Name Alexandra Esmonde Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read:3.1-3.3.4
1. (Knowledge)Tell three interesting elements of this chapter:
a. Vague, unclear, and broad statements prevents laws and regulations from being put in to place or enforced (Baase 153).
b. Judicial actions so far have given the Internet the highest level of government protection, similar to that of print media (Baase 155).
c. Anyone can publish anything they want on the Internet and have anyone read it. An editor or a publish does not have to approve when one speaks their mind (Baase 144).
2. (Comprehension) Summarize what is being discussed within this chapter?
In this chapter the author discusses the difficulties that the law has with keeping up with technology. Technology changes at a much faster rate than the law can keep up with, thus leading to numerous laws and regulations that cannot be enforced because there are no laws that stand up for the wrong that is being done online. The Internet has made it possible for anyone to publish anything online and it can be viewable by anybody (Baase 144). Spam filters and blocks only do so much, and the majority of information can still come through to viewers. This means that even children can see adult material because there is no way of blocking certain viewers (Baase 2008).
3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I think that a new solution should be something that goes along with the ever-changing technology, something that is high tech. I think that some form of finger print scanning or facial recognition should be used to identify who is using the computer and what sites they are going on. For example if a child is trying to go on adult sites, there face and finger print will be scanned and they will be subsequently blocked from the sites. This is a more foolproof way to install security systems in a computer and to monitor what is actually happening online.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Internet fraud and misrepresenting oneself on the Internet is similar to misrepresentation that does not take place on the Internet. For example, a pedophile will pretend to be a child’s friend and lure there under the false pretense of candy or helping them find a lost puppy. This is comparable to people posting a picture that is them from fifteen years ago, and claiming that it was taken yesterday. This relates to Bloom’s Taxonomy because everything that happens on the Internet needs to be evaluated-whether it is by the person who is making the site, an online database controller, or a child’s parent. The synthesis of information from the Internet in to a child’s mind has an impact on their entire life and their actions and behavior. Analyzing these problems takes time by experts and computer analysts who together can make the Internet a safer place for children and for those just trying to find information.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because it is true and relates to almost everyone’s life. Most people do not go through their day without going on the Internet at least once, and while looking for relevant information we come across numerous different pop-ups and spam that we have no desire to see. Anyone can publish anything on the Internet, which is proven by sites such as Wikipedia where anyone can edit what the article is saying (Baase 144). Potential threats are not always visible online because it can never be known who is on the other side of a chat room, or an article that is being read (Baase 152). There have been numerous laws that have been passed to help stop children’s exposure to inappropriate materials online, such as the Child Online Protection Law, 1998 (Baase 154) or the 1996 Child Pornography Prevention Act (Baase 151) but the laws include broad or vague regulations and therefore cannot always be enforced (Baase 153). After reading this information I believe, even more so than before, that the government and lawmakers need to do more to keep up with the Internet and technology that is rapidly changing. Without new laws that keep up with technology then there will be a lot more ways for people to harm others on the Internet and they will be able to get away with it, since there will be no laws preventing their actions.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
The topic is relevant in today’s society because now more than ever the Internet is one of the main focuses of the majority of people’s lives. I know that when I use the Internet pop-ups come up that are supposed to be blocked by spam filters, or inappropriate web sites will come up when I type something in to Google or Yahoo. Since I am older I know what to do when events such as those occur, but I realize that someone who is younger might not know how to react to those instances and will therefore get him or herself in to a bad situation. Ethically people’s rights especially to privacy can be violated on the Internet, and the fact that people have the possibility of being exposed to things online that they would not usually want to be exposed to.
References
A Gift of Fire by: Sara Baase, 2008
No comments:
Post a Comment