Sunday, April 17, 2011

Chapter 8 (8.1,8.2)

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 8 (8.1, 8.2)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Computer data glitches
b. Are computer-controlled devices too unsafe to use? (405)
c. Therac-25 gave massive overdoses of radiation (425).

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in chapter 8 is how computer-controlled devices can sometimes inconvenience society. We only think of how beneficial the devices can be, but this chapter points out the disadvantages of having so many computer-controlled devices such as Therac-25. Therac-25 was a computerized radiation therapy. Therac-25 involved massive overdoses and resulted in deaths and serious injuries. For more info go to: http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation that I have experienced with these glitches is something that involves my father. My father was born 100% deaf. He cannot hear anything and he does not speak. He has a voice, but because of his inability to hear sounds he cannot pronounce words or letters therefore he must use sign language. Doctors have always wanted him to test out the new and improved cochlear implant. Finally we convinced my father to try it out just to see if it would improve anything for him. They tried the cochlear implant on my father, but it did not go over so well. He was in severe pain everyday because he was not used to the everyday noise that we hear. I felt so sorry for him because a simple sound like a car driving by sounded to him like he was standing next to 100 fireworks. When he went back to the doctor he asked to have the implant taken out because he’d rather be deaf than have to deal with that kind of pain every single day. I did not blame him. This just goes to show that even though technology is progressing a lot nowadays, it doesn’t mean that everything is going to be perfect.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Something similar to this situation that doesn’t have anything to do with technology is saving money in your piggy bank instead of the bank. You don’t feel like going to the bank every time you get your paycheck so you just end up saving your money in your own little homemade piggy bank. Everyday you count your money and there is the same amount everyday until one day you realize that instead of saving more money, there is less money in the piggy bank. You can’t remember if you may have taken money out of the piggy bank to use it in case of an emergency. You recount all the money and put your next paycheck in and realize that again you have less money than you did when you counted it the week before. Now you begin to wonder if you are miscounting it yourself. Then you start to think if someone is stealing your money when you’re not around so you hide the piggy bank in another spot. Eventually the money saving becomes consistent and you realize that your little brother or sister has been stealing your money all along and now that they cannot find where you have hidden it this time, they can’t steal any of your money. This compares to bank statements. Sometimes the computer glitches cause your account to have more many than you thought you had or it can cause your account to be overdrawn and you will be charged for going over your balance. Sometimes you just never know if you are making your own personal mistake or if it is the computers that have made the mistake. This applies to Bloom’s taxonomy because when using computer-controlled devices you have to be extra careful to make sure that you are not making any mistakes and make sure that the computer as well isn’t making any errors. Even though computers do things faster and easier, it doesn’t always mean that they are right.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in this article because we rely so much on computer-controlled devices to do everything for us and we don’t realize how many errors can be made. Many people have suffered from the inconveniences of these devices such as the people of the Therac-25 incident. They called Therac-25 the “fatal dose” because in1985 the radiation-treatment device began blasting holes through patients’ bodies and many suffered injuries and deaths of this device. I found more information at this site: http://www.ccnr.org/fatal_dose.html

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?


This topic is most definitely relevant in today’s society because I think the more advanced technology gets the more we rely on computer-controlled devices. I don’t think that we realize the disadvantages of the devices because we depend on them so much to get things done quicker and easier. After reading chapter 8 I realized how unsafe these devices could be to not only us, but to our environment as well. I, myself love technology such as my cell phone and laptop, but at the same time is it benefitting me as much as I think it is? After reading this chapter, I think not! I realized that these devices have caused a lot of havoc in this world and we need to take a step back and re-think our processes before we dig ourselves into a deeper hole and can’t get out. Our society needs to be a little more independent when it comes to relying on technology devices for EVERYTHING!

Thursday, April 7, 2011

Chapter 6 (Part 2)

Name: Chelsie Suttell Class time: 11 am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 6 (part 2)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Increased security of a business and monitoring of employees (337).
b. How the system manager can access any e-mails even though there is a password in effect.
c. Monitoring for certain purposes are legal.

2. (Comprehension) Summarize what is being discussed within this chapter?

In chapter 6 it discusses how employers can monitor their employees every move while on the job. “In virtually all systems, the system manager can access anything on the system” (339). It goes on to discuss how monitoring the employee’s moves could affect the business environment.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation that I have encountered with the situation discussed above is when I applied to Tully’s good times restaurant. When I was being interviewed the first question they asked me was “Do you have an active face book or twitter account?” At first my reaction was surprised and confused and I subtly said, “Yes, I do” and they asked for my account information. Then the interviewer explained to me why she asked such a question that seems to be irrelevant. She said the reason why she asked is because they wanted to make sure my personal life would not interfere with their business and that I could be a respectable and responsible employee. After that interview I went home and thought a lot about my face book account. A week later I deleted my account because it made me uncomfortable that anyone could watch my every move of my personal life. Now that I do not have a face book account people need to get to know me in person, not by the Internet.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

This situation applies to a parent watching a young child. Although the child isn’t being interviewed for a job, they are being taught the manners of the real world. A parent must watch a child’s every move when they are extremely young because when as child is so young, they are like a sponge. They absorb everything they see, whether it be right or wrong so the parent is there to make sure that the child is making the right choices so that in the long run they have a good successful life.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the chapter. Although it was scary to me to know that my boss could see everything I was doing, I still understand that it had to be done in order to make sure all the employees would be responsible workers. As a business owner I would most likely do the same thing to make sure that my business is being ran the right way by my employees. After reading this chapter I will be more careful of what I say in my e-mails especially if they are in my professional workplace.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This is relevant in today’s society because it is so easy for employees to stray off of their work with networks like twitter or face book etc. I have not had a face book in over a year and I have found that I am much better without it. I am not so concerned with everyone else’s lives and I am more concerned with my own. I am much better at doing the tasks that need to be done rather than going on face book all the time. Therefore, I do think that being able to monitor certain activities in a workplace is acceptable.

Tuesday, April 5, 2011

Chapter 6 (part 1)

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 6 (Part 1)

1. (Knowledge) Tell three interesting elements of this chapter:
a. Computers and communications networks are causing changes in the size of businesses and the number of people who are self-employed (308).
b. Fears of mass unemployment.
c. Computer technology did not cause mass unemployment (312).

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in chapter 6 is how technology destroys some jobs and creates others. Computers have created new products and services, whole new industries, and millions of jobs (310).


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Like the example on page 310 in chapter 6 about how a sewing machine meant a reduction in the price of clothes, being able to work from home on your computer also makes it easier and cheaper for everyone. Although being able to work from home doesn’t make it cheaper in the same aspect, it makes it cheaper in the way that we don’t have to use up gas to travel to work everyday. We don’t have to use so much electricity in office buildings.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

One situation I can compare to a situation that does not concern technology is coaching a sports team. The more kids there are that play sports the more coaches that are needed to coach the teams. Therefore, it creates more jobs. I’m not exactly sure if this example goes with what were talking about in chapter 6, but what I got out of it is that technology creates more jobs, faster and easier. So I tried to link something together without technology and came up with coaching a sports team. This connects to bloom’s taxonomy because I followed all the steps to come up with it.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in this chapter because technology definitely does eliminate some jobs and creates others. “A successful technology eliminates some jobs, but creates others” (310). “At the same time, computers eliminate more high-skilled jobs than older technologies” (315). Now that technologies have become more advanced, people are required to have higher education in order to work in highly skilled and highly trained intellectual elite. This chapter has made me conclude that going to college with benefit me in the future because the more education I get, the more chances I will have at making good money in the real world.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very relevant in today’s society because the more advanced technology gets the more qualified a person must be to get a certain job such as an engineer. Some ethical evaluations that can be made from this chapter are people going to college not because they want to, but because they have to and they know it is the right choice. Going to college gives a person more benefits and allows a person to have more opportunities throughout their lives. After reading this chapter I realized how important college education is and what it could determine for my future.

Monday, March 21, 2011

Chapter 5, Section 5.1, 5.2, 5.3

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 5 (5.1, 5.2, 5.3)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Crimes committed with computers and on the Web are more devastating. (253)
b. What a hacker actually is and what they actually do.
c. Our identity has become a series of numbers. (273)

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in this chapter is how much easier it has become for people to commit crimes on the Web. The Web has made it easier and more efficient to commit a crime within your own home.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A new solution for this problem is to have more security blocks on the Web. For instance when a credit card is being used, there should be a series of security questions asked to the customer instead of personal information such as their social security number. “Our identity has become a series of numbers” (273). Any website that asks for your social security number should be a red flag right away that it could be a fraud.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A situation like the one I discussed above would be similar to a situation of crime that happened before the Internet was created. For example, being pick-pocketed down the street was a huge problem in the city at one point. A lot of homeless people would steal wallets from people walking down the street in order to get some cash right away. This made people want to carry their money more securely rather than in their pockets (Chapter 5, 5.1). New ideas that I could contribute would be to add more security questions and have a way to authorize a website so that people would know it was safe and efficient. This applies to Bloom’s taxonomy because when using the Web you must go through all the steps in order not to get caught up in a fraud. Bloom’s taxonomy gives all the proper steps so that we don’t make a mistake that could get our personal belongings stolen.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what has been said about how much easier committing crimes has gotten since the Web has come along. “Crimes committed on the Web are more devastating and harder to detect that similar crimes committed without computers” (253). I will not be much more careful when ordering things online and I will make sure that every website I order from is authentic. I am more skeptical about websites like EBay and craigslist because you never know who could be handling your personal information and that scares me.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is absolutely relevant in today’s society because everyday people find easier ways to manipulate the system and steal other people’s personal information. I have been a victim of fraud before when I ordered a pair of “Uggs” from a fake website. The website had all the logos of the Ugg brand it was just that the prices were a little cheaper so I decided to save a little money. When I got the Uggs after they were shipped to my house I realized that the Uggs I had bought from this site were totally different from the real Uggs that I had bought at the store in the Galleria Mall. From now on I will be more aware of what I am purchasing on the Internet.

Sunday, March 13, 2011

Chapter 4- Part 2

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: 4.4, 4.5, 4.6, and 4.7

1. (Knowledge)Tell three interesting elements of this chapter:
a. Should search engines need authorization for the copying essential to the search service? (232)
b. Converting books in the public domain to digital format.
c. Should all software be open-source?

2. (Comprehension) Summarize what is being discussed within this chapter?

In chapter four the main topic that is being discussed is whether search engines are committing copyright infringement. “In Kelly v. Arriba Soft an appeals court ruled that copying images from Webs pages, converting them to thumbnail images, and displaying the thumbnails to search engine users did not infringe copyrights” (232). This is highly controversial. What is also discussed is the way that textbooks have been downloaded to computers into digital format to make the books online.

3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Something that I have experienced is the fact that I know get to view my textbooks online. It makes it so much easier because I don’t have to worry about losing my book or carrying it around all day. I love the fact that my schoolbooks are so easy to access.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Something that I can compare to the situations in this chapter is working out at the gym. The more you work out, the easier things get. You feel happier, you look better, and you are healthier on the outside and inside. This compares to being able to download your schoolbooks online. The more that you are able to do on software, the easier things get for us as humans.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do not agree with whether search engines should have authorization for the copying essential to search services. Why should they need authorization? They are helping society out by putting more useful information on the Internet.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I do think that this topic is relevant in today’s society because some people use search engines to their advantage and others take advantage of it and create copyright infringement which ruins it for the rest of us that actually use the search engines for useful situations.

Watching/ Thoughts Sheet: Steal This Film

Your Name: Chelsie Suttell Class time: 11 AM
SHOULD BE NO LONGER THAN 2 PAGES

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay

Who is the Pirate Bay? What do they stand for? What is their mission?


1. Name, and define, 3 significant people interviewed in the movie (Knowledge):
a. Lawrence Liang – Alternative Law Forum, Bangalore
b. Sebastian Lutgert – Pirate Cinema
c. Dan Glickman – Chairman, MPAA


2. What are the main ideas being discussed within this movie? (Comprehension)

The main ideas being discussed in Steal this Film are whether downloading torrents should be considered legal or illegal and whether it is a good thing for our future or if it can hurt us in the future.

3. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (Comprehension)

Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data in little amounts of time. It is a technological advancement because it has allowed us to make copies of books, newspapers, records, etc. This has made it a lot easier to distribute large amounts of information in very little time.

4. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, and/or society at large– BE SPECIFIC (Application)?

Being able to download music has become a part of my daily life. Because I am a college student and all my money goes to my tuition and schoolbooks, I do not exactly have the money to pay a dollar a piece for every song I want to have. I download approximately 100 songs a month. If I bought my music, it would cost me 100 hundred dollars a month just to get the music that I want to listen to. Being able to download my music for free has allowed me to explore my own imagination and creativeness. I am sure that I am not the only one who has this experience. There are always people walking around campus with their headphones in listening to music and I can guarantee that at least 85% of those students do not buy their music legally due to the fact that it is so easy to download them for free.

5. Analyze what you’ve watched. What is the future of distribution, production and creativity? Has society achieved its main goal in relation to Intellectually Property? (Analysis)

I believe that there is a lot in store when it comes to distribution, production, and creativity. Downloading torrents and other files has allowed many young artists to grow easy and in a timely manner. There are many bands that I have listened to from downloading their music for free that I would have never known if networks like Pirate Bay or Lime wire did not exist. It has allowed someone like me be able to get something as simple as a song quick and easy as well. I think that the future holds great things. Although society has achieved many goals, I do not think we have achieved the main goal when it comes to intellectual property yet.

6. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? (Analysis)?

I do not think that downloading is stealing someone’s intellectual property because we are only promoting his or her work, not stealing it. Like I said before, there are many bands that I have listened to that I wouldn’t have normally listened to if I weren’t able to download it. Therefore, the work is more popular because of its exposure.

7. How will the issues of copyright and Intellectual property affect the world in 50 years? BE SPECIFIC (SYNTHESIS)

I think that the issues of copyright and Intellectual property will affect the world in 50 years dramatically. It has already made a huge impact on society today and I know it can only get more technical.

8. Do you agree with what is being said within movie? What shifts in your opinion on this topic have happened from watching this film? What new ideas have you created after watching and thinking about this film? (Evaluation)

I agree with the fact that downloading files is not illegal. I can guarantee that almost everyone in the world has done it at least once in their lives. Although I do think it should not be considered illegal, I do think that there should be a line drawn. People should not be able to alter another persons work. I believe that should be illegal. After watching this film, I will be more careful of what I download and make sure that I am not stepping on anyone’s toes while downloading files.

Sunday, March 6, 2011

Chapter 4- Part 1

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 4, 4.1-4.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. How the Internet effects copyright so strongly.
b. Computers made high quantity distribution easy and cheap.
c. Napster and copyright infringement.

2. (Comprehension) Summarize what is being discussed within this chapter?

The main topic being discussed in this chapter is copyright. What is infringing upon copyright and how more recent technology has made it easier to breakthrough copyright legally and illegally.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

An example from chapter four that I have experienced is the Napster case. Instead of using Napster though, I used Lime wire. Both are services used to download free music. “Napster opened on the Web in 1999 as a service allowing users to copy songs in MP3 files from the hard disks of other users” (Baase 209). Napster was investigated because it was considered illegal by the legal system. It was supposedly infringing upon copyright issues, as well as the service I had used (Lime wire). Eventually Lime wire was shut down by court investigations and it was no longer available to any users to download MP3s.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A situation I can compare that does not apply to computers, technology, or the Internet is when you buy a new pair of shoes and your best friend happens to love them. The next day she shows up with the same exact shoes that you had bought and takes all the credit for YOUR fashion sense. Although it is not illegal to do this, it is against social and moral code. It would make me very angry if someone took something that I came up with and took full credit for MY idea. “In the 1960’s growth in illegal sales of unauthorized copies of recorded music accompanied the growth of the music industry” (Baase 204). Not only has illegally downloading music put a big slump in the economy of the music industry, it has also caused a lot of viruses in our computers because some of the MP3 files that we download are not safe for our software. Reading this article made me think about Bloom’s Taxonomy and how it comes into place when it comes to sharing and downloading music. I must apply all the steps of Bloom’s taxonomy to make sure that what I am doing is safe. I also need to realize whether it is illegal or not and if I am infringing upon a certain software’s copyright.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the article. I agree with the fact that making unauthorized copies of music should be illegal because it is stealing in everyway. It is just easier to do because you are in the comfort of your own home without everyone witnessing your illegal act. Although I commit the act myself, it has become an everyday thing to be able to download music for free. I try to buy as much of my music as possible because it is much better quality, but when I don’t have the money to do so, downloading MP3s is my last resort. “Almost 100 million MP3 files were available on the service. A survey by Webnoize of more than 4,000 college students found that almost 75% of them used Napster at least once a month” (Baase 209). A conclusion I have drawn after reading this chapter is to be more careful with what I am doing on these services because they are illegal and it could put me in legal danger if I am not more aware of what I am infringing upon.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is more than relevant in today’s society because recent technologies have made it incredibly easy to infringe upon copyright issues. “Computers and communications technologies made high quality copying and high quantity distribution extremely easy and cheap” (Baase 201). For example, high-speed broadband Internet connections have made it easy to make quick transfers of huge files. Before recent technologies, individuals themselves did not have to worry about copyright law, but now with all the MP3 download services it has become more common for individuals to deal with.




References

Baase, Sara. “A Gift of Fire.” Copyright Law and Significant Cases: (January 2008): 197-212.