Friday, September 23, 2011

Chapter 2: Privacy


Name Alexandra Esmonde                  Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2,2.5.3-2.5.4

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        There are numerous different aspects of privacy such as: freedom from intrusion, control of information about oneself, and freedom from survelliance.
b.       Anything that is done online can be traced back to the original user or computer.  Governments have the capacity to store massive amounts of data that no one would have thought to save before the increase of technology.
c.        The government has numerous databases of people’s personal information.  The government does not always obey all privacy laws so the Privacy Act of 1974 has been passed to help regulate what governments can and cannot do with people’s personal information.

2.     (Comprehension) Summarize what is being discussed within this chapter?
This chapter was discussing the issues of privacy and maintaining one’s personal security with all the new technlogies in the world.  Government’s now have the power to record and track people’s actions and gain hold of their personal information and records.  Privacy laws, such as the Privacy Act of 1974 have been put in place to help regulate government’s actions regarding privacy (Baase 58).  For example colleges and universities are required to send updates including student’s names and social security numbers.  This data is kept indefinitely and may or may not be used for analysis.  The point is that the government has all this personal information just sitting in databases that may or may not be used, but it can be accessed at any point even if the individuals do not give consent (Baase 61).


3.     (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
In regards to the problem of government’s having access to everyone’s information and movements, I think that there should be stricter laws in place that regulate what can and can not be recorded and stored in databases.  There is no need for data to be stored simply for the purpose of having on hand. In my opinion governments should have to justify why they have certain information, and if they have no need for it then it should not be stored and recorded.  People have the right to privacy, and there is no need for survelliance if people are not under suspicion.


4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

This article refers to Bloom’s Taxonomy because people and the government need to evaluate the situation and make decisions.  People’s values of privacy are a concern, and that is the first step in deciding what information should and should not be kept.  After evaluating and making decisions in regards to people’s values analysis of the data needs to take place.  This is important because not every person’s movements and information need to be recorded, and it is important to analyze what should and should not be stored and why.  Applying the connection between what is necessary to be stored and what is not and then communicating so that the general public can understand are the last three steps.  Application, comprehension and knowledge are the final steps in communicating to the public what data will be stored and why is the first step to getting the public to trust the government and feel save supplying personal information and just living their daily lives, not feeling like every move is under survelliance.

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article.  I think that the government has too much control and ability for survelliance under the general public.  The majority of the population poses no threats to society or anybody else, and therefore there is no reason for every move to be recorded and stored in databases.  I think that the government should spend their time and energy on issues that have already presented themselves, instead of looking for potential threats.  The issue of teenage sucicide because of bullying has been a prevelant issue that has been increasing recently and it seems that no one has been paying as much attention to it as they should be.  There are anti-bullying programs in schools but if students do not undertstand the consequences, and teachers do not respond to student’s cries for help then nothing will change.  The government should be investing time and resources such as counselors or speakers to show the consequences of bullying.


6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
This topic is relevant in all the aforementioned ways.  Government over survelliance, resources that are poorly used and privacy that is invaded are all real life issues.  Ethically people question whether or not it is ethical for the government to have this level of control and the ability to track everyone’s movements and transactions.  Ethically speaking after reading this chapter it has given me a new understanding of the level of control that the government has over us, and I think that most people agree that stricter laws need to be in place or protecting people’s privacy.





References

 A Gift of Fire by: Sara Baase

Sunday, September 18, 2011

Chapter 1: Unwrapping the Gift


Name Alexandra Esmonde                  Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 1: Unwrapping the Gift

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        The Internet gives people the power to make more informed decisions.  Ex: Can look up a medical issue that we used to have to rely on experts to diagnose.
b.       The Internet gives people the power of “innovation without permission (Baase 9).  People can state their opinion, or post how they feel without having to check with a boss or a higher authority before doing so.
c.        Technological change is fast a dramatic.  Something that is imperative now will be obsolete in five years.

2.     (Comprehension) Summarize what is being discussed within this chapter?
This chapter discusses the ever changing role of technology and how it impacts the lives of everyone in every society.  The chapter discussed how different web features, such as blogs enhanced the content and expression of web postings.  Blogs voiced the unbiased opinions of ordinary people that gave people a genuine connection to each other (Baase 5).  The chapter also discussed how with greater technological improvements people take greater risks, such as with cell phones.  People rely on their phones to get them out of trouble, so they become more careless or engage in behaviors they would not have without a cell phone.  For example, taking off unprepared for a hike in a remote area (Baase 10).  The chapter also discussed the risks that new technology brings, such as the increased risk for identity theft, privacy violations, spam, and copyright infringements (Baase 3).


3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
The issue of copyright infringement is one that has increased, as the Internet has become almost the primary form of communication and the transfer of information.  The Internet has increased the risks of identity theft and fraud because it is so easy to be anonymous on the Internet.  When something is ordered online and credit card information is put in, the customer has no idea who is actually receiving their card information.  Sites such as Wikipedia which allow anyone to edit the content of the site are opening doors for people to falsify information and post anything they desire that pertains to the topic of the site (Baase 13).  In my experience teachers have told me not to use Wikipedia because it is unreliable and they would not consider it an informative source for research papers and other projects that require the use of the Internet to find information.



4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
This article applies to Bloom’s taxonomy because it follows the steps that Bloom’s taxonomy presents: knowledge, comprehension, application, analysis, synthesis and evaluation.  This is how technology is formed, someone learns how to invent something new, or make a new idea more efficient.  Then they apply it to every day life, or use it to improve upon something that is already made, thus applying it.  Then they analyze the pros and cons of the new technology or idea and if its benefits will outweigh its costs.  Then incorporating the new idea in to old ideas or bettering an old idea while studying the affects of the technological benefit to society.  These steps are taken when inventing a new idea or improving upon something that was already invented, while following Bloom’s taxonomy.