our information that we do not want shared private.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
The best thing to relate privacy restrictions on
the internet to would be a child’s privacy being threatened and violated by a
cautious parent. The “Big Brother” internet program is similar to a child’s
parent because they both watch over the actions of another. (2.2) Some may see
the actions of the “Big Brother” program and the cautious parent as good and
fair while others may think that it is an illegal restriction of their privacy.
Also, as of now it is not necessary for governments to require search warrants
before reading someone’s email. (http://www.computerworld.com/s/article/9026629/Search_warrants_not_needed_to_monitor_Internet_use_court_says) I think that this
should be treated as if it were written mail in a mailbox and private property.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said, but only to an extent. Yes, I think that the governments watch us and save information about us. I also think that the local and federal governments could easily violate our privacy rights and consider it justified in some way. But, I do not think that our privacy is always being violated and it is also not a bad thing that some of these programs are out. Our privacy may feel threatened at times, but it is for the good of the group. These programs are used to catch terrorists and stop other illegal activity. One example of this is the program Obama passed called “Einstein 3” which is supposed to catch criminals online. (http://gawker.com/5306575/obama-goes-ahead-with-nsa-internet+monitoring-program) I think that whether we want our personal information read it will be, but generally it’s to a small extent and for a good cause.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is very relevant in today’s society. This is because this era society lives in now is extremely technologically based and we use computers frequently. We put a lot of trust into our computers and the information we put in them. The amount that governments should be allowed to see though is an ethical battle of right and wrong power uses. After reading this article I will be sure to watch what I post online knowing that somewhere it is being viewed and saved by someone I didn’t intend on sharing this information with.
References
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and
the Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
Pareene. "Obama Goes Ahead With NSA Internet-monitoring Program." Friday
night newsdump. Gawker, 07,02,2009. Web. 26 Feb 2012.
monitoring-program>.
Rosencrance, L. Search warrants not needed to monitor internet use, court says.
Computerworld, 2007. Web. 26 Feb 2012..
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.1 and 2.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. Everything that we do online is recorded and linked to our computers like online searches and viewed images.
b. Invisible information gathering is the collecting of someone’s personal information without them knowing.
c. Dataveillance is the use of personal-data systems to collect personal information or monitor people.
2. (Comprehension) Summarize what is being discussed within this chapter?
Since computers have become so popular and advanced, our personal information has become more and more exposed. Society’s privacy is not as protected as it used to be. New technologies pose many threats to our privacy. What people do online is saved and linked to their computer. Both the federal and local governments maintain several databases containing our information. The government can be seen as in violation of “The Privacy Act of 1974”. Data mining programs have been issued to monitor searches to find potential terrorists. The “USA PATRIOT Act” weakened society’s 4th Amendment. The 4th Amendment continues to be weakened through time.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A new solution for this type of problem would be reinforcing the people’s rights stated in the 4th Amendment and The Privacy Act of 1974 and passing another law that specifically limits the power of the government to search someone. This will help keep our rights and keep our information that we do not want shared private.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
The best thing to relate privacy restrictions on
the internet to would be a child’s privacy being threatened and violated by a
cautious parent. The “Big Brother” internet program is similar to a child’s
parent because they both watch over the actions of another. (2.2) Some may see
the actions of the “Big Brother” program and the cautious parent as good and
fair while others may think that it is an illegal restriction of their privacy.
Also, as of now it is not necessary for governments to require search warrants
before reading someone’s email. (http://www.computerworld.com/s/article/9026629/Search_warrants_not_needed_to_monitor_Internet_use_court_says) I think that this
should be treated as if it were written mail in a mailbox and private property.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said, but only to an extent. Yes, I think that the governments watch us and save information about us. I also think that the local and federal governments could easily violate our privacy rights and consider it justified in some way. But, I do not think that our privacy is always being violated and it is also not a bad thing that some of these programs are out. Our privacy may feel threatened at times, but it is for the good of the group. These programs are used to catch terrorists and stop other illegal activity. One example of this is the program Obama passed called “Einstein 3” which is supposed to catch criminals online. (http://gawker.com/5306575/obama-goes-ahead-with-nsa-internet+monitoring-program) I think that whether we want our personal information read it will be, but generally it’s to a small extent and for a good cause.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is very relevant in today’s society. This is because this era society lives in now is extremely technologically based and we use computers frequently. We put a lot of trust into our computers and the information we put in them. The amount that governments should be allowed to see though is an ethical battle of right and wrong power uses. After reading this article I will be sure to watch what I post online knowing that somewhere it is being viewed and saved by someone I didn’t intend on sharing this information with.
References
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and
the Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
Pareene. "Obama Goes Ahead With NSA Internet-monitoring Program." Friday
night newsdump. Gawker, 07,02,2009. Web. 26 Feb 2012.
Rosencrance, L. Search warrants not needed to monitor internet use, court says.
Computerworld, 2007. Web. 26 Feb 2012.
Sunday, February 19, 2012
Chapter 1: 1.3-1.4
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 1.3-1.4
1. (Knowledge)Tell three interesting elements of this chapter:
a. There was an error with the ATMs for a large New York bank which caused accounts to debited twice for approximately $15 million.
b. A deontological idea is an idea where a distinction is made between ethical theories viewed as either positive or negative due to an intrinsic aspect.
c. Commercial laws define rules for economic
transactions and contracts.
2. (Comprehension)Summarize what is being discussed within this chapter?
Many issues involving the impact of technology have many pros and cons, but people generally only notice one side. We often prefer convenience over the benefits of the economy and society, as in the use of ATMs. We also trade off convenience for security and privacy. Laws also benefit people and businesses in different ways.
Ethics is known as a study of the definition of doing the right thing. People act based off of emotions therefore our choices are not always rational and right. Ethical rules are the moral rules for human interactions. Deontological (nonconsequentialist) ideas are ideas where a distinction is made between ethical theories viewed as either positive or negative due to an intrinsic aspect. These deontologists emphasize duty and absolute rules. They also state that logic and reason determine rules of ethical behavior. The main example of a consequentialist theory would be Utilitarianism. Someone’s utility is what satisfies their own personal needs and values. Utilitarianism is a very influential theory and it has several branches like act utilitarianism. We as a society have our natural rights which are fundamental rights and they include the right to life, liberty, and property. Negative rights (liberties) are rights which are acted without interference and claim rights (positive rights) force people to be obligated some people to provide certain things to other. There are also many conflicts between positive and negative rights. Laws are not always ethical and they do not always agree with one another. It isn’t always ethically right to do something that is right and vice versa.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A specific example I have which is related to this type of problem is errors with ATM machines. (1.3) My ATM card often does not work and I cannot withdraw money from the ATM. Also, a very good friend of mine had his ATM card stolen and had his account drained by a criminal. Tighter security would help identity fraud and theft. Placing cameras in ATMs could help detect and find the criminals. (http://www.scambusters.org/atmtheft.html) One way of helping prevent ATM theft is using the same ATM every time and searching for external devices placed on ATMs that could potential be cameras or card readers. (http://www.ehow.com/how_4410876_avoid-atm-scam-atm-theft.html)
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.
A good comparison for the issue of society being hurt due to people wanting the convenience that does not relate to technology would be the fast food industry. Fast food is generally very unhealthy and sometimes harmful to people yet society loves it because it is extremely convenient. (1.3) The issue here is that it is also cheaper to eat fast food than it is to eat healthy food. I would propose lowering the price of healthy food and implying a “fat tax” which taxes fat foods. Denmark is currently having a debate over the effectiveness of this act. (http://www.foxnews.com/health/2011/10/03/denmark-government-officials-impose-fat-tax/) Society as a whole is sometimes seen as lazy and the major emphasis we put on convenience over many other things is an example of this.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said because I feel as if we have given up security for convenience. Society is hurt because we tend to do things that best serve us individually rather than as a whole. Also, I agree that ethically right is not always legal and vice versa. It is legal to gamble and drink but it is not necessarily ethical to some people. I can conclude that every issue, regardless what it is has two sides. Also, majority of the time, it is not necessarily right in every way to one or another.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is without a doubt relevant in today’s society. This is because ethics are part of everyone’s life. Also we as society are hurt because of our individualistic ways of life. I am viewing this topic the way I am because I have personally experienced the harmful side effects of the importance of convenience. There are rights and wrongs to the reliance we place on convenience. Yes, it may make our lives easier, but at a cost. The main question though is, is there more rights or wrongs relating to convenience, especially involving personal things such as ATM and our wealth. I will think twice about relying on what is solely easiest and perhaps look at what may be ethically right.
References
Associated
Press. "Government Officials Impose 'Fat Tax' Fox News." Fox
News - Breaking News Updates Latest News Headlines Photos & News Videos.
Fox News, 03 Oct. 2011. Web. 18 Feb. 2012.
.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and
the Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
Contributor, EHow. "How to Avoid ATM Scam or ATM Theft EHow.com." EHow How to Videos, Articles & More -
Discover the Expert in You. EHow.com. EHow, 15 Oct. 2011. Web. 18 Feb.
2012..
Lanford, Audri/Jim. "Keep Safe From These ATM Scams." "Internet Scams,
Identity Theft, and Urban Legends: Are You at Risk?" Internet
Scambusters. Web. 18 Feb. 2012.
.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 1.3-1.4
1. (Knowledge)Tell three interesting elements of this chapter:
a. There was an error with the ATMs for a large New York bank which caused accounts to debited twice for approximately $15 million.
b. A deontological idea is an idea where a distinction is made between ethical theories viewed as either positive or negative due to an intrinsic aspect.
c. Commercial laws define rules for economic
transactions and contracts.
2. (Comprehension)Summarize what is being discussed within this chapter?
Many issues involving the impact of technology have many pros and cons, but people generally only notice one side. We often prefer convenience over the benefits of the economy and society, as in the use of ATMs. We also trade off convenience for security and privacy. Laws also benefit people and businesses in different ways.
Ethics is known as a study of the definition of doing the right thing. People act based off of emotions therefore our choices are not always rational and right. Ethical rules are the moral rules for human interactions. Deontological (nonconsequentialist) ideas are ideas where a distinction is made between ethical theories viewed as either positive or negative due to an intrinsic aspect. These deontologists emphasize duty and absolute rules. They also state that logic and reason determine rules of ethical behavior. The main example of a consequentialist theory would be Utilitarianism. Someone’s utility is what satisfies their own personal needs and values. Utilitarianism is a very influential theory and it has several branches like act utilitarianism. We as a society have our natural rights which are fundamental rights and they include the right to life, liberty, and property. Negative rights (liberties) are rights which are acted without interference and claim rights (positive rights) force people to be obligated some people to provide certain things to other. There are also many conflicts between positive and negative rights. Laws are not always ethical and they do not always agree with one another. It isn’t always ethically right to do something that is right and vice versa.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A specific example I have which is related to this type of problem is errors with ATM machines. (1.3) My ATM card often does not work and I cannot withdraw money from the ATM. Also, a very good friend of mine had his ATM card stolen and had his account drained by a criminal. Tighter security would help identity fraud and theft. Placing cameras in ATMs could help detect and find the criminals. (http://www.scambusters.org/atmtheft.html) One way of helping prevent ATM theft is using the same ATM every time and searching for external devices placed on ATMs that could potential be cameras or card readers. (http://www.ehow.com/how_4410876_avoid-atm-scam-atm-theft.html)
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.
A good comparison for the issue of society being hurt due to people wanting the convenience that does not relate to technology would be the fast food industry. Fast food is generally very unhealthy and sometimes harmful to people yet society loves it because it is extremely convenient. (1.3) The issue here is that it is also cheaper to eat fast food than it is to eat healthy food. I would propose lowering the price of healthy food and implying a “fat tax” which taxes fat foods. Denmark is currently having a debate over the effectiveness of this act. (http://www.foxnews.com/health/2011/10/03/denmark-government-officials-impose-fat-tax/) Society as a whole is sometimes seen as lazy and the major emphasis we put on convenience over many other things is an example of this.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said because I feel as if we have given up security for convenience. Society is hurt because we tend to do things that best serve us individually rather than as a whole. Also, I agree that ethically right is not always legal and vice versa. It is legal to gamble and drink but it is not necessarily ethical to some people. I can conclude that every issue, regardless what it is has two sides. Also, majority of the time, it is not necessarily right in every way to one or another.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is without a doubt relevant in today’s society. This is because ethics are part of everyone’s life. Also we as society are hurt because of our individualistic ways of life. I am viewing this topic the way I am because I have personally experienced the harmful side effects of the importance of convenience. There are rights and wrongs to the reliance we place on convenience. Yes, it may make our lives easier, but at a cost. The main question though is, is there more rights or wrongs relating to convenience, especially involving personal things such as ATM and our wealth. I will think twice about relying on what is solely easiest and perhaps look at what may be ethically right.
References
Associated
Press. "Government Officials Impose 'Fat Tax' Fox News." Fox
News - Breaking News Updates Latest News Headlines Photos & News Videos.
Fox News, 03 Oct. 2011. Web. 18 Feb. 2012.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and
the Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
Contributor, EHow. "How to Avoid ATM Scam or ATM Theft EHow.com." EHow How to Videos, Articles & More -
Discover the Expert in You. EHow.com. EHow, 15 Oct. 2011. Web. 18 Feb.
2012.
Lanford, Audri/Jim. "Keep Safe From These ATM Scams." "Internet Scams,
Identity Theft, and Urban Legends: Are You at Risk?" Internet
Scambusters. Web. 18 Feb. 2012.
Monday, February 13, 2012
GMO's
Chris Wyant CIS 105 12 PM2/12/12
1) Remember when you were a tour guide for an Alien? The Alien is back and wants to understand what a GMO is. Explain this information to the Alien.GMO stands for a genetically modified organism. This is when scientists take the DNA, which is an organism’s structural code, and puts it into another organism. GMOs are also known as transgenic organisms. The transferring process itself is called genetic modification (GM) or genetic engineering.
2) State the controversy associated with GMO’s.
One controversy with GMO’s is over whether or not the GMO’s are harmful to eat. The long term effects on the human body from eating GMO’s have not been studied yet. Whether or not genetically engineering organisms is ethical is another controversy. In a way we are tampering with nature and trying to control it. Another controversy is whether or not it should be required to label what is GM and what is not. Some people want to know. One last controversy that GMOs may have is the effect on society. Rich nations will take advantage of GM and will put nations that produce all natural products out of business.
3) Are people’s reactions to GMO different in various regions of the world? Explain with references.
Yes, people’s reactions to GMOs are different in various regions around the world. Looking at Europe can be a prime example in showing the differences in views. Europe Parliament let the states decide whether or not they would allow or ban GM. (http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans) This is because Europe has been dealing with GM for some time now. On the other hand, Sweden, Czech Republic, and Spain have just begun experimenting with GM. (http://www.euronews.net/2010/07/13/gmos-divide-europe/).
4) What’s your reaction to this topic? Explain with references.
My reaction to this topic is that it should be up to the people to decide whether or not GM should be allowed. Where it is accepted, labeling should be required. Although GM has been linked to disease and toxins, there have been no studies done to show the effects on the human body. Also, no long term studies have been done yet to show possible harms. (http://www.responsibletechnology.org/gmo-basics) GM could be great for third-world countries that have little food because it could supply them and keep them from starving at a low cost. These articles all seemed to have a biased opinion against GMOs therefore doing more research, I found that there as many pros as there are cons to GMOs. (http://www.csa.com/discoveryguides/gmfood/overview.php). An example from this reading I researched was that they can help increase nutrients and help keep medicine last longer and be stronger.
5) Can GMO’s be changed? Should they be changed? Explain with references.
GMO’s can be changed because they are GM by humans. They can be changed to be more pesticide resistant or grow more crops that are stronger and better. (http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml) I think that they should be changed because we as humans are the dominant species on Earth and need to do what we have to in order to survive. We should use the powers and abilities we have to further better ourselves.
6) While reading "Institute for Responsible Technology. GMO Basics (Also explore at least two of the other tabs on this page:http://www.responsibletechnology.org/gmo-basics" What were the two tabs that you explored? How did the information presented affect what you thought about GMO's?
The two tabs I explored were about the health risks that GM can cause (http://www.responsibletechnology.org/), and long term environmental effects that GMO’s may have (http://www.responsibletechnology.org/gmo-dangers/dangers-to-the-environment). Both of these tabs expressed negative side effects and showed the harm the GMO’s can cause. They were all cons of this technological advance and neither showed pros. Reading these tabs made me lean towards prohibiting GMOs. The negative viewpoints of both of these tabs make the reader dislike GMOs and not see the positive side of them.
7) Typing out the exact quote from any of the readings (and referencing it) list one powerful statement that you read.
Put the statement in context and explain why this statement was powerful enough to remember. (What made you react to this information?)
“Genetically modified foods have been linked to toxic and allergic reactions, sick, sterile, and dead livestock, and damage to virtually every organ studied in lab animals” is a very powerful statement because it forces a certain view point of GMOs on the reader. (http://www.responsibletechnology.org/gmo-basics) This is very powerful because it can easily persuade people to instantly dislike GMOs without further reading. I was turned off when I read this and did not like the sound of GMOs. This statement makes GMOs sound like they are purely a bad thing.
References:
"Europe Paves Way for GM Crop Bans Environment Guardian.co.uk." Latest US and World News, Sport and Comment from the Guardian Guardiannews.com The Guardian. 6 July 2011. Web. 11 Feb. 2012. http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans.
"Genetically Modified Foods and Organisms." Oak Ridge National Laboratory. Human Genome Project Information, 5 Nov. 2008. Web. 11 Feb. 2012. http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml.
"GMOs Divide Europe Euronews, Europa." GMOs Divide Europe. Euronews. Web. 11 Feb. 2012. http://www.euronews.net/2010/07/13/gmos-divide-europe/.
"Institute for Responsible Technology - GMO Basics." GMO Basics. Institute For Responsible Technology. Web. 11 Feb. 2012. http://www.responsibletechnology.org/gmo-basics.
Layton, Lyndsey. "FDA Rules Won't Require Salmon Labels." Washington Post: Breaking News, World, US, DC News & Analysis. 19 Sept. 2010. Web. 11 Feb. 2012. http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html.
Whitman, Deborah B. "Genetically Modified Foods: Harmful or Helpful?" CSA. ProQuest, Apr. 2000. Web. 11 Feb. 2012. http://www.csa.com/discoveryguides/gmfood/overview.php.
1) Remember when you were a tour guide for an Alien? The Alien is back and wants to understand what a GMO is. Explain this information to the Alien.GMO stands for a genetically modified organism. This is when scientists take the DNA, which is an organism’s structural code, and puts it into another organism. GMOs are also known as transgenic organisms. The transferring process itself is called genetic modification (GM) or genetic engineering.
2) State the controversy associated with GMO’s.
One controversy with GMO’s is over whether or not the GMO’s are harmful to eat. The long term effects on the human body from eating GMO’s have not been studied yet. Whether or not genetically engineering organisms is ethical is another controversy. In a way we are tampering with nature and trying to control it. Another controversy is whether or not it should be required to label what is GM and what is not. Some people want to know. One last controversy that GMOs may have is the effect on society. Rich nations will take advantage of GM and will put nations that produce all natural products out of business.
3) Are people’s reactions to GMO different in various regions of the world? Explain with references.
Yes, people’s reactions to GMOs are different in various regions around the world. Looking at Europe can be a prime example in showing the differences in views. Europe Parliament let the states decide whether or not they would allow or ban GM. (http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans) This is because Europe has been dealing with GM for some time now. On the other hand, Sweden, Czech Republic, and Spain have just begun experimenting with GM. (http://www.euronews.net/2010/07/13/gmos-divide-europe/).
4) What’s your reaction to this topic? Explain with references.
My reaction to this topic is that it should be up to the people to decide whether or not GM should be allowed. Where it is accepted, labeling should be required. Although GM has been linked to disease and toxins, there have been no studies done to show the effects on the human body. Also, no long term studies have been done yet to show possible harms. (http://www.responsibletechnology.org/gmo-basics) GM could be great for third-world countries that have little food because it could supply them and keep them from starving at a low cost. These articles all seemed to have a biased opinion against GMOs therefore doing more research, I found that there as many pros as there are cons to GMOs. (http://www.csa.com/discoveryguides/gmfood/overview.php). An example from this reading I researched was that they can help increase nutrients and help keep medicine last longer and be stronger.
5) Can GMO’s be changed? Should they be changed? Explain with references.
GMO’s can be changed because they are GM by humans. They can be changed to be more pesticide resistant or grow more crops that are stronger and better. (http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml) I think that they should be changed because we as humans are the dominant species on Earth and need to do what we have to in order to survive. We should use the powers and abilities we have to further better ourselves.
6) While reading "Institute for Responsible Technology. GMO Basics (Also explore at least two of the other tabs on this page:http://www.responsibletechnology.org/gmo-basics" What were the two tabs that you explored? How did the information presented affect what you thought about GMO's?
The two tabs I explored were about the health risks that GM can cause (http://www.responsibletechnology.org/), and long term environmental effects that GMO’s may have (http://www.responsibletechnology.org/gmo-dangers/dangers-to-the-environment). Both of these tabs expressed negative side effects and showed the harm the GMO’s can cause. They were all cons of this technological advance and neither showed pros. Reading these tabs made me lean towards prohibiting GMOs. The negative viewpoints of both of these tabs make the reader dislike GMOs and not see the positive side of them.
7) Typing out the exact quote from any of the readings (and referencing it) list one powerful statement that you read.
Put the statement in context and explain why this statement was powerful enough to remember. (What made you react to this information?)
“Genetically modified foods have been linked to toxic and allergic reactions, sick, sterile, and dead livestock, and damage to virtually every organ studied in lab animals” is a very powerful statement because it forces a certain view point of GMOs on the reader. (http://www.responsibletechnology.org/gmo-basics) This is very powerful because it can easily persuade people to instantly dislike GMOs without further reading. I was turned off when I read this and did not like the sound of GMOs. This statement makes GMOs sound like they are purely a bad thing.
References:
"Europe Paves Way for GM Crop Bans Environment Guardian.co.uk." Latest US and World News, Sport and Comment from the Guardian Guardiannews.com The Guardian. 6 July 2011. Web. 11 Feb. 2012. http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans.
"Genetically Modified Foods and Organisms." Oak Ridge National Laboratory. Human Genome Project Information, 5 Nov. 2008. Web. 11 Feb. 2012. http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml.
"GMOs Divide Europe Euronews, Europa." GMOs Divide Europe. Euronews. Web. 11 Feb. 2012. http://www.euronews.net/2010/07/13/gmos-divide-europe/.
"Institute for Responsible Technology - GMO Basics." GMO Basics. Institute For Responsible Technology. Web. 11 Feb. 2012. http://www.responsibletechnology.org/gmo-basics.
Layton, Lyndsey. "FDA Rules Won't Require Salmon Labels." Washington Post: Breaking News, World, US, DC News & Analysis. 19 Sept. 2010. Web. 11 Feb. 2012. http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html.
Whitman, Deborah B. "Genetically Modified Foods: Harmful or Helpful?" CSA. ProQuest, Apr. 2000. Web. 11 Feb. 2012. http://www.csa.com/discoveryguides/gmfood/overview.php.
Wednesday, February 8, 2012
Assignment #4 Critical thinking #2
Name Chris Wyant
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Levi Rickert
Date of Publication: 2/3/2012
Book: Menominee Seventh Grader Suspended for Saying
“I Love You” in her Native Language
Sections read: http://www.nativenewsnetwork.com/menominee-seventh-grader-suspended-for-saying-i-love-you-in-her-native-language.html#menominee-seventh-grader-suspended-for-saying-i-love-you-in-her-native-language
1. (Knowledge)Tell three interesting elements of this chapter:
a. I was not aware that there was such a language known as Menominee spoken, nonetheless spoken in Wisconsin.
b. A girl named Miranda Washinawatok was benched for a basketball game because she spoke her native language in front of a teacher that could not comprehend her.
c. The only reconciliation that Ms. Washinawatok received was that of a generic apologetic letter as well as a public apology.
2. (Comprehension) Summarize what is being discussed within this chapter?
In “Menominee Seventh Grader Suspended for Saying “I Love You” in her Native”, a young girl is benched from her basketball game by her coach because she spoke her native language in front of the coaches and the coaches could not comprehend what she was saying. All that was said in Menominee was “Hello, I love you”. Washinawatok’s mother pushed to figure out why her daughter was benched and finally found out the true reason. She held several meetings with the principal in order to try and make things right. Ms. Washinawatok received a written apology as well as a public apology addressed to her, her parents, guardians, and the Menominee tribe.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A specific example similar to this problem would be when the mentally insane people were locked away because we could not understand them. The people that held power in towns or cities would lock away anyone who was mentally ill because they didn’t know what they were saying and because they were different. This is similar to Ms. Washinawatok because she was punished because she was different and not understood. The solution to this problem is to spend more time with the people that are “different” and try and understand their way of living, not just punish them for being “different”.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how itapplies to the stages in Bloom's taxonomy in full sentences. I would compare this situation to the one in Arizona where a woman was denied a job in a local government office because she did not speak English well enough. (http://www.publicceo.com/2012/02/arizona-candidate-for-local-office-hits-language-barrier-campaign-suspended/)%20 Her campaign was shut down not because she wasn’t capable, but because her native language was not English. Just like Ms. Washinawatok in “Menominee Seventh Grader Suspended for Saying “I Love You” in her Native Language”, she was also punished due to difference in their languages. Here as well, people didn’t accept this woman because of her differences.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do not agree with how Ms. Washinawatok was treated and then apologized to. Our
“Linguistic Rights” states our right to speak our native language. (http://en.wikipedia.org/wiki/Linguistic_rights) Violating this right should have earned more response and there should have been much more compensation for Ms. Washinawatok’s troubles than just an apology. Unfortunately people have yet to adjust to present day life and our freedom’s we possess as individuals.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Yes this topic is relevant in today’s society because it was a very recent article showing that it is still a concern. Also the example of the Arizona woman who lost her campaign due to her native language not being English is also very recent. A violation of ethics can be seen from reading the paper by Levi Rickert. I will hopefully treat others with all respect to their customs and beliefs. People should not be judged based on how they look or what language they speak.
References
Local Governments. "Arizona Candidate for Local Office Hits Language Barrier,
Campaign Suspended PublicCEO." PublicCEO California Local
Government News. 07 Feb. 2012. Web. 07 Feb. 2012.
.
Wikipedia. "Linguistic Rights." Wikipedia, the Free Encyclopedia. 24 Jan.
2012. Web. 07 Feb. 2012.
.
Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Levi Rickert
Date of Publication: 2/3/2012
Book: Menominee Seventh Grader Suspended for Saying
“I Love You” in her Native Language
Sections read: http://www.nativenewsnetwork.com/menominee-seventh-grader-suspended-for-saying-i-love-you-in-her-native-language.html#menominee-seventh-grader-suspended-for-saying-i-love-you-in-her-native-language
1. (Knowledge)Tell three interesting elements of this chapter:
a. I was not aware that there was such a language known as Menominee spoken, nonetheless spoken in Wisconsin.
b. A girl named Miranda Washinawatok was benched for a basketball game because she spoke her native language in front of a teacher that could not comprehend her.
c. The only reconciliation that Ms. Washinawatok received was that of a generic apologetic letter as well as a public apology.
2. (Comprehension) Summarize what is being discussed within this chapter?
In “Menominee Seventh Grader Suspended for Saying “I Love You” in her Native”, a young girl is benched from her basketball game by her coach because she spoke her native language in front of the coaches and the coaches could not comprehend what she was saying. All that was said in Menominee was “Hello, I love you”. Washinawatok’s mother pushed to figure out why her daughter was benched and finally found out the true reason. She held several meetings with the principal in order to try and make things right. Ms. Washinawatok received a written apology as well as a public apology addressed to her, her parents, guardians, and the Menominee tribe.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A specific example similar to this problem would be when the mentally insane people were locked away because we could not understand them. The people that held power in towns or cities would lock away anyone who was mentally ill because they didn’t know what they were saying and because they were different. This is similar to Ms. Washinawatok because she was punished because she was different and not understood. The solution to this problem is to spend more time with the people that are “different” and try and understand their way of living, not just punish them for being “different”.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how itapplies to the stages in Bloom's taxonomy in full sentences. I would compare this situation to the one in Arizona where a woman was denied a job in a local government office because she did not speak English well enough. (http://www.publicceo.com/2012/02/arizona-candidate-for-local-office-hits-language-barrier-campaign-suspended/)%20 Her campaign was shut down not because she wasn’t capable, but because her native language was not English. Just like Ms. Washinawatok in “Menominee Seventh Grader Suspended for Saying “I Love You” in her Native Language”, she was also punished due to difference in their languages. Here as well, people didn’t accept this woman because of her differences.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do not agree with how Ms. Washinawatok was treated and then apologized to. Our
“Linguistic Rights” states our right to speak our native language. (http://en.wikipedia.org/wiki/Linguistic_rights) Violating this right should have earned more response and there should have been much more compensation for Ms. Washinawatok’s troubles than just an apology. Unfortunately people have yet to adjust to present day life and our freedom’s we possess as individuals.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Yes this topic is relevant in today’s society because it was a very recent article showing that it is still a concern. Also the example of the Arizona woman who lost her campaign due to her native language not being English is also very recent. A violation of ethics can be seen from reading the paper by Levi Rickert. I will hopefully treat others with all respect to their customs and beliefs. People should not be judged based on how they look or what language they speak.
References
Local Governments. "Arizona Candidate for Local Office Hits Language Barrier,
Campaign Suspended PublicCEO." PublicCEO California Local
Government News. 07 Feb. 2012. Web. 07 Feb. 2012.
Wikipedia. "Linguistic Rights." Wikipedia, the Free Encyclopedia. 24 Jan.
2012. Web. 07 Feb. 2012.
Subscribe to:
Posts (Atom)