Wednesday, December 15, 2010

Chapter 5

5.4- Two sites are unintentionally blocked are The home page of Yale University's biology department and sites about Middlesex and Essex.
5.5- Two methods that are used by governments to control access to information are to censor sexual websites as well as pass the communications decency Act of 1996 which attempted to keep the access to information limited and made people subject to fines if they access obscene or indecent materials.
5.7- Two reasons people object to spam is that it often contains viruses, and most of the time the ads are false promoting 'get rich' symbols which are suppose to be appealing and they add up over time and make people opposed to them. Another reason is that spam often includes misleading material and unsolicited commercial email which makes a lot of emails go out.
5.11- I think the policy that is appropriate for elementary schools are that they block and restrict students from accessing sites and information that have explicit material including bad language, sexual content, or violent content. However I think high school is a lot different, students are more mature and are able to handle sexual and violent content unlike elementary school students. High school students need to access information that may be deemed sexual, violent, or have bad language as part of their studies.
5.14- In my opinion the boy is clearly very stupid. He said that "These are dangerous sites" and that they are, any site that states how to make a bomb can not be trusted, probably not accurate, and is most likely made by an unauthorized official. They are very dangerous indeed because bombs are life threatening, so why did he enter the site? He claims that he is not a troublemaker, but any person who makes a bomb with then intent to set it off in their school, regardless with knowing how much force it would put off, they are absolutely a troublemaker. He is not a regular kid because most kids would not search how to make a bomb in the first place never mind make one and set it off in their school.
5.15- My reaction if a law was passed to restrict availability to that material is that it is absurd, their is freedom of speech for a reason, an atheist parent can restrict their child from viewing the material, but a law should not be passed to restrict it from other people. All of the restricting issues differ because some are harmful to people, some are views that people do not agree with, and some are material that people should not be able to view. Bomb making sites are harmful and dangerous to people, while sexual and violent content are material that young children should not be able to view. All of the sites are similar in the way that their is opposition against them and reasons why they should be restricted.
5.17- Issues that are raised by this problem are that terrorists and enemies would be able to hide their operations and beat the U.S. government advancing in intelligence. The posting of the sites should be illegal because it is detrimental to the United States because it makes terrorism more likely to happen. However it should be legal because people want to see everything that is going on across the world. I believe that the illegal argument is stronger because terrorism is a huge issue in the world and it has to be stopped at all costs.
5.18- Harris Interactive said that the recipients of the email signed up to receive it, and if that is the case than I believe that Harris is right and did nothing wrong. MAPS believed that they did not offer the proper amount of information to the recipients to send the information out. I believe Harris Interactive should win because there is no evidence against them and what they were doing was completely legal and descent.

Monday, December 6, 2010

A Gift of Fire Questions

1.15-
A.The person in this case is interpreting the right claimed as a positive right because he is claiming that he is entitled to he viagra and that the insurance company is suppose to front the money to him for it because they are obligated to. Positive rights are rights that impose an obligation on some people to provide certain things for others. This should be a positive right because the insurance company is obligated to give the money to the man so that he could have a happy sex life.
B. The issue is interpreted as a Negative right because the Legislators have the right to act peacefully without interference, however the organization that ran ads criticizing their voting records interfered with their right to act peacefully. It should be a negative right because the only obligation they impose on others is not to prevent you from acting.
3.9-
I believe that this was illegal for the reasoning that personal information was being invaded and without the consent of the person. It was illegal because the bookseller was saving copies of thousands of emails and analyzed them to collect data on sales trends and the people on the other side of the email messages did not give the bookseller permission to access their mail.
3.10-
The most serious threat in my opinion is the threat of terrorism because CALEA requiring that technology used in communications systems be redesigned, and existing equipment modified, to ensure the ability of law enforcement agencies to interpret communications which could be vulnerable to communism.

Thursday, October 28, 2010

Book Work

Chapter two
2.10- No it is not a violation of privacy because the United States does not have comprehensive federal legislation regulating personal data collection and use.
2.11- a. I can easily see the arguments involved that are for and against that policy. For example, an argument against it would be that it is an invasion of privacy, each person has the right to keep their name in secrecy. Often stalkers violate people by looking them up through their number, and it would be a security issue if people were able to get other people’s names by typing their number into a phone. Arguments for the policy would be that you could find a persons name if it is an emergency, or if a prank caller is harassing you, you will be able to get their name, it would also be helpful to know who you are calling or talking to.
I think it is a bad policy because it is not respecting people’s rights and privacy.
b. It might change their use and impact because they are a lot easier to access on the Web opposed to book form and people use the Internet a lot more.
2.12- a. It would have been less likely if they were in paper files because they would then have to be processed through a postal system and it would be harder to gain access to the documentation because they would be in one remote place, opposed to the Internet that is a huge space.
b. It could have been prevented if the health department had more security on the AIDS files and limit the access to employees.
2.13 a. The government’s arguments in support of this action are that they need a proper collection of each small business because they have to be entered into a federal database to ensure there is no illegal activity going on and to collect taxes for the people. Privacy advocates would give the argument that small businesses have the right to pay the taxes when they deem necessary and that it is a violation of privacy to track a business down to collect money.
b. I think it should be permitted because it helps the government track down offenders of the law that do not pay taxes and it can help catch criminals.
2.14 Arguments in favor are that it would be easier to track down drug offenders and you would be able to have access to the databases that can help find the voters and conduct investigations weather illegal activity is taking place or not. Arguments against it are that it would be invading people’s privacy and as a result it would be against the law, and the FBI or IRS has no right to have those records. I believe the argument against it is stronger because they raise more valid point of why it should be private.
2.15 Advantages of the expanded database are that the NICB could find out more crimes that occured in the insurance agencies, because they can not all be seen as suspicious. The privacy concerns are that it makes everyone with an insurance claim a suspect in crimes and they would have access to private things.
2.16 The reasons for this are that it would be increasingly simple to find out if a person is a threat to the country, if they are not from the country, and if they have any criminal affiliations. Some risks are that the FAA would have a great deal of social security numbers in their possession and it would be difficult to keep them all private. I believe it is a good idea because it will keep the country safe and stop any possible terrorist threats.
2.17 They can get information from credit reports on credit card databases.

Monday, September 13, 2010

Security
http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_imuttik_vb_oct2000.pdf
This example is a virus case study, that harms the computer.The example touches base on how security can be breached on any form of hardware, because often virus blockers do not work efficiently.
http://www.vendorsafe.com/images/pdfs/CaseStudy_FastFood.pdf

The pdf file shows how a security breach can compromise a whole business. The stealing of credit card numbers is one of the main things that happens in security breaches, and many people lose money as well as the industry and company involved. It is a huge disadvantage for the company because they lose a lot of money but the hackers get the advantage. It is morally wrong for hackers to steal credit card numbers but they steal a lot of money and make a profit.
Privacy:
http://www.ucdmc.ucdavis.edu/compliance/guidance/privacy/example.html

The article is about breaches of privacy and how they can happen in various different ways, for example they show how people can be monitored when they use their computer. Privacy can always be compromised when using machines and you can never be sure that they work. People are faced with the decision of weather or not to breach someone else's computer files if they are given the chance, touching upon moral and ethical issues.
http://www.monitoringsoftwareonline.com/

The article shows how parents now have the ability to monitor what their kids view on the computer. Is this not wrong? It seems to be an invasion of privacy and is ethically wrong, each person, child or adult, has the right to look at what they want to look at what they want because they have that freedom. The advantage of this is that parents can make sure their children stay off harmful websites, but a disadvantage is they are taking away the freedom and rights of their kids.