Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.1 and 2.2
1. (Knowledge)Tell three interesting elements of this chapter:
a. Everything that we do online is recorded and linked to our computers like online searches and viewed images.
b. Invisible information gathering is the collecting of someone’s personal information without them knowing.
c. Dataveillance is the use of personal-data systems to collect personal information or monitor people.
2. (Comprehension) Summarize what is being discussed within this chapter?
Since computers have become so popular and advanced, our personal information has become more and more exposed. Society’s privacy is not as protected as it used to be. New technologies pose many threats to our privacy. What people do online is saved and linked to their computer. Both the federal and local governments maintain several databases containing our information. The government can be seen as in violation of “The Privacy Act of 1974”. Data mining programs have been issued to monitor searches to find potential terrorists. The “USA PATRIOT Act” weakened society’s 4th Amendment. The 4th Amendment continues to be weakened through time.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
A new solution for this type of problem would be reinforcing the people’s rights stated in the 4th Amendment and The Privacy Act of 1974 and passing another law that specifically limits the power of the government to search someone. This will help keep our rights and keep our information that we do not want shared private.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
The best thing to relate privacy restrictions on
the internet to would be a child’s privacy being threatened and violated by a
cautious parent. The “Big Brother” internet program is similar to a child’s
parent because they both watch over the actions of another. (2.2) Some may see
the actions of the “Big Brother” program and the cautious parent as good and
fair while others may think that it is an illegal restriction of their privacy.
Also, as of now it is not necessary for governments to require search warrants
before reading someone’s email. (http://www.computerworld.com/s/article/9026629/Search_warrants_not_needed_to_monitor_Internet_use_court_says) I think that this
should be treated as if it were written mail in a mailbox and private property.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said, but only to an extent. Yes, I think that the governments watch us and save information about us. I also think that the local and federal governments could easily violate our privacy rights and consider it justified in some way. But, I do not think that our privacy is always being violated and it is also not a bad thing that some of these programs are out. Our privacy may feel threatened at times, but it is for the good of the group. These programs are used to catch terrorists and stop other illegal activity. One example of this is the program Obama passed called “Einstein 3” which is supposed to catch criminals online. (http://gawker.com/5306575/obama-goes-ahead-with-nsa-internet+monitoring-program) I think that whether we want our personal information read it will be, but generally it’s to a small extent and for a good cause.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is very relevant in today’s society. This is because this era society lives in now is extremely technologically based and we use computers frequently. We put a lot of trust into our computers and the information we put in them. The amount that governments should be allowed to see though is an ethical battle of right and wrong power uses. After reading this article I will be sure to watch what I post online knowing that somewhere it is being viewed and saved by someone I didn’t intend on sharing this information with.
References
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and
the Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
Pareene. "Obama Goes Ahead With NSA Internet-monitoring Program." Friday
night newsdump. Gawker, 07,02,2009. Web. 26 Feb 2012.
Rosencrance, L. Search warrants not needed to monitor internet use, court says.
Computerworld, 2007. Web. 26 Feb 2012.