Tuesday, March 13, 2012

"Midterm: 2 questions about the assignment"

When doing the GMO midterm assignment, are we going to be comparing and contrasting prices of organic and non organic foods?

How many products of food do we have to look at to get the proper information needed to complete the project?

Monday, March 12, 2012

Chapter 3: Part 1: Freedom of Speech


Author: Sarah Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3
1. (Knowledge)Tell three interesting elements of this chapter:

a. Many websites are not as reliable as people believe. There are no qualifications for creating a website, people are free to speak their minds. Not all websites can be resourceful which is why people need to be more aware of the information that is provided on the Web.
b. COPA and CDA are two laws that tried to restrict searches of adult material, but were not passed due to the 1st Amendment, Freedom of Speech.
c. The government is able to regulate print media, broadcast, telephones, and postal service. However it is not easy to regulate the Web, which is why the web is filled with inappropriate websites.

2. (Comprehension) Summarize what is being discussed within this chapter?

Freedom of Speech is the reason why so much adult material is accessible to children. Since technology has become a large part in everyone’s lives there has been more child abductions and increase in pornography. Since some information cannot be blocked by firewalls, adult material cannot be fully monitored. Parents and guardians need to be more aware of the inappropriate websites that become easily attainable for children and people under the age of 18. This website exemplifies the realism of child abductions that occur because of the Internet. http://kidshealth.org/parent/firstaid_safe/outdoor/abductions.html

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
 
A new solution to this problem would be to monitor the child and make sure they are being smart on the Internet. Although parents are able to set up firewalls, there are ways that spam and adult websites can find other ways to keep their websites on the Internet. Filters should be able to block all inappropriate websites that can be accessed in a child’s home, school environment or library.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Freedom of speech is the main reason why the Internet is filled with spam, massive amounts of adult information and racist remarks and pictures. The Internet gains strong 1st Amendment protection since it is mainly based on the freedom of people thoughts and ideas (p. 155 Baase). A situation that occurred in this chapter can be related to the amount of privacy children are given which can lead to abduction or easy access to pedophiles and pornographers. Although parents are able to filter out bad websites, not every parent or guardian knows that this is possible

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Yes I do agree with what is being discussed in these sections although it can be known as unethical. There are not enough protection acts therefore children are increasingly becoming victims of pedophiles and pornographers. The government should find more reasons to ban adult material from the Internet because it is not being fully protected. However pedophiles, spammers, and pornographers will always be in our society we make it easier to become victims by using the Web.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is highly relevant in today’s society because it does not seem like people are aware of their lack of privacy. Since children are using the Internet more than ever there should be a strict law to help reduce the inappropriate websites that are easily available. The main reason there are inappropriate websites is due to the lack of responsibility users have. Most information that a person posts on the Internet is through their name or email and it is stored to a database and sold.

References
http://kidshealth.org/parent/firstaid_safe/outdoor/abductions.html March 10, 2012

Sunday, March 4, 2012

Chapter 2: Part 2

Author: Sarah Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.3, 2.4, 2.5


1. (Knowledge)Tell three interesting elements of this chapter:

               a. In section 2.3 Baase states that there is no law requiring federal agencies to notify
                  someone if their personal data is lost or stolen.

b. In four years government agencies had 788 different cases with lost or stolen identities. People were stealing data and personal information off of government computers. “The Federal Bureau of Prisons, the Drug Enforcement Administration, the FBI, and the U.S Marshals Service lost 400 laptops”(p. 86 Baase).
c. Data brokers and people who sell private information for money or for personal use are acting in an unethical way, which relates to chapter 1, section 4.

2. (Comprehension) Summarize what is being discussed within this chapter?

In this chapter the main topic is privacy. Privacy in the 21st century is looked at completely different than in past years. For example people are constantly putting their private information on the Internet because they think their account is private. What people do not realize is that even with a private account personal information is accessible. Information that is public, such as your hometown, school, or telephone number are pulled and used for data mining. These sections include topics from lack of data privacy to the importance of encryption resources and why they have become increasingly popular. Firms such as ChoicePoint and Acxiom “…sell data to businesses for marketing and ‘consumer management’ (p. 82 Baase). These sections also discuss that your personal searches and social networking sites are constantly being monitored and watched by the government.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

There are many solutions that can help prevent personal information from being sent out on the web. For example, people who do not want any of their personal information available for marketers should not use the computer because personal information has no privacy when on the Internet. People who use the web for any research, purchases, tax forms, credit card bills, social networking, etc. are all in danger. There is no way of stopping data miners from finding personal information because even a home telephone number can be used to find information like where someone lives or how many children they have. Although these solutions seem obvious, some people do not fully understand that there is a lack of privacy when you are putting personal data online.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

You can compare the extreme use of data mining and people hacking personal information with someone who robs a bank. Robbing a bank and someone robbing your identity is a unique comparison because they are both highly unethical. Ethics is an important part of someone’s life and without an ethical background many criminal activities can exist. Even though data mining is not as serious as robbing a bank it can still harm the person that the information was taken from. Data mining along with robbing a bank are unethical because they are putting people someone’s personal life at risk.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

Yes, I do agree with what is being discussed in these sections. The sections put an emphasis on how important it is to keep your personal information off the Internet and not available for data brokers. Data brokers obtain information by lying to other companies to get a SSN, address, credit card numbers and other personal information. The important thing to remember when it comes to privacy matters is that the information someone puts on the Internet is no longer just that person’s information. The information can be bought and sold for 3/5th of a penny. Privacy rights can only be protected if you limit yourself to what you search online and what websites a person is browsing.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is extremely relevant in society because many younger people are using the Internet and they are not aware of the lack of privacy that they are given. Since Facebook and other social networking sites are so prominent in the 21st century people around the world should acknowledge the fact that there are data brokers that will steal personal information and sell it for a profit. An ethical evaluation made from this chapter is that since people around you (data brokers and miners) live unethically, a person who uses the internet needs to act ethically and not post inappropriate information to a public website. After reading these sections my knowledge of the widespread lack of privacy has increased. I am now more aware that every Google search or website I look at is being monitored and watched.
Since I’ve read these sections I will be much more careful when entering personal data and information on a public website.

References:
http://www.youtube.com/watch?feature=player_embedded&v=wbBDQgFNoqw February 28, 2012
Baase, Sarah "A Gift of Fire" 2008