Monday, December 8, 2008
Application of Knowledge
ICEK
This book would facilitate small group discussion for junior high and senior high students. The chapters are to the point. The questions are relevant and thought provoking. The text may serve as reference material for middle and secondary education teachers.
I’m not a lawyer (IANAL), but I am familiar with the selected issues and legalities written to in the text. People should be treated respectfully. The internet is dangerous; proceed with caution.
The Blue Nowhere
Though not a suspenseful “ticking-bomb,” the novel provides a basic introduction to the largess and complexity of the internet.
I glimpsed into a world that heretofore I did not know. The internet has no boundaries, not interpersonal, geographical or political. Countries do not contain it. Languages do not confound it. The only limitation to which the internet is subject is the medium that carries its “message.” I learned about servers, routers and circuitry and viruses, encryptions, and codes. I have come to recognize that the commercial and educational windows-supported use of the web though valuable is superficial, hardly addressing its potential terror and full capacity.
By the time I finished the novel, I knew the internet was wide-open frontier. It is the world’s “wild west.” I experienced a sense of jealousy of those who can challenge it and conquer even a little part of it.
Ethics for the Information Age and Privacy Articles
I appreciated the computing history presented in the first chapter. The chapters on privacy as well as the assigned articles have clearly altered some of my activities on the web. I have a better grasp regarding what permissible for use in an educational setting. I try to model responsible behaviors. I downloaded the “Easy Guide for Windows Users” and have shared it with friends. I recognize the government postures against personal privacy in the name of “anti-terrorism.” I now view personal privacy as critical to liberty. I am thankful for privacy advocacy groups. I also have an answer for those who say they “have nothing to hide.”
The introduction to ethical theories was most interesting. I differentiated between my uncompromising religious world view and a workable social ethic wherein everyone may survive and enjoy freedoms. When an individual on our discussion board blithely selected the “Divine Command Theory” as workable for our diverse society, it gave me pause. Although we may share similar energy, if our orthodoxy is not the same, the only other thing we may share if applying the Divine Command Theory is strife and sorrow. I pray this is not heresy: there will be no peace on earth without convergence and tolerance.
Social Contract Theory and the Internet...Thoughts
I chose the Social Contract Theory because it purported to offer equal liberties, respect, and opportunity to all members of its society. The governing body is charged with the protection against infringement of individual liberties and it is not above its own laws. Social contract implies a common goodness between people. It does mean, however, that some personal preferences are unmet. A community of tolerance is necessary to achieve peace in a complex society.
There are limitations, however, to the theory. The social contract will not work where there is no vision beyond the self. A contract implies at least two parties; it is not unidirectional, and there must be reciprocity between like-minded individuals.
In regard to the internet, its fierce capacity is overwhelmingly huge; it is its own being. The internet exacerbates self-orientation and subjective relativism.
We studied no ethical theory appropriate to harness it. The Social Contract Theory is inadequate by definition; it requires reciprocity. Its justice does not well address willful wrong of multitudes.
My choice of theory is irrelevant. For the first time since starting this course of work, I question the worth of what I am studying in terms of its lasting effect or value to other persons. I must have much more information to make any significant application of ethics to the peculiar connectedness afforded by the internet.
Thank-you for this course and the opportunity to study these issues.
Saturday, November 29, 2008
"Public Records on the Internet: The Privacy Dilemma"
Review and Reaction to the Article
“Public Records on the Internet: The Privacy Dilemma” (Givens)
In “Public Records on the Internet,” Givens exposes the dangers and perceived consequences of the posting of public records on the internet. The accessibility of public records promotes governmental accountability and transparency. Conversely, in a technological age, the exposure of private citizens’ information jeopardizes their safety.
There are a variety of public records that are accessible via the internet. These include tax records, motor vehicle records, voter files, state and federal licenses, and court files. Of most concern are court files. Court files contain sensitive information regarding the personal lives and identities of individuals involved in the file. Issues dealing with family law are particularly concerning. Posted court files lend themselves to identity theft, safety threats, and intimidation that did not exist when only paper records were kept. Paper records created a “de facto privacy” that required the inquirer to activity go to a courthouse and retrieve documents. When documents are posted on line, they may readily be accessed by the “click of a mouse” eliminating any privacy the individual may have had.
Givens suggests that there are several “negative consequences” of posting court records on the internet and then offers several suggestions to amend them. I will speak to three of these.
Identity Theft. The posting of personal information when it is not pertinent fact constitutes irresponsible posting by governmental agencies. The inclusion of unnecessary personal identifying information or the failure to block information to public view should be carefully reviewed. That high opportunity is afforded to identity thieves is indisputable.
The creation of a “two-tier” report posting seems to remedy some of the unnecessary exposure problem. The fact of a matter may be posted e.g. a child was abused. The identifying information regarding the accused social security numbers, address, etc. as well as the texted record of the grief imposed upon the child need not be entered on line. If this information is wanted, the person wanting it may then request of the courthouse records department to have it.
Risks of Personal Safety. In criminal court proceedings, victims, witnesses, and jury members are all at risk of for personal safety when identifying information is posted on the internet. Witnesses and jury members may be in fear of personal safety and decline to participate in juries except under duress. Justice potentially may not be served on several levels.
The “two-tier” method may be of some help here, but more aggressive measures should be taken to protect innocent persons such as concealment of identity except by personal request.
“Private” Judges. The existence and function of “private” judges as well as the desirability of judgment by the court alone attests to the concern for the privacy and functionality of a jury of “peers.” Though the option for these judgment avenues has long existed, posting sensitive and private information to the internet acerbates this so called dual system of justice. The ability to safeguard personal information should be the right of all persons in a free society. As our society becomes increasingly diverse and less apt to comprehend the personal liberties yet afforded it by law, I believe more persons will opt for private or court versus jury judgments in certain types of cases.
Work Cited
Givens, Beth. “Public Records on the Internet: The Privacy Dilemma.”
Privacy Rights Clearinghouse. Mar. 2006. 28 Nov. 2008.
"Employee Monitoring: Is There Privacy in the Workplace?"
Review and Reaction to the Article:
“Employee Monitoring: Is There Privacy in the Workplace?” (Privacy)
Employer monitoring of its workforce is “virtually unregulated”; it is at the will and discretion of the employer. Moreover, communication technologies invite easy monitoring of employee work product and activity while “on the clock” and even while off – site. Generally, employees should be aware that there are few rights to privacy in the work place.
Motivation for monitoring includes concern for litigation over electronic records, productivity, and inappropriate or illegal activity. Most employers have policies regarding their surveillance of employees, but policies may not be legally binding.
In regard to telephone use, employers may monitor any phone conversation, log the numbers dialed, and record the time spent at that number. Electronic mail, voice mail, and instant messaging are not private. Text messages from a workplace provided phone are a little more difficult to obtain insomuch that the storage of the text messages may be from an outside telephone company.
Computer use is employers’ “window” into the workspace. Computer screens may be viewed. File content may be monitored. Even keystrokes may be logged. Employees need not be “notified” that they are being monitored.
Several privacy sites were listed in this article to which a person may refer if they have concerns. The ACLU is active in the area of personal privacy.
Of the reasons proposed by the author to justify employer monitoring, the protection of personal client records was over sighted. Employer surveillance may be fairly heavy in workplaces where large numbers of private or sensitive records are held. This is not secret. Surveillance of record disposition and use is necessary to maintain the trust of clientele. However, there is a balance that should be carefully maintained. Heavily monitoring employees in arenas outside of clientele records seems to express employer distrust of sorts of the employee. It is symptomatic of a breach in healthy employer – employee relationships.
It has occurred to me that for the Social Contract Theory to “work,” the society to which it is applied must for the most part hold in common human values such as respect, good will, and trust. If moral guidelines such as respect and trust erode, then parties must act to protect themselves. Everyone looses. I wonder if ethics and philosophy has any meaning at all in societies where large numbers of its members do not or cannot identify with the greater social impact of their personal behaviours.
Work Cited
Privacy Rights Clearinghouse. “Employee Monitoring: Is There Privacy in the Workplace?” Privacy Rights Clearinghouse. July 2008. 28 Nov. 2008.
Friday, November 28, 2008
"Search Engine Privacy Tips"
Review and Reaction to the Article:
“Search Engine Privacy Tips” (Dixon)
In “Search Engine Privacy Tips,” Dixon makes the observation that most people treat inquiry boxes on search engines like a blank slate that erases itself when the search is completed. The contrary is true. Search engines keep extensive logs of inquiries. Search engines make private information very public. Many connect names and other identifying information with searches. Some search engines have actually posted inquiries on the web. Others inquiries have been accessed by the federal government. To this, Dixon offers several personal privacy suggestions. She also recommends that readers at least start with simple protection measures versus become intimidated and do nothing at all.
While making a search inquiry, users should avoid searching their own name and /or personal identifying information such as social security numbers, passwords, and other ID; this information is logged and attached to the search engine and the user’s IP address. Users should try to avoid accepting search engine cookies. Users should be careful about what they search for remembering that the logs of these will be kept for a very long time.
Several suggestions were made regarding the search engine sites themselves. Use of an anonymizing tool may dissociate the search from the searcher. Avoid posting email, reading the news, and searching on the same search engine. Use a variety of search engines and as many different computers as possible. If one computer is consistently used, request a periodic change of IP address.
Browser histories should be deleted after each use. This is especially true when using public access computers.
From an ethical perspective, aggression against personal privacy is fierce and relentless. Personal privacy is kept only in as much as the holder is aware and is able to fend away intruders. Governmental trespass into personal privacy via the internet makes a mockery of personal privacy legislation. Full disclosure of the extent of personal privacy invasion and, governmental transparency as to its access would shock the citizenry.
Work Cited
Dixon, Pam. “Search Engine Privacy Tips.” World Privacy Forum. 14 July 2008.
28 Nov. 2008.
Wednesday, November 26, 2008
Last Text Chapters & The Book
Chapter 36: Cyber Police
Computer use is highly monitored and restrictive in my educational setting. URL histories, emails, and actual time spent on internet activity are monitored and limited. Sites close automatically after idling for specified time frames. Exchange or download of files is limited. Views, frames and information in general are available on a needs – base only. Violations of institutional policy occur no doubt, but they are confidential and I am not aware of them. It is probable that individuals do cross institutional boundaries, but this does not seem to be common. The environment is very professional.
Chapter 37: Getting Caught
Most institutions have ethical codes of conduct. The attitude that some on line behaviour is OK if not caught is not a part of the institutional environment at all.
Chapter 38: Play by My Rules
Right and wrong is not relative. The world is unable to survive if it is. That cyberspace “has no rules” has more to do with the threat of punishment than it does with behaving responsibly within the greater human community. In my institution, employees agree that they will “play by the employer’s rules” or the person is not employed.
Chapter 39: Making Ethical Decisions
Acceptable behaviour on line may be guided by laws of the land, rules of conduct, religion, and company policies. Carefully considering the outcomes of personal behaviour is important in any environment as well.
Chapter 40: Cyber – Parenting
Parents should be take the initiative and become involved in their children’s internet activity. There are number servers and filters that may help parents shield their children from dangers on the internet. The need for internet involvement of parents in children’s lives is not a part of my institutional concern.
The Book
The Book lends itself to group discussion. It is appropriate in a public setting for use with adolescents. It might be given as a reference to a parent. The book provides questions for discussion. It is easy to read. The book is, however, fairly repetitive. Its language is diminutive. Parents are portrayed as “bad guys” and “stupid guys” versus best friends, confidants, and individuals who have the child’s best interest in mind.
Sunday, November 23, 2008
On Line Voting Benefits v Risks
Regarding the benefit – risk ratio of on line voting, the risks far out weigh the benefits.
Voting from Home
The primary benefit of on line voting touted by proponents is that individuals who otherwise could not get to the polls would have an opportunity to vote from within their own home or another convenient location. However, this benefit assumes…
*that these excluded persons have and can operate a computer,
*that they are able to pay for and access internet service,
*that they will have opportunity to cast their vote without coercion, and
*that the intended individual is indeed voting.
Persons negatively impacted would be the computer illiterate, the elderly, the poor, and the oppressed. Privacy for voting would be uninsurable at the point of entry. Individual identity would be more difficult to determine.
Ballot Box Tampering
The argument that electronic voting would eliminate “ambiguity associated with paper balloting” and the “risk of ballot box tampering” is outweighed by the technological problems of safeguarding the electronic process of casting an on line vote.
*that personal computers be virus and otherwise tamper free
*that the website be real versus spoof
*that the website be available, not overwhelmed or under an attack
*that personal privacy be respected,
*that the personal and IP addresses of individuals not be retained, and
*that a paper trail be made to ensure backup in case of computer failure or “clitch.”
Internet voting would be a potential target for illegal tampering on a huge scale, much larger than a ballot box scale.
Monetary Costs
Whether the costs of creating, installing, insuring, and making a verifiable paper record would be less expensive than casting an on line vote is dubious. I have no way of measuring the costs to either side. Voters would sustain the cost of access to computers and the internet. A system for receiving millions of votes would need to be created and kept. The thought that large amounts of technical equipment would be on standby for months at a time and be expected to start up without high costs is unreasonable. The equipment would also require safe storage and tight security.
If electronic voting becomes an option in a larger way than it already is, it should be offered only as one of several methods in which a vote may be cast. All persons should feel safe, free, private, and comfortable with voting for the individual of their choice ...and they must know for certainty that their vote has indeed been cast.
Saturday, November 22, 2008
Ethics Personal Privacy
In Thomson (1975), “the right to be let alone” is more appropriately applied to individual privacy from the public versus from governmental intrusion or law enforcement as the example was given in the text.
In Benn and Reiman (1976), the right to personal privacy as fundamental to American liberty is expanded by equating it with “a right which all human individuals possess.”
In our technological society, physical boundaries are ineffectual as barriers against invasion of privacy. High concentrations of private information held by governmental and private others begs use and abuse of the power. The lack of transparency exacerbates abuse. Governmental and private parties alike relentlessly challenge consumers for personal information e.g. “surcharges” for cash payers, higher pricing for “non-club” shoppers, higher fees for “non-registered” drivers on state funded toll roads. Personal information is also simply given away. Children and adults alike fail to identify or value personal privacy as liberty, as a critical element of freedom.
Privacy exists in our society only as far as an individual is able (in compliance with law) to assert and defend his right. Given the citizenry’s loss of rights subsequent to 9/11 and the aggressiveness of the public and private sectors, there can be no question that personal privacy is endangered.
Saturday, November 15, 2008
Saga of Shredding in U.S.
“The Saga of Shredding in the U.S.: A Privacy Advocate’s Perspective” (Givens)
This article is a record of a presentation given at a conference of the National Association for Information Destruction in San Diego, California in May of 2004 (Givens). In her presentation, Givens offers an abbreviated history of identity theft crimes. In the early 1990s, identity theft was in its infancy. In fact, it was not even identified as identity theft per se. Crimes involving theft of personal information from data banks began to occur. Simple theft of personal information from trash containers became popular. Since that time, in the single year of 2003, 10 million individuals reported some form of identity theft. Identity theft is now divided into two types: a stolen credit is used for pay and purchase or stolen identity is used in application fraud.
The California Document Destruction Law began as a media story about the wealth of personal information to be found in trash dumpsters. In fact, Givens gives credit to the awareness of identity theft and the need for consumer protection to the media. A California legislator viewed a television video clip and subsequently introduced legislation to protect consumers against careless handling of sensitive information.
Problems with paper shedding were discussed in the light of improper shedding and the distribution of shredded paper. When paper is misloaded into shredders, the information may yet be readable. Only cross-cut shredders are recommended. Some discussion was made as to the shedding industry which has grown up around the need for privacy.
Givens encourages companies to adopt strict privacy and disposal practices for sensitive information and to screen employees. Dishonest employees account for a large part of information theft. Workplaces should create a “culture of confidentiality.”
The article was very informative, particularly as I reviewed the strictness of the California law to which she referred. The enormity of identity theft is overwhelming. In regard to media efforts, similar efforts have occurred in several cities across the U.S. where media has exposed careless information disposal. Givens adds that computer hardware, CDs, magnetic tape and microfiche are important to destroy. I add recycled personal telephones to the list.
I appreciate this article. I wondered as I read it if honesty and good will are a casualties of the digital age. Has “access” limited the ability of society to trust anyone any more?
Work Cited
Givens, Beth. “The Saga of Shredding in the U.S.: A Privacy Advocate’s
Perspective.” Privacy Rights Clearinghouse. 21 May 2004.
14 Nov. 2008. <http://www.privacyrights.org/ar/NAID.htm.>
.
Alert: FTC Disposal Rule: Does It Apply to You
“Alert: FTC Disposal Rule: Does It Apply to You?” (Privacy)
In “Alert: FTC Disposal Rule,” the author reports on the enactment of a ruling from the FTC regulating the disposal of sensitive consumer information. The target of the ruling is proper disposal of sensitive, personal information which consumers have been required to summit for services or which has been collected from them in the course of business. Both individuals and large business are to comply with this ruling.
The goal of the Disposal Rule is to protect consumers from identity theft.
The Rule applies to all forms of information gathering including paper, disc, and computer. The method of destruction is left to those who collect it. However, simply discarding sensitive information in a trash can or bin without taking effective measures to destroy it is, with this ruling, illegal and punishable.
The list of persons and business affected by this ruling is extensive and includes some persons who might not even know about it: landlords with tenant history, parents who hire someone to work in their home to take care of children.
This article was reviewed because it is about the FTC ruling upon which the previous article on prevention of identity theft was written. There are many sensitive documents viewed in the daily course of daily work. My workplace has many limitations placed on viewing electronic documents and actively tracks viewing. Document types of all kinds are carefully disposed in specific containers located in multiple places. I am continually impressed with how much security must be built around good services to protect consumers. I am impressed with the responsibility to handle and discard documents carefully.
Work Cited
Privacy Rights Clearinghouse. “Alert: FTC Disposal Rule: Does It Apply to
You?” Privacy Rights Clearinghouse. 3 June 2005. 14 Nov. 2008.
<http://www.privacyrights.org/ar/FTC-DisposalRule.htm>.
.
Prevent Identity Theft with Responsible Handling
“Prevent Identity Theft with Responsible Information-Handling Practices
in the Workplace” (Givens)
In “Preventing Identity Theft,” Givens states that there are basically two parties which must take action to prevent identity theft: the consumer and the collector of information. This article concerns responsible information handling methods in the business arena. Givens states that employers place sensitive information at risk by not properly screening dishonest employees and by not implementing adequate safeguards for information.
Givens suggests and describes fourteen measures to take to safe guard information in the workplace. Though each of these measures is important, I found several to be quite poignant and will comment on them.
Institutions should adopt a comprehensive privacy policy that includes measures to be taken to safeguard information. In addition to the policy, a specific person should be identified as responsible for the policy. This additional step to the policy puts a face to the policy for me and offers a person to call or consult regarding sensitive information. It also heightens importance and awareness. This seems more effective than requiring employees to read legal jargon they can barely decipher and then click “I understand and will comply.” Employees may click “yes” because they cannot work unless they do. I do not believe that agreement with the policy infers understanding it or its importance and ramifications. The personal addition is an excellent idea.
Institutions should dispose of documents carefully. I am impressed with how critical this is. It is also very costly. Cost is passed to the consumer. Our society is paying heavily to safeguard against sensitive information and identity crimes. I wish there were effective methods to prevent these crimes from being possible at all.
Givens suggests that data access should be restricted to a needs basis only. This restriction serves as means of keeping employees focused to their own work product and record. It limits the number of individuals who have access to the entire record; there are fewer individuals to track. It protects consumer privacy by disallowing “the dots to be connected” by a large number of employees. This is a very effective method of securing information.
Regular auditing of compliance as well as informing employees that they will be regularly audited, lends itself to a culture of safety awareness. Auditing of individuals is not personal, but institutional policy. It applies to each employee. Security of the product or protection of the sensitive record and the person it represents is the goal.
Work Cited
Givens, Beth. “Prevent Identity Theft with Responsible Information-Handling
Practices in the Workplace.” Privacy Rights Clearinghouse. March 2004.
14 Nov. 2008. <http://www.privacyrights.org/ar/PreventITWorkplace.htm>.
.
Wednesday, November 5, 2008
Copyright Law and New Technologies
Part 3 of an Educational World Series on Copyright and Fair Use.” (Starr)
This article on “Copyright Law and New Technologies” speaks to copyright status and use of Web pages. It reviews issues concerning Web resources and categories of software. There are two types of original works that are not covered by copyright law; those that are non-copyright protected, such as governmental, and those that reside in the public domain. Many of the laws governing new technologies predate software technologies. Good intent and common sense are important when considering using of original works and asking for permission.
Most countries protect Web pages by copyright law or regulation. Many countries participate in an international treaty which protects copyrights, the Berne Convention for the Protection of Literary and Artistic Works. The Berne Treaty, refined in Paris in 1971, addresses literally every type of work potentially posted on the Web including broadcasts, recitations, sound recordings, film and other artistic and literary works.
Posting copyrighted material to a personal Web site without investigating its copyright status may be viewed as an infringement upon the author's potential revenue. In certain circumstances, posting links, particularly copying html codes to an inside page may be an infringement. Copying illustrations to a personal Web site should be avoided. When determining if a multimedia resource or a book is in the public domain, it should be associated with a corresponding print resource as much as possible. If there is doubt, ask permission because not all Web materials and pages have corresponding print resources.
All software is protected by copyright law in the United States. Of the several types of software, each is governed by a slightly different set of regulations. The governing nuisances between commercial software, shareware, and freeware are considered. In regard to software applications in the educational setting, generally speaking use is limited to licensure, time, and absolutely no monetary involvement.
I found this article to be most interesting of the three I read in this series. I have a limited understanding now why some workplace programs are unavailable due to the small number of licenses purchased. I have never considered searching for a corresponding print resource to a Web page. I will be careful not copy a site’s html code into a work product. I have learned that as important as citing and giving credit is, it does not substitute for permission; copyrights may yet be infringed upon.
.
Work Cited
Starr, Linda. “Is Fair Use a License to Steal? Part 2 of an Education World
Series on Copyright and Fair Use.” Education World. 2004. 31 Oct. 2008
<http://www.educationworld.com/a_curr/curr280c.shtml>.
.
Is Fair Use a License to Steal?
Part 2 of an Educational World Series on Copyright and Fair Use.” (Starr)
This article is the second of a series considering copyright law. Its focus is upon the Fair Use Doctrine and its application to the educational setting. The author begins the discussion with the caveat that if there is a question regarding “fair use,” always seek permission. This does seem like the safest recourse insomuch that the regulations are complex.
The Fair Use Doctrine was made to allow for public consideration of copyrighted works. In its application to the educational setting, the Fair Use Doctrine simply says that if a work is used for educational purposes and the possibility for significantly diminishing an author’s compensation for the work is avoided, then within certain restrictions, the educator may use the work without seeking permission.
When considering a work for instructional purposes, there are generally four factors that should be considered: purpose of use, type of work, amount to be used, and the potential for diminishing author compensation. The purpose of the use must be for education. No one may make money from its use or take money from the author. When considering incorporating a work, a precise copy should be avoided; it should be altered significantly from the original.
The type or nature of the work to be used is significant as to the regulations to which its use must adhere. In regard to the written word, there are specific regulations as to books, poems, articles, and short stories. There are specific guidelines as to illustrations, graphs, and charts. Music, videos, and digital reproductions are specifically regulated.
The amount of a work or performance used also defines whether permission for use should be obtained. Generally the smaller the percentage of a work copied the less subject it is to infringing upon copyrights.
I appreciate this over view and had no knowledge of the Fair Use Doctrine prior to this reading; I am surprised at its detail. For example, there is a limited number of days an off air taping may be used. There is a distinction between articles and poems and the same work may not be copied more than nine times in a semester. Significant is the disallowance of materials meant for consumable use. Copying workbook contents over and over for classroom use appears suspect. The most significant element to avoid when considering legal use of another’s materials is whether the individual is potentially financially damaged.
Work Cited
Starr, Linda. “Is Fair Use a License to Steal? Part 2 of an Education World Series on
Copyright and Fair Use.” Education World. 2004. 31 Oct. 2008
http://www.educationworld.com/a_curr/curr280b.shtml.
.
Copyrights and Copy Wrongs
“Copyrights and Copy Wrongs, Part 1 of an Education World Series on Copyright and Fair Use” (Starr)
In “Copyrights and Copy Wrongs,” the basics of copyright law are seen to dispel common misunderstandings regarding the use of internet resources for educational purposes (Starr). The article reviews on line resources that are within the public domain and on line resources that are protected by copyright law.
A copyrightable work must be tangible and creative. To be tangible, the work must be recorded in some manner. To be creative, the work must be more than a collection of fact; at minimum it must be a creative arrangement of fact.
The objective of copyrighting from a societal perspective is to encourage creativity through compensation of its author. Moreover, copyrights protect the author’s right to compensation and control over the use and reproduction of his work.
The extension of copyrights to an author is not limited by the registration of the work. Rights are granted when the work is recorded.
For me, this article was very enlightening. I learned that nearly everything recorded, video, audio, written, and digital images, may easily pass the test for copyrights. Many more works are copyrighted than not. I have always considered that a work on the internet was there for public use and that permission from the author was not required for its use. Because a work is on the internet, public domain is not implied.
Quotations and citations for the work do not obviate the copyrights of the author. Permission from the author must be obtained prior to use or that use constitutes infringement. I give credit beyond what many of my colleagues do and thought this was in effect the same as obtaining permission. Multiple copies of works may divert compensation from the author. Knowing this, I am surprised that some university classes I have had did this and can only think that they must have had permission.
The safest recourse is to seek permission before using or incorporating someone else’s work no matter whether the work is cited or not. Good intentions do not satisfy respect of authors or copyright law.
Work Cited
Starr, Linda. “Copyrights and Copy Wrongs, Part 1 of an Education World Series on
Copyright and Fair Use.” Education World. 2004. 31 Oct. 2008
<http://www.educationworld.com/a_curr/curr280a.shtml>.
.
Monday, November 3, 2008
The Blue Nowhere Third Posting
Section II (cont.)
18, 19, 20 and 21
Gillette escaped from the Crimes Unit. He left out the back door disabling the fire alarm. . Gillette was Valleyman in the Knights of Access. He knows who Phate is. Both he and Phate were skilled software writers together. Then Phate went bad. He remembers taking things apart for the majority of his life. His childhood and brief college history including meeting his wife, Elana are presented. Elana is the objective of his “escape.” He disabled his anklet tracing device for only a brief time. He is trying to see Elana and give her the circuit board which he has made in prison. He is also showing his own skills at decoy and deception. At the Crimes Unit, the distracting computer wiping software has started and there are multiple “clues” for the team members to trace which Gillette planted for them.
The Pentagon, through David Chambers, puts pressure upon Bishop to keep the use of Gillette on the case a secret. Bishop deceives Chambers into believing that Gillette is under his control though at the time of the conversation, Gillette has escaped him. Chambers OKs Gillette being out of prison for three days to work on this case.
Gillette finds his way to his former wife’s home. Though he is captured, he is allowed to speak to his ex wife. He pleads with her to not leave him for someone named “Ed.” He gives her the circuit board which he smuggled out of prison. He tells her to patent it and it will make money for her and take care of her. She unconvincingly says “no.” He leaves it in the mail box.
Gillette confesses that he knows who Phate is, but only in an on line way. He states that Phate became dangerous and that he finally reported Phate’s stolen Harvard software to the Massachusetts Police. Phate was subsequently arrested.
A presumed deputy from the county, Charlie Pittman, approaches Bishop and Gillette as they are about to leave Elana’s home. He is prying for information which Bishop did not give him. Gillette is brought back to Crimes Unit. Bishop is beginning to like Gillette.
Phate selects his next victim.
The section quote that anonymity will be abolished by computing becomes a real possibility in these chapters even though elaborate cloaking devices are employed. The Captain Crunch reference was an interesting side bar. All of the characters, good and bad, use deception as a matter of daily operation. Deception is suggested as an easy, albeit elaborate at times, method of protection of privacy and information.
22 and 23
Phate has selected for his next target a little girl named Samantha. She is attending a private school that boasts security. She is the daughter of an executive that has made personal family security a priority. Phate hacks all of their information, poses as an uncle, and literally walks out of the school with the girl. While in route to his home to kill her, he becomes with distracted with a text message. He aborts his abduction of the little girl. He pulls over to the side of road, lets her out, and takes off. Phate has received a message from Shawn who tells him that Wayne Gillette is working with the Computer Crimes Unit on Phate’s murder cases. Phate is very excited about this new twist in his game. There is an obvious connection between Shawn and the character, Charlie Pittman.
Phate decides to take on the Computer Crimes Unit itself. The hunter will become the hunted. Phate is in his warehouse home. It is here that he keeps everything important to him. The warehouse is a computer museum. It is from here he stages his games.
Back in the Crimes Unit, it is suspicious that Bob Sheldon comes in late every so often. Gillette’s bot finds a posting from Phate himself; a modified quote of Shakespeare. The game is on now between the hunter and the hunted.
Phate’s character is developed in these chapters. A history of computing machines is reviewed in brief. The plot depth deepens with both good and bad in a deadly search for each other.
The Blue Nowhere Second Posting
Section II (cont.)
12 (second half) and 13
Holloway, in searching the computer files of Jamie Turner, remembers briefly his high school days. Holloway is depicted as an brilliant, disenfranchised teenager. He is ignored by his parents (who are consumed in their own lives and work) and he is marginalized by his teachers and peer groups at school. Holloway was non social, bored, and isolated. At seventeen years of age, he decided to become someone else just as he had done in the on line games he was playing. He social engineered a position in another school and became popular. While playing this acceptable social role, he was instrumental in his parents and brother’s demise. He later went to Princeton and at one time held remarkable computer positions. Now he is playing his game with Jamie Turner.
In the Crimes Unit, Gillette has been given full control over computer access and associated decisions. He cuts important lines of computer communication to prevent Phate potentially turning his game upon them. Bishop trusts Gillette and lets him do this.
Gillette’s work for the Crimes Unit is productive; he finds Phate’s true identity and some work history. He also identifies Phate as a co-leader of an on line gang, The Knights of Access. The other gang leader is identified as Valleyman. The crime investigation group recognizes Phate’s overall goal; to kill as many people as he can in one week.
The problem of capturing the interest and energy of gifted children is underscored in these two chapters. The crucial role which parents play in the development of their children is underscored. The ultimate crime of the century in regard to internet use is may be that of the invasion of privacy of all kinds, personal, corporate, and national, and the subsequent use of that information for bad.
14, 15, and 16
Most significantly to the story development, Gillette builds a bot to search for Valleyman, Phate, and Holloway. Gillette’s bot yields a message from a character known as “Vlast.” Vlast uses an internet server from Budapest and the reader is introduced to some background of the numbers of hackers in Budapest and why. Another character, “Triple X,” is found with Gillette’s bot. Gillette is able to engage in a “conversation” with Triple X where he discovers a few things about Phate’s program, Trapdoor. His conversation is cut short, however, due to a fault in the cloaking device supplied by Miller.
An abbrevated history of the Silicon Valley is presented. Its beginnings are in David Starr Jordan’s venture capital in a little known invention called the audion tube. The tube’s potential in electronics helped to create the Valley’s industry and changed the world.
Jamie Turner is presented as a disenfranchise child just as Phate is and with the same problems and potential for developing into an angry, isolated person.
Phate is updated by Shawn regarding the progress of the Crimes Unit as to his identity and automobile make. Phate goes to the St. Francis Academy and waits for Jamie Turner to come out….just as Phate has so engineered it.
The Silicon Valley history was very interesting. The history of the Budapest hackers was interesting. An internet world exists about which the average person is oblivious. The hack and chat rooms are presented as without rules and wild and dangerous.
17
Phate captures Jamie and uses him as access to “Booty.” Booty is killed. It was Booty that was Phate’s target; Jamie was the “trapdoor” to Booty. Gillette is at the crime scene. He offers council to Jamie when the school vice principle does not. Gillette is suggested as the Crime Unit’s internal spy. Gillette escapes the Crime Unit through the fire alarmed door just as Jamie had done at the school. Officer Bishop feels personally betrayed.
In this chapter, school authority figures are shown as detached and incapable of providing personal support for students. They appear unemotional and, in a sense, robotical. A dysfunctional computer addict is shown as more capable than anyone to help the boy in need. Most of the personal relationships in the story are fractured. The computer is personalized as a “co-conspirator” in Booty’s death. Booty is the second death in the week's "game." The appearance of Gillette at a crime scene seems a bit of a stretch in the story development for a prisoner serving a sentence in a federal prison.
Saturday, November 1, 2008
The Blue Nowhere First Posting
Section I
1
Chapter one introduces two characters, Lara Gibson and “Will Randolph.” Lara Gibson is a single woman living relatively near Silicon Valley. She touted her adeptness at self protection, taught other women how to protect themselves, and had her own web site in regard to her business and female self protection. Lara fell prey to Will Randolph. Will Randolph is a central character of the story.
Will Randolph posed as someone whom Lara knew, but not well. He seemed to know all about Lara, shared mutual friends, and even went to some of the same parties. Randolph deliberately created a reason for Lara to want to accompany him to his car. He easily overcame her and killed her.
Lara was an objectified element of a large game Randolph is playing. He was challenged to kill the “Queen of Urban Protection” and he did it with ease, socially engineering her.
2
Wyatt Gillette, Thomas (Andy) Anderson, Detective Bishop, Bob Shelton are introduced. Gillette is a 29 year old computer wizard and code slinger who is serving out the last year of a prison sentence for being basically a threat to the National security. He sports a palm tree tattoo on his arm. He is introduced as nonviolent and a victim of his own addiction to hacking.
Thomas (Andy) Anderson is a computer police detective who himself dabbled in illegal activities. Anderson, now well educated and respected among cyber cops, is the Chief of his division of the California State Police. Detective Frank Bishop is a homicide cop who wants to be on another case. Detective Bob Shelton is another homicide cop who is portrayed as not too intelligent.
Chief Anderson takes Gillette from prison to help work on Lara’s homicide. From the evidence gathered, the case requires intense understanding computers codes. Gillette is to hack into Lara’s computer and look for any traces of the perpetrator.
The sense of the chapter is that computer experts are generally tainted with some history of illegal activity. They are extremely competitive. Their skills are beyond conventional wisdom. It seems to “take a thief to catch a thief.” The computer code slingers and wizards all have at least two things in common: respect for each other and high intrigue associated with puzzle solving. Gillette is developing as an interesting character.
3 and 4
Phate’s character is developed. His real name is Jon Patrick Holloway. He has 6 or 7 identities. He makes a living by selling computer support wares. His very best friend is “Shawn.” Phate is a wizard and brilliant code slinger. He and Shawn put together software which accesses a computer without the knowledge of its owner. The software is called “Trapdoor.” Phate’s next target is a young boy named Jamie Turner.
Jamie Turner is a 15 year old boy who is becoming a very promising code slinger himself. He attends Saint Francis Academy which has high security. He wants to break his academy master’s gate code so that he may attend a concert with his brother. He puts several computers to work on this, but to no avail. Phate has identified Jamie as his next target and is looking through Jamie’s computer files via his "Trapdoor" virus.
The student’s digital knowledge places the teacher in an apologic posturing. It is the student who is really takes control. The student is able to manipulate his unsuspecting teacher. The student is his own master.
5 and 6
California’s Computer Crimes Unit is assigned to investigate and solve Lara’s murder. The team members and others are introduced in this chapter. Linda Sanchez is a detective involved with seizure, search and logging. She is the “team bloodhound.” Sergeant Stephen Miller is the second in command. He is an older computer hacker who is later associated with a couple of oversights in his computer research investigation. Tony Mott is a computer nerd, but not typical. He is athletic and a risk taker. He wears the biggest pistol. Andy Anderson is the lead of the team. Patricia Nolan is a computer expert with good credentials who works in security with Horizon On Line, the same company with which Lara had her internet service.
Gillette is given Lara’s computer and begins to review her files with a program he has developed. In the process of the introductions and collaboration with Gillette, the team reviews significant dates in the progression of computer development in the world including those associated with Univac, ENIAC and IBM.
The reader is given significant information regarding computer ease and important dates relevant to the development of the digital world. File types are introduced. Servers and routers and roots are explained in detail.
7 and 8
Gillette discovers Unix commands on Lara’s computer. Stephan Miller claimed not recognizing these as important. Peter Fowler is introduced as a gun runner who possibly sold the perpetrator a knife. Anderson goes to Hacker’s Knoll to see if he can find out any information.
Phate is transferring Jamie’s cracker and Booty’s password file to the DRC for rapid processing to facilitate getting Jamie out of the academy. Jamie sees the root seized on his computer, but does not recognize it as an invasion of his computer. He is not alarmed.
Phate receives an email from Shawn warning him that the police are close to Phate. Phate stops manipulating Jamie’s files and leaves abruptly for Milliken Park and Hacker’s Knoll. Phate is meeting Peter Fowler, the gun/knife runner.
Anderson goes to Milliken Park and finds himself in a close encounter with who he believes is the killer. Anderson actually overtakes Peter Fowler. Phate is present and kills them both.
The intrigue for puzzle solving is inherent in each of the characters, especially the hackers. Phate is excited and confirmed that someone of Anderson’s caliber is searching for him. A key to the game is given: Anderson was stabbed in the heart. Anderson’s death is an interesting turn in the plot.
Section II
9 and 10
With Anderson’s death, Captain Bernstein is introduced as the head of the investigation both for Lara’s case and now for Anderson’s case. That Andy was killed by the same “perp” is not in question. His phone was intercepted and he was killed with the same type of knife. The homicide elements were initially assumed by Susan Wilkins, but Bishop decides that he had some guilt and wanted to pursue the case himself. Huerto Ramirez and Tim Morgan are introduced as running Anderson’s crime scene. Before Gillette can be taken back to prison as Anderson had previously ordered, Gillette identified Phate as playing a virtual game in real life. Gillette identifies the killer as a MUD head who is playing Access in real life. Gillette stays on the team.
The idea that persons are objectified, that they may be no more than mere targets and a part of a game is strongly put forth. Persons in authority are at extreme disadvantage if they are not as literate as those anticipating leadership from them.
11 and 12 (first half)
Gillette begins his search for the killer by accessing his “tools”; computer programs hidden away in the Los Alamos Nuclear Weapons Research Facility. He has a 17 character password. Gillette looses himself in chat rooms, newsgroups, and websites. He finds the first real clues to Phate himself. He identifies Phate with Shawn who together created the virus "Trapdoor." Gillette works on a program to search for Phate and Shawn and the person who spoke about them on line, Triple X.
Web browsers and cloaking devices, traces were discussed. The Web, Usenet, IRC, and BBS were spoken to again. Robot demon programs were described. The internet was portrayed as having two faces; the commercial, educational side for civilians and the unsuspecting, and the unseen digital and character command side aggressively trying to protect and access information.
Saturday, October 25, 2008
Review of 4 Articles and Reactions
In Social Networking Websites and Teens, the survey attempts to provide an overview of teenage usage (ages to 12 to 17) of social networks. In regard to the survey, the "n" is 935, much less than the preferred target of 2000 when extrapolating to large numbers. In "Methods" 46% of those initially targeted for the study became a part of it. The results were analyzed. Boys and girls use the networks for slightly different reasons. Teens who go on line from home use the networks the most. Friendships are made and "managed." There are some concerns for personal safety and privacy.
Reaction
In regard to the study, not surprisingly, the survey found that greater than half of interviewed teens engaged in online social networks. Confidence is undermined by the fact that participants were "prompted" with two social sites: Facebook and MySpace. The information is not new. I am surprised it is not closer to 100% except for the availability of computers to all children. Not interviewing Spanish and other language speaking children is a limitation of the study. The need for positive discourse and trust between children and parents is underscored here.
In regard to my work setting and ethics, I really do not know anyone that is not connected to some type of social network. People trade pictures of children, coordinate activities, and discuss business on the internet quite frequently. Positive social interaction is a good thing and healthy for the heart.
In Your Guide to Social Networking Online, the reader is provided definitions for and a brief history of online networks and their usage. MySpace and Facebook are discussed and compared according to user definition, flexibility for profiles, and safety. Problems related to sustaining these giant sites are briefly discussed. Business networks are discussed. Other outlets for social interaction include news sites, photo sharing sites, and an information gathering and comparison site. A limited terminology review is presented and some related article and blog posts and social networking sites are presented.
Reaction
It is good to see there are so many things available to connect people. I am apart of some sites as well and enjoy them.
What Kind of Cyber Guide are You? is a short "quiz" for the reader, testing how he/she interacts with children and teens regarding internet usage. After taking the interactive quiz of sorts, suggestions are made to the participant for improvement.
In MySpace Cheat Sheet for Parents, reader is presented with a short list of FAQ in regards to surveillance of children's internet activities.
Reaction to both of the Above
I took the test: I am graded as a “Conversation Starter.” Though I appreciate the intent of these articles and quiz, the level of language and suggestions given are fairly elemental and condescending to parents.
Growing Up On Line Video
Review
The PBS film Growing Up On Line is a documentary considering teenage computer skills and social networking on line and authority figures. Teenage computer skills are generally quite superior to their parents and teachers. On line social networking is a “virtual society” in which teenagers spend a significant amount of time.
Lives On Line. The “virtual society” is portrayed as often unruly and dangerous. It is hidden from parental oversight. Initiation into this hidden world begins with young children playing innocent on line games and becoming “friends” of fantasy characters. By the time teenagers are in high school, internet interaction is the “currency” of their relationships.
Classrooms. Computers and internet applications in the classroom bring an enormous amount of information into teaching, but are also critical in capturing student attention. Teachers claim that to teach effectively they must be more of an entertainer than they feel they should. Student thought streams are fragmented as they struggle to focus on classroom concepts. There are viable concerns that assignments are completed at all by students, that shortcuts and plagiarism are widely employed.
Self Expression. The internet provides an unchecked outlet for self expression and experimental behaviors. Teenagers readily expose parts of their lives heretofore considered private. Interpersonal conflicts may be “hashed out” on line as opposed to face to face. So intense may on line relationships be that one girl claimed she felt “erased from the world” when her parents demanded that she delete a provocative picture file of herself and the associated individual contacts.
Child Predator Fear and Cyber Bullying. The dangers of on line child predators were discussed. Some methods were presented to help manage this threat: locate the home computer in an open place and not in children’s bedrooms, apply site screening software, and ask teenagers about their sites. There was discussion that teenagers may be willing participants in risky behaviors as well as victims. Bullying on line has the potential to be more intense than interpersonal bullying. It invades teenagers’ homes, their “safe havens.” Inflammatory words maybe viewed over and over. The outcomes may be devastating.
Up Dates. The documentary closes with selected updates of its teenagers and families. Teenage choices of schooling and degree of anticipated “virtual society” participation were presented. The strained relationship of one child and his mother was highlighted. No one looked very happy.
Reactions
Film Criticism. To me, the essence of the film is a conversation about teenagers, teenagers in emotional turmoil seeking peers and others for acceptance and nonjudgmental guidance at the exclusion of their parents. The internet and internet skills are the platform to present the producer’s perspectives. Teenagers are portrayed in a sense as superior to and more powerful (in regard to their internet skills) than their parents. Little personal or social accountability is underscored.
Parents are portrayed as overbearing, controlling, and clueless as to how to make a significant positive impact upon their children’s personal and social lives. Children and parents are depicted as living in parallel life patterns. Religious values and morals are excluded from this documentary. Unconditional love, trust, acceptance, and honesty are the basics of good actual relationships; these elements were not address except by their absence.
Some Thoughts. Immature, narcissistic behaviors are not unique to today’s teenagers. However, internet socializing encourages and exploits these behaviors. In lieu of strong personal relationships, the internet presents as a constant “friend,” ever available to “listen.” Direct, personal encounter skills have diminished opportunity for exploration and development.
It is my experience that actual personal relationships are seldom made in a "click"; they are built over time and use a wide variety of connection modalities. Relationships limited to “clicking” are frequently fleeting and without significant depth.
Lost, lonely children tumbling along in life without moral constraint and lacking personal security in an adult who determines to unconditionally love them is a huge problem. I am not sure how to fix that. I can only say it most optimally is started when teenagers are babies and that the need for good relationships continues throughout life.
My Teaching Setting. I must not expect students to recognize “what I know” as important without also recognizing and being skillful at what they know. Learning is ever constant and requires deliberate attention from teachers. This underscores to me how important it is to be skillful to some degree in all form of communication to maintain viability. I believe that strong, dependable trust is basic to good personal interaction and significantly impacts the direction of virtual interactions.
All of my “students” are professionals and over 20. I have learned (and it has taken time and not without mistakes) to avoid being judgmental and accept the good that individuals have to offer in their work. I am in a position to enable and facilitate professionals to have confidence and skills in critical life situations. Each day I see the confidence element as more critical.
Interpersonal skills are often lacking in professionals, younger and older. I have been the recipient of some thoughtless emails and instant messages. I find that neutral or positive responses, personal notes, calls, and remembering individual needs is both surprising and well received. I try to build trust by strengthening their ability to remember algorithms and critical responses without judging their weaknesses. I really do. I know that professionals must know the material or skill even better than me because when they are done they must use it to save a life.
Friday, October 24, 2008
Searching Virtual Self
Thursday, October 23, 2008
On Line Activity Search Engines
Computer based crawlers read and collect information that is later catalogued, matched, and ranked as to relevancy. Human based reviews work somewhat like review of abstracts. They are labor intensive.
Exactly how information is deemed relevant and ranked by the computer method is an industry secret of each provider. Generally, however, search engines employ an algorithm structure with a set of rules. Majorly important is the location/frequency rule. It has its short comings as demonstrated in the "miserable failure" search in Google which yielded George Bush. Computer based search engines differ as to the number of web pages they "read" and how often they are "read" and updated.
Search engines add and delete materials also based upon their popularity. Sites are guarded from manipulation by web masters.
The history of search engines and directories is a mere nineteen to twenty years old beginning with "Archie." Engines and speculation have come and gone along with fortunes as most search engines are "commercial ventures." Netscape was at one time a most popular browser with some relatively powerful search engines at the time. Google is by far the most popular search engine now.
I appreciated reading these articles. The history is short. The rate of growth and speed of acquisition is incredible. The internet never "closes up shop," never goes to sleep, never fatigues. There are a number of popular "boutique" engines for specific interests. Some of these are free, but I notice more and more that many require a member fee. In fact, a huge world of the information seems to be unavailable to the non paying "searcher." There is some concern that Google is defining the world by its algorithms. Moreover, though it employs other languages, it is an English based system which also limits its depth.