Name: Chelsie Suttell Class time: 11 AM
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: January 2008
Book: A Gift of Fire
Sections read: Chapter 2/ Privacy
1. (Knowledge)Tell three interesting elements of this chapter:
a. Fourth Amendment
b. Government rights to access our personal information.
c. What we agree to when we sign up for a social network.
2. (Comprehension) Summarize what is being discussed within this chapter?
The main issue being discussed in this article is the issue with privacy when it comes to government or using the Internet. “Computer technology is not necessary for the invasion of privacy” (Baase 45). The Internet and computers has just made it a lot easier for anyone to access our private information.
3. (Application) Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?
An example of this type of situation that I have encountered is when I signed up for the social network called Face book. This network allowed almost anyone in the world to access as much personal information as I provided. Even if I did not even know this person existed. “When someone joins, subscribes to, or registers with a company such as AOL or MySpace, they are accepting the company’s policy on privacy and information sharing as part of the agreement” (Baase 56). I eventually deleted my Face book because after a while I did not like the fact that everyone knew every detail about my life.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Bloom’s taxonomy is something we use to analyze what decisions we are going to make. Therefore we use Bloom’s taxonomy on the Internet by choosing what information we are going to put about ourselves on the Internet and what we are going to try and keep private. Something that relates to this chapter that does not concern computers or technology is when we go out to eat at a restaurant and have a private conversation at the table. You don’t know who could be watching or hearing every word you have to say.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I do agree with what is being said in the article because privacy is almost impossible nowadays. The Internet and everyday life has almost made it physically impossible to keep our privacy. A conclusion I can draw after reading this material is that everything I do on the Internet will be a lot more discreet.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This article is relevant in today’s society because our privacy is very important. We as the people of America need to keep our freedom and keep our privacy under control. What the government does with our privacy must be stopped at some point. If it were for the benefit of our safety then I would concur, but if it is for their personal use, I do not agree. Some new ideas I have after reading this chapter is to not use social networks anymore so that I can keep some of my privacy and freedom from the government.
No comments:
Post a Comment