Sunday, September 25, 2011

"A Gift of Fire" Chapter 2: Privacy

Name Kayley Cartwright Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: “ A Gift of Fire”
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2, 2.53-2.5.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. In the United Kingdom, to enforce the 9pm curfew for young people the government uses a public camera system (p.73).
b. “Encryption is a technology. often implemented in software, that transformed data into a form that is meaningless to anyone who might intercept or view it” (p.101).
c. “ The National Security Agency(NSA) collects and analyzes foreign intelligence information related to national security. It also protects U.S. Government communications and information related to U.S. national security from others”(p.123).

2. (Comprehension) Summarize what is being discussed within this chapter?

With the creation of new technology comes with the possibility of it affecting our privacy. Our information can be shared anywhere on the Internet, in order for the information to be protected the government has stepped in and created many acts and laws. Although the government has created laws to help protect our privacy, they have also created many things that may violate our privacy. For example, phone tapping.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Health Insurance Portability and Accountability Act (HIPAA) was created to help keep patient’s information private. The regulations cover health records and health payment records private and personal (p.113). With HIPAA health care providers must not provide more than the minimal amount information needed (p.113). Many of the rules allowed law enforcement agencies and various other government agencies access to patient medical records without patient consent or a court order (p.113).
http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Baase uses Facebook as an example when it comes to sharing information and privacy (p.55). Before Facebook introduced “news feeds” and “mini-feeds” in 2006 people may not check up on their friends and what they are doing. Although Facebook stated that the new updates did not interfere with the users privacy, the users felt like there privacy was violated (p.55). The new feeds spread the information to everyone instantly, and in the real world information is not spread to everyone and at such a fast pace. With all the users complaints, Facebook added detailed privacy controls for the new feeds that the users could control what information they wanted shared and what they didn’t want to share (p.55).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Many of the statements that Baase made were in fact very true. The government has many ways that it can control what we share and what we don’t. There are many laws and acts in place to help stop the spread of our personal information without our permission. Within these acts and laws there are still ways for the government to tap our phone lines and track our e-mails. I believe that our information can be private and secure as long as we keep an eye on where we are sharing it and what is being done with the information.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Privacy is relevant in today’s society. There are many cases of identify theft and stealing of credit card information. Through the Internet our information can be used to make purchases and social networking. Although the government has many ways to protect our privacy now, I think that there will be more controls time goes on and years pass. Privacy will always be an issue when it comes to new technology and the progression of the Internet.




References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html

Tuesday, September 20, 2011

Reading and Thoughts "A Gift of Fire" Chapter 1

Name Kayley Cartwright                                                                                                                          Class time: MWF 12pm
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: January 2008
Book: “A Gift of Fire”
Sections read: 1.1 p.2-3, 1.2 p.4-5, 1.3 p. 21-27,  and 1.4 p.28-34

1.     (Knowledge) Tell three interesting elements of this chapter:
a.      One interesting statement that Baase made was that “Bloggers demonstrate influence by digging up information before mainstream media. They detect and report errors, bias and digitally falsified news photos.” This can be found in section 1.1 p.6.
b.      Another interesting topic that Baase talked about was the pros and cons of Automated Teller Machines (ATM) and the decline of going into the bank and having physical contact with a bank teller.  The discussion of the pros and cons can be found in section 1.3.
c.      Baase also states “ethics is the study of what it means to “do the right thing.””  This quote can be found in section 1.4 p.28.

2.     (Comprehension) Summarize what is being discussed within this chapter?

The first chapter of “A Gift of Fire” talks about the development of technology over the years and what is going to happen to technology. Beside just the advancements in technology, Baase talks about ethics and how ethics are about doing the right thing. Baase talks about what she feels is going to happen to technology in the future and the many advancements that will happen.

3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

Baase uses ATMs and online banking as an example of advancement in technology. We use ATMs and online banking because it is more convenient (p.21).  With ATMs and online banking we are able to check our balance and make a withdrawal at anytime of the day (p.21). Although the convenience of ATMs and online banking there are many disadvantages such as the increase unemployment of bank tellers, increase of crime, and increase of error. Anyone is able to take a stolen credit card or ATM card and try to withdrawal money from that account. If you went to a teller they might be able to tell that the person withdrawing money was not you and stop theft (p.22). 

4.     (Analysis) Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

The textbook is called “A Gift of Fire”, and the author Baase talks about Prometheus who brought us the gift of fire (p.2).  Fire is helpful but can also be destructive. We have gradually learned how to use fire productively, safely, and respond effectively to disasters (p.2). Computer technology is sort of the same as fire (p.2).  With the new technology that is coming out there is bound to be many difficulties and disadvantages that come with it. We need to learn how to adapt to the change and to deal with the bad thing that may happen as the technology grows.

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
        
          I agree with many of the statements that Baase has made. With changes in technology come pros and cons that include unemployment, crime and loss of privacy (p.22).  Also ethics are about doing the right thing and apply not only to computers and technology but companies and everyday life (p.28.)

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
               
                  Ethics is a topic in chapter one that does not only apply to computers and technology but to businesses and everyday life. No matter what company you work for they end up putting the employee through ethics training. Even though companies go out of their way to teach their employees about ethics when they may not be doing ethical things when it comes to the business. They may not be doing the right thing with people’s money or the payment of employees but they still expect the employees to make ethical decisions (p.34). For example: A bank employee may have access to the customer’s accounts and personal information. If a person comes in asking the bank employee about another customer and their information the bank employee needs to make an ethical decision about giving the information. Most of the time the bank employee will keep that information private and only available to the customer that the information belongs to.



References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.