Name: Adam J. Medina Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: The Gift of Fire
Sections read: 2.1-2.2, 2.3.2-2.3.6, 2.4.2, and 2.5.3-2.5.4
1. (Knowledge)Tell three interesting elements of this chapter:
a. Something interesting is how there are 3 key aspects to privacy
b. What was interesting is how since technology is always changing there are always new ways to risk losing your privacy, and how we use search engines, things don’t disappear, it helps us find what we were looking for.
c. How hackers can steal identities, and personal data, or buying records under false pretenses.
2. (Comprehension) Summarize what is being discussed within this chapter?
What is being discussed in this chapter, is that Baase is saying that privacy is not protected unless you make sure you protect it, and that since technology is always changing you have to change your privacy, and how to be weary of getting your identity stolen.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
An easy solution would be for shoppers who post their personal information online not to do it, and for teenagers who place all of their information in social networks, don’t do it because you place yourself at risk for all of your information to be taken away.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
Reading these sections by Baase reminded me about, the problem Sony had with the Playstion network. Baase explain how hackers go out of their ways just to steal personal information. As a member of PSN (Playstation Network) I was lucky enough not to be one of the many to have my account hacked. Sony then shut down the network to reprimand those who were hacked and to make the network more secure. (http://abcnews.go.com/Technology/video/sony-playstation-hackers-network-games-ps3-13466450)
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
For my personal opinion, I completely agree with Baase within what was read because, Baase makes sense. Millions of people everywhere use the internet to purchase things, such as amazon, ebay and risk their personal information. Even though I personally wasn’t a victim it was still nerve-racking for me. Reading this help me draw the conclusion that I must be extra careful about my personal information and where I place it.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic on personal information and privacy being protected is relevant in today’s society because people in this new era and time feel that since technology is evolving then their online personal information is protected, but people neglect that there are other people who are unethical and advance their technology so they can steal random people identity and personal information. Reading this chapter I decided that if there are people who are unaware of the risk I will try to inform them the way Baase informed me.
References
Question 2: Chapter 2.1 – 2.2
Question 3: Chapter 2.1, 2.3.3
Question 4: Chapter 2.3.3, http://abcnews.go.com/Technology/video/sony-playstation-hackers-network-games-ps3-13466450
No comments:
Post a Comment