Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 8.1 Failures and Errors in Computer Systems
8.2 Case Study: The Therac-25 425
1.(Knowledge) Tell three interesting elements of this chapter:
a. “We can categorize computer errors and failures in several ways, for example, by the cause, by the seriousness of the effects, or by the application area” (Baase, pg. 406).
b. “ The Therac-25 was a software-controlled radiation therapy machine used to treat people with cancer. Between 1985 and 1987, Therac-25 machines at four medical centers gave massive overdoses of radiation to six patients (Baase, pg.425).
c. “Atomic Energy of Canada Limited (AECL), a Canadian government corporation, manufactured the Therac-25. Investigators studying the accidents found that AECL produced very little documentation concerning the software specifications or the testing plan during development of the program. Although AECL claimed that they tested the machine extensively, it appeared that the test plan was inadequate (Baase, pg.426).
2.(Comprehension) Summarize what is being discussed within this chapter?
Errors, failures, and risk happen all the time when it comes to technology. A website may crash because of too many users or a computer program might fail because of an error. These problems happen all the time. Some are small and affect few people while some are large and affect many people. A perfect example would be the Therac-25. The machine had problems with the programming and many bugs that caused the machine to overdose six patients (Baase, pg.425). More information on Therac-25 http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html
3.(Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
Problems with software happen all the time. Many of the bugs are found before the product or software is released to the public, a few of them slip by the testers. Take a look at the new iPhone that was released. Many people were complaining about the quick loss in battery life, although Apple claimed that the battery would last up to 8 hours talk time. It took Apple a while to admit that there were problems with the new iPhone 4S, but they have claimed to fix most of the problems and released an update for users to download. Here are the technical specifics that Apple released about the iPhone 4S: http://www.apple.com/iphone/specs.html Here is an article better explaining the bugs in the new iPhone 4S: http://www.gmanews.tv/story/237698/technology/more-bugs-reported-in-iphone-4s
4. (Analysis) Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Many people thought that the Internet and computer systems were going to crash on January 1, 2000. People were told to stock up on food and water and that caused a panic. To tell the truth nothing really happened on the major scale, but some minor problems did occur. “For example, some credit cards with expiration dates in 2000 would not work” (Baase, pg.421). “People writing software in the 1960’s and 1970’s never considered or imagined that their code would still be used in the year 2000. Businesses and governments spent many billions of dollars on the “Y2K problem”, tracking down two-digit dates in their software and making modifications, rushing to finish before January 1, 2000” (Baase, pg.421).
5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
Baase makes many great points about the errors of technology. This topic is important when it comes to technology in everyday life especially medicine. Computer programs and machines need to be tested and be working correctly before they are released to the public. There also can be issues when it comes to the Internet and websites. There maybe an error with your online banking or a companies business through the Internet. I think that there should be tougher regulations when it comes to companies producing products for medical treatments. Maybe if these stricter regulations were in place a while ago the deaths involved with the Therac-25 incident would of not had happened.
6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Errors, failures, and risks are an important topic to talk about when it comes to technology and safety. There are many new technological inventions that make life easier but they need to be tested to make sure they work okay. For example, my mom had to go to many training classes to learn how to do the new Da Vinci robotic surgeries. The new robotic surgeries are minimally invasive and allow a person to heal quicker. With this there are also many concerns, what happens if something goes wrong and the robot does the wrong thing? The doctor is controlling the robot away from the body and there are many safety features where the robot will just shut off. I have had the experience of seeing this robot at Millard Suburban Hospital and even got to do a pretend surgery myself using the controls it was like playing a video game.
http://www.davincisurgery.com/
http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/davinci.html
References
http://www.apple.com/iphone/specs.html
http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/davinci.html
http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html
http://www.davincisurgery.com/
http://www.gmanews.tv/story/237698/technology/more-bugs-reported-in-iphone-4s
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
My CIS 105 assignments
Sunday, November 20, 2011
Sunday, November 13, 2011
Chapter 6 : Part 2
Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.4,6.5
1. (Knowledge)Tell three interesting elements of this chapter:
a. “Embezzlement is “fraudulent appropriation of property by a person whom it has been entrusted””(Baase, pg.332).
b. “Supervisors and managers have always monitored their employees. The degree of detail and frequency of the monitoring has varied depending on the kind of work, economic factors, and available technology. Computers have made new kinds of monitoring possible and old methods more efficient” (Baase, pg.335).
c. “The National Labor Relations Board (NLRB) sets rules and decides cases about worker-employer relations. It has been a focus of controversy between unions and employers since its creation more than 60 years ago” (Baase, pg.342).
2.(Comprehension) Summarize what is being discussed within this chapter?
Many companies are allowing their customers to telecommute to work. Telecommuting means that the employee is able to work from anywhere but the office to get the work done. With this increase in telecommuting there is also an increase in work crime and employee monitoring. Even if the employee does not telecommute there is still a possibility the company is watching what the employee is doing on the Internet. There are many ways for an employee to commit a work crime an example would be embezzlement.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
If the job that the employee is doing involves the computer the company is most likely keeping track of what the employee is doing on that computer. I know that at my work when I first started one of the papers I had to sign was a computer policy. This policy stated that if I were to use a computer it would only be used for work related material and I could possible be tracked on what I was doing. Companies can also check emails, web history, and even voice mail. This is a very good article explaining more about companies tracking employees. http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI
4.(Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
While employee crime has happen a while now, the way it has been done has greatly changed over the years with the changes in technology. Technology has helped employee crime become easier and anonymous. “With the use of computers, trusted employees have stolen hundreds of thousands – in some cases million – of dollars from their employers. Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.332). Without technology, employees stealing from their employers would take great skill and secrecies.
5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
With advancements in technology, companies will find new ways to watch employees and what they are doing on company time. Companies will also have to find many new ways to help protect their company from crime committed by employees.
6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Many employees need to know that the company they work for will be tracking what they do on company time. This important to know because if the employee does something wrong the company may fire them. As I stated in the answer to question 3, when I started my new job I had to sign a computer policy letting me know that the company will be tracking what I do on the computer. Employee Crime is also relevant to today’s society because there are many ways crime to happen. “Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.333). “Careful screening and background checks on prospective employees can be helpful, although some laws make various kinds of screening more difficult (or completely illegal)” (Baase, pg.334).
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.4,6.5
1. (Knowledge)Tell three interesting elements of this chapter:
a. “Embezzlement is “fraudulent appropriation of property by a person whom it has been entrusted””(Baase, pg.332).
b. “Supervisors and managers have always monitored their employees. The degree of detail and frequency of the monitoring has varied depending on the kind of work, economic factors, and available technology. Computers have made new kinds of monitoring possible and old methods more efficient” (Baase, pg.335).
c. “The National Labor Relations Board (NLRB) sets rules and decides cases about worker-employer relations. It has been a focus of controversy between unions and employers since its creation more than 60 years ago” (Baase, pg.342).
2.(Comprehension) Summarize what is being discussed within this chapter?
Many companies are allowing their customers to telecommute to work. Telecommuting means that the employee is able to work from anywhere but the office to get the work done. With this increase in telecommuting there is also an increase in work crime and employee monitoring. Even if the employee does not telecommute there is still a possibility the company is watching what the employee is doing on the Internet. There are many ways for an employee to commit a work crime an example would be embezzlement.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
If the job that the employee is doing involves the computer the company is most likely keeping track of what the employee is doing on that computer. I know that at my work when I first started one of the papers I had to sign was a computer policy. This policy stated that if I were to use a computer it would only be used for work related material and I could possible be tracked on what I was doing. Companies can also check emails, web history, and even voice mail. This is a very good article explaining more about companies tracking employees. http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI
4.(Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
While employee crime has happen a while now, the way it has been done has greatly changed over the years with the changes in technology. Technology has helped employee crime become easier and anonymous. “With the use of computers, trusted employees have stolen hundreds of thousands – in some cases million – of dollars from their employers. Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.332). Without technology, employees stealing from their employers would take great skill and secrecies.
5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
With advancements in technology, companies will find new ways to watch employees and what they are doing on company time. Companies will also have to find many new ways to help protect their company from crime committed by employees.
6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Many employees need to know that the company they work for will be tracking what they do on company time. This important to know because if the employee does something wrong the company may fire them. As I stated in the answer to question 3, when I started my new job I had to sign a computer policy letting me know that the company will be tracking what I do on the computer. Employee Crime is also relevant to today’s society because there are many ways crime to happen. “Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.333). “Careful screening and background checks on prospective employees can be helpful, although some laws make various kinds of screening more difficult (or completely illegal)” (Baase, pg.334).
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI
Saturday, November 5, 2011
Chapter 6: Work
Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.1,6.2,6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. “Telecommuting has become part of our vocabulary, describing the phenomenon of working at a distance from the traditional company office or factory, connected by computers and telecommunications device” (Baase pg.308).
b. “The Organisation of Economic Co-operation and Development (OECD), an international organization whose members include most of Western Europe, North America, Japan, Australia, and New Zealand, studied employment trends in 25 countries from 1950 to 1994” (Baase pg.313).
c. “Telecommunicating is very common now, so it might be surprising that local governments and labor unions attempted to stop it in the 1980s and that the Occupational Health and Safety Administration (OSHA) tried to regulate it” (Baase pg. 330).
2. (Comprehension) Summarize what is being discussed within this chapter?
With the creation of new technology there comes a change in jobs. The new technology will take away jobs but it will also create new jobs. “The goals of technology include a reduction in the resources needed to accomplish a result and an increase in productivity and standard of living” (Baase, pg.310). “The new jobs created by computers are different from the jobs eliminated”(Baase, pg.315). Many employees that were replace by technology would have to go and get extensive training to be hired to fill one of the new jobs that were created by the new technology because it was different than what the employee was used to doing. The unemployment rate also decreased because many companies began offshoring. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). “Forrester Research estimates that 3.3 million white-collar jobs will have left the U.S. for other countries between 2000 and 2015” (Baase, pg 321). “The internet makes it possible for companies to locate in small towns and work with dispersed consultants instead of having hundreds or thousands of employees in larger population centers” (Baase, pg.327).
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
Many jobs are being offshored, which is creating fewer jobs in the United States. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). Offshoring can have positives and negatives. One positive of offshoring is that it is cheaper for companies to create their product and to pay the employees. “Consumers have many complaints about customer-service call centers in foreign countries: Foreign accents are difficult to understand. Service personnel are not familiar with the product or service the consumer is asking about – they just read from a manual. The workers experience problems too” (Baase, pg.321). While offshoring may seem like a greater financial option for many companies they also need to think about the customer needs and the needs of the company.
http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Without the advancements of technology through the years what would the current times look like? Would we have cars? Would we still be using typewriters? Would anyone be able to work from home? Would job be offshored to foreign countries? The answer would most likely be no to all of these questions. With the advancement of technology has allowed for many great inventions that make our lives easier. A new technology advancement that has allowed company employees to work from anywhere is telecommunication. “Telecommuting, and telecommunications generally, make it easier to work with clients, customers, and employees in other countries: At home, one can more easily work a few hours at night that are compatible with foreign time zones” (Baase, pg.328).
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
There is a never-ending cycle between technology advancements and jobs. The new technology is created, jobs are lost, and new jobs are created. This happens all the time when new technology is created. The only way that this cycle will end is if new technology advancements are not made or the technology advancements include the jobs that exist and the new one that are about to be created. I also think that jobs will continue to be offshored to other countries rather than stay in the country that the company is in.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Chapter 6: Jobs is relevant in today’s society. For many young adults graduating from high school the major question is: Is it worth going to college? They may think this because many jobs are being lost and sent overseas. Is it worth going into debt, which you may never be able to pay back, just to get a higher education? Will this higher education guarantee me a job? The answer may be no and it may be yes, it depends on the person. This chapter has helped me to understand what is happening between technology and jobs. “Telework reduces overhead for employers and, in some, cases, increases productivity” (Baase pg.328).
Chapter 6 has helped me to learn the benefits and problems of telecommunication and working from somewhere other than the office.
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.1,6.2,6.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. “Telecommuting has become part of our vocabulary, describing the phenomenon of working at a distance from the traditional company office or factory, connected by computers and telecommunications device” (Baase pg.308).
b. “The Organisation of Economic Co-operation and Development (OECD), an international organization whose members include most of Western Europe, North America, Japan, Australia, and New Zealand, studied employment trends in 25 countries from 1950 to 1994” (Baase pg.313).
c. “Telecommunicating is very common now, so it might be surprising that local governments and labor unions attempted to stop it in the 1980s and that the Occupational Health and Safety Administration (OSHA) tried to regulate it” (Baase pg. 330).
2. (Comprehension) Summarize what is being discussed within this chapter?
With the creation of new technology there comes a change in jobs. The new technology will take away jobs but it will also create new jobs. “The goals of technology include a reduction in the resources needed to accomplish a result and an increase in productivity and standard of living” (Baase, pg.310). “The new jobs created by computers are different from the jobs eliminated”(Baase, pg.315). Many employees that were replace by technology would have to go and get extensive training to be hired to fill one of the new jobs that were created by the new technology because it was different than what the employee was used to doing. The unemployment rate also decreased because many companies began offshoring. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). “Forrester Research estimates that 3.3 million white-collar jobs will have left the U.S. for other countries between 2000 and 2015” (Baase, pg 321). “The internet makes it possible for companies to locate in small towns and work with dispersed consultants instead of having hundreds or thousands of employees in larger population centers” (Baase, pg.327).
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
Many jobs are being offshored, which is creating fewer jobs in the United States. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). Offshoring can have positives and negatives. One positive of offshoring is that it is cheaper for companies to create their product and to pay the employees. “Consumers have many complaints about customer-service call centers in foreign countries: Foreign accents are difficult to understand. Service personnel are not familiar with the product or service the consumer is asking about – they just read from a manual. The workers experience problems too” (Baase, pg.321). While offshoring may seem like a greater financial option for many companies they also need to think about the customer needs and the needs of the company.
http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Without the advancements of technology through the years what would the current times look like? Would we have cars? Would we still be using typewriters? Would anyone be able to work from home? Would job be offshored to foreign countries? The answer would most likely be no to all of these questions. With the advancement of technology has allowed for many great inventions that make our lives easier. A new technology advancement that has allowed company employees to work from anywhere is telecommunication. “Telecommuting, and telecommunications generally, make it easier to work with clients, customers, and employees in other countries: At home, one can more easily work a few hours at night that are compatible with foreign time zones” (Baase, pg.328).
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
There is a never-ending cycle between technology advancements and jobs. The new technology is created, jobs are lost, and new jobs are created. This happens all the time when new technology is created. The only way that this cycle will end is if new technology advancements are not made or the technology advancements include the jobs that exist and the new one that are about to be created. I also think that jobs will continue to be offshored to other countries rather than stay in the country that the company is in.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Chapter 6: Jobs is relevant in today’s society. For many young adults graduating from high school the major question is: Is it worth going to college? They may think this because many jobs are being lost and sent overseas. Is it worth going into debt, which you may never be able to pay back, just to get a higher education? Will this higher education guarantee me a job? The answer may be no and it may be yes, it depends on the person. This chapter has helped me to understand what is happening between technology and jobs. “Telework reduces overhead for employers and, in some, cases, increases productivity” (Baase pg.328).
Chapter 6 has helped me to learn the benefits and problems of telecommunication and working from somewhere other than the office.
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/
Sunday, October 23, 2011
Chapter 5: Crime
Name Kayley Cartwright Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 5.1,5.2,5.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. In the early days of computing, a hacker was a creative programmer who wrote very elegant or clever programs. A “good hack” was an especially clever piece of code (Baase p.254).
b. Beginning roughly in the mid-1990s, the intricate interconnectedness of the Web and the increased use of the Internet for e-mail and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging – and more attractive to criminal gangs (Baase p.257).
c. In several major thefts of data from retailers, the databases included unencrypted credit-card numbers, and other security numbers read from the magnetic strips on the cards (Baase p.278).
2. (Comprehension) Summarize what is being discussed within this chapter?
With the increase of the technology and the use of the Internet there is also an increased risk of crime. The Internet allow us to make purchases, connect with people from all over the world, and do many other interesting things. When we make purchases on the Internet we share our personal information and credit card information. The same when we connect with family and friends we share personal information and personal photos. With this information out there it is easier for hackers and criminals to access it and assume our identity. Many sites have created and added many new features to alert customers when the site believes that fraud and identity theft might have occurred.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
“When a thief steals a credit-card number, we can get a new account with a new number, but if a hacker gets a copy of the file with our digitalized thumbprint or retina scan, we cannot get a new one. Identity theft might become easier to prevent, but much worse for a victim when it occurs” (Baase p.282). The latest technology that has become convenient and easy to use is cloud computing. Cloud computing allows its users to share their information, data, music and photos to many devices that are hooked up to the clouds and have access to Wi-Fi. Although it becomes easier to share our information from many computers, phones, and tablets there is also an increase in the worry of data theft. This article provides more information about cloud computing and theft risks: http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
“Financial institutions have added procedures to authenticate customers, making it more difficult for a thief armed with a stolen account number and other commonly used identifying information to withdraw money from an account. Some financial institutions store an identification number for the customer’s home computer or laptop and then verify the machine used when the customer logs on (Baase p.279).” These precautions are very important when it comes to online banking and paying bills on the Internet with a credit card. Although many people think that only using their password will keep them safe on the Internet that is not true especially if the password is very simple. Many people connect identity theft with the Internet but the same theft of a bank account can happen with an online account or by retrieving the account number from a check or paystub. Many precautions need to be made whether we use the Internet or paper accounts.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
“If you send a change-of-address notification to your credit-card company, the company will probably send a conformation to both your old and new addresses. Thieves who plan to use a stolen credit-card number for a long time do not want the owner of the card to see fraudulent charges on the bill and close the account (Baase p.279).” Thieves are creative when it comes to carrying out their plan of attack. Many companies know this and have created many new precautions and ways to alert customers of many possible fraudulent charges. Crime occurs in many offenses on the Internet the main crimes that come to mind are identity theft and fraudulent charges.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Crime on the Internet is a relevant topic in today’s society. Technology is always changing and evolving whether it be sharing information on a cloud of using a new social networking site there are many risks that users need to be aware of. After reading chapter 5 I will be making sure that all may accounts and their information remain safe and secure.
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 5.1,5.2,5.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. In the early days of computing, a hacker was a creative programmer who wrote very elegant or clever programs. A “good hack” was an especially clever piece of code (Baase p.254).
b. Beginning roughly in the mid-1990s, the intricate interconnectedness of the Web and the increased use of the Internet for e-mail and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging – and more attractive to criminal gangs (Baase p.257).
c. In several major thefts of data from retailers, the databases included unencrypted credit-card numbers, and other security numbers read from the magnetic strips on the cards (Baase p.278).
2. (Comprehension) Summarize what is being discussed within this chapter?
With the increase of the technology and the use of the Internet there is also an increased risk of crime. The Internet allow us to make purchases, connect with people from all over the world, and do many other interesting things. When we make purchases on the Internet we share our personal information and credit card information. The same when we connect with family and friends we share personal information and personal photos. With this information out there it is easier for hackers and criminals to access it and assume our identity. Many sites have created and added many new features to alert customers when the site believes that fraud and identity theft might have occurred.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
“When a thief steals a credit-card number, we can get a new account with a new number, but if a hacker gets a copy of the file with our digitalized thumbprint or retina scan, we cannot get a new one. Identity theft might become easier to prevent, but much worse for a victim when it occurs” (Baase p.282). The latest technology that has become convenient and easy to use is cloud computing. Cloud computing allows its users to share their information, data, music and photos to many devices that are hooked up to the clouds and have access to Wi-Fi. Although it becomes easier to share our information from many computers, phones, and tablets there is also an increase in the worry of data theft. This article provides more information about cloud computing and theft risks: http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
“Financial institutions have added procedures to authenticate customers, making it more difficult for a thief armed with a stolen account number and other commonly used identifying information to withdraw money from an account. Some financial institutions store an identification number for the customer’s home computer or laptop and then verify the machine used when the customer logs on (Baase p.279).” These precautions are very important when it comes to online banking and paying bills on the Internet with a credit card. Although many people think that only using their password will keep them safe on the Internet that is not true especially if the password is very simple. Many people connect identity theft with the Internet but the same theft of a bank account can happen with an online account or by retrieving the account number from a check or paystub. Many precautions need to be made whether we use the Internet or paper accounts.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
“If you send a change-of-address notification to your credit-card company, the company will probably send a conformation to both your old and new addresses. Thieves who plan to use a stolen credit-card number for a long time do not want the owner of the card to see fraudulent charges on the bill and close the account (Baase p.279).” Thieves are creative when it comes to carrying out their plan of attack. Many companies know this and have created many new precautions and ways to alert customers of many possible fraudulent charges. Crime occurs in many offenses on the Internet the main crimes that come to mind are identity theft and fraudulent charges.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Crime on the Internet is a relevant topic in today’s society. Technology is always changing and evolving whether it be sharing information on a cloud of using a new social networking site there are many risks that users need to be aware of. After reading chapter 5 I will be making sure that all may accounts and their information remain safe and secure.
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
Sunday, October 16, 2011
Chapter 4: Steal this Film II
Your Name Kayley Cartwright Class time: MWF 12pm
Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay
1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):
o Why have international copyright laws been created yet?
o How was Pirate Bay able to get their site back up in working order after the raid and not get into any further trouble?
o When did the Pirate Bay raid take place?
2. Foundation (UNDERSTANDING):
a. What is the Pirate Bay?
Pirate Bay is a website based in Sweden that allowed users to download movies without paying for them. Pirate Bay is a site that allows users to share files.
b. What do they stand for (what is their mission)?
Pirate Bay stands for the freedom of speech.
c. What is their purpose for making and distributing this film as a free download?
Making and distribution this film as a free download because they want people to learn about file sharing and what people can benefit from file sharing. They want to show that that file sharing in no illegal and the company has the right the keep the site running.
3. Provide 3 referenced connections to Baase readings (LINKING).
a. “ The Napster and Grokster decisions made it clear that businesses that encourage copyright infringement and provide tools to do so as a fundamental part of that’s business model cannot operate legally.” (p.212)
b. “ The first major legal cases based on the DMCA involved the Content Scrambling System (CSS), a protection scheme for movies. DeCSS could, of course, be used to create numerous unauthorized copies, and that might well be its main use.” (p.218)
c. “Creative works such as books, articles, plays, songs (both music and lyrics), works of art, movies, and software are protected by copyright, a legal concept that defines rights to intellectual property.” (p.198)
4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):
a. Lawrence Liang is a legal researcher and lawyer based in Bangalore. He is against the politics of Intellectual Property.
b. Yochai Benkler is a professor of law and author. Benkler is the Berkman Professor of Entrepreneurial Legal Studies at Harvard Law School.
c. Bram Cohen is a computer programmer and an author BitTorrent Protocol.
d. Fred von Lohmann is an American lawyer and specializes in Intellectual Property.
e. Rick Prelinger is an Internet archivist and founder of Prelinger Archivies.
5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):
a) Fredrik Neij is the co-founder of Pirate Bay.
b) Gottfried Svartholm is a Swedish computer specialist and co-founder of Pirate Bay.
c) Peter Sunde is an IT expert and co-founder and spokesperson of Pirate Bay.
6. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).
One of the main ideas being talked about in the film is that Pirate Bay is being accused of breaking the United States copyright laws. The copyright laws do not apply to the company that is based in Sweden. The MPAA tried suing Pirate Bay for the company file sharing and breaking copyright laws. “Digital technology and the Internet empowered us all to be publishers, thus to become copyright owners (for our blogs and photos, for example), and they empowered us all to copy, and thus to infringe copyrights (Baase p.202).”
7. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)
BitTorrent is a file sharing protocol used to distribute large amounts of data. BitTorrent is responsible for most of the Internet traffic and large data file sharing. For the police to stop file sharing they cannot just stop one computer, the police would have to find and shut down all of the computers that is part of the file sharing process.
8. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?
When I was younger Napster was a major controversy. The website allowed for the file sharing of music and it was free. Napster allowed people to get their favorite music for nothing, which was better than running to the store and having to buy a whole CD for $15.00. When Napster first came out I didn’t understand the concept of file sharing and copyright laws. After watching “Steal This Film”, I was able to understand piracy, file sharing, and copyright laws. “Users and observers of digital media and of the Internet debate whether copyright can surivive the enormously increased ease of copying and the habits and expectations that developed about sharing information and entertainment online (Baase p.203).”
9. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)
Future distribution, production and creativity will come with stronger copyright laws and security to prevent infringement. I think that the distribution of movies and music will become more digital and Internet based. Intellectually Property in the Information Age will become more of an issue and will see many changes.
10. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?
I think that downloading is stealing someone’s Intellectual Property. Although it is available to download on the Internet the site that is allowing you to download does not own the rights to the song, movie or software someone else does. Infringement of copyright is illegal and a person caught may have to pay the company money or if severe case many get jail time. “The entertainment industry has filed hundreds of lawsuits against individuals whom it accuses of sharing music. Letters to college students threaten fines of thousands of dollars (Baase p.214).”
11. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)
50 years from today there will still be issues with Intellectual Property and copyright laws. File sharing on the Internet and piracy will become larger and more severe than it is today and will be harder to stop. Although the governments try to stop file sharing, piracy, and copyright infringement by creating more laws with harder punishments people will still participate in these illegal acts.
12. Do you agree with what is being said within movie? Explain. (EVALUATION)
From the companies stand point I do agree with what they are saying. Pirate Bay is a Sweden based company and should not be in trouble with the United States because of breaking their copyright laws. I also agree with MPAA on the basis that Pirate Bay should not allow people to file share movies for free instead of the people going out and seeing the movie in a theater or buying a copy of the film. At some point all of the world governments need to come together to try and create an international copyright law which would make the file sharing that happens on Pirate Bay illegal.
13. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)
While I see many of the great point that Pirate Bay makes, my opinion on file sharing and copyright infringement does not change. I always thought of downloading music from the Internet was an illegal thing. After the Napster ordeal my generation was taught about the reciprocations of file sharing. I prefer to use iTunes and pay for my music or rent movies through Netflix or Blockbuster.
Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay
1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):
o Why have international copyright laws been created yet?
o How was Pirate Bay able to get their site back up in working order after the raid and not get into any further trouble?
o When did the Pirate Bay raid take place?
2. Foundation (UNDERSTANDING):
a. What is the Pirate Bay?
Pirate Bay is a website based in Sweden that allowed users to download movies without paying for them. Pirate Bay is a site that allows users to share files.
b. What do they stand for (what is their mission)?
Pirate Bay stands for the freedom of speech.
c. What is their purpose for making and distributing this film as a free download?
Making and distribution this film as a free download because they want people to learn about file sharing and what people can benefit from file sharing. They want to show that that file sharing in no illegal and the company has the right the keep the site running.
3. Provide 3 referenced connections to Baase readings (LINKING).
a. “ The Napster and Grokster decisions made it clear that businesses that encourage copyright infringement and provide tools to do so as a fundamental part of that’s business model cannot operate legally.” (p.212)
b. “ The first major legal cases based on the DMCA involved the Content Scrambling System (CSS), a protection scheme for movies. DeCSS could, of course, be used to create numerous unauthorized copies, and that might well be its main use.” (p.218)
c. “Creative works such as books, articles, plays, songs (both music and lyrics), works of art, movies, and software are protected by copyright, a legal concept that defines rights to intellectual property.” (p.198)
4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):
a. Lawrence Liang is a legal researcher and lawyer based in Bangalore. He is against the politics of Intellectual Property.
b. Yochai Benkler is a professor of law and author. Benkler is the Berkman Professor of Entrepreneurial Legal Studies at Harvard Law School.
c. Bram Cohen is a computer programmer and an author BitTorrent Protocol.
d. Fred von Lohmann is an American lawyer and specializes in Intellectual Property.
e. Rick Prelinger is an Internet archivist and founder of Prelinger Archivies.
5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):
a) Fredrik Neij is the co-founder of Pirate Bay.
b) Gottfried Svartholm is a Swedish computer specialist and co-founder of Pirate Bay.
c) Peter Sunde is an IT expert and co-founder and spokesperson of Pirate Bay.
6. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).
One of the main ideas being talked about in the film is that Pirate Bay is being accused of breaking the United States copyright laws. The copyright laws do not apply to the company that is based in Sweden. The MPAA tried suing Pirate Bay for the company file sharing and breaking copyright laws. “Digital technology and the Internet empowered us all to be publishers, thus to become copyright owners (for our blogs and photos, for example), and they empowered us all to copy, and thus to infringe copyrights (Baase p.202).”
7. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)
BitTorrent is a file sharing protocol used to distribute large amounts of data. BitTorrent is responsible for most of the Internet traffic and large data file sharing. For the police to stop file sharing they cannot just stop one computer, the police would have to find and shut down all of the computers that is part of the file sharing process.
8. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?
When I was younger Napster was a major controversy. The website allowed for the file sharing of music and it was free. Napster allowed people to get their favorite music for nothing, which was better than running to the store and having to buy a whole CD for $15.00. When Napster first came out I didn’t understand the concept of file sharing and copyright laws. After watching “Steal This Film”, I was able to understand piracy, file sharing, and copyright laws. “Users and observers of digital media and of the Internet debate whether copyright can surivive the enormously increased ease of copying and the habits and expectations that developed about sharing information and entertainment online (Baase p.203).”
9. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)
Future distribution, production and creativity will come with stronger copyright laws and security to prevent infringement. I think that the distribution of movies and music will become more digital and Internet based. Intellectually Property in the Information Age will become more of an issue and will see many changes.
10. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?
I think that downloading is stealing someone’s Intellectual Property. Although it is available to download on the Internet the site that is allowing you to download does not own the rights to the song, movie or software someone else does. Infringement of copyright is illegal and a person caught may have to pay the company money or if severe case many get jail time. “The entertainment industry has filed hundreds of lawsuits against individuals whom it accuses of sharing music. Letters to college students threaten fines of thousands of dollars (Baase p.214).”
11. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)
50 years from today there will still be issues with Intellectual Property and copyright laws. File sharing on the Internet and piracy will become larger and more severe than it is today and will be harder to stop. Although the governments try to stop file sharing, piracy, and copyright infringement by creating more laws with harder punishments people will still participate in these illegal acts.
12. Do you agree with what is being said within movie? Explain. (EVALUATION)
From the companies stand point I do agree with what they are saying. Pirate Bay is a Sweden based company and should not be in trouble with the United States because of breaking their copyright laws. I also agree with MPAA on the basis that Pirate Bay should not allow people to file share movies for free instead of the people going out and seeing the movie in a theater or buying a copy of the film. At some point all of the world governments need to come together to try and create an international copyright law which would make the file sharing that happens on Pirate Bay illegal.
13. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)
While I see many of the great point that Pirate Bay makes, my opinion on file sharing and copyright infringement does not change. I always thought of downloading music from the Internet was an illegal thing. After the Napster ordeal my generation was taught about the reciprocations of file sharing. I prefer to use iTunes and pay for my music or rent movies through Netflix or Blockbuster.
Chapter 4: Musicians Look For Pay In An MP3 World
How are the ideas expressed in the Sydel segment it different from the Chuck D and Lars Ulrich video?
If people keep downloading music for free than the quality of the music will go down because no one will be able to make a living as a professional musician. The United States has copyright laws it just have become difficult for the record companies to enforce them.
What point does Sydel make that is the same or different than the Chuck D and Lars Ulrich video?
Artist Jonathan Coulton writes songs about his life as a computer programmer. Coulton allows people to download his music for free on the Internet but people have been willing paying for the songs. Coulton says that he makes more money now than he did as a computer programmer and that he has more creative freedom now than he would if he signed with a record company.
http://www.npr.org/templates/story/story.php?storyId=112065448
If people keep downloading music for free than the quality of the music will go down because no one will be able to make a living as a professional musician. The United States has copyright laws it just have become difficult for the record companies to enforce them.
What point does Sydel make that is the same or different than the Chuck D and Lars Ulrich video?
Artist Jonathan Coulton writes songs about his life as a computer programmer. Coulton allows people to download his music for free on the Internet but people have been willing paying for the songs. Coulton says that he makes more money now than he did as a computer programmer and that he has more creative freedom now than he would if he signed with a record company.
http://www.npr.org/templates/story/story.php?storyId=112065448
Chapter 4:Chuck D and Lars Ulrich
In 1-2 sentences, explain Eric Schmidt's point of view on Intellectual Property.
Eric Schmidt, CEO of Google, believes that the company needs to find a legal and business mechanisms that allow people to be properly compensate for the Intellectual Property and still want to use the site. Schmidt states the many people would be willing to pay for a service that would allow them to be entertained anywhere.
What is Chuck D's slant on Intellectual property?
Chuck D says that there is an exception to the rule. That the power is going back to the people after the music company’s have owned the Intellectual Property for the last 15-16 years. He thinks that the Internet is the only was some artists would be able to share their music.
Explain the reason why might Lars Ulrich express the opinion he has. Base your answer on facts from this chapter.
Lars Ulrich has taken the view he has on Napster not because of the loss of money but on the basic fact that it is illegal. Napster is violating the copyright laws of the artist’s music that is being shared to thousands of people without them spending a penny on the music. Ulrich thinks that Napster should of asked the artists first if they would like their music to be shared on their site and the artists should have the option to opt of if they would like. “The entertainment industry pushed hard for laws and industry agreements to require that makers of PCs and digital recorders and players build copy-protection mechanisms into their products.” (p. 215)
Eric Schmidt, CEO of Google, believes that the company needs to find a legal and business mechanisms that allow people to be properly compensate for the Intellectual Property and still want to use the site. Schmidt states the many people would be willing to pay for a service that would allow them to be entertained anywhere.
What is Chuck D's slant on Intellectual property?
Chuck D says that there is an exception to the rule. That the power is going back to the people after the music company’s have owned the Intellectual Property for the last 15-16 years. He thinks that the Internet is the only was some artists would be able to share their music.
Explain the reason why might Lars Ulrich express the opinion he has. Base your answer on facts from this chapter.
Lars Ulrich has taken the view he has on Napster not because of the loss of money but on the basic fact that it is illegal. Napster is violating the copyright laws of the artist’s music that is being shared to thousands of people without them spending a penny on the music. Ulrich thinks that Napster should of asked the artists first if they would like their music to be shared on their site and the artists should have the option to opt of if they would like. “The entertainment industry pushed hard for laws and industry agreements to require that makers of PCs and digital recorders and players build copy-protection mechanisms into their products.” (p. 215)
Subscribe to:
Comments (Atom)