Tuesday, April 24, 2012

Chapter 6: Work, Guest speaker Ken Fick, CPA, MBA

1. Do you think it is more effective to have meetings by telecommuting rather than in person?
2. How common is it in your line of work to have meeting by telecommuting?

Midterm: 2 Questions about the assinment

1. What happens if we are with people using technology?
2. What if there is an emergency?

Sunday, April 8, 2012

Chapter 4: Part 1, Intellectual Property

Name Matt Halla Class
time: 11 am
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author:
Sara Basse
Date
of Publication: 2008
Book:
A Gift Of Fire
Sections
read: 4.3-4.7

1.
(Knowledge)Tell
three interesting elements of this chapter:
a.
Some
companies buy a bunch of domain names, not to use them but to not allow others
from using them.
b.
The
free-software movement doesn’t believe that copyright should protect software
at all and it should be open and free to all.
c.
There
is a lot of controversy over whether patents are good protection for software.

2.
(Comprehension)
Summarize what is being discussed within this chapter?
The
discussion in this chapter is about protection on the web and software that is
put out for all to see. There is a large debate over patenting programs and
whether they consist of an actual new idea or are just writings. Also there is
the movement of free software that tells us software should be free for
everyone. There are many laws and lawsuits over domain names and protections a
company and different software that is put out.



3.
(Application)Name
a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
I
feel that software should be free because some programs are very expensive and
if you need them then you have to shell out the cash. If you don’t have money
to get a specific program that you may need, then you may fail at whatever it
may be whether a job or school. There are websites that allow you to get free
programs, movies, music, books, etc. this relates to how the free-software
movement wants all software to be open and free for everyone to enjoy. I use a
program called bit torrent that allows me to download, off specific websites,
many programs and such that I want for free.



4.
(Analysis)Address
ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to
computers, technology, or the Internet? Be sure to reference the chapter and
your solution. What ideas NEW can you add to the issue that is being presented
within the reading? Try to connect what you have
by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.

An
example of this would be like Wal-Mart. Wal-Mart has many items for cheap and
can sell for lower than many smaller stores in the area. When a big store like
Wal-Mart moves into an area it usually puts many small businesses out just like
how companies will buy domain names just so that others cannot use them.



5.
(Synthesis)
Address all that apply. Do you agree with what is being said within the article
(Why/Why not? Back up with FACTS)? What
new conclusions can you draw about this (or other topics) after reading this
material?
I
agree with this chapter and the free software movement ideas. I think that
software should be free for everyone. I use the program to get free software
because I don’t want to pay for a program that I would like to try out and see
what it’s about instead of wasting my money. This is like how in the movie TRON
the owner of the company saw where they were going and wanted to charge for
their program, so he stole it and put it on the internet for free to get back
at the executives.


6.
(Evaluation)
Address all that apply. Judge whether or not this topic is relevant in today’s
society? Evaluate why you are viewing the topic in this manner based on your
experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading
this chapter?

This
is relevant in today’s society because there are more lawsuits and law
regarding downloading different things off the internet and what names you use.
Mp3 files have gotten more and more notice ever since napster was forced to
start charging for their music and after they were not free anymore limewire,
frostwire, torrents, and many other programs popped up for p2p (person to
person) sharing. Many people use these programs and share all kinds of files
with each other without ever paying for anything.

Sunday, March 11, 2012

Chapter 3: Part 1: Freedom of Speech

Name Matt Halla Class
time: 11 am
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author:
Sara Basse
Date
of Publication: 2008
Book:
A Gift Of Fire
Sections
read: 3.1

1.
(Knowledge)Tell
three interesting elements of this chapter:
a.
Any business, organization, or person can set
up a web site
b.
Cigarette ads are legal in magazines, but
banned from radio, television, and all electronic media under the FCC.
c.
In 1996, the main parts of the first major
internet censorship law, the Communications Decency Act, were ruled
unconstitutional.

2.
(Comprehension)
Summarize what is being discussed within this chapter?
This
chapter discusses the freedom of speech and how it’s not as free as you think
it is. There is much that is censored by the FCC and you really can’t say or
post anything you like without getting in trouble. The first amendment was
written to prevent offensive and controversial ideas and speech, but it seems
to have been taken farther than that.



3.
(Application)Name
a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
This
is similar to a movie I seen called “Fahrenheit 9/11” where the director,
Michael Moore, drove in a circle around the capitol building reciting the Patriot
Act and got pulled over and told to leave and to stop what he was doing.



4.
(Analysis)Address
ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to
computers, technology, or the Internet? Be sure to reference the chapter and
your solution. What ideas NEW can you add to the issue that is being presented
within the reading? Try to connect what you have
by reading this article and how it applies to the stages in Bloom's taxonomy in
2 full sentences.
No
matter where you go in life something is censored. Censorship isn’t just
confined to the internet and newspapers. There are things we can’t say or do
out in public but by yourself or in your home with people you can say what you
wish.


5.
(Synthesis)
Address all that apply. Do you agree with what is being said within the article
(Why/Why not? Back up with FACTS)? What
new conclusions can you draw about this (or other topics) after reading this
material?
I
agree that some stuff needs to be censored so that everyone can’t see or read
it. For example, porn on the internet or in stores should not be allowed to be
viewed by younger individuals, but some things said on tv I don’t see why it’s
censored because you can still hear the beginning or the word and still
understand what word was said. Also I think after a certain hour when kids aren’t
going to be watching tv there shouldn’t be as much censorship.


6.
(Evaluation)
Address all that apply. Judge whether or not this topic is relevant in today’s
society? Evaluate why you are viewing the topic in this manner based on your
experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading
this chapter?
This
topic is relevant in today’s society because there have only been more things
censored and if there are enough people who are offended by something then it
will be removed and usually a fine is issued. Michael Moore’s movie came out
2004 and was much about censorship and the government. As the FCC makes the
regulations for censorship, it’s all up to the people running it to say what’s
offensive and what can be shown or read.

Monday, March 5, 2012

Chapter 2: Part 2

Name Matt Halla Class
time: 11 am
KEEP THIS
TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara
Basse
Date of
Publication: 2008
Book: A
Gift Of Fire
Sections
read: 2.3-2.5

1.
(Knowledge)Tell
three interesting elements of this chapter:
a.
For decades
most cryptographers worked for the NSA.
b.
Eavesdropping on cell phone calls was a
popular form of industrial spying in the 1980s.
c.
An FTC study found that 89% of sites aimed at
children collected personal information and only 23% asked children to get
permission from a parent to provide the information.

2.
(Comprehension)
Summarize what is being discussed within this chapter?
This chapter
discusses how privacy has changed in the past few decades. IDs have been faked
to gain access to a person’s personal information. Social security numbers have been taken and mistaken
for other people. Companies have found many clever ways to get our information,
a lot of the time without us evening knowing. Social networking sites have made
it easier for companies and people to look up someone and find out whatever
they put on.



3.
(Application)Name a specific example or NEW solution
for this type of problem/similar situation in
society or that you have experienced – be
specific and explain?
Most cell
phones now have an internal gps so you can find your way or look up a family member
by their phone signal. This could also be used by others to find you or track
what you’re doing and where you’re going.



4.
(Analysis)Address
ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to
computers, technology, or the Internet? Be sure to reference the chapter and
your solution. What ideas NEW can you add to the issue that is being presented
within the reading? Try to connect what you have by reading this
article and how it applies to the stages in Bloom's taxonomy in 2 full
sentences.
During the
civil war, they used codes inside of letters and newspapers to tell others in the
group where to meet or what the plan was. Only the few in the group knew what
letters to look for and they made it difficult for others to break the code. Most
had a group of letters and numbers that they used to decode whatever they
needed to send.


5.
(Synthesis) Address
all that apply. Do you agree with what is being said within the article
(Why/Why not? Back up with FACTS)? What
new conclusions can you draw about this (or other topics) after reading this
material?
I agree that
companies and websites take our information without us knowing. Also, the signals
that our phones send out can be tracked by people to find out what we are
doing. I can see that our privacy isn’t as safe as we would like to think. There
is a lot that we don’t know about where our information is going or who is
reading it.


6.
(Evaluation)
Address all that apply. Judge whether or not this topic is relevant in today’s
society? Evaluate why you are viewing the topic in this manner based on your
experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions
were made/can be assumed from this chapter? What new ideas will you make after reading
this chapter?


This is
relevant in our society today because as technology has increased there have
been more privacy issues. There isn’t much in this world that is actually
private anymore. There is always a way that someone can track you or get your
information. Most of us have cell phones and the technology that they use allows
others to watch what we are doing, just like the computers and the internet.

Wednesday, February 29, 2012

Chapter 2: Video and Reading Connections

Name: Matt Halla Class time: 11 AM

1. Explain data mining:
Data mining is when companies go through social networking, credit checks, etc. to see how a person acts and using their time before even seeing them or knowing who they are as a person. This is taking our privacy away by having companies look into everything we are doing outside of what they expect for everyone.



2. Relate data mining to privacy issues, specifically citing something you read in Baase, Orwell, etc.

Data mining is like the “big brother” in Orwell’s 1984. The Big Brother isn’t always watching but can at any point in time check what any person is doing. This is just like how when you apply for a job, or already have one, and the company can go look you up on facebook or look at your records to see if you are a threat to their company in any way.


3. Explain Ashley Paynes’s situation:

Ashley Payne was a teacher who was forced to resign from her school from alleged pressure from the principal. She had taken about 700 photos on her vacation and posted them on her facebook page. 10 of these photos had her with an alcoholic beverage in the picture and the school didn’t think that this was proper for a teacher to have out in the world. Also, she had used the word “bitch” in a posting which didn’t go over well for the school either. The use of the word was for a popular game she was going to engage in playing. For this she resigned because of the pressure put on her from the school.




4. Were Ashley Payne’s rights violated? Did the school district have just cause for asking for her resignation? Base your answers off of what you have learned about privacy, show connections to Baase, Orwell, etc and support your opinion.

I think that her rights were violated because she is old enough to have a drink and she wasn’t falling over drunk. Facebook is an open site where you can look up people but what people do in their free time shouldn’t affect their job if it’s nothing that a normal person would engage in. If it’s in a tasteful manner there shouldn’t be a problem with anyone having a drink or using a specific word.




5. Summarize the video “Police surveillance cameras are stopping crime or invading their privacy by Alex Dunbar.”


There was an attempt by the Syracuse police department to stop crime by installing video cameras on the corners of streets. This caused much discussion in the neighborhood about whether or not its was for protection or just so that they can watch everyone.




6. Are police surveillance and traffic cameras are stopping crime or invading your privacy? Base your answers off of what you have learned about privacy, show connections to Baase, Orwell, etc and support your opinion.
I think that the cameras are a good idea to put out and try to catch people committing crimes that would have otherwise gone unnoticed. There is a positive and negative side to everything that is done but I think that by putting them up there is more of a positive aspect than a negative one. This would be a slight invasion of privacy but if they hid them then who knows where they will be.