Friday, November 11, 2011

Chapter 6: Part 2


Name Alexandra Esmonde                 Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.4, 6.5

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        Computers have opened the door for employees to steal large amounts of money from their companies (Baase 333).
b.       Monitoring systems can count every keystroke of clerks (Baase 336).
c.        There is not always a clear distinction between policies of a workplace and the law (Baase 337).

2.     (Comprehension) Summarize what is being discussed within this chapter?
 This chapter discusses the fact that now, more than ever, everything that people do on the computer can, and is being monitored. At work it is now possible to trace every word that an employee types and the employer can read all of it. There is not always a clear distinction between the policies that an employer enforces and the laws that protect privacy.  Employees have used faulty security or their information about their employer's computer systems to steal millions of dollars.  The computer has become an important tool in worker productivity but it has also proven to not be without risks, and sometimes people ask if the risks are greater than the rewards. 


3.     (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?
 I think that there should be higher security on computer's so that workers cannot embezzle money so easily through technology.  If employers cut down on the "monitoring" of their employees every move then I feel as if employees would think twice about stealing money. Companies should put better benefits, or incentives in place to help make sure that their employees are not tempted to steal from them because they are doing fine on their own. New security and a different level of employee employer cooperation and arranging of benefits needs to be put in place as well.


4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
 The first step in remedying this problem is evaluating the situation.  After, synthesizing which would be combining the information from all different cases and analyzing what is going wrong and why.  Applying the information that has been gathered and the conclusions that have been drawn to solving the issue. Comprehending what is happening and why is one of the main steps towards solving the problem and finally knowing what to do and why.


5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I think the article is relevant because employers monitor their employees and employees do steal from their employers in real life. This just backs up the fact that with new technology there need to be new laws and safeguards in place. People need to be more aware that there are dangers that come with new technology, and things need to be done to protect people against hackers and losing their identity because someone hacked in to their computer.

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
 Ethically speaking I do not think that it is ethical to monitor every keystroke that employees make. There needs to be some form of trust that employees will come to work and do their job without needed to be monitored every single second. People need to realize that technology affects humans and humans will be prosecuted in court and the laws need to catch up to the technology.


References
A Gift of Fire By: Sara Baase

Sunday, November 6, 2011

Chapter 6: Work


Name        Alexandra Esmonde          Class time:12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.1, 6.2, 6.3

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        When computers were invented numerous people feared that they would be laid off and their jobs would be replaced by technology (Baase 308).
b.       The Internet helped to create 100,000 new Internet related jobs in 1996 (Baase 310).
c.        Technology and computers have increased the quality of life of Americans and have caused them to spend more money on luxury items such as cruises and larger homes (Baase 314).

2.     (Comprehension) Summarize what is being discussed within this chapter?
 This chapter discusses the effect that computers have had on the world and the effect that they were presumed to cause.  Numerous people thought that they would lose their jobs or technology would cause the creation of more jobs overseas (Baase 310).  However, computers created numerous jobs in engineering and system analysis jobs which require a college degree and a college degree which caused a larger amount of people to become more highly educated, thus increasing the standard of living (Baase 315).  Computers help with job training and step by step instructions that used to require extensive training (Baase 316).  Computers changed they way people live, in some ways that no one expected.

3.     (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?
 The creations of forms of higher intelligence-such as computers always brings up the question: will technology replace human power and intelligence? For example, the newest phones that have come out could replace computers. Pretty soon all technology will be on one device and computers will be rendered obsolete. Also, the beginning creations of robots makes people wonder what will the world be like in ten years.  Technology keeps replacing itself and the need for human dependency.

4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
 The evaluation of what people need and how technology plays a role in daily life is important to realizing what people need and why.  Analyzing how specific technologies can aid in every day life is also important to the further development of technology and creation of better, faster devices.


5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in this article because technology has played a large role in the development of the economy and the creations or abolition of jobs.  Technology is one of the largest aspects of the workforce and the better it gets the more jobs can be at risk or outsourced.  As much as technology can enhance the workplace it is also cheaper and more efficient, doesn't need sick days and can easily replace human labor.  It is important to realize the thin line between technology helping hobs and technology taking jobs away.



6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

 It is relevant in today's society because people and businesses are faced with the dilemma everyday.  Ethically speaking in today's world it is never guaranteed if a computer is doing the talking, or the scheduling, or handling a compliant or if an actual human is. The world is becoming somewhat depersonalized and is it ethically correct for a computer or an automated system to be handling personal scheduling or complaints? Technology has taken over numerous human interactions and jobs which used to require personal face to face or human to human interaction. Is it ethical to have a computer take over all these personal, interactive jobs?




References
 A Gift of Fire by: Sara Baase 2008.

Sunday, October 16, 2011

Chapter 4: Musicians Look For Pay In An MP3 World"


The ideas expressed in Sydel's video differ from Chuck D and Lars Ulrich because Sydel focuses on revenue that artist's lose ,while Ulrich said that they lose "mere pocket change."  The Sydel video proposed the idea of artists such as Coltham giving away their music but Ulrich would never agree with that because he believes that artists should have the right to control their music and their revenue.

Both videos agree on the point that technology plays a large issue in this debate. Ulrich knows that technology cannot be stopped, no matter how badly he wants it to be, and he realizes that artists and the rest of the world are trailing behind technology.  Sydel's video states the fact that technology has not yet reached the point where it can give people full connectedness to their music, meaning be able to listen and watch anything the consumer wants on any device at any time.  Both videos agree that technology cannot be stopped and yet it is not perfect.

Chapter 4: Chuck D and Lars Ulrich


Eric Schmidt believes that intellectual property is essential to Google, and the company  would not exist without intellectual property or intellectual property rights.  Schmidt believes that a balance of interests needs to be found, and analogous models that pertain to newspaper etc need to be constructed.

Chuck D disagrees with Ulrich because Chuck D believes that recording artists make their music in order for it to be heard. It will be heard whether or not the consumer pays to hear it, and Chuck D has no problem with the fact that people download music illegally, he just wants his music to be heard by anyone that wants to hear it.
Lars Ulrich does not support illegal downloading because he believes that he, and other recording artists worked hard to produce the songs and that they should get the revenue that they deserve. Ulrich says the main issue is about control, controlling what you own, controlling what is on the Internet, and he wants people to understand what is at stake.  He wants the issue to be that of public debate so that parameters can be set for the future because the artists have the right to control and own their music.

Chapter 4: Intellectual Property (Part 1)

Name Alexandra Esmonde Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read:4.1, 4.2, 4.3.1, 4.3.2

  • (Knowledge)Tell three interesting elements of this chapter: 
    •  There is a difference between patent and copyright, and once copyright expires the information is in the public domain and anyone can have access to it.
    •  The goal in the development of copyright laws is to devise good definitions to extend the scope of protection to new technologies (Baase 204).
    •  The challenge with copyright and copyright laws is that the benefits of easily available material want to be maintained on the Internet and the creative reuse of material is to be encouraged, but while protecting copyright (Baase 206).

  • (Comprehension) Summarize what is being discussed within this chapter? 
This chapter discusses the issues that copyright poses in terms of privacy and what should and should not be copyrighted. Property rights protect the physical property that each individual has and those rights include the right to sell it, to use it, and to prevent others from using it.  The chapter also discussed the rights that the U.S Copyright Law gives copyright holders, including: the ability to make copies of work, produce translations, movies based on books, distribute copies, perform work in public, and display work in public (Baase 204).  The chapter discussed the ways in which copyright is protected under laws and what happens when people violate copyright laws.



  • (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain? 
A specific example of this issue is the Napster issue. When that high vole of people downloaded music illegally from Napster and it was not shut down, even though it was the most popular downloading site many people questioned if that was the end to copyright (Baase 209).  The issue was that by illegally downloading music it was taking away from the revenue that artists would have made off the sale of their songs or albums.  However, numerous people believed that songs and albums are overpriced and illegally downloading is doing nothing to hurt anybody, since the artists are already millionaires.  However, Napster was eventually shut down and there are strict punishments for illegal downloading that involve heavy fines and sometimes even jail time.


  • (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.  
Bloom's taxonomy applies to this case because the issue needed to be evaluated by all parties that it applied to, the issue needed to be addressed, and then laws and consequences needed to be applied.  The steps that the addressing the problem, determining a solution, and finally reaching doable solutions all followed the steps in Bloom's taxonomy.


  • (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material? 
I agree that the issue of copyright and copyright laws is one that is hard to identify and therefor enforce.  Since the laws have not yet caught
up to technology it is hard for infringements to be prosecuted and such if there is no law that really encompasses the violations.  The law needs to catch up with technology, and fast before the Internet gets out of hand.

  • (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter? 
This topic is relevant in today's society because we use the Internet everyday. We download and listen to music every day, and every day music, videos, and other electronic games are downloaded and bought and sold illegally.  This issue is prevalent in today's society because it happens every day in every part of the world, and numerous people have learned how to exploit the law and make a large profit off of selling illegally pirated and downloaded music and so forth.




References
A Gift of Fire By: Sara Baase

Thursday, October 6, 2011

Chapter 3: Questions from Dr. RSM

  --In your own words define the  phrase ‘least restrictive means’ . Why or why not? 2-4 referenced sentences.
Least restricitive means refers to the least invasive route that can be taken.  In the discussion of the chapter filters seem to be the most least restrictive means of Internet control without invading people's right to use the Internet for their own personal use (Baase 155).
             --Why is this term important?  How does it effect Freedom of Speech. Why or why not? 2-4 referenced sentences.
This term is important because everyone has the right to practice the First Amendment right to Free Speech.  This term means that the government has the right to intervene to protect children and others that can be harmed by offensive material on the Internet, by creating laws such as The Child Online Protection Act, but the government does not, or should not, have the power to regulate every one's Internet use and prosecute adults for looking at material that may be considered inappropriate (Baase 154).

             --Do you consider the Internet an appropriate tool for young children?  Why or why not? 2-4 referenced sentences.
I do not think that young children have any reason to go on the Internet.  Their homework, to the best of my knowledge, does not involve looking things up online, or typing a paper.  I believe that the Internet is a necessary tool for school and further learning but young children should be learning by interacting with each other and playing outside, not by using the Internet.

Chapter 3: Questions from Baase p. 189

3.1 A common carrier is the use of the postal system, telephone, or telegraph, a broadcast includes television or radio, and publishers fall under the category of print media including newspapers, books, magazine, and pamphlets (Baase 145).  In respect to freedom of speech and control of content, print media has the strongest First Amendment protection, which means that it experiences the least government regulation (Baase 2008).  Broadcast structures and the content of the broadcasting programs are both regulated by the government.  Broadcasting licenses are granted by the government, and they must meet governmental standards (Baase 145).  Finally, common carriers have broader and looser regulations but the Telecommunications Act of 1996 stated that "no provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider" (Baase 147).
3.2 Two methods that parents can use to restrict their children's web access to inappropriate materials are filtering systems, and the ability of Internet subscribers to lock their children out of certain sites.  Some sites develop policies to protect members-such as expelling users who post inappropriate material, removing offensive material, and aiding law enforcement with child pornography investigators (BAase 158).  By having the company or provider monitor the content that is being put on the site, parents can be more assured that their child is only viewing what they are supposed to on that given website (Baase 2008).  Filtering systems give parents the ability to block certain sites completely, or banning of certain words in to a search term box.  These filters help parents have more of a control over their child's Internet viewing because they can somewhat pick and choose what their child can and cannot look at (Baase 155).
3.8 I do not believe that television could outweigh the First Amendment.  The government already has control over television, as do service providers.  Movie channels such as HBO, premium channels, and adult movie channels all have to be paid for, and most require a password when purchasing a show or a movie.  Inappropriate material, such as (child) pornography is less easy to access on the television as it is on the Internet because the majority of channels require a password to gain access. If a parent does not want their child watching television then it is their job to monitor their child's use, or to take away the television completely.  However, on the Internet it is harder to control the content and what is being put out there because there are not as many filters or controls, and inappropriate sites do not need a password or require any sort of proof of age.  This is why the Internet should be more government regulated than television.

Chapter 3: Freedom of Speech


Name Alexandra Esmonde                  Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read:3.1-3.3.4

1.     (Knowledge)Tell three interesting elements of this chapter:
a.      Vague, unclear, and broad statements prevents laws and regulations from being put in to place or enforced (Baase 153). 
b.       Judicial actions so far have given the Internet the highest level of government protection, similar to that of print media (Baase 155).
c.        Anyone can publish anything they want on the Internet and have anyone read it.  An editor or a publish does not have to approve when one speaks their mind (Baase 144).

2.     (Comprehension) Summarize what is being discussed within this chapter?
In this chapter the author discusses the difficulties that the law has with keeping up with technology.  Technology changes at a much faster rate than the law can keep up with, thus leading to numerous laws and regulations that cannot be enforced because there are no laws that stand up for the wrong that is being done online.  The Internet has made it possible for anyone to publish anything online and it can be viewable by anybody (Baase 144).  Spam filters and blocks only do so much, and the majority of information can still come through to viewers.  This means that even children can see adult material because there is no way of blocking certain viewers (Baase 2008).

3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I think that a new solution should be something that goes along with the ever-changing technology, something that is high tech.  I think that some form of finger print scanning or facial recognition should be used to identify who is using the computer and what sites they are going on.  For example if a child is trying to go on adult sites, there face and finger print will be scanned and they will be subsequently blocked from the sites.  This is a more foolproof way to install security systems in a computer and to monitor what is actually happening online.

4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
Internet fraud and misrepresenting oneself on the Internet is similar to misrepresentation that does not take place on the Internet.  For example, a pedophile will pretend to be a child’s friend and lure there under the false pretense of candy or helping them find a lost puppy.  This is comparable to people posting a picture that is them from fifteen years ago, and claiming that it was taken yesterday.  This relates to Bloom’s Taxonomy because everything that happens on the Internet needs to be evaluated-whether it is by the person who is making the site, an online database controller, or a child’s parent.  The synthesis of information from the Internet in to a child’s mind has an impact on their entire life and their actions and behavior.  Analyzing these problems takes time by experts and computer analysts who together can make the Internet a safer place for children and for those just trying to find information.

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because it is true and relates to almost everyone’s life.  Most people do not go through their day without going on the Internet at least once, and while looking for relevant information we come across numerous different pop-ups and spam that we have no desire to see.  Anyone can publish anything on the Internet, which is proven by sites such as Wikipedia where anyone can edit what the article is saying (Baase 144).  Potential threats are not always visible online because it can never be known who is on the other side of a chat room, or an article that is being read (Baase 152).  There have been numerous laws that have been passed to help stop children’s exposure to inappropriate materials online, such as the Child Online Protection Law, 1998 (Baase 154) or the 1996 Child Pornography Prevention Act (Baase 151) but the laws include broad or vague regulations and therefore cannot always be enforced (Baase 153).  After reading this information I believe, even more so than before, that the government and lawmakers need to do more to keep up with the Internet and technology that is rapidly changing.  Without new laws that keep up with technology then there will be a lot more ways for people to harm others on the Internet and they will be able to get away with it, since there will be no laws preventing their actions.

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
The topic is relevant in today’s society because now more than ever the Internet is one of the main focuses of the majority of people’s lives.  I know that when I use the Internet pop-ups come up that are supposed to be blocked by spam filters, or inappropriate web sites will come up when I type something in to Google or Yahoo.  Since I am older I know what to do when events such as those occur, but I realize that someone who is younger might not know how to react to those instances and will therefore get him or herself in to a bad situation.  Ethically people’s rights especially to privacy can be violated on the Internet, and the fact that people have the possibility of being exposed to things online that they would not usually want to be exposed to.

References

A Gift of Fire by: Sara Baase, 2008

Friday, September 23, 2011

Chapter 2: Privacy


Name Alexandra Esmonde                  Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2,2.5.3-2.5.4

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        There are numerous different aspects of privacy such as: freedom from intrusion, control of information about oneself, and freedom from survelliance.
b.       Anything that is done online can be traced back to the original user or computer.  Governments have the capacity to store massive amounts of data that no one would have thought to save before the increase of technology.
c.        The government has numerous databases of people’s personal information.  The government does not always obey all privacy laws so the Privacy Act of 1974 has been passed to help regulate what governments can and cannot do with people’s personal information.

2.     (Comprehension) Summarize what is being discussed within this chapter?
This chapter was discussing the issues of privacy and maintaining one’s personal security with all the new technlogies in the world.  Government’s now have the power to record and track people’s actions and gain hold of their personal information and records.  Privacy laws, such as the Privacy Act of 1974 have been put in place to help regulate government’s actions regarding privacy (Baase 58).  For example colleges and universities are required to send updates including student’s names and social security numbers.  This data is kept indefinitely and may or may not be used for analysis.  The point is that the government has all this personal information just sitting in databases that may or may not be used, but it can be accessed at any point even if the individuals do not give consent (Baase 61).


3.     (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
In regards to the problem of government’s having access to everyone’s information and movements, I think that there should be stricter laws in place that regulate what can and can not be recorded and stored in databases.  There is no need for data to be stored simply for the purpose of having on hand. In my opinion governments should have to justify why they have certain information, and if they have no need for it then it should not be stored and recorded.  People have the right to privacy, and there is no need for survelliance if people are not under suspicion.


4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

This article refers to Bloom’s Taxonomy because people and the government need to evaluate the situation and make decisions.  People’s values of privacy are a concern, and that is the first step in deciding what information should and should not be kept.  After evaluating and making decisions in regards to people’s values analysis of the data needs to take place.  This is important because not every person’s movements and information need to be recorded, and it is important to analyze what should and should not be stored and why.  Applying the connection between what is necessary to be stored and what is not and then communicating so that the general public can understand are the last three steps.  Application, comprehension and knowledge are the final steps in communicating to the public what data will be stored and why is the first step to getting the public to trust the government and feel save supplying personal information and just living their daily lives, not feeling like every move is under survelliance.

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article.  I think that the government has too much control and ability for survelliance under the general public.  The majority of the population poses no threats to society or anybody else, and therefore there is no reason for every move to be recorded and stored in databases.  I think that the government should spend their time and energy on issues that have already presented themselves, instead of looking for potential threats.  The issue of teenage sucicide because of bullying has been a prevelant issue that has been increasing recently and it seems that no one has been paying as much attention to it as they should be.  There are anti-bullying programs in schools but if students do not undertstand the consequences, and teachers do not respond to student’s cries for help then nothing will change.  The government should be investing time and resources such as counselors or speakers to show the consequences of bullying.


6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
This topic is relevant in all the aforementioned ways.  Government over survelliance, resources that are poorly used and privacy that is invaded are all real life issues.  Ethically people question whether or not it is ethical for the government to have this level of control and the ability to track everyone’s movements and transactions.  Ethically speaking after reading this chapter it has given me a new understanding of the level of control that the government has over us, and I think that most people agree that stricter laws need to be in place or protecting people’s privacy.





References

 A Gift of Fire by: Sara Baase

Sunday, September 18, 2011

Chapter 1: Unwrapping the Gift


Name Alexandra Esmonde                  Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 1: Unwrapping the Gift

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        The Internet gives people the power to make more informed decisions.  Ex: Can look up a medical issue that we used to have to rely on experts to diagnose.
b.       The Internet gives people the power of “innovation without permission (Baase 9).  People can state their opinion, or post how they feel without having to check with a boss or a higher authority before doing so.
c.        Technological change is fast a dramatic.  Something that is imperative now will be obsolete in five years.

2.     (Comprehension) Summarize what is being discussed within this chapter?
This chapter discusses the ever changing role of technology and how it impacts the lives of everyone in every society.  The chapter discussed how different web features, such as blogs enhanced the content and expression of web postings.  Blogs voiced the unbiased opinions of ordinary people that gave people a genuine connection to each other (Baase 5).  The chapter also discussed how with greater technological improvements people take greater risks, such as with cell phones.  People rely on their phones to get them out of trouble, so they become more careless or engage in behaviors they would not have without a cell phone.  For example, taking off unprepared for a hike in a remote area (Baase 10).  The chapter also discussed the risks that new technology brings, such as the increased risk for identity theft, privacy violations, spam, and copyright infringements (Baase 3).


3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
The issue of copyright infringement is one that has increased, as the Internet has become almost the primary form of communication and the transfer of information.  The Internet has increased the risks of identity theft and fraud because it is so easy to be anonymous on the Internet.  When something is ordered online and credit card information is put in, the customer has no idea who is actually receiving their card information.  Sites such as Wikipedia which allow anyone to edit the content of the site are opening doors for people to falsify information and post anything they desire that pertains to the topic of the site (Baase 13).  In my experience teachers have told me not to use Wikipedia because it is unreliable and they would not consider it an informative source for research papers and other projects that require the use of the Internet to find information.



4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
This article applies to Bloom’s taxonomy because it follows the steps that Bloom’s taxonomy presents: knowledge, comprehension, application, analysis, synthesis and evaluation.  This is how technology is formed, someone learns how to invent something new, or make a new idea more efficient.  Then they apply it to every day life, or use it to improve upon something that is already made, thus applying it.  Then they analyze the pros and cons of the new technology or idea and if its benefits will outweigh its costs.  Then incorporating the new idea in to old ideas or bettering an old idea while studying the affects of the technological benefit to society.  These steps are taken when inventing a new idea or improving upon something that was already invented, while following Bloom’s taxonomy.