Sunday, November 20, 2011

Chapter 8: Errors Failures and Risk

Name: Adam J. Medina Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 8.1-8.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. Something that I found interesting in this chapter is how you can compare something so simple such as driving a car to computer use, and how all of the flaws of computers are reported but not the good
b. Something I found interesting is how people depend so much on technology, such as the Therac-25 incident, to where people received an overdose of radiation because the machine had an error.
c. Something else that also was interesting is the way people suffer from the loss of billing and how people easily trust the computers like it’s flawless.

2. (Comprehension) Summarize what is being discussed within this chapter?

This chapter is explaining how computer systems fail, crash or doesn’t work because of the quality of it and software bugs, viruses, and other things. The chapter also explains how the product is misused and disrupts people lives. This chapter also explains how people suffered because of errors like those who suffered in the Therac-25 case.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A new solution for this problem would probably have to be, not to put all our eggs in one basket, what I mean is that maybe we shouldn’t put 100% trust in computers. This society is developing so fast and advancing every day that we as a society feel as if we need the computers and that it wouldn’t crash or damage or catch a bug but that is when we are wrong and placed in positions we do not want to be in. The Therac-25 incident was another case where people placed 100% in technology which shouldn’t have been done. The machine had to be recalled for extensive design changes including hardware safeguards against software errors. (http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html)


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

To compare this topic to something without technology would have to be, taking this subject matter into the past. In the past roughly around the 80’s I doubt that there were hardly any errors with people’s personal information and without computers doing all of the work. Now what if something crashes with a lot of billing information and it doesn’t get fixed people and major companies lost hundreds of dollars which can’t be returned or undone, then there is something even more major that is a problem with technology.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being discussed in this chapter because as Baase explained about billing errors and how it messes with people. Baase used in example on how a woman received a $6.3 million bill for electricity when the correct bill was meant to be $63. This happens because of an error from a new computer system (Baase 407). This shows how people rely on to much technology instead of manually doing things which can decrease the percentage of errors.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very much relevant in today’s society because computers are still being bugged and errors are still being made. People can prevent these things by not putting all of their trust in computers to do the work but split the work, half computer and half workers. I’ve concluded that people will always be dependent on computers and always place themselves at risk for these things to happen.




References

A Gift of Fire: Sara Baase: pg. 407

An Investigation of the Therac-25 Accidents: Nancy Leveson, University of Washington and Clark S. Turner, University of California, Irvine (http://courses.cs.vt.edu/cs3604/lib/Therac_25/Therac_1.html)

Sunday, November 13, 2011

Chapter 6 Part 2

Name: Adam J. Medina Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.4-6.5

1. (Knowledge)Tell three interesting elements of this chapter:
a. Something that I found interesting was employee monitoring, people cannot be trusted in their own working area.
b. Something else that was of interest to me was that people really embezzle money or merchandise from their place of work
c. One more thing that happen to be interesting to me was how there is a law to violate the privacy of your work place which is the ECPA (Electronic Communications Privacy Act) (Baase 340)

2. (Comprehension) Summarize what is being discussed within this chapter?

What are being discussed in this chapter are employment monitoring, employee crime and other sorts of privacy violation at the work place. (Not a violation due to the ECPA)



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

A new solution would have to be for employees to be honest and not steal from their work place in order to be trusted and possibly abolish the ECPA, so that privacy could be ours once again because I know that slowly we are losing our privacy upon everything.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

I think in the past something like this wouldn’t be happening in the work environment. While people in the past seem to be more honest and trying to earn an honest buck, not go around the system and embezzle things. Things were more privacy oriented; they seem less on background checks as well since they didn’t have the technology in the past to do things like this. Now things have change and technology is growing, and like Baase said, before bosses patrolled the aisle watching workers, now computer monitoring can be constant, more detailed, more detailed, and unseen. So it is a lot of privacy being lost. (Baase 335)

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being discussed, after reading this material, because employees place this upon themselves, working people can’t be trusted because, they going to want more than what they have. You give them an inch and they take a yard. So when they are being watched all day it makes them preform productively and efficiently, but this is not fair for the workers who want their privacy, good workers not needed to be worried about, it might affect their performance. Baase even stated that it affects people of the white collar division as well.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exmple of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

In today society this topic is relevant because computer monitoring is happening today but workers in general cannot be trusted to work in specific environment because of the evil temptation of embezzling the company you work for, and workers lose all ethics, values and morals, just for a quick buck or their own personal needs and it just isn’t fair to everyone else.




References


The Gift of Fire: Sara Baase: Chapter 6 section 6.4 and 6.5.1

Sunday, November 6, 2011

Chapter 6: Work

Name: Adam J. Medina Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6 Work: 6.1-6.3

1. (Knowledge)Tell three interesting elements of this chapter:
a. Something interesting about this chapter is how technology is not only used to work smarter and efficiently but how scary it is to say that we might lose our jobs to computers.
b. Something that I found interesting was how at first people argued that spending money on computers was a waste and a decrease in efficiency.
c. Something else that was interesting was how the main cause of losing jobs is the very same thing that is giving more and more people jobs.

2. (Comprehension) Summarize what is being discussed within this chapter?

This chapter is about how people are scared to losing their jobs to new technology and how the new technology is also giving jobs. It also discuss about getting jobs, work ethics and answers the millions of questions we have about work force and technology.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

An example of this would be, bank tellers being replaced by ATMs’. Baase mentions this in section 6.2.1 and explains that bank tellers dropped by 37% between 1983 and 1993 (Baase pg. 309)




4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Reading this chapter I realized that people in the world since the beginning of time has always used technology and that is never going to change, technology is always evolving and that is not going to stop. This is allowing me to realize that jobs and the workforce won’t be able to function efficiently without the use of technology and they feel as if they would waist more money on the employees. (Baase pg. 313)




5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I honestly agree with what Baase is saying throughout the whole chapter, about jobs being removed because of technology and how technology is giving jobs to the people who need to use them and I conclude that this is something that will continue to happen and it will not stop, it will just get worse to where people aren’t getting employed to work with technology but instead being replaced overall.



6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is very much relevant in today’s society because from a first-hand point of view I noticed that major owned corporations especially those that are privately owned hire people for technological purposes and lay off people due to what they call a recession which we haven’t been in for quite some time now, or to “slow business”, when the business is never slow, just growing with customers.






References

A Gift of Fire: Sara Baase chapter 6 Work
Pages 309 and 313

Sunday, October 16, 2011

Chapter 4: INTELLECTUAL PROPERTY (Part 1)

Name: Adam J. Medina Class time:12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 4.1-4.3.2

1. (Knowledge)Tell three interesting elements of this chapter:
a. How it is easy to throw away ethical values just but illegal downloading
b. The cases which were sued by companies for copy right infringement
c. How even the use of new technology has its challenges of being used

2. (Comprehension) Summarize what is being discussed within this chapter?
The chapter is talking about copy right infringement, and its intellectual properties, dealing with copy rights and its infringement.



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
Honestly the problem is in the infringement of the internet and the solution to it, I honestly don’t think there is a solution. The reason why I think that the solution is impossible is because in order to stop illegal downloading you have to cut off the internet completely, which will never happen because catching everyone who illegally downloads is nearly impossible.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
From personal experience I remember when I was in high school learning about the constitution and law, and copyright infringement came up as a matter, and we discussed how it is wrong and how it takes away from the artist whom produce these products and it also takes away from appreciating something new and different from you. Copyright infringement is happening all around the world even as you read this, so imagine the millions and billions of people doing this, do you think you can stop them?


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree 100% in what is Baase is saying because it takes away from the artist, whom makes the product. It takes away from what’s being produced and from the families of others especially if that’s the way they make a living. Also I agree with what Baase is saying on how things companies being sued for copyright infringement because the facts show that you can’t blame a company if families want to record certain things to watch over and over.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is very much related in today’s society because as I said before infringement is happening right now so how can it be stopped? Now is this ethical to say the least? No its not because its just like the saying goes, you would steal if you know you wouldn’t get caught, and that is exactly what’s happening .




References

4.2.1
4.3
4.3.1

Friday, October 7, 2011

Chapter 3 Freedom of Speech

Name: Adam J. Medina Class time: 12p
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 3 Sections 3.1-3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. How freedom of speech is not only limited in the US today but also on the web, and other things.
b. How print media (such as newpapers and books) has the strongest protection of the First Amendment, such as Cigarette ads are legal in magazines but not legal on the radio, t.v, or anyother electronic media under the FCC.
c. How freedom of speech is different from the past, compared to now, it seemed stricter.

2. (Comprehension) Summarize what is being discussed within this chapter?
What is being discussed in this chapter is how the First Amendment (Freedom of Speech part) is limited not only in the real world but, also on the internet, the publication, and even the broadcast (such a radio waves, or television waves). (pg. 146-148)



3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
Well reading what Baase wrote in this chapter reminded me of the time when I was learning about the Amendments and the Bill of Rights, in high school I was learning how peoples freedom of speech was limited, this is the video to show that the reverends rights was violated(http://www.youtube.com/watch?v=u8H4YATaX1k) and how you are not supposed to say things like this because of stereotypes (http://www.youtube.com/watch?v=jC9cV3-9ST8 first 33 seconds).



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
I honestly can’t relate this to anything except for when the rights were made in 1789. How the founding fathers could even argue about the amendments but I highly doubt that they violated these rights them selfs.


5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with section 3.1.2 (Freedom of Speech Principles) because, Baase talks on how freedom of speech is used and the preventions upon the First Amendment and how people use their Freedom of Speech to voice or show their opinion, also on how it’s a restriction on the power of the Government.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is relevant in the society today because Baase makes me as a reader wonder if the government is limiting our freedom of speech what else are they putting a limit on. This is ethical (what the government is doing) because the government wants to make sure that the people are safe, in was by preventing people saying, bomb on an airplane, or fire in a movie theater. After reading this chapter I’m glad the government is limiting some free speech, because it opens up to me the safety and concern of people. (Pg. 149-151)






References

Pg. 146-148
Pg. 149-151
http://www.youtube.com/watch?v=jC9cV3-9ST8
http://www.youtube.com/watch?v=u8H4YATaX1k

Sunday, September 25, 2011

Chapter 2

Name: Adam J. Medina Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2, and 2.5.3-2.5.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. Something interesting is how there are 3 key aspects to privacy
b. What was interesting is how since technology is always changing there are always new ways to risk losing your privacy, and how we use search engines, things don’t disappear, it helps us find what we were looking for.
c. How hackers can steal identities, and personal data, or buying records under false pretenses.

2. (Comprehension) Summarize what is being discussed within this chapter?

What is being discussed in this chapter, is that Baase is saying that privacy is not protected unless you make sure you protect it, and that since technology is always changing you have to change your privacy, and how to be weary of getting your identity stolen.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

An easy solution would be for shoppers who post their personal information online not to do it, and for teenagers who place all of their information in social networks, don’t do it because you place yourself at risk for all of your information to be taken away.



4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Reading these sections by Baase reminded me about, the problem Sony had with the Playstion network. Baase explain how hackers go out of their ways just to steal personal information. As a member of PSN (Playstation Network) I was lucky enough not to be one of the many to have my account hacked. Sony then shut down the network to reprimand those who were hacked and to make the network more secure. (http://abcnews.go.com/Technology/video/sony-playstation-hackers-network-games-ps3-13466450)



5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

For my personal opinion, I completely agree with Baase within what was read because, Baase makes sense. Millions of people everywhere use the internet to purchase things, such as amazon, ebay and risk their personal information. Even though I personally wasn’t a victim it was still nerve-racking for me. Reading this help me draw the conclusion that I must be extra careful about my personal information and where I place it.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic on personal information and privacy being protected is relevant in today’s society because people in this new era and time feel that since technology is evolving then their online personal information is protected, but people neglect that there are other people who are unethical and advance their technology so they can steal random people identity and personal information. Reading this chapter I decided that if there are people who are unaware of the risk I will try to inform them the way Baase informed me.




References

Question 2: Chapter 2.1 – 2.2

Question 3: Chapter 2.1, 2.3.3

Question 4: Chapter 2.3.3, http://abcnews.go.com/Technology/video/sony-playstation-hackers-network-games-ps3-13466450