Sunday, April 17, 2011

Chapter 8 (8.1,8.2)

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 8 (8.1, 8.2)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Computer data glitches
b. Are computer-controlled devices too unsafe to use? (405)
c. Therac-25 gave massive overdoses of radiation (425).

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in chapter 8 is how computer-controlled devices can sometimes inconvenience society. We only think of how beneficial the devices can be, but this chapter points out the disadvantages of having so many computer-controlled devices such as Therac-25. Therac-25 was a computerized radiation therapy. Therac-25 involved massive overdoses and resulted in deaths and serious injuries. For more info go to: http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation that I have experienced with these glitches is something that involves my father. My father was born 100% deaf. He cannot hear anything and he does not speak. He has a voice, but because of his inability to hear sounds he cannot pronounce words or letters therefore he must use sign language. Doctors have always wanted him to test out the new and improved cochlear implant. Finally we convinced my father to try it out just to see if it would improve anything for him. They tried the cochlear implant on my father, but it did not go over so well. He was in severe pain everyday because he was not used to the everyday noise that we hear. I felt so sorry for him because a simple sound like a car driving by sounded to him like he was standing next to 100 fireworks. When he went back to the doctor he asked to have the implant taken out because he’d rather be deaf than have to deal with that kind of pain every single day. I did not blame him. This just goes to show that even though technology is progressing a lot nowadays, it doesn’t mean that everything is going to be perfect.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Something similar to this situation that doesn’t have anything to do with technology is saving money in your piggy bank instead of the bank. You don’t feel like going to the bank every time you get your paycheck so you just end up saving your money in your own little homemade piggy bank. Everyday you count your money and there is the same amount everyday until one day you realize that instead of saving more money, there is less money in the piggy bank. You can’t remember if you may have taken money out of the piggy bank to use it in case of an emergency. You recount all the money and put your next paycheck in and realize that again you have less money than you did when you counted it the week before. Now you begin to wonder if you are miscounting it yourself. Then you start to think if someone is stealing your money when you’re not around so you hide the piggy bank in another spot. Eventually the money saving becomes consistent and you realize that your little brother or sister has been stealing your money all along and now that they cannot find where you have hidden it this time, they can’t steal any of your money. This compares to bank statements. Sometimes the computer glitches cause your account to have more many than you thought you had or it can cause your account to be overdrawn and you will be charged for going over your balance. Sometimes you just never know if you are making your own personal mistake or if it is the computers that have made the mistake. This applies to Bloom’s taxonomy because when using computer-controlled devices you have to be extra careful to make sure that you are not making any mistakes and make sure that the computer as well isn’t making any errors. Even though computers do things faster and easier, it doesn’t always mean that they are right.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in this article because we rely so much on computer-controlled devices to do everything for us and we don’t realize how many errors can be made. Many people have suffered from the inconveniences of these devices such as the people of the Therac-25 incident. They called Therac-25 the “fatal dose” because in1985 the radiation-treatment device began blasting holes through patients’ bodies and many suffered injuries and deaths of this device. I found more information at this site: http://www.ccnr.org/fatal_dose.html

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?


This topic is most definitely relevant in today’s society because I think the more advanced technology gets the more we rely on computer-controlled devices. I don’t think that we realize the disadvantages of the devices because we depend on them so much to get things done quicker and easier. After reading chapter 8 I realized how unsafe these devices could be to not only us, but to our environment as well. I, myself love technology such as my cell phone and laptop, but at the same time is it benefitting me as much as I think it is? After reading this chapter, I think not! I realized that these devices have caused a lot of havoc in this world and we need to take a step back and re-think our processes before we dig ourselves into a deeper hole and can’t get out. Our society needs to be a little more independent when it comes to relying on technology devices for EVERYTHING!

Thursday, April 7, 2011

Chapter 6 (Part 2)

Name: Chelsie Suttell Class time: 11 am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 6 (part 2)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Increased security of a business and monitoring of employees (337).
b. How the system manager can access any e-mails even though there is a password in effect.
c. Monitoring for certain purposes are legal.

2. (Comprehension) Summarize what is being discussed within this chapter?

In chapter 6 it discusses how employers can monitor their employees every move while on the job. “In virtually all systems, the system manager can access anything on the system” (339). It goes on to discuss how monitoring the employee’s moves could affect the business environment.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A similar situation that I have encountered with the situation discussed above is when I applied to Tully’s good times restaurant. When I was being interviewed the first question they asked me was “Do you have an active face book or twitter account?” At first my reaction was surprised and confused and I subtly said, “Yes, I do” and they asked for my account information. Then the interviewer explained to me why she asked such a question that seems to be irrelevant. She said the reason why she asked is because they wanted to make sure my personal life would not interfere with their business and that I could be a respectable and responsible employee. After that interview I went home and thought a lot about my face book account. A week later I deleted my account because it made me uncomfortable that anyone could watch my every move of my personal life. Now that I do not have a face book account people need to get to know me in person, not by the Internet.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

This situation applies to a parent watching a young child. Although the child isn’t being interviewed for a job, they are being taught the manners of the real world. A parent must watch a child’s every move when they are extremely young because when as child is so young, they are like a sponge. They absorb everything they see, whether it be right or wrong so the parent is there to make sure that the child is making the right choices so that in the long run they have a good successful life.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the chapter. Although it was scary to me to know that my boss could see everything I was doing, I still understand that it had to be done in order to make sure all the employees would be responsible workers. As a business owner I would most likely do the same thing to make sure that my business is being ran the right way by my employees. After reading this chapter I will be more careful of what I say in my e-mails especially if they are in my professional workplace.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This is relevant in today’s society because it is so easy for employees to stray off of their work with networks like twitter or face book etc. I have not had a face book in over a year and I have found that I am much better without it. I am not so concerned with everyone else’s lives and I am more concerned with my own. I am much better at doing the tasks that need to be done rather than going on face book all the time. Therefore, I do think that being able to monitor certain activities in a workplace is acceptable.

Tuesday, April 5, 2011

Chapter 6 (part 1)

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 6 (Part 1)

1. (Knowledge) Tell three interesting elements of this chapter:
a. Computers and communications networks are causing changes in the size of businesses and the number of people who are self-employed (308).
b. Fears of mass unemployment.
c. Computer technology did not cause mass unemployment (312).

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in chapter 6 is how technology destroys some jobs and creates others. Computers have created new products and services, whole new industries, and millions of jobs (310).


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Like the example on page 310 in chapter 6 about how a sewing machine meant a reduction in the price of clothes, being able to work from home on your computer also makes it easier and cheaper for everyone. Although being able to work from home doesn’t make it cheaper in the same aspect, it makes it cheaper in the way that we don’t have to use up gas to travel to work everyday. We don’t have to use so much electricity in office buildings.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

One situation I can compare to a situation that does not concern technology is coaching a sports team. The more kids there are that play sports the more coaches that are needed to coach the teams. Therefore, it creates more jobs. I’m not exactly sure if this example goes with what were talking about in chapter 6, but what I got out of it is that technology creates more jobs, faster and easier. So I tried to link something together without technology and came up with coaching a sports team. This connects to bloom’s taxonomy because I followed all the steps to come up with it.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in this chapter because technology definitely does eliminate some jobs and creates others. “A successful technology eliminates some jobs, but creates others” (310). “At the same time, computers eliminate more high-skilled jobs than older technologies” (315). Now that technologies have become more advanced, people are required to have higher education in order to work in highly skilled and highly trained intellectual elite. This chapter has made me conclude that going to college with benefit me in the future because the more education I get, the more chances I will have at making good money in the real world.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very relevant in today’s society because the more advanced technology gets the more qualified a person must be to get a certain job such as an engineer. Some ethical evaluations that can be made from this chapter are people going to college not because they want to, but because they have to and they know it is the right choice. Going to college gives a person more benefits and allows a person to have more opportunities throughout their lives. After reading this chapter I realized how important college education is and what it could determine for my future.

Monday, March 21, 2011

Chapter 5, Section 5.1, 5.2, 5.3

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 5 (5.1, 5.2, 5.3)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Crimes committed with computers and on the Web are more devastating. (253)
b. What a hacker actually is and what they actually do.
c. Our identity has become a series of numbers. (273)

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in this chapter is how much easier it has become for people to commit crimes on the Web. The Web has made it easier and more efficient to commit a crime within your own home.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A new solution for this problem is to have more security blocks on the Web. For instance when a credit card is being used, there should be a series of security questions asked to the customer instead of personal information such as their social security number. “Our identity has become a series of numbers” (273). Any website that asks for your social security number should be a red flag right away that it could be a fraud.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A situation like the one I discussed above would be similar to a situation of crime that happened before the Internet was created. For example, being pick-pocketed down the street was a huge problem in the city at one point. A lot of homeless people would steal wallets from people walking down the street in order to get some cash right away. This made people want to carry their money more securely rather than in their pockets (Chapter 5, 5.1). New ideas that I could contribute would be to add more security questions and have a way to authorize a website so that people would know it was safe and efficient. This applies to Bloom’s taxonomy because when using the Web you must go through all the steps in order not to get caught up in a fraud. Bloom’s taxonomy gives all the proper steps so that we don’t make a mistake that could get our personal belongings stolen.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what has been said about how much easier committing crimes has gotten since the Web has come along. “Crimes committed on the Web are more devastating and harder to detect that similar crimes committed without computers” (253). I will not be much more careful when ordering things online and I will make sure that every website I order from is authentic. I am more skeptical about websites like EBay and craigslist because you never know who could be handling your personal information and that scares me.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is absolutely relevant in today’s society because everyday people find easier ways to manipulate the system and steal other people’s personal information. I have been a victim of fraud before when I ordered a pair of “Uggs” from a fake website. The website had all the logos of the Ugg brand it was just that the prices were a little cheaper so I decided to save a little money. When I got the Uggs after they were shipped to my house I realized that the Uggs I had bought from this site were totally different from the real Uggs that I had bought at the store in the Galleria Mall. From now on I will be more aware of what I am purchasing on the Internet.

Sunday, March 13, 2011

Chapter 4- Part 2

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: 4.4, 4.5, 4.6, and 4.7

1. (Knowledge)Tell three interesting elements of this chapter:
a. Should search engines need authorization for the copying essential to the search service? (232)
b. Converting books in the public domain to digital format.
c. Should all software be open-source?

2. (Comprehension) Summarize what is being discussed within this chapter?

In chapter four the main topic that is being discussed is whether search engines are committing copyright infringement. “In Kelly v. Arriba Soft an appeals court ruled that copying images from Webs pages, converting them to thumbnail images, and displaying the thumbnails to search engine users did not infringe copyrights” (232). This is highly controversial. What is also discussed is the way that textbooks have been downloaded to computers into digital format to make the books online.

3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

Something that I have experienced is the fact that I know get to view my textbooks online. It makes it so much easier because I don’t have to worry about losing my book or carrying it around all day. I love the fact that my schoolbooks are so easy to access.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Something that I can compare to the situations in this chapter is working out at the gym. The more you work out, the easier things get. You feel happier, you look better, and you are healthier on the outside and inside. This compares to being able to download your schoolbooks online. The more that you are able to do on software, the easier things get for us as humans.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do not agree with whether search engines should have authorization for the copying essential to search services. Why should they need authorization? They are helping society out by putting more useful information on the Internet.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I do think that this topic is relevant in today’s society because some people use search engines to their advantage and others take advantage of it and create copyright infringement which ruins it for the rest of us that actually use the search engines for useful situations.

Watching/ Thoughts Sheet: Steal This Film

Your Name: Chelsie Suttell Class time: 11 AM
SHOULD BE NO LONGER THAN 2 PAGES

Name of Movie: Steal this Film
Year: 2006
Producers: The Pirate Bay

Who is the Pirate Bay? What do they stand for? What is their mission?


1. Name, and define, 3 significant people interviewed in the movie (Knowledge):
a. Lawrence Liang – Alternative Law Forum, Bangalore
b. Sebastian Lutgert – Pirate Cinema
c. Dan Glickman – Chairman, MPAA


2. What are the main ideas being discussed within this movie? (Comprehension)

The main ideas being discussed in Steal this Film are whether downloading torrents should be considered legal or illegal and whether it is a good thing for our future or if it can hurt us in the future.

3. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (Comprehension)

Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data in little amounts of time. It is a technological advancement because it has allowed us to make copies of books, newspapers, records, etc. This has made it a lot easier to distribute large amounts of information in very little time.

4. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences, and/or society at large– BE SPECIFIC (Application)?

Being able to download music has become a part of my daily life. Because I am a college student and all my money goes to my tuition and schoolbooks, I do not exactly have the money to pay a dollar a piece for every song I want to have. I download approximately 100 songs a month. If I bought my music, it would cost me 100 hundred dollars a month just to get the music that I want to listen to. Being able to download my music for free has allowed me to explore my own imagination and creativeness. I am sure that I am not the only one who has this experience. There are always people walking around campus with their headphones in listening to music and I can guarantee that at least 85% of those students do not buy their music legally due to the fact that it is so easy to download them for free.

5. Analyze what you’ve watched. What is the future of distribution, production and creativity? Has society achieved its main goal in relation to Intellectually Property? (Analysis)

I believe that there is a lot in store when it comes to distribution, production, and creativity. Downloading torrents and other files has allowed many young artists to grow easy and in a timely manner. There are many bands that I have listened to from downloading their music for free that I would have never known if networks like Pirate Bay or Lime wire did not exist. It has allowed someone like me be able to get something as simple as a song quick and easy as well. I think that the future holds great things. Although society has achieved many goals, I do not think we have achieved the main goal when it comes to intellectual property yet.

6. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? (Analysis)?

I do not think that downloading is stealing someone’s intellectual property because we are only promoting his or her work, not stealing it. Like I said before, there are many bands that I have listened to that I wouldn’t have normally listened to if I weren’t able to download it. Therefore, the work is more popular because of its exposure.

7. How will the issues of copyright and Intellectual property affect the world in 50 years? BE SPECIFIC (SYNTHESIS)

I think that the issues of copyright and Intellectual property will affect the world in 50 years dramatically. It has already made a huge impact on society today and I know it can only get more technical.

8. Do you agree with what is being said within movie? What shifts in your opinion on this topic have happened from watching this film? What new ideas have you created after watching and thinking about this film? (Evaluation)

I agree with the fact that downloading files is not illegal. I can guarantee that almost everyone in the world has done it at least once in their lives. Although I do think it should not be considered illegal, I do think that there should be a line drawn. People should not be able to alter another persons work. I believe that should be illegal. After watching this film, I will be more careful of what I download and make sure that I am not stepping on anyone’s toes while downloading files.

Sunday, March 6, 2011

Chapter 4- Part 1

Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 4, 4.1-4.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. How the Internet effects copyright so strongly.
b. Computers made high quantity distribution easy and cheap.
c. Napster and copyright infringement.

2. (Comprehension) Summarize what is being discussed within this chapter?

The main topic being discussed in this chapter is copyright. What is infringing upon copyright and how more recent technology has made it easier to breakthrough copyright legally and illegally.


3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

An example from chapter four that I have experienced is the Napster case. Instead of using Napster though, I used Lime wire. Both are services used to download free music. “Napster opened on the Web in 1999 as a service allowing users to copy songs in MP3 files from the hard disks of other users” (Baase 209). Napster was investigated because it was considered illegal by the legal system. It was supposedly infringing upon copyright issues, as well as the service I had used (Lime wire). Eventually Lime wire was shut down by court investigations and it was no longer available to any users to download MP3s.


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

A situation I can compare that does not apply to computers, technology, or the Internet is when you buy a new pair of shoes and your best friend happens to love them. The next day she shows up with the same exact shoes that you had bought and takes all the credit for YOUR fashion sense. Although it is not illegal to do this, it is against social and moral code. It would make me very angry if someone took something that I came up with and took full credit for MY idea. “In the 1960’s growth in illegal sales of unauthorized copies of recorded music accompanied the growth of the music industry” (Baase 204). Not only has illegally downloading music put a big slump in the economy of the music industry, it has also caused a lot of viruses in our computers because some of the MP3 files that we download are not safe for our software. Reading this article made me think about Bloom’s Taxonomy and how it comes into place when it comes to sharing and downloading music. I must apply all the steps of Bloom’s taxonomy to make sure that what I am doing is safe. I also need to realize whether it is illegal or not and if I am infringing upon a certain software’s copyright.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the article. I agree with the fact that making unauthorized copies of music should be illegal because it is stealing in everyway. It is just easier to do because you are in the comfort of your own home without everyone witnessing your illegal act. Although I commit the act myself, it has become an everyday thing to be able to download music for free. I try to buy as much of my music as possible because it is much better quality, but when I don’t have the money to do so, downloading MP3s is my last resort. “Almost 100 million MP3 files were available on the service. A survey by Webnoize of more than 4,000 college students found that almost 75% of them used Napster at least once a month” (Baase 209). A conclusion I have drawn after reading this chapter is to be more careful with what I am doing on these services because they are illegal and it could put me in legal danger if I am not more aware of what I am infringing upon.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is more than relevant in today’s society because recent technologies have made it incredibly easy to infringe upon copyright issues. “Computers and communications technologies made high quality copying and high quantity distribution extremely easy and cheap” (Baase 201). For example, high-speed broadband Internet connections have made it easy to make quick transfers of huge files. Before recent technologies, individuals themselves did not have to worry about copyright law, but now with all the MP3 download services it has become more common for individuals to deal with.




References

Baase, Sara. “A Gift of Fire.” Copyright Law and Significant Cases: (January 2008): 197-212.

Dipity Timeline

Tuesday, March 1, 2011

Baase: Chapter 3


Name: Chelsie Suttell                  Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 3

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        What should and should not be put on the Internet.
b.       Internet companies to require registration (Baase 173).
c.        Creating online fund-raisers for political candidates.

2.     (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in this chapter is censorship on the Internet, what should and should not be posted on the Internet.  What is considered legal and illegal?


3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

A solution to the situation discussed in this chapter is to completely eliminate child pornography sites.  There should be something that blocks all kinds of those under-aged sexual sites.  “In 1996 Congress passed the Child Pornography Prevention Act to extend the law against child pornography to include ‘virtual children’ (Baase 151).  With all the advances we have nowadays there should be something they can do to get rid of this sickening act.


4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

When using the Internet we must go through all the steps of Bloom’s taxonomy.  We cannot believe everything we see on the Internet therefore Bloom’s taxonomy must come into place.  A website could say it is advertising one thing and next thing you know we’re on an illegal site.  This also makes it unsafe for younger children to surf the web. “The distinctions between categories such as erotica, art, and pornography are not always clear, and different people have very different personal standards” (Baase 152).

5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is said in this article because the Internet is almost another world of crime and warfare.  It makes me sad that we have to watch our every move while we are checking our email or logging onto Face Book.  “Our sole intent is to make the Internet safer for our youth” (151) This was said by the Department of Justice Spokesman, commenting on the demand for millions of user search terms from Google, 2006.

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?


This subject is most definitely relevant in today’s society.  All the crimes that occur on the Internet today make me feel unsafe in my own home.  There are lines that need to be drawn.  People need to be more cautious of their decisions when using the Internet.  Just purchasing a simple item from the Web can destroy their lives.


Sunday, February 27, 2011

Baase: Chapter 2


Name: Chelsie Suttell                  Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 2/ Privacy

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        Fourth Amendment
b.       Government rights to access our personal information.
c.        What we agree to when we sign up for a social network.

2.     (Comprehension) Summarize what is being discussed within this chapter?

The main issue being discussed in this article is the issue with privacy when it comes to government or using the Internet.  “Computer technology is not necessary for the invasion of privacy” (Baase 45).  The Internet and computers has just made it a lot easier for anyone to access our private information.



3.     (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

An example of this type of situation that I have encountered is when I signed up for    the social network called Face book.  This network allowed almost anyone in the world to access as much personal information as I provided. Even if I did not even know this person existed.  “When someone joins, subscribes to, or registers with a company such as AOL or MySpace, they are accepting the company’s policy on privacy and information sharing as part of the agreement” (Baase 56).  I eventually deleted my Face book because after a while I did not like the fact that everyone knew every detail about my life.




4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

Bloom’s taxonomy is something we use to analyze what decisions we are going to make.  Therefore we use Bloom’s taxonomy on the Internet by choosing what information we are going to put about ourselves on the Internet and what we are going to try and keep private.  Something that relates to this chapter that does not concern computers or technology is when we go out to eat at a restaurant and have a private conversation at the table.  You don’t know who could be watching or hearing every word you have to say.  



5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the article because privacy is almost impossible nowadays.  The Internet and everyday life has almost made it physically impossible to keep our privacy.  A conclusion I can draw after reading this material is that everything I do on the Internet will be a lot more discreet.


6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

This article is relevant in today’s society because our privacy is very important.  We as the people of America need to keep our freedom and keep our privacy under control.  What the government does with our privacy must be stopped at some point.  If it were for the benefit of our safety then I would concur, but if it is for their personal use, I do not agree.  Some new ideas I have after reading this chapter is to not use social networks anymore so that I can keep some of my privacy and freedom from the government.



Wednesday, February 16, 2011

CIS105 r/t assignment


Name: Chelsie Suttell            Class time: 11 am
KEEP THIS TO 1-2 – PAGES LONG

Title of Article: Unwrapping the Gift
Author: Sarah Baase
Date of Publication: January 2008
Book: A Gift of Fire

1.     Tell three interesting elements of this article: (Knowledge)
a.       The rapid development of technology: cell phones, internet, etc.
b.       How these technologies impacted society for the good and bad.
c.       Almost everything people do as a society relates back to technologies.

2.     What is the main issue being discussed within this article? (Comprehension)

The main issue being discussed within this article is how fast technology has developed.  Technology has positive effects and negative effects on society today.



3.     What is an example of this type of problem/similar situation that you have experienced – be specific? (Application)

An example of this type of situation that I have experienced is using the internet to shop online.  Although it was quick and easy, it was also a fraudulent site and the product I received was not worth the money I had paid. 



4.     Address all that apply. How can you compare this situation to something that does not relate to computers, technology, or the Internet? What ideas NEW can you add to the issue that is being presented within the reading? (Analysis)

More and more people are shopping online so that they don’t have to deal with the hectic crowds and long lines during the holidays.  Although this seems like it couldn’t get better it has its downfalls.  There is no personal connection when buying through the internet, therefore more and more people are losing their money over the internet because there are so many identity thefts and fraud acts occurring.



5.     Address all that apply. Do you agree with what is being said within the article (Why/Why not)?  What new conclusions can you draw about this (or other topics) after reading this material? (Synthesis)

I agree with what is being said within the article because although every technology may make things easier for us, there will always be some new scams or downfalls that people will be able to come up with in order to benefit themselves.  Having no personal connection with someone over the internet makes it a lot easier for someone to steal your personal belongings. 

6.     Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What new choices/decisions will you make after reading this article? Explain. (Evaluation)

This topic is most definitely relevant in today’s society because there are identity thefts and scams happening left and right.  People may think that technology is the greatest thing on earth, but it also has a lot of disadvantages that at the end of the day will hurt our society.


Monday, February 14, 2011

Reading/ Thoughts: Jon Crowcroft


Name: Chelsie Suttell             Class time: 11 AM
KEEP THIS TO 1-2 – PAGES LONG

Title of Article: On the Nature of Computing
Author: Jon Crowcroft
Date of Publication: February 2005
Book: Communications of the ACM

1.     Tell three interesting elements of this article: (Knowledge)
a.       Computing is a completely different style of life.
b.       Computing can be used to create an artificial life.
c.       The only limitation of computing is the imagination of its creator.

2.     What is the main issue being discussed within this article? (Comprehension)

The main issue being discussed in this article is that computing is almost like a totally different world.  Anything and everything can be created through computing.



3.     What is an example of this type of problem/similar situation that you have experienced – be specific? (Application)

An example of this situation is when my friends and I created a fake MySpace to spy on a boyfriend.  It was all in good fun, but it just goes to show how easy an artificial life can be created through the Internet.  We were able to access pictures from where ever we wanted and created a girl who was totally artificial.  We created all fake information to make the girl seem realistic.



4.     Address all that apply. How can you compare this situation to something that does not relate to computers, technology, or the Internet? What ideas NEW can you add to the issue that is being presented within the reading? (Analysis)

I don’t really know how to compare this issue without using computers, technology, or internet, but a new idea that I can add to the issue is that computing can and is used to unite the whole entire world and it links every citizen of every country to each other in some way.


5.     Address all that apply. Do you agree with what is being said within the article (Why/Why not)?  What new conclusions can you draw about this (or other topics) after reading this material? (Synthesis)

I do agree with what is said in the article because I believe that the Internet is like another world.  I conclude from this article that the Internet has absolutely no limits. Anything and everything can be created through computing and it is amazing.

6.     Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What new choices/decisions will you make after reading this article? Explain. (Evaluation)

This topic is most definitely relevant in today’s society especially because of face book and MySpace. Both of those are examples of computing and building and creating lives.  I am more aware that anyone can access information about me through computing because there are absolutely no limits to it.



Reading/ Thoughts: L.Winner


Name: Chelsie Suttell            Class time: 11AM
KEEP THIS TO 1-2 – PAGES LONG

Title of Article: Do Artifacts Have Politics?
Author: L. Winner
Date of Publication: 1986
Book: The whale and the reactor: a search for limits in an age of high technology.

1.     Tell three interesting elements of this article: (Knowledge)
a.       Robert Moses built his bridges lower to keep public transportation out. 
b.       Some technologies benefit people and harm others.
c.       Technology is used to promote things whether they are good or bad.

2.     What is the main issue being discussed within this article? (Comprehension)

The main issue being discussed within this article is that technology molds society.  For example, the organized movement of handicapped people during the 1970’s.  The structures of common use made it almost impossible for handicapped people to live a public life.



3.     What is an example of this type of problem/similar situation that you have experienced – be specific? (Application)

A similar situation that I have experienced is when I went to a restaurant with my friend who is confined to a wheelchair.  We were unaware that this restaurant did not have any ramps for him to access so we ended up having to choose a different restaurant to go to because he was unable to make it up the stairs. This made my friend extremely frustrated because he wants to live his life just as people do who are not handicapped.



4.     Address all that apply. How can you compare this situation to something that does not relate to computers, technology, or the Internet? What ideas NEW can you add to the issue that is being presented within the reading? (Analysis)

If everyone in society could think the same and react the same to every situation then I believe there would be a way to make everything easier.  For example, if everyone in the world was treated equally and power and authority was distributed equally then the world could agree on one thing. 



5.     Address all that apply. Do you agree with what is being said within the article (Why/Why not)?  What new conclusions can you draw about this (or other topics) after reading this material? (Synthesis)

I do agree with what is said in the article because technology has formed a whole new society.  There are positives and negatives to every technology made.  New conclusions that I can draw from this article are that there will be a lot more controversy as technology develops and advances.

6.     Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What new choices/decisions will you make after reading this article? Explain. (Evaluation)

This article is definitely relevant to today’s society.  I believe that technology has its pros and its cons.  After reading this article I will be more observant when I am using new technologies such as my iPod or computer because I have learned that there is so much more behind these things than just being a new piece of technology we can use.