Monday, March 21, 2011

Kat Dion Chapter 5

Name Kat Dion                                                                                                                 Class time:12pm
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: Gift of Fire
Sections read: 5.1 5.2 5.3

1.       (Knowledge)Tell three interesting elements of this chapter:
a.         That hackers are so intelligent they can hack into government websites and change things.
b.       That in 1965 there were over 500,000 hacker attacks on department of defense networks, but the hackers didn’t change anything. 
c.       To protect people from identity theft some institutions install an identification number on the customers laptop and then verify the machine when the customer logs in. 

2.       (Comprehension) Summarize what is being discussed within this chapter?

This chapter talks about how hackers get into government and business websites and what the government has done to stop them. This chapter also discusses identity theft and how large it is in today’s society and what being done to reduce and or stop identity thefts.


3.       (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?

My grandparents had their identity stolen when they were on vacation in Florida, as they were driving through Georgia their credit company called and asked if  they had used their credit card at a gas station in Daytona and they said no so they ma nagged to deactivate that credit card and catch the thieves before anything else happened,


4.       (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

Back when I was in middle school we had this mysterious kid that would somehow gain access into all of our lockers and take what was valuable like lunch money cd players Gameboys or even sometimes homework and use it for himself. He was eventually caught and ever since then they keep everyone’s combination under lock and key. Some lockers and still broken into but today it’s for calculators PSP’s or Ipods. The issue that’s being presented within the reading neglects to mention how hackers can hack into your own computers as your using them and see what you’re doing this is a way they can plant viruses and or  get the necessary information to steal your identity.

5.       (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

Yes I back up what’s being said because it is an epidemic the idea oof hackers and as technology advances so do they. What I can draw from this chapter is to be more careful with my information and what I put out on the web because dealing with identity theft doesn’t seem like something I want to handle.

6.       (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?


His topic is extremely relevant in today’s society, hackers are larger than ever. There is people that are trained to hack into websites so that they can tell the government were their weaknesses are to stop other hackers from gaining access.  The reason I am so strongly against hackers and identity thieves is because these things have happened to my friends and family. I’ve even have a friends credit card stolen out of their mailbox and used to the maximum credit limit. Hacking is wrong and don’t do it if you don’t want it to happen to some one you know.

Monday, March 14, 2011

Watching thoughts sheet

Your Name Kat Dion                                                                         Class time: 12-12:50
Should be no longer than 2  pages

Name of Movie: Steal this Film
Year: 2006
BitTorrent was developed by Bram Cohen as a peer-to-peer program for uploading and downloading files on the internet. The advancement has made it easier for users of the internet to share files with other users without paying to upload or download the files which largely attracts people because of the convience.

  1. Based on the main point off this film (If you don’t understand read: http://stealthisfilm.com/Part2/). Where do you see connections to your experiences,and/or society at large– be specific (Application)?

People like to think that everything should be free especially if it is on the internet. But because of all the network sharing sites people are starting to think that everything else should be just as easily accessible to them.

  1. Analyze what you’ve watched. What is the future of distribution, production and creativity? Has society achieved its main goal in relation to Intellectually Property? (Analysis)
The future of distribution and production will be at a financial stand still because in a very short time everything will be shared and reproduced again and again online. Record companies should start printing just one copy of every cd because soon that’s all it going to take for everyone to have access to what on the cd as for the future of creativity I don’t believe it will change because it remains the same just develops in different ways.

  1. Do you think that downloading is stealing someone’s Intellectual Property? Why or why not? (Analysis)?
No because once you post something on the internet or put out a CD you should automatically expect it to be shared and used by many different hands. You put the music out there so be prepared to have it copied and shared, especially because they only real way to make money with movies and music is to sell merchandise and attract people to the show to watch it and in a way file sharing could help people sell more tickets because the music is now be accessed by a larger group.

  1. How will the issues of copyright and Intellectual property affect the world in 50 years? be specific (Synthesis)

I believe technology will be so far advanced by then copyright and Intellectual property won’t have a chance to affect anything. We already at a speed of before the movie or the cd comes out people already have it on their iPods or on a burned DVD. As the years go by technology will only get faster to the point where officials won’t have time to stop it.

  1. Do you agree with what is being said within movie?  What shifts in your opinion on this topic have happened from watching this film?  What new ideas have you created after watching and thinking about this film? (Evaluation)
Before watching this video I believed that file sharing was wrong, as I watched this video I realized that file sharing is just a part of the advancements in technology and that there is no way to stop it . Also that artists and directors put their material out there for people to see and hear it should be an expectation by them that the information is going to be widely shared.
Producers: The Pirate Bay

Who is the Pirate Bay?  What do they stand for? What is their mission?
Pirate Bay is a website where you can download bit torrent files for games music movies for free instead of paying to use them.  Their mission is be a host site for free downloads because they believe that information is meant for everyone to see and that you shouldn’t have to pay for it.

  1. Name, and define, 3 significant people interviewed in the movie (Knowledge):
    1.   Frederik Neij- co-creator of pirate bay a sharing website and was found guilty of assisting to make copyright available.
    2. Lawerence Liang- lawyer and has become a spokesperson against intellectual property. 
    3.   Peter Sunde- co-founder of pirate bay supports the spread of information throughout the internet and has started other websites such as flatter encouraging sharing of information.


  1. What are the main ideas being discussed within this movie? (Comprehension)
The main idea is Intellectual Property rights and whether it is ok to share files freely throughout the internet and whether sites such a Napster and Pirate Bay are violating copyright laws by being a network that openly allows users to share information through there network.

  1. What is BitTorrent? Explain what it does and how this technologic advancement had changed society. (Comprehension)

Tuesday, March 1, 2011

Reading thoughts sheet for section 3.2-3.4...Kat Dion

Name: Kat Dion                                                                                  Class time: 12:00
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Baase, Sara
Date of Publication: 2008
Book: A Gift of Fire
Sections read:3.2, 3.3,3.4

1.      (Knowledge)Tell three interesting elements of this chapter:
a.         How congress comes up with laws attempting to protect children and almost every time is shot down when reviewed by the Supreme Court.
b.        Although spam seems unimportant, while reading I found that there have been many battles between spamming companies and email companies such as AOL.
c.       How companies such as Google will give up on its main purpose, making information available to all people internationally, very easily so that their business in other countries is not effected. 

2.      (Comprehension) Summarize what is being discussed within this chapter?
This section mainly focuses on how freedom of speech and political speech infringes upon blocking certain things on the internet such as filtering out all websites not acceptable for children at home and in public places. If political campaigns online are held to the same restrictions as campaigning in other forms of media. Also how does blocking certain spam emails hurting that company’s freedom of speech. It also discusses how companies should decide between their ethics and try to figure out what to block from the public eye.



3.      (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?
Through the news and media and numerous political debates, I have realized that protecting children from online porn sites has become increasingly hard over the past decade, because of all the new technology that is out there and hackers and some website creators are finding ways around the filters already in place. An easy solution to this problem i believe is limiting their access to the internet. If parents supervised their children while using the internet at all times unless being under other adult supervision. Then the children would have no chance to access such websites that display explicate images.




4.      (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 



5.      (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I agree with what was said in these sections, because it shows what businesses will actually give up so they don’t lose business. It also showed me how what going on in other countries influence what we block in the United States. The first section I read I also supported my opinion the freedom of speech activists are very sensitive and it take many years to create a law that works with the constitution by in no way harming our freedom of speech.



6.      (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?

This topic is very relevant to today’s society because as technology is changing at such a rapid pace it is becoming harder for the law to catch up with the new technologies and to protect people from harmful sites will not interfering with our basic freedoms granted to use in the Constitution. The reason I agree with the relevance of these sections is because I was born in an age of technology and I see on a daily basis in the news what this technology is causing. Whether it be helping child molesters to talk to children or helping add campaigns for political elections. By seeing the positives and negatives of the technology coming out today I realize how hard it is for the government to protect the children form seeing explicit material. I also see how hard it is for companies to stick to their ethics when there is a threat to lose business from other countries. After reading this chapter I will look into more closely what businesses are changing to fit other countries demands. This is because I did not feel that the topic of businesses and censorship in other countries was explained enough in the book.