Monday, March 5, 2012

Chapter 2: Part 2

Name Matt Halla Class
time: 11 am
KEEP THIS
TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara
Basse
Date of
Publication: 2008
Book: A
Gift Of Fire
Sections
read: 2.3-2.5

1.
(Knowledge)Tell
three interesting elements of this chapter:
a.
For decades
most cryptographers worked for the NSA.
b.
Eavesdropping on cell phone calls was a
popular form of industrial spying in the 1980s.
c.
An FTC study found that 89% of sites aimed at
children collected personal information and only 23% asked children to get
permission from a parent to provide the information.

2.
(Comprehension)
Summarize what is being discussed within this chapter?
This chapter
discusses how privacy has changed in the past few decades. IDs have been faked
to gain access to a person’s personal information. Social security numbers have been taken and mistaken
for other people. Companies have found many clever ways to get our information,
a lot of the time without us evening knowing. Social networking sites have made
it easier for companies and people to look up someone and find out whatever
they put on.



3.
(Application)Name a specific example or NEW solution
for this type of problem/similar situation in
society or that you have experienced – be
specific and explain?
Most cell
phones now have an internal gps so you can find your way or look up a family member
by their phone signal. This could also be used by others to find you or track
what you’re doing and where you’re going.



4.
(Analysis)Address
ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to
computers, technology, or the Internet? Be sure to reference the chapter and
your solution. What ideas NEW can you add to the issue that is being presented
within the reading? Try to connect what you have by reading this
article and how it applies to the stages in Bloom's taxonomy in 2 full
sentences.
During the
civil war, they used codes inside of letters and newspapers to tell others in the
group where to meet or what the plan was. Only the few in the group knew what
letters to look for and they made it difficult for others to break the code. Most
had a group of letters and numbers that they used to decode whatever they
needed to send.


5.
(Synthesis) Address
all that apply. Do you agree with what is being said within the article
(Why/Why not? Back up with FACTS)? What
new conclusions can you draw about this (or other topics) after reading this
material?
I agree that
companies and websites take our information without us knowing. Also, the signals
that our phones send out can be tracked by people to find out what we are
doing. I can see that our privacy isn’t as safe as we would like to think. There
is a lot that we don’t know about where our information is going or who is
reading it.


6.
(Evaluation)
Address all that apply. Judge whether or not this topic is relevant in today’s
society? Evaluate why you are viewing the topic in this manner based on your
experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions
were made/can be assumed from this chapter? What new ideas will you make after reading
this chapter?


This is
relevant in our society today because as technology has increased there have
been more privacy issues. There isn’t much in this world that is actually
private anymore. There is always a way that someone can track you or get your
information. Most of us have cell phones and the technology that they use allows
others to watch what we are doing, just like the computers and the internet.

No comments:

Post a Comment