Wednesday, April 25, 2012

Chapter 6: Work, Guest speaker Ken Fick, CPA, MBA.

1) Mr. Fick, telecommuting seems to be a large topic that has many different opinions. When did telecommuting every Friday become part of your everyday week?

2) Many people do not like the fact that you can not see your boss or employees because you are telecommuting from a house, or other department. What are some advantages that you have seen since you have started telecommuting?

Sunday, April 15, 2012

Chapter 5: Crime HACTIVISM

1. (Knowledge)Tell three interesting elements of this chapter:

 a. Hactivism has changed over the years, but one thing that has stayed constant is that a person “hacks” into a computer or database and steals unlawful information.

b. Since the growth of web hackers people are increasingly losing their amount of privacy. Web hackers can steal credit card numbers, social security numbers and other important personal information.

c. Hacking has become more popular due to things like script kiddie’s and groups like anonymous. Script kiddie’s make it possible for hackers to steal tools off the net and use them against other people.

2. (Comprehension) Summarize what is being discussed within this chapter?

Hacking has been around for many centuries. Hacking has three phases; phase one was the early years of technology, the 60’s an 70’s. This was when hacking was used as a positive term that was someone who was creative and created many of the first computer games and operating systems. Hackers of this time …”were not authorized users, the early hackers mostly sought knowledge and intellectual challenges”(Baase p. 254). In the late 1970’s to 1990’s the name hacking began to have a negative meaning. As computers and technology increasingly became popular, so did hacking and stealing information. From this time on hacking has been known as something detrimental to society. Hackers of these times steal an abundance of information and can sell or bribe a company with the stolen information. The ‘Anonymous’ group has had many attempts to take down the Internet. The problem with the Anonymous group is that no one can be completely sure if they are posing a threat of people are pretending to be these cyber hackers. In an article by Tom Gjelten, titled ‘Anonymous’ Hacking Group Threatens the Internet. Tom wrote, “The contradictions highlighted the difficulty of assessing whether a hacking threat should be attributed to Anonymous or to hackers merely posing as Anonymous”(¶ 7). These contradictions can be harmful to the Internet because no one can know for sure if these threats are real or not. The problem with the Internet is the amount of crime that can erupt from different websites and information. Hackers tend to put worms in these websites that flood your computer and erase and steal important data.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

The reason that hacking is so popular is due to the fact that there is no way of controlling these hackers. Groups like Anonymous have greatly changed the privacy of the Internet. Although the Internet does not have many privacy options, information like SSN and credit card numbers should not be able to be found on the Internet. Not only do SSN and credit card numbers get hacked, but so do large corporate businesses and even databases that the FBI and CIA use. A new solution to the increasing rate of hackers is to find software that could eliminate hackers from entering your computer. A situation that I faced with cyber hacking was when I got my credit card numbers stolen. My information was hacked because I gave an unsecure website my personal information. I then had hundreds of dollars stolen from my account by a man in England. This hacker was never found or punished for the money he stole. Since there are so many hackers they could not properly trace back who specifically stole my money.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

“Hactivism is the use of hacking to promote a political cause”(Baase p. 263). Hackers use the internet to try and change the government and to threaten it. This can compare to the use of propaganda, which became popular during World War II. Propaganda was used to support the government by telling people to join the war or have some sort of support for the country. This is similar to hactivism because hackers try to threaten the government so there duties can change. In the article “Anonymous, LulzSec Respond To FBI Arrests Of Suspected Hackers” by Huffington Post, hactivist claim that they will not change because the government lies to its citizens and takes money to change contracts, but hackers believe that the government can not fulfill these tasks. Hactivist use these arguments to justify their reasoning for government hacking.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

These articles discuss the meaning of hactivist and why these people hack into websites. Reasons people do these is for money, popularity and to show that they have power. I do not agree with the ideas of a hacker or hactivist. Hackers can be extremely dangerous and very intimidating Hactivist are the main people who try to bribe the government and continuously threaten the Internet and our personal space.



6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic, hactivism is extremely relevant in today's society because people are constantly being hurt by these hackers. Hackers everyday steal important information and as of now there is no way to stop them. Hactivism is when hackers steal information from the government which can be extremely detrimental. Baase stated that someone hacked into the US government system and tried to get information to defend the Soviet Union during the war. There should be a harsh punishment for hackers therefore it could eliminate the amount of hackers by punishing them. Many hackers cannot be stopped and since this is such a wide spread issue there should be more ways to protect a person from being hacked.


References
http://www.npr.org/2012/03/30/149712036/anonymous-hacking-group-threatens-the-internet

Tuesday, March 13, 2012

"Midterm: 2 questions about the assignment"

When doing the GMO midterm assignment, are we going to be comparing and contrasting prices of organic and non organic foods?

How many products of food do we have to look at to get the proper information needed to complete the project?

Monday, March 12, 2012

Chapter 3: Part 1: Freedom of Speech


Author: Sarah Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3
1. (Knowledge)Tell three interesting elements of this chapter:

a. Many websites are not as reliable as people believe. There are no qualifications for creating a website, people are free to speak their minds. Not all websites can be resourceful which is why people need to be more aware of the information that is provided on the Web.
b. COPA and CDA are two laws that tried to restrict searches of adult material, but were not passed due to the 1st Amendment, Freedom of Speech.
c. The government is able to regulate print media, broadcast, telephones, and postal service. However it is not easy to regulate the Web, which is why the web is filled with inappropriate websites.

2. (Comprehension) Summarize what is being discussed within this chapter?

Freedom of Speech is the reason why so much adult material is accessible to children. Since technology has become a large part in everyone’s lives there has been more child abductions and increase in pornography. Since some information cannot be blocked by firewalls, adult material cannot be fully monitored. Parents and guardians need to be more aware of the inappropriate websites that become easily attainable for children and people under the age of 18. This website exemplifies the realism of child abductions that occur because of the Internet. http://kidshealth.org/parent/firstaid_safe/outdoor/abductions.html

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
 
A new solution to this problem would be to monitor the child and make sure they are being smart on the Internet. Although parents are able to set up firewalls, there are ways that spam and adult websites can find other ways to keep their websites on the Internet. Filters should be able to block all inappropriate websites that can be accessed in a child’s home, school environment or library.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Freedom of speech is the main reason why the Internet is filled with spam, massive amounts of adult information and racist remarks and pictures. The Internet gains strong 1st Amendment protection since it is mainly based on the freedom of people thoughts and ideas (p. 155 Baase). A situation that occurred in this chapter can be related to the amount of privacy children are given which can lead to abduction or easy access to pedophiles and pornographers. Although parents are able to filter out bad websites, not every parent or guardian knows that this is possible

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Yes I do agree with what is being discussed in these sections although it can be known as unethical. There are not enough protection acts therefore children are increasingly becoming victims of pedophiles and pornographers. The government should find more reasons to ban adult material from the Internet because it is not being fully protected. However pedophiles, spammers, and pornographers will always be in our society we make it easier to become victims by using the Web.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is highly relevant in today’s society because it does not seem like people are aware of their lack of privacy. Since children are using the Internet more than ever there should be a strict law to help reduce the inappropriate websites that are easily available. The main reason there are inappropriate websites is due to the lack of responsibility users have. Most information that a person posts on the Internet is through their name or email and it is stored to a database and sold.

References
http://kidshealth.org/parent/firstaid_safe/outdoor/abductions.html March 10, 2012

Sunday, March 4, 2012

Chapter 2: Part 2

Author: Sarah Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.3, 2.4, 2.5


1. (Knowledge)Tell three interesting elements of this chapter:

               a. In section 2.3 Baase states that there is no law requiring federal agencies to notify
                  someone if their personal data is lost or stolen.

b. In four years government agencies had 788 different cases with lost or stolen identities. People were stealing data and personal information off of government computers. “The Federal Bureau of Prisons, the Drug Enforcement Administration, the FBI, and the U.S Marshals Service lost 400 laptops”(p. 86 Baase).
c. Data brokers and people who sell private information for money or for personal use are acting in an unethical way, which relates to chapter 1, section 4.

2. (Comprehension) Summarize what is being discussed within this chapter?

In this chapter the main topic is privacy. Privacy in the 21st century is looked at completely different than in past years. For example people are constantly putting their private information on the Internet because they think their account is private. What people do not realize is that even with a private account personal information is accessible. Information that is public, such as your hometown, school, or telephone number are pulled and used for data mining. These sections include topics from lack of data privacy to the importance of encryption resources and why they have become increasingly popular. Firms such as ChoicePoint and Acxiom “…sell data to businesses for marketing and ‘consumer management’ (p. 82 Baase). These sections also discuss that your personal searches and social networking sites are constantly being monitored and watched by the government.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

There are many solutions that can help prevent personal information from being sent out on the web. For example, people who do not want any of their personal information available for marketers should not use the computer because personal information has no privacy when on the Internet. People who use the web for any research, purchases, tax forms, credit card bills, social networking, etc. are all in danger. There is no way of stopping data miners from finding personal information because even a home telephone number can be used to find information like where someone lives or how many children they have. Although these solutions seem obvious, some people do not fully understand that there is a lack of privacy when you are putting personal data online.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

You can compare the extreme use of data mining and people hacking personal information with someone who robs a bank. Robbing a bank and someone robbing your identity is a unique comparison because they are both highly unethical. Ethics is an important part of someone’s life and without an ethical background many criminal activities can exist. Even though data mining is not as serious as robbing a bank it can still harm the person that the information was taken from. Data mining along with robbing a bank are unethical because they are putting people someone’s personal life at risk.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Yes, I do agree with what is being discussed in these sections. The sections put an emphasis on how important it is to keep your personal information off the Internet and not available for data brokers. Data brokers obtain information by lying to other companies to get a SSN, address, credit card numbers and other personal information. The important thing to remember when it comes to privacy matters is that the information someone puts on the Internet is no longer just that person’s information. The information can be bought and sold for 3/5th of a penny. Privacy rights can only be protected if you limit yourself to what you search online and what websites a person is browsing.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is extremely relevant in society because many younger people are using the Internet and they are not aware of the lack of privacy that they are given. Since Facebook and other social networking sites are so prominent in the 21st century people around the world should acknowledge the fact that there are data brokers that will steal personal information and sell it for a profit. An ethical evaluation made from this chapter is that since people around you (data brokers and miners) live unethically, a person who uses the internet needs to act ethically and not post inappropriate information to a public website. After reading these sections my knowledge of the widespread lack of privacy has increased. I am now more aware that every Google search or website I look at is being monitored and watched.
Since I’ve read these sections I will be much more careful when entering personal data and information on a public website.

References:
http://www.youtube.com/watch?feature=player_embedded&v=wbBDQgFNoqw February 28, 2012
Baase, Sarah "A Gift of Fire" 2008

Wednesday, February 29, 2012

Chapter 2: Video and reading connections

Name: Mollie Bower Class time: 12

1. Explain data mining:

Data mining is the process of gathering mass amounts of information from different websites that a person has accessed to analyze patterns. Data mining can be used to find background information on a person. This background information can include photos, credit card numbers, and also information that is not true. Joel Stein looked at his data mining and found multiple false accusations about him. Data mining is and invasion of privacy and does not always collect true information.

2. Relate data mining to privacy issues, specifically citing something you read in Baase, Orwell, etc.

Data mining has many privacy issues because it gathers mass amount of information to show patterns and new development of information. Privacy issues have been increasing due to social networks, Google, blogs and other websites that have information on account. Baase states that “A privacy-protecting default, from both an ethical and a legal prospective, could specify that the company may or may not store or use the information, beyond this immediate purpose for the search in a way that could disclose a person searches.” Baase’s statement explains that companies should include that the information you state will be used publicly and they cannot be accountable for public access of the information.

3. Explain Ashley Paynes’s situation:

Ashley Payne was a high school teacher that took a trip to Europe and posted pictures to her Facebook account. Not only did she post pictures to her account, but there were 10 of these 700 photos that showed her drinking alcohol. Also along with her Facebook photos she played a game called “Bitching Bingo”. A parent of the school emailed the principal in late August to discuss how unprofessional Payne’s Facebook was. When Payne was called into the principal’s office she did not know that any students could have access to her Facebook page because it was private to people who weren’t her friends. Payne was shocked that the principal gave her the choice to resign or they would further look into this case. Payne resigned because she did not want to have an investigation. After Payne had resigned she had followed up with investigating herself. Payne now believes that it was not a parent who emailed the principal, it was one of her colleagues that did not like her and wanted to get Payne fired. Payne now has a lawsuit out in the state of Georgia because she was falsely accused of being an unprofessional teacher.

4. Were Ashley Payne’s rights violated? Did the school district have just cause for asking for her resignation? Base your answers off of what you have learned about privacy, show connections to Baase, Orwell, etc and support your opinion.

Yes, Payne’s rights were violated because the school wasn’t even able to research further into her Facebook account and basically gave her an ultimatum to resign or she would be fired. The email came from an unknown email account that did not exist when Payne tried to look into the email. The school district should have asked her to resign; they should have looked at all possible problems. If there were major issues on her Facebook site then they should have asked her to resign. Payne should not have had to worry that her Facebook site would be looked at my parents and students because it was private. Although her profile was private people were obviously allowed to access it. In Orwell’s novel 1984 he writes “BIG BROTHER IS WATCHING YOU…” this statement means that even when you think your information is private there are still other ways to access it.

5. Summarize the video “Police surveillance cameras are stopping crime or invading their privacy by Alex Dunbar.”

The video "Police surveillance cameras are stopping crime or invading their privacy" by Alex Dunbar summarizes the fact that sometimes these cameras set up by the government can invade our privacy. Alex Dunbar does not agree with these cameras and thinks that they are invading his privacy. Although, these cameras can invade privacy there have been positive aspects to these cameras. A lot of crime in cities has decreased since the cameras have been put up. However, the cameras may take away some of our privacy, but in the long run mostly just protect our citizens. This video relates back to "Big Brother is Watching You" by George Orwell because in his book, he says big brother is watching you, which in whole could mean that society is always watching you.

6. Are police surveillance and traffic cameras are stopping crime or invading your privacy? Base your answers off of what you have leaned about privacy, show connections to Baase, Orwell, etc and support your opinion.

Traffic cameras somewhat invade our privacy, which many people do not like. Since the installation of these cameras have increased the crime rate has severely dropped. The more people think they are being watched the less likely they will be to do something against the law. Not only do these traffic cameras protect the roads we drive on from reckless drivers, but they also stop other crimes that could be going on in a neighborhood. In Orwell's story "Big Brother is Watching You", he emphasizes that someone somewhere is always watching you even if you think you are in privacy. This relates to the traffic cameras because there is a chance that you are being watched if you're walking or driving the streets. Surveillance cameras are a positive factor to our society, even if everyone does not agree. These cameras are able to protect us from crime, which can make our lives better and more safe.

Sunday, February 19, 2012

Chapter 1: 1.3 1.4

1. (Knowledge)Tell three interesting elements of this chapter:


a. There are many problems that are caused by the internet like cyberbullying and fraud.


b. People have to be aware of how safe the websites are that they are browsing on. The advance of technology has changed life for the better, but also has negative effects.


c. “Ethics is the study of what it means to ‘do the right thing.’ It is a complex subject that has occupied philosophers for the thousands of year.” Ethics are our rules that people follow when interacting with other humans.


2. (Comprehension) Summarize what is being discussed within this chapter?


In sections 1.3 and 1.4 Baase discusses the effects of the Internet and how it has spread widely across the world. She also discusses how important it is to have an ethical approach on life. Baase evaluates the rights that are given to all Americans. For example freedom of speech is a right that some people can take advantage of. Baase demonstrates an important point that when people use the Internet they are trusting that it will protect their credit card, emails, social networking sites, etc. Since technology is constantly changing people always need to adapt to it. It is also important to have an ethical background when you are talking to people and expressing whom you are. People are supposed to know the difference between right and wrong, but not everyone does. It is expected as a human being to know this ethical way of living. Sometimes ethics can be broken when you tell a lie to save a life or to save someone who is in trouble.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?


When people use their credit cards at an ATM or at an online site they should be absolutely reliable. People should be more ethical and not be tempted to steal money from one another. Practicing basic morals like the Ten Commandments can improve society. Society is portrayed as a scary place because there are people in the world that have no moral background. When someone commits a crime it should be seen to everyone that it is not ethical. The philosopher Immanuel Kant stated, “We should follow rules of behavior that we can universally apply to everyone.” Kant’s theory demonstrates that all humans should act like humans and not commit crimes, unless it is for self-defense.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.


People do good things because it is socially acceptable; there are many humans that do hatred acts. For example, there have been many hate crimes recently and one that stands out is an act that was done by homophobics. Two straight guys approached a gay man and beat him practically to death and left him outside to die. Mostly all humans know that they should not act this way but they are unable to determine right from wrong. In section 1.4 behaving ethically is the main topic. A website produced by the National Defense attorney defined what ethics is. “This level involves the most difficult ethical choices, because it concerns making moral judgments about public policies. The responsibility is to make moral policies; the difficulty is in determining how moral a policy is. Public policies almost always deal with very complex issues, where ethical choices are rarely clear, and it is often difficult to determine if a policy is right or wrong.” These two kids made an unethical decision, which shows that not every person follows this ethical code that is expected of society.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?


I agree with both of the topics that Baase discussed. It is morally right to practice what is known as “The 10 Commandments.” The Ten Commandments are a set of laws that are known by people worldwide. By following these commandments you are known to be a good person. Not every person has the mind set to follow these worldwide laws. There are criminals because they can’t follow the ethical code. Baase also discusses the importance of freedom of speech, which has been abused now more than ever. People have the ability to write whatever is on their mind on a social networking site. What people need to think about is that this statement can be seen by basically anyone with an account. Baase also focuses on the importance of weighing out two sides of an argument. Most of the time when someone sees two sides of an argument it helps this person to be more conscious.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?


This topic is completely relevant in todays society. It is becoming more popular for people to do unethical things because it can be easy to steal, cheat, lie, etc. I have always been taught to do things to other as you would have done to yourself. This statement shows the ethical values that I have and that I use in every day life. The ethical evaluations that were made were the importance of acting as a civil human being. The new ideas that I made were many people do unethical things but that does not make them a morally wrong person. As stated previously someone could lie to protect himself or herself or another life. Also, it is importance to see both sides of a topic because it can further your knowledge on a topic and give you a different point of view.



References


http://www.au.af.mil/au/awc/awcgate/ndu/strat-ldr-dm/pt4ch15.html 2/18/12 4:32PM

Monday, February 13, 2012

GMO's

1) Remember when you were a tour guide for an Alien? The Alien is back and wants to understand what a

GMO is. Explain this information to the Alien.
A GMO is a genetically modified food. Genetically modified food means that products such as plants, bacteria and animals are injected with what could be considered a steroid. The injection increases the rate of production for these goods. In the 21st century people are more interested in the amount and the look of the food they’re eating. “Technologies for genetically modifying foods offer dramatic promise for meeting some of the 21st Century's greatest challenges. Like all new technologies, they also pose some risks, both known and unknown” (http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml).

2) State the controversy associated with GMO’s.

Since GMO’s do not have to be listed on the products that have these hormones in them it increases the risk of people eating unhealthy foods. Although America is all about producing the best product the fastest way, GMO’s are not always the greatest decision. GMO’s do have their benefits because they decrease the amount of pesticides and CFO’s that are extracted into the earth and the environment. In Europe GMO’s are banned from their products. Europe is smart by doing this because they would rather have all healthy products. In an article Europe discusses why they are going to continue to avoid using GMO’s. “The Parliament's report seeks to provide member states with "a solid legal basis" for banning GM crop cultivation, and to give them better legal protection in the event of challenges from trading partners opposed to bans”(http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans). Europe wants to ban GMO’s and make sure that the people of Europe will not be eating this kind of food.

3) Are people’s reactions to GMO’s different in various regions of the world?
Explain with references.


Yes people’s reactions are different in conutries all over the world. Even in the United States not every person is for GMO’s, which is why there has been an increase in farmers markets and organic food. The reason people are choosing organic and farmers markets over food with GMO’s are because GMO’s do not have to be listed on foods that are in grocery stores. It is believed that in America people do not want to read extra labeling because it confuses them. “Extra labeling only confuses the consumer," said David Edwards, director of animal biotechnology at the Biotechnology Industry Organization. "It differentiates products that are not different. As we stick more labels on products that don't really tell us anything more, it makes it harder for consumers to make their choices”( http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html). This is not an appropriate way of producing food because it is false advertisement. People in America are consuming GMO’s and don’t even realize it, while in Europe GMO’s are completely banned so that minimizes their exposure to GMO’s.

4) What’s your reaction to this topic? Explain with references.

GMO’s are a way of falsely producing food for people worldwide. If I knew that GMO’s were contained in most of the food I eat, I would begin to buy organic foods to decrease the risk of eating these hormones. The fact that the government tries to avoid controversy with GMO’s shows that they are obviously unhealthy. If these GMO’s are good for us they would be stated on the manufactured product. The FDA does not feel that it is necessary to label these kinds of food because American’s will become more confused. “The FDA defends its approach, saying it is simply following the law, which prohibits misleading labels on food. And the fact that a food, in this case salmon, is produced through a different process, is not sufficient to require a label”(http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html). Americans should be aware that the food they are eating is genetically altered.

5) Can GMO’s be changed? Should they be changed? Explain with references.

Yes, GMO’s can be changed and by changing them more people should start to focus more on buying their
foods from organic or farmers markets. GMO’s should not be contaminating our foods. Although, most people do not even realize there are GMO’s in their products they can be detrimental to our health. GMO’s like in Europe should be banned from our country. The only people that benefit from GMO’s are the producers and the people selling the goods. “These GMOs are key targets for critics and general unease among Europeans. Several EU states, therefore, invoked a safeguard clause or national decrees to prevent their cultivation on their territories”( http://www.euronews.net/2010/07/13/gmos-divide-europe/). People are at unease for GMO’s because they don’t seem to have any benefit to the consumers.

6) While reading "Institute for Responsible Technology. GMO Basics (Also explore at least two of the other tabs on this page:

http://www.responsibletechnology.org/gmo-basics
" What were the two tabs that you explored? How did the information presented affect what you thought about GMO's?
http://www.responsibletechnology.org/gmo-basics/the-ge-process
This website increased my knowledge of how the process of GMO’s is used. GMO’s. “Because living organisms have natural barriers to protect themselves against the introduction of DNA from a different species, genetic engineers must force the DNA from one organism into another”. Anything that is being forced into another animal, plant, etc. should not be done. Replicating DNA is creating identical products of one another but they are only a clone and could possibly not have the same benefits that an organic fruit would have.
http://www.responsibletechnology.org/gmo-dangers/dangers-to-the-environment
This website talked about the toxics of GMO’s and how farmers try to make sure that nothing is cross pollinated. Crosspollination means two plants come in contact with each other and they don’t always have a positive impact. Some farmers try as hard as possible to stop crosspollination. “No one knows what might happen if DNA containing pharmaceutical properties are spread to wild plants.” Pharmaceutical properties are what GMO’s are contained with, they can be misleading and many people do not realize that they are using GMO’s.

7) Typing out the exact quote from any of the readings (and referencing it) list one powerful statement that you read.

Put the statement in context and explain why this statement was powerful enough to remember. (What made you react to this information?)
"Extra labeling only confuses the consumer," said David Edwards, director of animal biotechnology at the Biotechnology Industry Organization. "It differentiates products that are not different. As we stick more labels on products that don't really tell us anything more, it makes it harder for consumers to make their choices."( http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html)
This quote stood out to me because the FDA believes that extra labels are confusing to Americans. Most Americans have somewhat of an education and almost all Americans know how to read. The FDA comes up with an inexcusable answer as to why we don’t know when GMO’s are in our food. This quote angered me because the FDA will come up with any excuse to not have GMO’s labeled. If GMO’s benefit us then they surely would be labeled. Not labeling GMO’s shows that they are not safe and should not be injected into any of our foods.
References
http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html
http://www.responsibletechnology.org/gmo-dangers/dangers-to-the-environment
http://www.responsibletechnology.org/gmo-basics/the-ge-process
http://www.euronews.net/2010/07/13/gmos-divide-europe/
http://www.washingtonpost.com/wp-dyn/content/article/2010/09/18/AR2010091803808.html
http://www.guardian.co.uk/environment/2011/jul/06/europe-gm-crop-bans)
http://www.ornl.gov/sci/techresources/Human_Genome/elsi/gmfood.shtml

Wednesday, February 8, 2012

Assignment #4: Critical thinking #2

Name: Mollie Bower Class time: 12
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Levi Rickert
Date of Publication:
Book: Menominee Seventh Grader Suspended for Saying “I Love You” in her Native Language
Sections read:
1. (Knowledge)Tell three interesting elements of this chapter:

a. Miranda along with 60% of the students in her class were American Indian and spoke Menominee.
b. Since the Indian reservation was so close to Shawano, Wisconsin, teachers and coaches should understand and realize that students do know a different language.
c. The teacher should know her students and if she had thought that Miranda was threatening in a way she would have stated so before accusing her of saying a bad word. The teacher should know that the students know other languages and should not punish them for speaking that way.

2. (Comprehension) Summarize what is being discussed within this chapter?

Miranda was suspended and benched from her basketball game because a teacher over heard her speaking her native language. The teacher was not aware that she was only saying “hello” and “I love you”. Since the teacher should know her students on a personal level, since it is a Catholic school she should understand that students know different languages. The Menominee tribe is located six miles from Sacred Heart Catholic Academy. Since the tribe is so close to the school, teachers should know at least a few words of this language so they don’t accuse someone innocent like Miranda.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

A new solution to this problem would be to have an educational meeting and have the teachers learn some of the Menominee tribe language. If teachers and higher authorities learned some of the language teachers and students can avoid problems such as the one Miranda and her Mother dealt with. It is discriminating that like Miranda’s mother stated about there being a Spanish prompt answering machine you can chose from, but not Menominee. Since 60% of the schools population is American Indian they should offer an option of Menominee and not just Spanish.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

This article is discrimination of American Indian tribes. Students in school located six miles from the Indian Reservation spoke the native language of Menominee. Since this language is so widely spoken teachers and principals should at least be familiar with some words. The teacher discriminated against Miranda because the teacher believed that she was saying a bad word and then accused her of having a bad attitude.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

This article is very discriminating and demonstrates the lack of trust teachers have for their students. Another teacher taunted Miranda even after she got in trouble the first time. The other teacher said she did not appreciate her getting the other teacher upset because “she is like a daughter to me.” The students were never told that they could not speak this language, which is why it was a shock to Miranda and her mother that she was being punished this way. The teachers should know that 60% of their students are American Indian therefor they may know a different language and teachers should be familiar with it.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is highly relevant in today's society because it is becoming increasingly popular to know more that just the English language. Teachers at the Sacred Heart Catholic Academy should be proud that their students know a different language. In this case a student was punished for knowing more about something than her teacher did.