Thursday, November 15, 2007
GOF 2.5 Protecting Privacy
GOF 2.4 More Privacy Risks
GOF 2.4 Sarah Baase stresses the issue of a national identification system. The potential national ID card would contain a smart-card memory that can retain information such as the person's name, photo, Social Security number, other identifying information, and health, tax, financial, citizenship, employment, or other data. The ID system could be used to help catch criminals and terrorists. Personal health and medical information is then at risk, because the smart cards could then provide unwanted guests with this personal medical information. Pharmacists are worried that they might not be able to give prescription medicines to family members or friends. Everyone's information would then be stored on databases. What if that database has to be hacked into or had a virus that deleted important information?
GOF 2.31and 2.3.3 Consumer Information
Monday, November 12, 2007
2.2 Big Brother Is Watching You
In chapter 2.2 Sarah Baase explains how government agencies are invading our privacy by not obeying the Forth Amendment. Both the IRS and the FBI have access to huge databases filled with tons of personal information. Did you know every toll you pay collects personal information about you, like social security number, license plate; because of our advance technology the government can even tell how fast the driver was going through the toll. Also, government agencies are able to buy personal information from private information service companies; the information would be illegal for them to collect. In 2001, the USA PATRIOT Act lets the government collect information from financial institutions on any transactions that differ from a customer's usual patterns; but that’s not all they can check. New technologies now allow video surveillance to watch out every move, without us being told. As the Supreme Court of
Saturday, November 10, 2007
From Virtual Communities to Smart Mobs
Lane Jennings article "From Virtual Communities to Smart Mobs" stated the good the bad and the ugly about information sharing. One example of the good occurred on
Friday, November 2, 2007
GOF Chapter 7 Computer Crime
In this chapter, Sarah Baase explains the term hacking. In the early days of computer programming a hacker was a creative programmer who wrote clever programs. As time went on the word hacking took on a totally different meaning; a quote from Baase "Breaking into computers on which the hacker does not have authorized access." Hacking has created huge problems for every organization, company, and individual that has access to the internet. These individuals that are labeled "hackers" range from any age, and can break into and steal millions of dollars as well as confidential military information. How can the ordinary person protect themselves from being subjected to a hacker? What actions must be taken?
Sunday, October 28, 2007
Freedom of speech in cyberspace chapter five: GoF
In chapter five A Gift of Fire, Sarah Baase tells us how the First Amendment protects our right to express his or her views on any topic. But some American citizens tend to take advantage of the Web; this problem brings up a very controversial topic. What should be illegal to put on the Web? That question depends on the individuals views. Pornography for one is illegal because it displays sexual behaviors that have no social, political, or artistic value. Should these Web pages be allowed on the web?
http://www.whywehatebush.com/
http://www.iratecitizens.org/Dumbya/102Reasons.html