Monday, February 27, 2012

Chapter 2: Privacy, part 1

Name: Edmund Barfour                                                                                              Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication:
Book: A Gift of Fire
Sections read: 2.1 to 2.2

Knowledge)Tell three interesting elements of this chapter:
1. There are thousands of databases, both government and private, containing personal information about us.

2. Communication on web sites and e-mails are recorded and can be copied, forwarded and widely distributed, and read by others years later.


3. Government has access to large masses of such data.


(Comprehension) Summarize what is being discussed within this chapter?

This chapter explains and talks about privacy of the Internet and how it can protect or affects a person’s freedom. Also, the chapter shows how the government can access information on a person through search engines or e-mails. Moreover this chapter covers invisible information gathering, and principles for data collection and use


(Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

A specific example of this situation I have experienced is when I once posted a picture on my MySpace account and the picture happened to appear on Google has I googled my name and found my picture on a public website.
                       

(Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

Specifically I can’t relate a private investigator going through someone’s trash for evidence to prove a point to computers, technology, or the Internet. (Basse, pp.45, 2010) a new idea I can add to this issue is the idea of how people can access someone’s information on a social network website without hacking into their computer because with social network a person’s information is clearly noticeable.



(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what was said in the reading because a person’s freedom is not respected. I can conclude by stating that I have learned how not to avoid privacy theft, and am more conscious on what I do on the Internet.


(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

This topic is very relevant in today’s society because almost everyone has access to the Internet. The ethics that can be assumed from this reading is “natural right” which views ethical behavior as acting in a way that respects a set of fundamental rights of others, including right of freedom. I will be conscious on what I do on the Internet to prevent disturbance of privacy.



                                                                Reference
Sara Baase, A Gift of Fire, Third Edition, pp.45-74, 2010










No comments:

Post a Comment