Sunday, November 20, 2011

Chapter 8: Errors, Failures, and Risks

Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 8.1 Failures and Errors in Computer Systems 

8.2 Case Study: The Therac-25 425

1.(Knowledge) Tell three interesting elements of this chapter:
a. “We can categorize computer errors and failures in several ways, for example, by the cause, by the seriousness of the effects, or by the application area” (Baase, pg. 406).

b. “ The Therac-25 was a software-controlled radiation therapy machine used to treat people with cancer. Between 1985 and 1987, Therac-25 machines at four medical centers gave massive overdoses of radiation to six patients (Baase, pg.425).

c. “Atomic Energy of Canada Limited (AECL), a Canadian government corporation, manufactured the Therac-25. Investigators studying the accidents found that AECL produced very little documentation concerning the software specifications or the testing plan during development of the program. Although AECL claimed that they tested the machine extensively, it appeared that the test plan was inadequate (Baase, pg.426).

2.(Comprehension) Summarize what is being discussed within this chapter?

Errors, failures, and risk happen all the time when it comes to technology. A website may crash because of too many users or a computer program might fail because of an error. These problems happen all the time. Some are small and affect few people while some are large and affect many people. A perfect example would be the Therac-25. The machine had problems with the programming and many bugs that caused the machine to overdose six patients (Baase, pg.425). More information on Therac-25 http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html


3.(Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Problems with software happen all the time. Many of the bugs are found before the product or software is released to the public, a few of them slip by the testers. Take a look at the new iPhone that was released. Many people were complaining about the quick loss in battery life, although Apple claimed that the battery would last up to 8 hours talk time. It took Apple a while to admit that there were problems with the new iPhone 4S, but they have claimed to fix most of the problems and released an update for users to download. Here are the technical specifics that Apple released about the iPhone 4S: http://www.apple.com/iphone/specs.html Here is an article better explaining the bugs in the new iPhone 4S: http://www.gmanews.tv/story/237698/technology/more-bugs-reported-in-iphone-4s


4. (Analysis) Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Many people thought that the Internet and computer systems were going to crash on January 1, 2000. People were told to stock up on food and water and that caused a panic. To tell the truth nothing really happened on the major scale, but some minor problems did occur. “For example, some credit cards with expiration dates in 2000 would not work” (Baase, pg.421). “People writing software in the 1960’s and 1970’s never considered or imagined that their code would still be used in the year 2000. Businesses and governments spent many billions of dollars on the “Y2K problem”, tracking down two-digit dates in their software and making modifications, rushing to finish before January 1, 2000” (Baase, pg.421).



5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Baase makes many great points about the errors of technology. This topic is important when it comes to technology in everyday life especially medicine. Computer programs and machines need to be tested and be working correctly before they are released to the public. There also can be issues when it comes to the Internet and websites. There maybe an error with your online banking or a companies business through the Internet. I think that there should be tougher regulations when it comes to companies producing products for medical treatments. Maybe if these stricter regulations were in place a while ago the deaths involved with the Therac-25 incident would of not had happened.



6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?


Errors, failures, and risks are an important topic to talk about when it comes to technology and safety. There are many new technological inventions that make life easier but they need to be tested to make sure they work okay. For example, my mom had to go to many training classes to learn how to do the new Da Vinci robotic surgeries. The new robotic surgeries are minimally invasive and allow a person to heal quicker. With this there are also many concerns, what happens if something goes wrong and the robot does the wrong thing? The doctor is controlling the robot away from the body and there are many safety features where the robot will just shut off. I have had the experience of seeing this robot at Millard Suburban Hospital and even got to do a pretend surgery myself using the controls it was like playing a video game.
http://www.davincisurgery.com/
http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/davinci.html


References

http://www.apple.com/iphone/specs.html

http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/davinci.html

http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html

http://www.davincisurgery.com/

http://www.gmanews.tv/story/237698/technology/more-bugs-reported-in-iphone-4s

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

Sunday, November 13, 2011

Chapter 6 : Part 2

Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.4,6.5

1. (Knowledge)Tell three interesting elements of this chapter:

a. “Embezzlement is “fraudulent appropriation of property by a person whom it has been entrusted””(Baase, pg.332).
b. “Supervisors and managers have always monitored their employees. The degree of detail and frequency of the monitoring has varied depending on the kind of work, economic factors, and available technology. Computers have made new kinds of monitoring possible and old methods more efficient” (Baase, pg.335).
c. “The National Labor Relations Board (NLRB) sets rules and decides cases about worker-employer relations. It has been a focus of controversy between unions and employers since its creation more than 60 years ago” (Baase, pg.342).

2.(Comprehension) Summarize what is being discussed within this chapter?

Many companies are allowing their customers to telecommute to work. Telecommuting means that the employee is able to work from anywhere but the office to get the work done. With this increase in telecommuting there is also an increase in work crime and employee monitoring. Even if the employee does not telecommute there is still a possibility the company is watching what the employee is doing on the Internet. There are many ways for an employee to commit a work crime an example would be embezzlement.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

If the job that the employee is doing involves the computer the company is most likely keeping track of what the employee is doing on that computer. I know that at my work when I first started one of the papers I had to sign was a computer policy. This policy stated that if I were to use a computer it would only be used for work related material and I could possible be tracked on what I was doing. Companies can also check emails, web history, and even voice mail. This is a very good article explaining more about companies tracking employees. http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI


4.(Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.


While employee crime has happen a while now, the way it has been done has greatly changed over the years with the changes in technology. Technology has helped employee crime become easier and anonymous. “With the use of computers, trusted employees have stolen hundreds of thousands – in some cases million – of dollars from their employers. Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.332). Without technology, employees stealing from their employers would take great skill and secrecies.

5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

With advancements in technology, companies will find new ways to watch employees and what they are doing on company time. Companies will also have to find many new ways to help protect their company from crime committed by employees.

6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Many employees need to know that the company they work for will be tracking what they do on company time. This important to know because if the employee does something wrong the company may fire them. As I stated in the answer to question 3, when I started my new job I had to sign a computer policy letting me know that the company will be tracking what I do on the computer. Employee Crime is also relevant to today’s society because there are many ways crime to happen. “Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.333). “Careful screening and background checks on prospective employees can be helpful, although some laws make various kinds of screening more difficult (or completely illegal)” (Baase, pg.334).


References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI

Saturday, November 5, 2011

Chapter 6: Work

Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.1,6.2,6.3

1. (Knowledge)Tell three interesting elements of this chapter:

a. “Telecommuting has become part of our vocabulary, describing the phenomenon of working at a distance from the traditional company office or factory, connected by computers and telecommunications device” (Baase pg.308).

b. “The Organisation of Economic Co-operation and Development (OECD), an international organization whose members include most of Western Europe, North America, Japan, Australia, and New Zealand, studied employment trends in 25 countries from 1950 to 1994” (Baase pg.313).

c. “Telecommunicating is very common now, so it might be surprising that local governments and labor unions attempted to stop it in the 1980s and that the Occupational Health and Safety Administration (OSHA) tried to regulate it” (Baase pg. 330).

2. (Comprehension) Summarize what is being discussed within this chapter?

With the creation of new technology there comes a change in jobs. The new technology will take away jobs but it will also create new jobs. “The goals of technology include a reduction in the resources needed to accomplish a result and an increase in productivity and standard of living” (Baase, pg.310). “The new jobs created by computers are different from the jobs eliminated”(Baase, pg.315). Many employees that were replace by technology would have to go and get extensive training to be hired to fill one of the new jobs that were created by the new technology because it was different than what the employee was used to doing. The unemployment rate also decreased because many companies began offshoring. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). “Forrester Research estimates that 3.3 million white-collar jobs will have left the U.S. for other countries between 2000 and 2015” (Baase, pg 321). “The internet makes it possible for companies to locate in small towns and work with dispersed consultants instead of having hundreds or thousands of employees in larger population centers” (Baase, pg.327).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Many jobs are being offshored, which is creating fewer jobs in the United States. “India has been the most popular country for offshoring work from the U.S., but companies are moving work to Canada, China, Brazil, and other places”(Baase, pg.319). Offshoring can have positives and negatives. One positive of offshoring is that it is cheaper for companies to create their product and to pay the employees. “Consumers have many complaints about customer-service call centers in foreign countries: Foreign accents are difficult to understand. Service personnel are not familiar with the product or service the consumer is asking about – they just read from a manual. The workers experience problems too” (Baase, pg.321). While offshoring may seem like a greater financial option for many companies they also need to think about the customer needs and the needs of the company.

http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Without the advancements of technology through the years what would the current times look like? Would we have cars? Would we still be using typewriters? Would anyone be able to work from home? Would job be offshored to foreign countries? The answer would most likely be no to all of these questions. With the advancement of technology has allowed for many great inventions that make our lives easier. A new technology advancement that has allowed company employees to work from anywhere is telecommunication. “Telecommuting, and telecommunications generally, make it easier to work with clients, customers, and employees in other countries: At home, one can more easily work a few hours at night that are compatible with foreign time zones” (Baase, pg.328).


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

There is a never-ending cycle between technology advancements and jobs. The new technology is created, jobs are lost, and new jobs are created. This happens all the time when new technology is created. The only way that this cycle will end is if new technology advancements are not made or the technology advancements include the jobs that exist and the new one that are about to be created. I also think that jobs will continue to be offshored to other countries rather than stay in the country that the company is in.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Chapter 6: Jobs is relevant in today’s society. For many young adults graduating from high school the major question is: Is it worth going to college? They may think this because many jobs are being lost and sent overseas. Is it worth going into debt, which you may never be able to pay back, just to get a higher education? Will this higher education guarantee me a job? The answer may be no and it may be yes, it depends on the person. This chapter has helped me to understand what is happening between technology and jobs. “Telework reduces overhead for employers and, in some, cases, increases productivity” (Baase pg.328).
Chapter 6 has helped me to learn the benefits and problems of telecommunication and working from somewhere other than the office.




References


Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.wsbtv.com/news/news/local/home-depot-sending-jobs-offshore/nFNcC/

Sunday, October 23, 2011

Chapter 5: Crime

Name Kayley Cartwright Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 5.1,5.2,5.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. In the early days of computing, a hacker was a creative programmer who wrote very elegant or clever programs. A “good hack” was an especially clever piece of code (Baase p.254).
b. Beginning roughly in the mid-1990s, the intricate interconnectedness of the Web and the increased use of the Internet for e-mail and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging – and more attractive to criminal gangs (Baase p.257).
c. In several major thefts of data from retailers, the databases included unencrypted credit-card numbers, and other security numbers read from the magnetic strips on the cards (Baase p.278).

2. (Comprehension) Summarize what is being discussed within this chapter?

With the increase of the technology and the use of the Internet there is also an increased risk of crime. The Internet allow us to make purchases, connect with people from all over the world, and do many other interesting things. When we make purchases on the Internet we share our personal information and credit card information. The same when we connect with family and friends we share personal information and personal photos. With this information out there it is easier for hackers and criminals to access it and assume our identity. Many sites have created and added many new features to alert customers when the site believes that fraud and identity theft might have occurred.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

“When a thief steals a credit-card number, we can get a new account with a new number, but if a hacker gets a copy of the file with our digitalized thumbprint or retina scan, we cannot get a new one. Identity theft might become easier to prevent, but much worse for a victim when it occurs” (Baase p.282). The latest technology that has become convenient and easy to use is cloud computing. Cloud computing allows its users to share their information, data, music and photos to many devices that are hooked up to the clouds and have access to Wi-Fi. Although it becomes easier to share our information from many computers, phones, and tablets there is also an increase in the worry of data theft. This article provides more information about cloud computing and theft risks: http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

“Financial institutions have added procedures to authenticate customers, making it more difficult for a thief armed with a stolen account number and other commonly used identifying information to withdraw money from an account. Some financial institutions store an identification number for the customer’s home computer or laptop and then verify the machine used when the customer logs on (Baase p.279).” These precautions are very important when it comes to online banking and paying bills on the Internet with a credit card. Although many people think that only using their password will keep them safe on the Internet that is not true especially if the password is very simple. Many people connect identity theft with the Internet but the same theft of a bank account can happen with an online account or by retrieving the account number from a check or paystub. Many precautions need to be made whether we use the Internet or paper accounts.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

“If you send a change-of-address notification to your credit-card company, the company will probably send a conformation to both your old and new addresses. Thieves who plan to use a stolen credit-card number for a long time do not want the owner of the card to see fraudulent charges on the bill and close the account (Baase p.279).” Thieves are creative when it comes to carrying out their plan of attack. Many companies know this and have created many new precautions and ways to alert customers of many possible fraudulent charges. Crime occurs in many offenses on the Internet the main crimes that come to mind are identity theft and fraudulent charges.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Crime on the Internet is a relevant topic in today’s society. Technology is always changing and evolving whether it be sharing information on a cloud of using a new social networking site there are many risks that users need to be aware of. After reading chapter 5 I will be making sure that all may accounts and their information remain safe and secure.

References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html

Sunday, October 16, 2011

Chapter 4: Steal this Film II

Your Name Kayley Cartwright Class time: MWF 12pm

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay


1. What questions/thoughts/reactions do you have after watching this film? (QUESTIONING):

o Why have international copyright laws been created yet?
o How was Pirate Bay able to get their site back up in working order after the raid and not get into any further trouble?
o When did the Pirate Bay raid take place?

2. Foundation (UNDERSTANDING):

a. What is the Pirate Bay?
Pirate Bay is a website based in Sweden that allowed users to download movies without paying for them. Pirate Bay is a site that allows users to share files.
b. What do they stand for (what is their mission)?
Pirate Bay stands for the freedom of speech.
c. What is their purpose for making and distributing this film as a free download?
Making and distribution this film as a free download because they want people to learn about file sharing and what people can benefit from file sharing. They want to show that that file sharing in no illegal and the company has the right the keep the site running.

3. Provide 3 referenced connections to Baase readings (LINKING).

a. “ The Napster and Grokster decisions made it clear that businesses that encourage copyright infringement and provide tools to do so as a fundamental part of that’s business model cannot operate legally.” (p.212)
b. “ The first major legal cases based on the DMCA involved the Content Scrambling System (CSS), a protection scheme for movies. DeCSS could, of course, be used to create numerous unauthorized copies, and that might well be its main use.” (p.218)
c. “Creative works such as books, articles, plays, songs (both music and lyrics), works of art, movies, and software are protected by copyright, a legal concept that defines rights to intellectual property.” (p.198)

4. There are at least 10 people interviewed in this film. Name 5 of these people, explain why they are included in the film (why they are significant). How do they relate/add information to the overall theme of the film (KNOWLEDGE):

a. Lawrence Liang is a legal researcher and lawyer based in Bangalore. He is against the politics of Intellectual Property.
b. Yochai Benkler is a professor of law and author. Benkler is the Berkman Professor of Entrepreneurial Legal Studies at Harvard Law School.
c. Bram Cohen is a computer programmer and an author BitTorrent Protocol.
d. Fred von Lohmann is an American lawyer and specializes in Intellectual Property.
e. Rick Prelinger is an Internet archivist and founder of Prelinger Archivies.

5. Name, and define, 3 significant people interviewed in the movie (KNOWLEDGE):

a) Fredrik Neij is the co-founder of Pirate Bay.
b) Gottfried Svartholm is a Swedish computer specialist and co-founder of Pirate Bay.
c) Peter Sunde is an IT expert and co-founder and spokesperson of Pirate Bay.

6. What are the main ideas being discussed within this movie? By referencing the book, make 2 connections between Baase and this film (COMPREHENSION).

One of the main ideas being talked about in the film is that Pirate Bay is being accused of breaking the United States copyright laws. The copyright laws do not apply to the company that is based in Sweden. The MPAA tried suing Pirate Bay for the company file sharing and breaking copyright laws. “Digital technology and the Internet empowered us all to be publishers, thus to become copyright owners (for our blogs and photos, for example), and they empowered us all to copy, and thus to infringe copyrights (Baase p.202).”

7. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (COMPREHENSION)

BitTorrent is a file sharing protocol used to distribute large amounts of data. BitTorrent is responsible for most of the Internet traffic and large data file sharing. For the police to stop file sharing they cannot just stop one computer, the police would have to find and shut down all of the computers that is part of the file sharing process.

8. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, or within society – BE SPECIFIC AND REFERENCE THE BOOK (APPLICATION)?

When I was younger Napster was a major controversy. The website allowed for the file sharing of music and it was free. Napster allowed people to get their favorite music for nothing, which was better than running to the store and having to buy a whole CD for $15.00. When Napster first came out I didn’t understand the concept of file sharing and copyright laws. After watching “Steal This Film”, I was able to understand piracy, file sharing, and copyright laws. “Users and observers of digital media and of the Internet debate whether copyright can surivive the enormously increased ease of copying and the habits and expectations that developed about sharing information and entertainment online (Baase p.203).”


9. Analyze what you’ve watched. Use your Baase connections. What do you think is the future of distribution, production and creativity? What do you think is the future of Intellectually Property in the Information Age? ? (ANALYSIS)

Future distribution, production and creativity will come with stronger copyright laws and security to prevent infringement. I think that the distribution of movies and music will become more digital and Internet based. Intellectually Property in the Information Age will become more of an issue and will see many changes.

10. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? Back up with Baase (ANALYSIS)?

I think that downloading is stealing someone’s Intellectual Property. Although it is available to download on the Internet the site that is allowing you to download does not own the rights to the song, movie or software someone else does. Infringement of copyright is illegal and a person caught may have to pay the company money or if severe case many get jail time. “The entertainment industry has filed hundreds of lawsuits against individuals whom it accuses of sharing music. Letters to college students threaten fines of thousands of dollars (Baase p.214).”

11. How do you see issues of copyright and Intellectual property effecting the world 50 years from today? BE SPECIFIC (SYNTHESIS)

50 years from today there will still be issues with Intellectual Property and copyright laws. File sharing on the Internet and piracy will become larger and more severe than it is today and will be harder to stop. Although the governments try to stop file sharing, piracy, and copyright infringement by creating more laws with harder punishments people will still participate in these illegal acts.

12. Do you agree with what is being said within movie? Explain. (EVALUATION)

From the companies stand point I do agree with what they are saying. Pirate Bay is a Sweden based company and should not be in trouble with the United States because of breaking their copyright laws. I also agree with MPAA on the basis that Pirate Bay should not allow people to file share movies for free instead of the people going out and seeing the movie in a theater or buying a copy of the film. At some point all of the world governments need to come together to try and create an international copyright law which would make the file sharing that happens on Pirate Bay illegal.

13. Has your opinion shifted on this topic after watching this film? Have you created any new ideas after watching, and thinking about, this film? (EVALUATION)

While I see many of the great point that Pirate Bay makes, my opinion on file sharing and copyright infringement does not change. I always thought of downloading music from the Internet was an illegal thing. After the Napster ordeal my generation was taught about the reciprocations of file sharing. I prefer to use iTunes and pay for my music or rent movies through Netflix or Blockbuster.

Chapter 4: Musicians Look For Pay In An MP3 World

How are the ideas expressed in the Sydel segment it different from the Chuck D and Lars Ulrich video?

If people keep downloading music for free than the quality of the music will go down because no one will be able to make a living as a professional musician. The United States has copyright laws it just have become difficult for the record companies to enforce them.

What point does Sydel make that is the same or different than the Chuck D and Lars Ulrich video?

Artist Jonathan Coulton writes songs about his life as a computer programmer. Coulton allows people to download his music for free on the Internet but people have been willing paying for the songs. Coulton says that he makes more money now than he did as a computer programmer and that he has more creative freedom now than he would if he signed with a record company.

http://www.npr.org/templates/story/story.php?storyId=112065448

Chapter 4:Chuck D and Lars Ulrich

In 1-2 sentences, explain Eric Schmidt's point of view on Intellectual Property.

Eric Schmidt, CEO of Google, believes that the company needs to find a legal and business mechanisms that allow people to be properly compensate for the Intellectual Property and still want to use the site. Schmidt states the many people would be willing to pay for a service that would allow them to be entertained anywhere.

What is Chuck D's slant on Intellectual property?

Chuck D says that there is an exception to the rule. That the power is going back to the people after the music company’s have owned the Intellectual Property for the last 15-16 years. He thinks that the Internet is the only was some artists would be able to share their music.

Explain the reason why might Lars Ulrich express the opinion he has. Base your answer on facts from this chapter.

Lars Ulrich has taken the view he has on Napster not because of the loss of money but on the basic fact that it is illegal. Napster is violating the copyright laws of the artist’s music that is being shared to thousands of people without them spending a penny on the music. Ulrich thinks that Napster should of asked the artists first if they would like their music to be shared on their site and the artists should have the option to opt of if they would like. “The entertainment industry pushed hard for laws and industry agreements to require that makers of PCs and digital recorders and players build copy-protection mechanisms into their products.” (p. 215)

Chapter 4: INTELLECTUAL PROPERTY (Part 1)

Name Kayley Cartwright Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 4.1,4.2,4.3,4.3.1,4.3.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. “A trademark is a symbol that identifies a product and/or the company that produces it. Companies may register trademarks with the government in order to protect ownership and control use of their trademarks.” (p.198)
b. “The first U.S. copyright law, passed in 1790, covered books, maps, and charts and protected them for 14 years. Congress later extended the law to cover new technologies: photography, sound recording, and movies.” (p.203)
c. “Through both lawsuits and lobbying, the intellectual-property industries have delayed, restricted, or prevented services, devices, technologies, and software that make copying easy and that people are likely to use widely in ways that infringe copyrights, although they may also have legal uses.” (p.214)

2. (Comprehension) Summarize what is being discussed within this chapter?

Although you may not be aware but copyright laws are a part of almost everything we do. Many of the products available on the Internet are covered under strict copyright laws. “Unauthorized copying and sharing of music, and now video, continue at a huge rate on the Web. Music sales have steadily dropped since about 2000. Undoubtedly, entertainment companies are losing income and potential income they could earn from their intellectual; property.” (p.212) While people think that is it okay to illegally share music files on the Internet, but really it is hurting the music companies and the artists who created the music.



3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

There are many new technologies in the world that allow us to do many things we weren’t able to do in the past. One of these things was to be able to watch television on our mobile phones. Almost everyone today owns a cell phone compared to fifteen years ago when cell phones were not as popular or had the ability to do the things they can do today. A company named OPTUS wants to record football games and broadcast the recording to cell phone users that would want to view the games. The American Football League (AFL) and the National Rugby League (NRL) are trying to stop OPTUS for recording the games because it interferes with the Copyright Act.
http://www.smh.com.au/business/optus-tests-copyright-law-over-mobile-recording-of-sport-20111013-1ln5p.html

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

“The entertainment industry pushed hard for laws and industry agreements to require that makers of PCs and digital recorders and players build copy-protection mechanisms into their products.” (p. 215) File sharing and the ability to download music for free greatly affects the music industry. Even though music can be bought for a cheap price people still want to get their favorite songs for free. Even is a person purchases a CD in the store they can still make copies of the CD to give to their friends. This allows for multiple people to have the CD while it was only purchased once. The same scenario can happen if the CD was bought digitally through an online store of iTunes. “As an alternative to banning media and devices that increase the likelihood of copyright infringement, several governments, including most in the European Union, tax digital media and equipment to pay copyright holders for losses expected from unauthorized copying.” (p.215)

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
Baase makes many good points throughout the first few sections of chapter four. “ The buyer of a software package is buying only a copy of it or a license to use the software. When we buy a movie on digital video disc (DVD), we are buying one copy with the right to watch it but not to play it in a public venue or charge a fee.” (p.199) Although we are able to buy a copy of a movie and be able to watch it, we do not own the rights to the movies just buy paying for the DVD. The company it letting us buy a copy of the movie to be able to view whenever we want but the company still owns the rights. Copyrights are able to allow the company to do this. “Movie and music companies pursue enforcement actions against pirate sites.” (p.213)


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?


The issue of intellectual property and copyrights are extremely relevant in today’s society. Many people are breaking company’s copyright laws when it comes to file sharing and making copies of music. The same issue comes up with pirating movies and software programs. Many people do not know the legal trouble they can get into for participating in one of these activities. While people still continue to file share many companies are trying to come up with new ideas and ways to make it harder for people to easily share their digital product.



References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.smh.com.au/business/optus-tests-copyright-law-over-mobile-recording-of-sport-20111013-1ln5p.html

Friday, October 7, 2011

Chapter 3: Questions from Dr. RSM

--In your own words define the phrase ‘least restrictive means’. Why or why not? 2-4 referenced sentences.
Least restrictive means is used within the courts to decide if the laws that the government puts into place that may interfere with our personal liberties. Least restrictive means is mostly used when it come to the First Amendment.

--Why is this term important? How does it effect Freedom of Speech. Why or why not? 2-4 referenced sentences.
Laws and regulations could easily take Freedom of Speech away. With least restrictive means the laws that the government can make are limited when it comes to the First Amendment. “The First Amendment covers spoken and written words, pictures, art and other forms of expression of ideas and opinions” (p.148). This amendment was created for offensive and controversial speech and ideas (p.147).
--Do you consider the Internet an appropriate tool for young children? Why or why not? 2-4 referenced sentences.

The Internet could be an appropriate tool for young children if the children use it properly. The Internet has many useful tools for the children to learn and be creative. When the Internet is misused it could cause the young children to see and view inappropriate age material. The Internet could not only be inappropriate for young children but also teens when it comes to social networking and cyberbullying. There are many things that parents can do to make precautions when it comes to their children using the Internet. Parents have a responsibility to supervise their children and to teach them how to deal with inappropriate material and threats (p.160). Parents can set up accounts for their children without e-mail or set up a specified list of addresses from which e-mail will be accepted (p.160).

Chapter 3: Questions from Baase p 189

3.1 Briefly explain the differences between common carriers, broadcasters, and publishers with respect to freedom of speech and control of content.

Common carriers provide a medium of communication (not content) and must make their service available to everyone. The law prohibits them from controlling the content of material that passes through their system(p.146). Print publishers and broadcasters are legally liable for content they publish or broadcast (p.147). They can be sued for libel and copyright infringement (p.147).

3.2 Describe two methods parents can use to restrict access by their children to inappropriate material on the Web.

Parents can set up accounts for their children without e-mail or set up a specified list of addresses from which e-mail will be accepted (p.160). The video game industry developed a rating system that provides an indication for parents about the amount of sex, profanity, and violence in a game (p.160). Parents have a responsibility to supervise their children and to teach them how to deal with inappropriate material and threats (p.160).

3.8 One of the arguments used to justify increased government control of television content is that television is “invasive.” It comes into the home and is more difficult to keep from children. Do you think this argument is strong enough to outweigh the First Amendment? Give reasons. Is this argument more valid for the Internet than for television, or less valid for the Internet than for television? Give reasons.

I do not think that this argument is strong enough to outweigh the First Amendment. Although many television shows may not be appropriate for children, rating have been created for each television show and displayed before the show starts. Even though many people do not pay attention to these ratings they are there for a reason. Besides the ratings many cable companies have parental controls. Parental controls allows the parents to go and block what television shows they do not deem appropriate for their children. This argument is less valid for the Internet than for television. This argument is meant for there to be more control over what we watch on television. This argument can also be used toward what we are able to watch on the Internet. Many television channels put episodes that aired on the television also on their websites, which allows children to go on the internet and watch the shows even if they are blocked on their television.

Chapter 3: Freedom of Speech

Name Kayley Cartwright Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 3.1-3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. “The Federal Election Commission (FEC), established in 1975, administers election laws”(p.177)
b. “Two antiracism organizations sued Yahoo in a French court in 1999 because French people could view Nazi memorabilia offered for sale on Yahoo’s U.S.-based auction sites.”(p.170)
c. “In 1996 about half of the e-mail received at AOL was spam, and a lot of it came form an e-mail advertising service called Cyber Promotions.” (p.161)

2. (Comprehension) Summarize what is being discussed within this chapter?

“The First Amendment covers spoken and written words, pictures, art and other forms of expression of ideas and opinions” (p.148). This amendment was created for offensive and controversial speech and ideas (p.147). Although we have freedom of speech how free is it? That is the question that Baase is taking a closer look into and what prevents our speech and publications from being edited and censored. Censorship plays a role in not allowing our speech to be completely free. Many government over the world limit what the their citizens can see and read. The governments also censor what their citizens see on the internet and what websites they may view. Freedom of speech not only affect what we say and print, the amendment also applies to the Internet. Many government laws and organizations were created to help make the Internet what it has become today.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Many governments have taken steps to cut, or seriously reduce, the flow of information and opinion on the Net (p.172). In China and Saudi Arabia, where the national government owns the Internet backbone (the communication lines in computers through which people access information), the governments install their own computers between the Net and the people with sophisticated firewalls and filters to block what they don’t want their people to see (p.172). Censorship in China is a current issue within the news.
http://www.penn-olson.com/2011/09/20/secdev-group-issues-report-on-us-tech-companies-ethical-issues-in-china/

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Children with access to the Internet on the family’s computer allows for the child to participate in many activities that are not appropriate for them. With younger children and teens having Facebook accounts opens the door for bullying to continue from school to home. Bullying and Cyberbullying has been within the news a lot lately. Many young children and teens have taken their lives because of cyber-bullying on Facebook and MySpace. http://abcnews.go.com/Technology/We_Find_Them/cyberbullying-/story?id=14675883


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Baase made many good points about freedom of speech and the Internet. When the governments are censoring material on the Internet taking away our freedom of speech? The First Amendment covers spoken and written words, pictures, art and other forms of expression of ideas and opinions” (p.148). Through out the coming years we can expect many changes to come about pertaining to what people can post on the Internet. While postings on the Internet maybe controversial and some times not the same the same have the same view as the viewer, the same posting can be made in a newspaper and magazine. It’s our freedom of speech. As long as it doesn’t make any threats to our country, other countries in the world, or people it should be okay to post or print.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Freedom of speech is extremely relevant in today’s society. As I posted above in question number four, bullying and cyberbullying has become a major issue in many children and teens lives. Many governments censor what their citizens see and what websites they can view.



References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.penn-olson.com/2011/09/20/secdev-group-issues-report-on-us-tech-companies-ethical-issues-in-china/

http://abcnews.go.com/Technology/We_Find_Them/cyberbullying-/story?id=14675883

Sunday, September 25, 2011

"A Gift of Fire" Chapter 2: Privacy

Name Kayley Cartwright Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: “ A Gift of Fire”
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2, 2.53-2.5.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. In the United Kingdom, to enforce the 9pm curfew for young people the government uses a public camera system (p.73).
b. “Encryption is a technology. often implemented in software, that transformed data into a form that is meaningless to anyone who might intercept or view it” (p.101).
c. “ The National Security Agency(NSA) collects and analyzes foreign intelligence information related to national security. It also protects U.S. Government communications and information related to U.S. national security from others”(p.123).

2. (Comprehension) Summarize what is being discussed within this chapter?

With the creation of new technology comes with the possibility of it affecting our privacy. Our information can be shared anywhere on the Internet, in order for the information to be protected the government has stepped in and created many acts and laws. Although the government has created laws to help protect our privacy, they have also created many things that may violate our privacy. For example, phone tapping.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Health Insurance Portability and Accountability Act (HIPAA) was created to help keep patient’s information private. The regulations cover health records and health payment records private and personal (p.113). With HIPAA health care providers must not provide more than the minimal amount information needed (p.113). Many of the rules allowed law enforcement agencies and various other government agencies access to patient medical records without patient consent or a court order (p.113).
http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Baase uses Facebook as an example when it comes to sharing information and privacy (p.55). Before Facebook introduced “news feeds” and “mini-feeds” in 2006 people may not check up on their friends and what they are doing. Although Facebook stated that the new updates did not interfere with the users privacy, the users felt like there privacy was violated (p.55). The new feeds spread the information to everyone instantly, and in the real world information is not spread to everyone and at such a fast pace. With all the users complaints, Facebook added detailed privacy controls for the new feeds that the users could control what information they wanted shared and what they didn’t want to share (p.55).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Many of the statements that Baase made were in fact very true. The government has many ways that it can control what we share and what we don’t. There are many laws and acts in place to help stop the spread of our personal information without our permission. Within these acts and laws there are still ways for the government to tap our phone lines and track our e-mails. I believe that our information can be private and secure as long as we keep an eye on where we are sharing it and what is being done with the information.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Privacy is relevant in today’s society. There are many cases of identify theft and stealing of credit card information. Through the Internet our information can be used to make purchases and social networking. Although the government has many ways to protect our privacy now, I think that there will be more controls time goes on and years pass. Privacy will always be an issue when it comes to new technology and the progression of the Internet.




References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

Tuesday, September 20, 2011

Reading and Thoughts "A Gift of Fire" Chapter 1

Name Kayley Cartwright                                                                                                                          Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: January 2008
Book: “A Gift of Fire”
Sections read: 1.1 p.2-3, 1.2 p.4-5, 1.3 p. 21-27,  and 1.4 p.28-34

1.     (Knowledge) Tell three interesting elements of this chapter:
a.      One interesting statement that Baase made was that “Bloggers demonstrate influence by digging up information before mainstream media. They detect and report errors, bias and digitally falsified news photos.” This can be found in section 1.1 p.6.
b.      Another interesting topic that Baase talked about was the pros and cons of Automated Teller Machines (ATM) and the decline of going into the bank and having physical contact with a bank teller.  The discussion of the pros and cons can be found in section 1.3.
c.      Baase also states “ethics is the study of what it means to “do the right thing.””  This quote can be found in section 1.4 p.28.

2.     (Comprehension) Summarize what is being discussed within this chapter?

The first chapter of “A Gift of Fire” talks about the development of technology over the years and what is going to happen to technology. Beside just the advancements in technology, Baase talks about ethics and how ethics are about doing the right thing. Baase talks about what she feels is going to happen to technology in the future and the many advancements that will happen.

3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

Baase uses ATMs and online banking as an example of advancement in technology. We use ATMs and online banking because it is more convenient (p.21).  With ATMs and online banking we are able to check our balance and make a withdrawal at anytime of the day (p.21). Although the convenience of ATMs and online banking there are many disadvantages such as the increase unemployment of bank tellers, increase of crime, and increase of error. Anyone is able to take a stolen credit card or ATM card and try to withdrawal money from that account. If you went to a teller they might be able to tell that the person withdrawing money was not you and stop theft (p.22). 

4.     (Analysis) Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

The textbook is called “A Gift of Fire”, and the author Baase talks about Prometheus who brought us the gift of fire (p.2).  Fire is helpful but can also be destructive. We have gradually learned how to use fire productively, safely, and respond effectively to disasters (p.2). Computer technology is sort of the same as fire (p.2).  With the new technology that is coming out there is bound to be many difficulties and disadvantages that come with it. We need to learn how to adapt to the change and to deal with the bad thing that may happen as the technology grows.

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
        
          I agree with many of the statements that Baase has made. With changes in technology come pros and cons that include unemployment, crime and loss of privacy (p.22).  Also ethics are about doing the right thing and apply not only to computers and technology but companies and everyday life (p.28.)

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
               
                  Ethics is a topic in chapter one that does not only apply to computers and technology but to businesses and everyday life. No matter what company you work for they end up putting the employee through ethics training. Even though companies go out of their way to teach their employees about ethics when they may not be doing ethical things when it comes to the business. They may not be doing the right thing with people’s money or the payment of employees but they still expect the employees to make ethical decisions (p.34). For example: A bank employee may have access to the customer’s accounts and personal information. If a person comes in asking the bank employee about another customer and their information the bank employee needs to make an ethical decision about giving the information. Most of the time the bank employee will keep that information private and only available to the customer that the information belongs to.



References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.