Professional Documents
Culture Documents
Freedom of speech, press, religion, assembly, and petition. Which amendment is this?
1st
The right to express oneself, guaranteed in the First Amendment to the US Constitution
Freedom of Speech
They take pleasure in taking the fun away other people and are usually encountered in video games.
Griefers
Your account setting is used to respect the choices made to limit sharing or visibility settings in the
account
True
A legal contract between the manufacturer and/or the author and the end user of an application.
Right to associate
A general statement intended to specify or delimit the scope of rights and obligations that may be
exercised and enforced by parties in a legally recognized relationship.
Disclaimer
Noee says he has the right to criticize the government. That means…
If a reporter can get three different sources to confirm the same factual allegation, he or she cannot be
successfully sued for libel.
False
Cartoonists – because they are trying to be funny – cannot be successfully sued for libel.
False
It is the right of every individual to hold opinions without interference and to seek, receive and impart
information and ideas through any media.
Freedom of Expression
Control of what people read, write, see or hear; efforts to prohibit free expression of ideas
Censorship
Internet Censorship is the control or suppression of what can be accessed, published, or viewed on the
Internet enacted by regulators, or on their own initiative.
True
What act is discussed in the image below which regulates the processing of personal information of
individuals collected by both public and private entities as a way to protect one’s privacy.
They intentionally upset other people on the internet by starting flame wars or posting content that are
designed to spark negative emotions.
Trolls
Cyborgs are called biological organism whose physical or mental abilities are extended beyond normal
limitations by either electronic, mechanical or robotic elements built into the body.
True
It outlines the exceptions for public disclosure and the procedures for accessing public documents.
Freedom of Information
If you give your information to a company, they will never share that information with anyone else.
False
Subscriber may request for the suspension, withdrawal, blocking, removal, and destruction of
Personal Information from processing systems.
When the subscriber already opted in there’s no way we can withdraw the given consent.
Internet addiction is a disorder wherein the person has an excessive impulse to use the internet.
True
Question 24 1 out of 1 points
Slander can occur through the use of a hand gesture or verbal communication that is not recorded.
True
It protects the right to obtain and publish information or opinions without government censorship or
fear of punishment.
What are included in the McLuhan’s Tetrad analysis. Arrange your answer in proper order.
Enhances
Reversal
Retrieval
Obsolete
Internet addiction is not yet recognized by Diagnostic and Statistical Manual of Mental Disorder to be a
real addiction.
True
What freedom gives you the right to say anything you want just long as you are not threatening safety of
anyone?
Speech
An image manipulation is an online platform where people build social relationships with other people
on the same platform that share similarities with them.
False
Who might see a comment you make on your friend Sarah’s Facebook status?
Sarah, Sarah’s friends, your friends, and the friends of Sarah’s friends
Question 31 1 out of 1 points
Self-Concept is consists of an individual’s own personal experiences, attributes, and traits that
differentiates them from other individuals.
False
The right to publish newspapers, magazines, and other materials without government restriction
Sending a text to your friend saying you don’t like Donald Trump is an example of freedom of the press.
False
Cookie is a type of technology placed on a website or within the body of an email for the purpose of
tracking activity on websites, or when emails are opened or accessed, and is often used in combination
with cookies.
False
False
What two amendments rights does the image exercise? Click on the 2 freedoms that identify the rights
being performed in the image
Assembly
Speech
Question 38 1 out of 1 points
Robotics is the science of communications and automatic control systems in both machines and living
things.
False Cybernetic
Match Column A with Column B. Select the letter of the BEST answer.
Question
A student writing a letter to the school principal asking to have free seating at lunch. Freedom of
Speech
Multiple online personas allows a person to maintain two (or more) mutually incompatible value
systems.
True
Match Column A with Column B. Select the letter of the BEST answer
Question
RA 7610 Special Protection of Children Against Abuse, Exploitation and Discrimination Act
Control of what people read, write, see or hear; efforts to prohibit free expression of ideas
Censorship
Written publication, tangible in form of a defamatory remark that has the tendency to injure another’s
reputation or character.
Libel
False
Slander
Hardware Physical computer itself, CPU, Hard Drive, Inputs
Software Instructions(programs) designed to be executed by the hardware
Causes of Computer Failure Hardware Errors (malfunction), Software Errors(bugs),
Programmed to solve the wrong problem, Misuse/given the wrong data, Communication failure,
Malice
Human Error The software may fail for other human reasons. The software may work but its
use may be misunderstood or program misunderstood problem
Malice People create software intended to do harm: viruses, spyware, trojan horse, DDOS
Ariane 5 Flight 501 Careless bug. used old software that didn't account for bit overflow with
new max velocity
Safety-Critical Software software that may affect someones safety if it fails to work
properly
Decision point A place in computer code when the next instruction executed depends on input
data
Control Programs Control Some sort of machinery, hardest to get right due to the necessity
for the program to run in real time and multiple processes
Real time programs that must do something within specific amounts of time
Multi-process programs that execute at the same time as one or more other programs
Advances in Software Engineering better education, more sophisticated testing, better
maintenance, and prevention of bugs
Major tasks of development Requirements, Specifications and design, implementation
Brook's law Adding people to a late project makes it later
Therac-25 Made by Atomic Energy of Canada Limited, used old software, 6 accidents with 3
resulting in death
Douglas Birsch Applied Ethicist
Birsch's Criteria for Moral Responsibility 1)A person's action must have caused the harm or
been a significant causal factor
2) A person must have intended or willed harm, or it must be a result of his or her negligence,
carelessness or recklessness.
3)The person must be able to have known, or must know the consequences of the action, or must
have deliberately remained ignorant of them.
Mitigating Circumstances 1)program was entirely developed by one person, working alone.
TODAY considered extremely poor programming practice.
3) Written in an assembly language-very low level language that similar to machine language.
Decision dependent upon time
4) Therac-20 software reused almost intact in Therac-25 since appeared to be error free. Not
ERROR FREE but hardware safeguards removed on Therac-25
Malware Malicious Software
Worm A program that makes copies of itself, then propagates those copies through a network to
infect other computers
Virus Malware that is similar to a worm, but resides inside another program. The program must
execute for it to propagate
Trojan Horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but that is actually designed for a malicious purpose.
Rootkit A program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system.
Ransomware Encrypts files for ransom
Hackers people who write and deploy malware are commonly called this and the act of
doing it is called hacking
day zero attack An attack that exploits a previously unidentified vulnerability
white hat hackers their goal is to seek out vulnerabilities so they can be removed before a
malicious intruder discovers them and launches an attack
Stuxnet a computer worm that significantly set back the Iranian nuclear development
program
Assembly Language Low level coding language used in computer architecture
Phishing Scams Hackers trying to get private information by acting as a trustworthy source
or resource
What are the main ways causes of computer failure? 1. Hardware Errors.
2. Software Errors.
3. The computer solves the wrong problem.
4. Misuse
5. Communication Failure
6. Malice
Define Safety Critical Software. Safety critical software is software that may affect
someone's safety if it fails to work properly.
Define Decision Point. A decision point is a place in computer code where the next
instruction executed depends on input data. You can use this concept to roughly calculate the
number of executions required to exhaustively test a program.
Define Control Programs. These are programs that control some sort of machinery.
Explain Real Time. The term real time simply means that the program must do something
within a specific amount of time.
Define Multiprocess. Programs that execute at the same time as one or more other programs.
List the advances in software development that enable most programs to execute daily without
computer failure. 1. Better education of software engineers, programmers, and analysts.
2. More sophisticated testing procedures.
3. Better maintenance.
4. Refocusing the software development process on the prevention of bugs rather than the
detection and correction of bugs.
What is the single most important component of reliable software? The quality of the people
who create it.
What are the major tasks of the software development process? 1. Requirements
2. Specifications and Design
3. Implementation
Explain the requirements task in the software development process. Engineers determine
exactly what the system needs to do to best serve the clients. They find out what is required of
the software.
Explain the specification and design task in the software development process. Once the
requirements of a system are established, designers develop the particular set of component
program modules, or subprograms of the software system.
Explain the implementation task in the software development process. Programmer then use
the design to create code in an appropriate programming language. The program is considered a
correct program when it matches the specification.
What does it mean to prove a program to be correct? Proving a program correct means
that the program matches a specification. A correctness proof for a program does not prove that
the specification itself is correct. The specifications are based on requirements, which are derived
largely through human communication.
What is the most important aspect of software development? Communication.
What is Brooke's Law? Adding people to a late project makes it later. Adding new people
adds new lines of communication, which increase the chances of miscommunication or missed
communication.
What are Birsch's criteria that must be met for a person to bear moral responsibility? 1. The
person's actions must have caused the harm, or been a significant casual factor.
2. The person must have intended or willed the harm, or it must be a result of his or her
negligence, carelessness or recklessness.
3. The person must be able to have known, or must know the consequences of the action, or must
have deliberately remained ignorant of them.
What are the most prevalent types of malware? 1. Worm
2. Virus
3. Spyware
4. Trojan Horse
5. Rootkit
What is a worm? A program that makes copies of itself and propagates those copies through
a network to infect other computers.
What is a virus? Malware that is similar to a worm, but which resides in another program.
That program must execute in order for the virus to propagate itself.
What is spyware? A computer program secretly installed for the purpose of collecting
information about the computer's user or users.
What is a trojan horse? A piece of software that masquerades as an innocent, and perhaps
useful, program, but that is actually designed for a malicious purpose.
What is a rootkit? A program that embeds itself into a computer's operating system and
acquires special privileges that would normally be available to the operating system.
Define Hackers. People who write and deploy malware are commonly called hackers.
What are the two connotations of the term hacker? 1. Simply people who were good at problem
solving via programming.
2. Most people today use "hacker" to describe someone who uses computer knowledge for
unethical purposes.
What is a day zero attack or a zero day attack? An attack that exploits a previously
unidentified vulnerability. Zero day attacks are commonly the most dangerous and unexpected.
What is the goal of white hat hackers? Their goal is to seek out vulnerabilities so they can
be removed before a malicious intruder discovers them and launches an attack.
What are the ethical and legal issues of ethical hacking? 1. Hiring a team of hackers is always
a risk because it possible that someone on the team may have illegitimate goals.
2. Sometimes even legitimate hacking necessarily violates the law. White hat hackers have been
arrested before.
3. The education and training of ethical hackers is controversial. Teaching hacking can equip a
person to prevent hacking but on the other hand it trains them to be a criminal.
What is a phishing scam? Phishing scams attempts to fool or frighten a person in to revealing
key information.
Hardware Errors When the hardware malfunctions and causes erroneous effects
Software Errors Mistakes in either the programming or the design of the software that
causes bugs (solving the wrong problem)
Misuse when a computer is provided erroneous data and usign the computer for the rong purpose
or using the computer incorrectly for the right purpose
Communication Error Human misunderstands a computer prompt
Malice Often the product of a full-blown vendetta caused by hackers for profit crime, terrorism,
or warfare (software created to do harm)
Safety-Critical Software Software that may affect someone's safety if it fails to work
properly
Decision Point A place in computer code where the next instruction executed depends on input
data
Control Programs Programs that control some sort of machinery (multi-process programs
w/real-time constraints)
Real Time A program must do something within a specific amount of time
Multi-Process Programs that execute at the same time as other programs (must coordinate with
each other)
Requirements (1) What is required of the software
Specifications & Design (2) Designers develop a particular set of component program
modules, or subprograms of the software
Implementation (3) Using the design to create code in an appropriate programming
language
Communication Another way the overall software process has improved; also the most
important component of software development
Brooke's Law Adding people to a pate project makes it later: creates new lines of
communication that leads to more chances of miss- or missed communication
Therac-25 The machine created by the Atomic Energy of Canada Limited (AECL) caused
overdoses that killed 6 cancer patients do to software bugs
Douglas Birsch Applied ethicist who claimed the software programmer and the company's
quality assurance officer bear moral responsibility for Therac-25
Birch's 1st Crieteria The person's actions must have caused the harm, or been a significant
causal factor
Birch's 2nd Criteria The person must have willed/intended the harm, or been the cause of
negligence, recklessness, or carelessness
Birch's 3rd Criteria The person must be able to have known, or must know the consequences
of the action, or must have deliberately remained ignorant of them
Assembly Language Very low level language that's similar to machine language used in the
Therac-25, where the decision is dependent on time
Malware Malicious software
Worm Software that copies itself and propagates those copies through a network to infect other
computers
Virus Malware that is similar to a worm, but resides in another program, of which must execute
inorder to propagate itself
Spyware Software that is secretly installed in a computer in order to collect data about the
computer's user(s)
Trojan Horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but is actually designed for a malicious purpose
Rootkit A program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system
A&P's Cash Register Scandal The cash register was programmed to charge an extra percentage if
the total amount was greater than a certain amount
sourceforge.net Known as a place where software developers could distribute their open
source software projects and started "wrapping" downlads with adware
Crypto-Locker Ransomware would encrypt files on your computer and make them unusable until
you paid a ransom
Hackers People who write and deploy malware
Zero Day Attack An attack the exploits a previously unidentified vulnerability
White Hat Hackers Seek out vulnerabilities to fix before a malicious intruder discovers them
and launches an attack
Phishing ScamAn attempt to fool or frighten a person into revealing key information
Stuxnet Worm A worm created by the CIA to set back the Iranian nuclear program
Ariane 5 Flight 501 Software bug that caused the rockets to self-destruct by trying to convert a
64-bit floating point to a 16-bit integer
Pentium Floating Point Divide Software caused dividion errors, but only for high precision
arithmetic
1. a lie involves something that is believed by the liar to be false or seriously misleading.
2. a lie is ordinarily stated in words.
3. a lie is made with the intention to deceive.
Deception and Withholding Information one is practicing a form of dishonesty by omission:
1. if one fails to convey information that the audience would reasonably expect would not be
omitted and
2. if the intent of the omission is to deceive.
Honesty as a Virtue The more you practice honesty, the less likely you are to be dishonest
Failure to Seek Out the Truth
Suspect of inaccurate information: In using the results as they are, he is neither lying nor
concealing the truth.
But he may be irresponsible in using the results without inquiring further into their accuracy.
Utilitarian Considerations requires that our actions promote human happiness and well-being
and avoid the opposite.
Disclose promptly factors that might endanger the public or the environment" - IEEE Code of
Ethics
Dishonesty in Research & Testing Falsification of data
Fabrication of data
Failure to respect intellectual property of others
Plagiarism
Inappropriate attribution of authorship
Intellectual Property creations of the intellect that can be protected in several ways, including as
trade secrets, patents, trademarks, and copyrights
Types of intellectual Property Trade secrets
Patents
Trademarks
Copyrights
Authorship Plagiarism
Rules for Expert Witnesses 1.Do not take a case if there is not enough time for a thorough
investigation
2.Do not accept a case if this cannot be done with good conscience.
3.The engineer should consult extensively with the lawyer
4.The witness should maintain an objective and unbiased
5.The witness should always be open to new information
Informing the Public The obligation of engineers to protect the health and safety of the public
requires more than refraining from telling lies or simply refusing to withhold information.
Requires that engineers aggressively do what they can to ensure that the consumers of
technology are not forced to make uninformed decisions
Confidentiality , there is an obligation to protect the confidentiality of the client-
professional relationship, just as with lawyers and physicians
The interests of the client, employer, or public that the engineer must protect are restricted to
those that are morally legitimate.
self perception of who we are in relation to ourselves, others, and social systems
self-concept the ideas and feelings we have about ourselves
persona Idea of a person based on role, likes, dislikes, etc. and depending on context
people who believe in true selves Dr. Phil (Authentic self), Oprah
people who don't believe in true selves Gonsalves and Sarner
What do opponents to personas believe? People with multiple personas may become
hypocrites if the personas are morally incompatible
sociopath someone who suffers from dissocial personality disorder
types of online sociopaths griefer, cyberbully/cyberstalker, troll
griefer online sociopath that is a spoilsport. Makes it miserable for others to play an online game.
cyberbully/cyberstalker online sociopath who uses internet to harass a particular target
troll online sociopath who posts in public forum/chat room to subvert conversation or provoke
an emotional response
antisocial personality disorder Name for dissocial personality disorder given by the DSM-
IV
physical bullying vs cyberbullying physical- bully more depressed, victim can see harasser
cyber- victim more depressed, harasser anonymous or obscured by internet
normalization process in which an aspect of society becomes "normal"
behavioral addiction addiction to certain online behaviors, such as gambling, video games,
internet surfing, sex, extreme sports, etc.
not officially in the DSM
social network today- sites like Facebook and LinkedIn
in the past- structure formed by human relationships
social network analysis branch of applied mathematics that helps us understand and
explore social organization
one-to-one relationships relationship between two people
graph theory branch of math used to analyze social networks
graph in math, a construct of nodes
nodes representation of an individual entity
edge connection between related nodes
network synonym for graph
six degrees of separation in social network graph of whole world, everyone in world is at
most 6 steps away from you
path sequence of edges between two nodes
shortest path path that uses least number of edges
length number of edges in path
Milgram experiment with letters where he sent out letters to random people asking them to
give them to people that he thought would be more likely to know the final intended recipient in
Boston
epistemology branch of philosophy that studies the nature of knowledge and how we know what
we know
ex. determining what is true and what is not true
direct acquisition of knowledge knowledge built for yourself through direct observation
indirect acquisition of knowledge knowledge acquired through language
homophily tendency for people to have close friendships with people similar to themselves
ex. Facebook like button- companies can guess what friends like too, better generate ad revenue
tertiary source survey/summary of of other work that does not include full evidence, sources, or
technical details
ex. some things on Wikipedia
secondary source discusses information presented elsewhere
ex. authoritative history of revolutionary war
ex. textbook, sometimes Wikipedia
primary source a source that is as close as possible to the topic being studied
ex. Ben Franklin's own letters
crowdsourcing taking tasks that would normally be performed by experts and allowing the public
to do them
ex. Wikipedia's editorial model
digital minstrelsy role play in which:
- person of advantaged group irl plays role of person in disadvantaged group
- role play purposefully demeans members of disadvantaged group
- the experience is mainly played out on a computer or gaming console
McLuhan's "media" extensions of humanity.
- not neutral, shapes way we think
McLuhan's tetrad four questions designed to help us analyze a new medium and force its
effects
- What does artifact enhance or make possible?
- If aspect of a situation is enhanced, what is obsolesced?
- What older ground is brought back in this new form?
- What is the reversal potential of the new form?
cybernetics the study of self-regulating/self-controlling systems
ex. human's internal heat regulation system
cyborg/cybernetic organism biological organism that has computer/machine components
Weiner's view of cybernetics machines give us new powers, but the organism remains in control.
We are already cyborgs!
cybernetic augmentation a computerized prothesis that gives the user abilities that normal
human beings do not have
ex. implementing chip in retina to allow direct interface between brain and computer
elective surgery surgery that is not medically necessary, but desired by patient
ex. elective ampuation
Body integrity identity disorder when someone feels that current bodies do not match image
of selves. May feel that they need elective amputation.
Should surgeons perform surgeries for this reason?
Behavioral addiction addiction to certain online behaviors like gambling, video games, internet
surfing, sex, extreme sports, etc.
Crowdsourcing taking tasks that would normally be performed by experts (such as writing
and editing articles), and allowing the public to do them
Cut scene short movie in a video game in which the player has little or no control; cut scenes
are designed to advance the plot of a game
Cyberbully (a.k.a. cyberstalker): someone who uses the Internet to harass a particular target,
usually one known in everyday life, often using fake identities or public Web sites to enable the
harassment
Cybernetic augmentation a computerized prosthesis that gives the user abilities that normal
human beings do not have
Cybernetics the study of self-regulating or self-controlling systems
Digital minstrelsy refers to types of role play in which a person who is a member of an
advantaged group in real life plays the role of a person from a disadvantaged group; the role play
purposefully demeans members of the disadvantaged group; the experience is primarily played
out on a computer or gaming console
Elective surgery a surgery that is not medically necessary, but is desired by the patient
Epistemology the study of the nature of knowledge and how we know what we know
Graph a construct in which individual entities are represented as nodes, with related nodes
connected by an edge; the word 'network' is sometimes used as a synonym for 'graph'
Graph theory a branch of mathematics used to analyze social networks
Griefer an online version of the spoilsport; someone who takes pleasure in shattering the world of
play itself
Homophily the tendency for people to have close friendships primarily with people similar to
themselves
Media according to McLuhan, extensions of humanity, in which each media extends some
natural human process; can be used interchangeably with the word 'technology'
Normalization the way that an aspect of society becomes "normal"
Primary source a source that is as close as possible to the topic being studied
Secondary source a source that discusses information presented elsewhere
Self according to the Blackwell Dictionary of Sociology, a relatively stable set of perceptions
of who we are in relation to ourselves, to others, and to social systems
Self-concept the ideas and feelings that we have about ourselves
Shortest path the path between two particular nodes that uses the least number of edges
Six degrees of separation hypothesis says that in the social network graph of the whole world,
everyone in the world is at most six steps away from you.
Social network a dedicated website or other application that enables users to communicate
with each other by posting information, comments, messages, images, etc.
Sociopath a person with a personality disorder manifesting itself in extreme antisocial
attitudes and behavior and a lack of conscience
Tertiary source a survey or summary of other work that does not include full evidence,
sources, or technical details
Tetrad four questions introduced by McLuhan designed to help us analyze a new medium and
foresee its effects
Troll a user who posts in a public forum or chat room, with the goal of either subverting the
conversation or otherwise provoking an emotional response
Self A relatively stable set of perceptions of who we are in relation to ourselves, to others, and
to social systems
Self-concept The ideas and feelings that we have about ourselves
Griefer Online version of a spoilsport; enjoys making other players not enjoy online games
Cyberbully Uses the Internet to harass a particular target, often using fake identities or public
Web sites to enable harassment; often chooses targets known in real life
Sociopath Someone who suffers from the dissocial personality disorder.
Troll Posts in a public forum or chat room, with the goal of either subverting the conversation
or otherwise provoking an emotional response
Normalization The way that an aspect of society becomes "normal"
Behavioral Addiction Addiction to certain online behaviors like gambling, video games, internet
surfing, sex, extreme sports, and so on.
Social Network Internet sites like Facebook and LinkedIn
Social Network Analysis Help people understand and explore social organization.
Graph Theory Branch of mathematics to analyze the social networks.
Graph A construct in which individual entities are represented as nodes.
Network Used as a synonym for "graph".
Six Degrees of Separation Says that, in the social network graph of the world, everyone in the
world is at most six steps away from you.
Paths A mathematician would describe the six degrees of separation hypothesis in terms of this.
Shortest Path The path that uses the least number of edges.
Epistemology Study of the nature of knowledge and how we know what we know
Homophily The tendency for people to have close friendships primarily with people similar to
themselves
Primary Source As close as possible to the topic being studied
Secondary Source Discusses information presented elsewhere
Tertiary Source Survey or summary of other work that does not include full evidence
sources, or technical details
Crowdsourcing Taking tasks that would normally be performed by experts and allowing
the public to do them.
Digital Minstrelsy Types of role play
Media Extensions of humanity
Tetrad Four questions designed by McLuhan to help analyze a new medium and foresee its
effects
Cybernetics Study of self-regulating or self-controlling systems.
Cyborg Short for cybernetic organism
Cybernetic Augmentation A computerized prosthesis that gives the user abilities that normal
human beings do not have.
Computer affecting many professions Computer use has had profound impact on
numerous professions.
Medicine
Business and Finance
Science and Engineering
Social Sciences
Sports and Physical Education
Government and Law
Publishing and Communication
Travel
Arts and Fine Arts
Education
business and finance Successes in business depends on provides quality goods at a competitive
price to customers. Computer use has penetrated all business including:
Manufacturing
Finance
Sales
Planning
science and engineering Computers were born from science and engineering and use is
wide spread:
Research
Aviation
Chemistry
social sciences The social sciences involve research, social policy planning, and delivering
services Computers have impacted all areas:
Social Policy
Research
Program delivery
sports and physical education Computers are found in sports and physical education uses that
range from management performance to analysis of athletes.
Records
Sports Management
Numerical analyses
government and law Governments use computer technology to perform law enforcement
activities. Gov'ts also enact laws to protect citizens using computers.
publishing and communication The communication industry's job is to deliver information
to those who desire it. No other industry, except perhaps financial services, is better suited to use
of computer automation.
Custom publishing
24-hour news cycle
WWW
travel The travel industry has changed dramatically due to computing.
Vacation planning
Reservations
Cross-selling
art and fine arts Artists use computers as media as a tool.
Videography
Display
Virtual galleries
Graphic design
Theatre
education Online classes
Access to class material on tools like WebCT, Blackboard, and eCollege.
Online peer reviewed articles available on library sites.
Groupware and collaboration tools.
The computer profession The explosion of computing technology has spawned a whole new
career area called Information Systems or IS. Businesses employ many people as programmers,
system analysts, and as other related professionals. They work in a corporation's IS department.
System analyst Solves computer problems and design the application of computer
technology to meet the needs of an organization. They help to maximum benefits from
investment in equipment, personnel, and business process design. The may plan and develop new
computer systems or devise ways to modify existing systems to meet new requirements. They
are aware of the potential of technology but must also understand the business of the
organization they are working for. The tend to work in domains that use specific types of
systems including: accounting, financial, scientific, or engineering systems. They are not
technical developers, they don't write computer programs, design networks, or develop
databases.
Software engineer Translate the recommendations of the system analyst into designs that are
implemented by a development staff. They establish testing criteria to certify that programs were
written correctly and that completed systems perform as required. While software engineers
usually possess strong programming skills, they are more concerned with designing algorithms,
analyzing and solving programming problems, and testing outcomes than with actually writing
code.
Programmer Writes computer programs in what are called programming languages such as
Java, C#, and Visual Basic. This person must have the ability to take a design specification
prepared by a system analyst or software engineer and implement the concepts as computer
programs.
System administrator The information systems employees responsible for the efficient use of
computers and networks by organizations. Their job is to ensure that an organization's processing
environment is designed with compatible equipment, including computers, the network, and
software that work reliably. They also monitor and adjust the performance of networks and
continually survey the current processing center to determine future network needs. They
troubleshoot problems reported by users and network monitoring systems and recommend fixes
and enhancements.
Computer operator Someone who has to keep the computers running. Responsible for
scheduling processing jobs, mounting tapes and disks on drives, and making sure the printer is
loaded with paper.
Webmaster The person responsible for designing, developing, and maintaining a Web site.
Database designer and administrator (DBA) Has jurisdiction over the organization's data storage
and works with database management systems, and determines ways to organize and store data.
Network administrator (NA) Responsible for making sure that the data gets delivered to the
right people at the right time. The selection, purchase, installation, and maintenance of network
servers, communication gateways, modems, and terminals.
IS Director This person runs a organization IS department. The IS director is responsible for
the IS department's budget hiring and firing of staff, staff development and retention, computer
operations, and negotiating with other senior managers for project selection,financing and
priority.
Chief information officer (CIO) Sits as a senior officer on the strategic decision-making
committees of the company.
Health issues Repetitive stress (or strain) injuries (RSIs)
Computer vision syndrome (CVS)
Low level electromagnetic fields
Psychological stress
Information overload
Isolation
Cyberbullies
Environment
Repetitive Stress Injury (RSI) Repetitive action, often to fingers, wrists, and arms, can create
discomfort or even permament disability.
Carpal Tunnel Syndrome (CTS) pain and weakness in lower arms and hands.
Computer Vision Syndrome (CVS) A frequent computer user's eyes may become irritated,
vision may blur, and they may experience headaches and even exhaustion.
Information overload Having too much information to make a decision or remain informed
about a topic. If not dealt with, Information overload can cause a person to freeze when asked to
make a decision.
Psychological stress A first time computer user may be anxious about making mistakes and
consequences. Lack of sufficient training can lead a user to experience loss of data and
communication messages and produce anxiety.
Isolation Significant correlations between computer-mediated-communication and
loneliness have not been detected. A study as Penn State University found that those who send e-
mail more frequently are more social and even less socially isolated, because the computer is
now being used as an additional means of communicating socially with others.
Work and workspace design Most IS professionals assume responsibility for challenging
assignments, using technology that continues to change. It is quite common for an organization
to provide continuing education programs just so that its staff can remain current.
De-skilling If lower skills are expected then more people are qualified for the job. With more
people qualified, the salary can be lower.
Job losses Technology replacing workers leads to this.
Communication and organizational structure The automation of information flow has changed
the way that people communicate within organizations, and the consequences has been job loss,
this time middle managers. Email and other communication tools make parts of these jobs
unnecessary.
Geography An expert in some aspect of the organization's production process need not be
stationed at each plant or factory. Instead that person can use video conferencing technology,
inexpensively through the Internet, to communication face to face with plant engineers around
the world. Companies are finding that they can reduce the travel expenses of bringing experts to
where they are needed by using communication technology instead.
Telecommuting Commuting to central work place is provided by telecommunication links.
Allows employees to have flexible hours that can often help when the need to care for young
children or elderly parents is involved. The handicapped and people living in remote areas may
also become employable due to telecommunicating. Society benefits, too, as fuel is consumed for
transportation and less pollution is produced. There is a downside. People are social and
telecommunicating breeds business isolation making job advancement more difficult to achieve.
Informal communication is largely lost. Corporations also face the increase risk of data loss and
compromise to data integrity resulting from the loss of direct corporate control over the
telecommuter's physical work environment.
Ergonomics Human factors is the scientific application of information about humans to the
design of objects, systems, and environments that humans use and interact with. This field has
made contributions to the design of computing equipment making use of computers and
peripheral technology more comfortable and less likely to induce strain or injury.
Assistive technology Erogonomics plays an important role in the conceptualization and design
of technology solutions for people with impairments.
Braille keyboard Have Braille symbols on top of each key. The output will be conventional
ASCII characters processed as if from any keyboard
Magnifier People with limited sight can benefit by using screen magnifiers.
Screen reader software This software aides those with hearing impartment by reading
documents, Web pages, or other content and transforming the typed words into synthesized
speech.
JAWS
EYES
Speech recognition Windows provides a way to command using spoken commands instead of
mouse clicks and keyboard strokes. Software that hears and understands human speech is
sophisticated technology.
Social concerns Use of computers is not without societal concerns. Initiatives range from
protecting children from undesirable material and predators, to banning certain materials are
discussed frequently by the public.
Child protection Blocking web sites
Sting operations
Legislation The federal and state governments have enacted child protection laws. Children's
Online Privacy Protection Act of 2000. This act requires a Web site that collects information
from or about children under 13 to publish a privacy policy which parent should read before
allowing access to the Web site. Protection is really only as good as the vigilance of parents and
their determination to teach their children to act responsibly.
Computer addiction There are people who feel the compulsion to spend so much of their time
computing that is causes problems with their health, finances, relationships, and career.
Green computing The study and practice of using resources efficiently and with a world
perspective. Green computing principles take into account these factors:
Economic viability
Social responsibility
Environmental impact
Business concerns Fraud
Computer Crime
Data and Equipment protection
Diasaters and Recovery
Fraud Online fraud rates for merchants are higher than fraud rates of brick and mortar stores.
Fraud rates for transactions where a customer personally presents a credit card are usually about
1 percent of sales but only fraud rates exceed 1.4%
Computer crime Theft of computer resources or use of computer systems while committing
a crime.
Types of computer crimes Computer as the target
Computer as the instrument of the crime
Computer is incidental to other crimes
Crimes associated with the prevalence of computers.
Property rights Generally software remains the property of the author. A staff programmer who
works for a company usually agrees to give ownership to the employer. But the end-user rarely
obtains ownership. When you purchase software, you are really purchasing permission to use the
software, but you don't own it. Since you are not the owner, you may not give copies of it to
anyone.
Data and equipment protection All computers users will want to protect data and
equipment.
Disaster and recovery plan Security is a system of safeguards designed to protect a computer-
bases information system from accidental or deliberate damage or access.
source card 1
"How Technology Has Changed Our Lives in the Last Five Years." - The Center of Technology.
N.p., n.d. Web. 29 Sept. 2014. http://www.centertech.org/
source card 2
"PBS LearningMedia." Technology Over Time. N.p., n.d. Web. 30 Sept. 2014.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
source card 3
"Top 12 Ways Technology Changed Learning." TeachHUB. N.p., n.d. Web. 02 Oct. 2014.
http://www.teachhub.com/how-technology-changed-learning
source card 2
"HowStuffWorks "How Has Technology Changed the Way We Conduct Business?""
HowStuffWorks. N.p., n.d. Web. 02 Oct. 2014.
http://money.howstuffworks.com/technology-changed-business.htm
source card 5
"How Technology in Schools Has Changed Over the Years." - EdTechReview™ (ETR). N.p.,
n.d. Web. 02 Oct. 2014. http://edtechreview.in/e-learning/386-change-in-school-technology
source card 6
"The World Economy and Technological Change." Global. N.p., n.d. Web. 02 Oct. 2014.
http://www.foreignaffairs.com/articles/42799/w-michael-blumenthal/the-world-economy-
and-technological-change
source card 7
"8 Ways the World Has Changed Since Obama's Election." Foreign Policy. N.p., n.d. Web. 02
Oct. 2014.
http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_sinc
e_obamas_election
source card 8
"Modern Technology Is Changing the Way Our Brains Work, Says Neuroscientist." Mail Online.
Associated Newspapers, n.d. Web. 02 Oct. 2014.
http://www.dailymail.co.uk/sciencetech/article-565207/Modern-technology-changing-
way-brains-work-says-neuroscientist.html
source card 9
"How Technology Is Affecting Our Lives." How Technology Is Affecting Our Lives. N.p., n.d.
Web. 03 Oct. 2014.
http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_affe
cting_our_lives.html
note card 1
How technology changed:In the last five years technology is growing and expanding worldwide
in just about every field and everywhere. Many people think technology is at its limit but what
those people don't know is that technology is rapidly changing. http://www.centertech.org/
source card 10
Carlson, W. Bernard. "Technology." World Book Advanced. World Book, 2014. Web. 7 Oct.
2014.
http://www.worldbookonline.com/advanced/article?id=ar549400&st=modern+technolog
y
note card 1a
Technology has changed everything that the nations do and how they function.
http://www.centertech.org/
note card 2
Technology has been changing and evolving over time. It has been changing since the 19th
century and is continuesly changing. It has made life easier and better.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
note card 2a
Its been changing over time and still changing today.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
note card 3
Technology changed how we learn by developing devices we use in school. (Computers,ebooks)
...
note card 3a
Technology changed how we do homework and projects. It changed how we take notes. We can
just pull up memopad,notes,word to type them up. ...
note card 4
Technology has changed the way we do business. Now the business people can take work on the
go just about anywhere. ... http://money.howstuffworks.com/technology-changed-
business.htm
note card 4a
Technology changed the way busniess communicate and speed up the pace.Instead of having to
to be face to face with you boss or another company they can easily email you. ...
http://money.howstuffworks.com/technology-changed-business.htm
note card 5
Technology in school has been changing since the 18th century. From the one-room to almost all
the kids under 18 have a mobile device. ...
note card 6
How technology changed the economy and global. ...
note card 6a ...
note card 7
Technology is helping Obama reach out to people. Telling people what is going on with things
within the government.
...http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_si
nce_obamas_election
note card 7a
Obama is reaching out to people with healthcare benefits etc. He is making it so people can
afford it.
...http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_si
nce_obamas_election
note card 8
Technology is changing the way we function. The way we behave, and adjusting the capacity of
reaching our full potential. ...http://www.dailymail.co.uk/sciencetech/article-565207/Modern-
technology-changing-way-brains-work-says-neuroscientist.html
note card 8a
Our brain is under threat from the modern day. Unless we see and look at how much technology
is actually doing to this world. ...http://www.dailymail.co.uk/sciencetech/article-
565207/Modern-technology-changing-way-brains-work-says-neuroscientist.html
note card 9
Technology is constantly changing our lives and the way we do things. Technology has made it
so we base everything off of it. Technology is needed to do every thing possible.
...http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_af
fecting_our_lives.html
note card 9a
It has made the people very lazy. They rely on technology to do everything for them.
...http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_af
fecting_our_lives.html
note card 10
The way we communicate to others has changed from letters to emails and texts. ...how-
technology-has-changed-workplace-communication
note card 10a
Technology now lets us see the people through video chatting. ...how-technology-has-
changed-workplace-communication
note card 11
Technology has changed the way we socialize with people. (Facebook, MySpace, Instagram,
twitter) http://webseo22.hubpages.com/hub/How-Social-Media-Has-Changed-the-World-Impact-
of-Social-Media-on-Our-Lives
"How Social Media Has Changed the World? 5 Impacts of Social Media on Our Lives."
HubPages. N.p., n.d. Web. 08 Oct. 2014.
note card 11a
Technology has made socializing addicting to the people who use it. It has become were people
use the internet almost 24 hours. http://webseo22.hubpages.com/hub/How-Social-Media-
Has-Changed-the-World-Impact-of-Social-Media-on-Our-Lives
"How Social Media Has Changed the World? 5 Impacts of Social Media on Our Lives."
HubPages. N.p., n.d. Web. 08 Oct. 2014.
note card 12
Technology is remaking society. Society is changing all around us. Its changing for the good and
the bad. http://www.businessinsider.com/15-ways-tech-is-reinventing-society-2013-
4?op=1
Dickey, Megan Rose. "15 Ways Technology Is Reinventing Society." Business Insider. Business
Insider, Inc, 28 Apr. 2013. Web. 07 Oct. 2014.
note card 12a
Its changing the way our cars are, there driving themselves. Its helping people become more fit
and healthier. ...http://www.businessinsider.com/15-ways-tech-is-reinventing-society-2013-
4?op=1
Dickey, Megan Rose. "15 Ways Technology Is Reinventing Society." Business Insider. Business
Insider, Inc, 28 Apr. 2013. Web. 07 Oct. 2014.
note card 13
How technology changed politics. The radios and the TV's have changed the viewers vote due to
the campaign and the details told. http://whichwaync.com/2012/10/08/qa-technology-on-the-
campaign-trail/
"Q&A: Technology on the Campaign Trail | WhichWayNC." WhichWayNC. N.p., n.d. Web. 09
Oct. 2014.
note card 13a
They change the mind of the viewers because some people listen to every word that the TVs tell
them to do. The social media and network help raise money for the candidates.
http://whichwaync.com/2012/10/08/qa-technology-on-the-campaign-trail/
"Q&A: Technology on the Campaign Trail | WhichWayNC." WhichWayNC. N.p., n.d. Web. 09
Oct. 2014.
note card 14
Technology has changed medicine. It help reaching patients. It improves the patients care and
health. http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 14a
It gives the patient better treatments without having to suffer with the pain. It has saved many
lives and increased the chance of recovering for some people.
http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 14b
It helps the doctors be more efficient with their jobs and easier to get in touch with. Doctors can
see medical textbooks on their device to answer and check people out.
...http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 15
Technology disadvantages: Technology's disadvantages include addiction to what ever device it
may be. A lot of people become addicted to technology. People can lose jobs and be replaced by
machines. ...http://www.slideshare.net/elivar92/technological-advantages
"Technological Advantages." Technological Advantages. N.p., n.d. Web. 09 Oct. 2014.
note card 15a
Technology advantages: Technology's advantages include communication. Technology made
communicating with other easier and quicker with the tap of a button.
...http://www.slideshare.net/elivar92/technological-advantages
"Technological Advantages." Technological Advantages. N.p., n.d. Web. 09 Oct. 2014.
note card 16
Technology changed the way the military strategies, help win the battles, and wars.
...http://science.howstuffworks.com/10-game-changing-technologies.htm
note card 16a
The military have learned were the enemy were. It helped the military become quicker and
stronger. ...http://science.howstuffworks.com/10-game-changing-technologies.htm
note card 17
Technology is making it easier to find jobs. They can now apply for a job in the comfort of their
home. ...http://www.huffingtonpost.com/josh-tolan/4-ways-technology-is-chan_b_2736375.html
note card 17a
It helps find people more qualified people for the job.
...http://www.huffingtonpost.com/josh-tolan/4-ways-technology-is-chan_b_2736375.html
note card 18
Farming has changed a lot due to the new upgrades in tools. It helps farming be a lot easier.
...http://www.significancemagazine.org/details/webexclusive/2198651/The-Rural-
Revolution-How-technology-has-changed-farming.html
note card 18a
It helps the farmers finish their work faster with the new tools. It helps keep their lands nutrient
and fertile. ...http://www.significancemagazine.org/details/webexclusive/2198651/The-Rural-
Revolution-How-technology-has-changed-farming.html
note card 19
Technology changed the way people view art. Now people can look it up on their mobile device
and see how it looks. ...http://www.theverge.com/2014/7/3/5867225/digital-revolution-barbican-
london-exhibition-photo-essay
note card 19a
People can make art on their device whenever they feel inspired.
...http://www.theverge.com/2014/7/3/5867225/digital-revolution-barbican-london-
exhibition-photo-essay
note card 20
Technology has made business post a lot of ads everywhere. They are trying to catch the peoples
eye and the way to do that is through technology. ...http://www.directcreative.com/how-
technology-has-changed-creativity-in-the-ad-business.html
note card 20a
Technology has made so many ad that people tune out. People have started seeing ads as just any
other commercial ...http://www.directcreative.com/how-technology-has-changed-creativity-
in-the-ad-business.html
note card 21
Technology has helped polices train. It helps them communicate with the main base to know
were the crime is. ...http://criminologycareers.about.com/od/Career_Trends/a/Technologies-
That-Are-Changing-the-Way-Police-Do-Business.htm
note card 21a
Technology helps train the dogs that the polices have.To train them and let their boss see how it's
going. ...
note card 22
Technology has changed the way we see sports. Instead of listening to it on the radio we now
watch the game on our tablets,phones,laptops,and TV's.
...http://www.therichest.com/sports/top-10-ways-technology-has-changed-
sports/?view=all
"Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22a
Technology has made altheletes,teams,and the owners wealthy. It gave them more publicity.
..."Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct.
2014.
note card 22b
Technology has made nit so the owners of the team can find new talent for their teams. It helps
find the people with talent and people with the least. ..."Top 10 Ways Technology Has Changed
Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22c
Technology has made altheles connected with their fans. The fans can tweet them or inbox them.
They can tell them how they feel about the game. ..."Top 10 Ways Technology Has Changed
Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22d
Technology allowes althelets to help themselves. They can get better by watching themselves
play or watching other people play. "Top 10 Ways Technology Has Changed Sports."
TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22e
Technology has helped the althelets and managers keep up with the points that where scored by
each player. Who scored the most points are all online. "Top 10 Ways Technology Has
Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22f
Technology made it here you can tune into the game from the comfort of your own home. You
can watch it on espn and hear what thee reporters and viewers are all saying. "Top 10 Ways
Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22g
Technology has helped the people who are addicted to watching sports able to watch the games
andy part of the game at any time. They can view it from a worldwide site and see the differnt
games. "Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct.
2014.
note card 22h
Technology lets people bet online. People bet on the team that they think will win. they put their
money where they trust is . Sometimes people are forced to bet on a team for big money ...
note card 22i
Technology has changed how the sports are viewed.They are seen scheduled on demand. ...
note card 22j
People dont always wanna go to the game and go therer sometimes they want it to come to
them. ...
note card 22k
People may feel like that they should be able to interact with their favorite player and with
facebook and twitter they can ...
note card 22i
Technology has made it so games are accessable at any time of the day. ...
note card 22m
technically this will likely run afoul of local ordinances, very few cases of underage gambling
have been brought to trial, ...
note card 22n
Technology has made it so they know their expectations for whos going to the playoffs and or
the finals. ...
note card 22o
Technology helps people see the highlights of the games. Maybe even the sponsores. ...
note card 22p
Technology has helped with so many things in the world but it has helped sports more than
anything in the world. ...
note card 22q
Technoloy has made it so that its viewable anywhere at any time of the day. Even when you may
be bored. ...
note card 23
Technology has destoyed the relationship with nature. its all about technology now.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/
note card 23a
Kids choose technology over nature everyday. Now kids don't like going outside.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/
note card 23b
Technology has helped make parks. Kids don't go to them very often cause of the way their
lifestyle. ...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-
knowledge/
note card 23c
Technology has torned down many trees and forest to make restaraunts,and many other
businesses. ...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-
knowledge/
note card 23d
Many people don't know is that by making more pollutions and not going to play and have fun
outside that nature is starting to take a turn for the worst. Business owners will start taking
wildlifes homes and making them find another only for that home to get detroyed.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/
Technology _____________today is not just a means for career advancement or merely a skill
set needed to survive in society. It's a tool that enables us all to make an impact beyond our own
lives. Technology can be your ticket to doing just that, to influencing and participating in
projects that will change the world. Your talents and skills in technology will let you contribute
on a larger scale, beyond personal benefits.
Technology Recent political and global issues are showing that _____________ is accelerating
change around the world and galvanizing groups of people in new ways.
Social networking tools ___________ ____________ __________ like Facebook and
Twitter enable the gathering together of groups of people to connect and exchange ideas. They
have brought together people facing repression and censorship in many countries in the Arab and
North African regions.
Crisis-mapping tools _________ __________ ___________ helped to share messages
describing violence occurring all over Kenya after a disputed election. They collect and map
information.
Health care and the Environment Technology could help improve _______ ______ and the
____________.
Technology Researchers say there is a nearly 100 percent chance of a flu pandemic in the next
century. ____________ could help us develop and deliver vaccines to save lives.
Retinal prosthetics are another example of global health concerns being addressed with
technology.
Environment Tagged with geographical information, the data could alert scientists to new
trends in our ___________.
Digital Divide.There is a great gap in the levels of Internet access and the availability of
technical tools in different regions of the world. The term coined for this difference in ease of
access to technology is the ___________ __________. One danger of a digital divide is that it
prevents us from using all the minds on the planet to solve the planet's problems. But this
challenge created by technology is also being answered by technology.
Web 2.0 As more web applications appeared that allowed everyone to become a "creator"
of the web, a new kind of Internet came into being. Nicknamed _____ _______, it had a set of
new features and functionality that allowed users to contribute content easily and to be easily
connected to each other. Now everyone could collaborate internationally at the click of a mouse.
Cognitive surplus _______________ __________ is the combination of leisure time and the
tools to be creative.
Autonomy, mastery, and purpose. Modern theories of motivation show that what pushes
people to apply their free time in altruistic causes, for no money, is the excitement of
__________, _____________, and ____________.
Autonomy __________ the freedom to work without constant direction and control.
Mastery _____________ the feeling of confidence and excitement from seeing your own
skills progress.
Purpose _____________ the understanding that you are working for something larger than
yourself.
Technology _____________ has added breadth to music. The first piece from the Virtual
Choir was released with 50 recorded voices. A blog connects the members and builds a real
sense of community between them.
Crowdfunding Kickstarter helps us connect by allowing people to post their ideas for community
projects, games, and inventions and to ask for funding directly. This style of generating capital to
start businesses is known as ____________.
Technology _______________ is changing how to decide what to purchase and how we
actually purchase goods and services.
Crowdsourcing QR (quick response) codes link to online information and video content.
Apps scan the bar code of an item and compare prices with nearby stores and online prices.
Tech-savvy shoppers get mobile coupons delivered to their cell phones (mobicoupons).
Marketers are aware of the phenomenon of __________________ (checking in with the voice of
the crowd.)
Access vs. ownership Even the idea of ownership is evolving thanks to new technologies. Items
like cars and bicycles can become "subscriptions" instead of large one-time purchases.
ZipCar _____________allows hundreds of thousands of people to use shared cars, and Call a
Bike is a popular bike-sharing program in Germany.
Collaborative consumption ____________ _____________ implies that we are joining
together as a group to use a specific product more efficiently.
Computer-literate Being _____________ ______________ means being familiar enough
with computers that you understand their capabilities and limitations and that you know how to
use them safely and efficiently.
Being Computer Literate Being _______ ____________means you can...
Avoid falling prey to hackers and viruses because you are aware of how they operate, you know
how to protect yourself from identity theft, you can separate the real privacy and security risks
from things you don't have to worry about, you know how to find information and use the web
effectively, you can avoid being overwhelmed by spam, adware, and spyware, and you know
how to diagnose and fix problems with your hardware and software.
True Being aware of how hackers and viruses operate can help you avoid falling prey to them.
Do you know how to protect yourself from identity theft when you're online?
Can you recognize real privacy and security risks?
Finding information and finding good information are two different things.
Do you know what programs to install to avoid online annoyances?
Caring for, maintaining, and knowing how to diagnose and fix problems can save you time and
hassle.
Information technology (IT) _______________ _________________ is a field of study focused
on the management and processing of information and the automatic retrieval of information.
One of the benefits of being computer literate is that you will be able to perform your job more
effectively. It also will make you more desirable as an employee. Your understanding of key
concepts in technology can "future-proof" you, letting you easily and quickly react to the next
round of new technologies.
Data mining Businesses use a technique known as _________ _________, the process of
searching huge amounts of data with the hope of finding a pattern. Managers can use mined data
to determine that if a certain product is to sell well, they must lower its price—especially if they
cut the price at one store and see sales increase, for example. This allows retailers to respond to
consumer buying patterns.
Artists Many ________ today work with computers. Mastery of software programs is essential
to creating digital art.
Artists may need to showcase their designs. It is helpful to know how to create and manage a
website.
Dance and music programs use computers. Sensors capture a dancer's movements. The computer
then generates a virtual dancer which the operator can manipulate.
Museums use technology to enhance visitors' experiences. Museums offer a full range of options
for tech-savvy visitors.
Computer technology The education industry uses ____________ ___________. Courses are
designed around course management software such as Blackboard and Moodle.
The Internet has advantages in the classroom as a research tool for students.
There are simulations and instructional software programs teachers can use to give students a
taste of running a global business or the experience of the Interactive Body.
Many museums offer virtual tours on their websites that allow students to examine the museum
collections.
Computer forensics Computers are being used in police cars and crime labs to solve an
increasing number of crimes.
One technique used by modern detectives to solve crimes uses computers to search the vast
number of databases on the Internet.
A law enforcement specialty called ___________ ___________ is growing in importance in
order to fight modern crime. Computer forensics analyzes computer systems with specific
techniques to gather potential legal evidence.
VeriMed The goals of modern biomedical chip research are to provide technological
solutions to physical problems and for identifying individuals.
_________, a "personal ID chip," is being implanted in humans as a means of verifying a
person's identity. When exposed to radio waves, it emits a signal that transmits its unique serial
number to a scanner, which connects to a database.
This might be used to keep Alzheimer's patients safe.
True Simulations model the structure of solar magnetic flares. By studying the data, forecasters
hope to improve their predictions about weather phenomena.
Scientists use three-dimensional scanners and imaging software to capture a detailed record of
the condition of ancient ruins. The virtual re-creation is very lifelike. Archaeologists study the
ruins on-screen instead of at the actual site.
MACH (My Automated Conversation CoacH) Researchers have developed a system to
help improve interpersonal skills for people with autism. _________________ is a computer
system that generates an on-screen person that can conduct a job interview or appear ready for a
first date.
Effective computing is computing that can recognize and simulate human emotions. Engineers
work to create computers that process data faster. Psychologists and computer scientists are
working toward a more complete understanding of human behavior.
Affective Computing A type of computing that relates to emotion or that deliberately tries to
influence emotion.
Augmentative Reality (AR) A combination of our normal sense of the objects around us with
an overlay of information displayed.
Big Data Very large data sets that are analyzed to reveal patterns, trends, and associations.
Software The set of computer programs or instructions that tells the computer what to do
and that enables it to perform different tasks.
Spam Unwanted or junk e-mail.
Virtual Reality (VR) Instead of adding information to the reality you perceive, __________
___________ replaces it with a different world. It creates an artificial environment that is
immersive and interactive.
How Computers
are Changing
Who We Are
GROUP 6
Donato, Ross Bradley
Elbo, Gerard Munchen
Pua, Gian Kyle
Salak, Angelo Luis
Serrano, Ariel John
TABLE OF CONTENT
CASE CASE
01 02
KRATOS AND POSEIDON’ S
VIRTUAL TWO-TIMING
PRINCESS
03 CASES 04 CASE
● A HEALTH WARNING FOR FASHION SOCIAL NETWORK
PHOTOS ANALYSIS
● MULTIPLE ONLINE PERSONAS
● GRIEFER MADNESS: BEHAVIOR ON
THE INTERNET GRIEFER
● VIRTUAL AND ONLINE ADDICTIONS
TABLE OF CONTENT
CASE CASE
05 06
DIVERSE PERSPECTIVES:
HOW THE INTERNET RACE IN VIDEO GAMES
08 CASE
OUR CYBERNETIC
FUTURE
INTRODUCTION
INTRODUCTION
Fluid and fast paced combat, God of War excels in this area of
gameplay.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS
Jamal is the father of two boys, one 17 and one 14. He enjoys playing
video games with his sons, but he usually plays through the games
himself, first, to make sure that they are suitable for his kids to play.
As Kratos continues towards the door, the player hears the Princess
begin to scream, and then the gruesome sounds of the princess being
crushed by the mechanism.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS
Jamal finds himself disturbed by this scene, and spends some time
looking for alternate solutions to the puzzle, but there are none. The
player cannot complete the game without pushing Poseidon’s Princess
into the crank.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS
Reflection Question:
Based on this description of Kratos’s behavior, do you agree that Kratos (if
he were real) should be diagnosed with dissocial personality disorder?
Jamal felt disturbed by the Poseidon’s Princess scene. Does that mean that
he is more moral than someone who was not disturbed by the scene? Would
you consider him to be more moral than someone who actually enjoyed the
scene?
Mitch and Meghan have been close friends since junior high. They
attend the same college, but they rarely see each other because they
are pursuing different majors.
Last year, Meghan started dating Erik, who is in many of Mitch’s classes.
Mitch discovered that he and Erik share an interest in massively
multiplayer online games and they’ve recently started teaming up in one
game.
CASE: VIRTUAL TWO-TIMING
Erik is part of an online guild, a group of players with whom he regularly meets to
work on challenging parts of the game.
A month or two after Mitch joined the guild, he started to notice that Erik spent the
majority of his time in the game teaming up with a female guild member named
Raquel.
6.2 CASE: VIRTUAL TWO-TIMING
Mitch did not think much of it until Valentine’s Day. On Valentines Day the game
has a special event that allows players to wear a sash that says “—’s
Sweetheart.” Erik’s character was wearing a sash that said “Raquel’s
Sweetheart” and Raquel was wearing one that read “Erik’s Sweetheart.”
Mitch started to worry about his friend Meghan. Was Erik cheating on her with
Raquel? Mitch confronted Erik about this, but Erik’s position was that he was
not doing anything wrong.
6.2 CASE: VIRTUAL TWO-TIMING
● They were playing a role-playing game. Raquel and Erik were only
pretending to be boyfriend/girlfriend. Even though they were emotionally
very close, and spent a lot of time together online, the boyfriend/girlfriend
relationship was just part of the game.
● Raquel and Erik have never physically met, so they cannot really be
considered boyfriend/girlfriend anyway.
Reflection Question:
Was Mitch right to approach Erik, and question him about his relationships? If
possible, use one of the moral theories from Chapter 1 to support your position.
Does it matter that the role-playing game that Erik and Raquel are playing is online?
Would your assessment of the situation
02
CASE 3: THE INTERNET AND THE SELF
Ourselves in the virtual world.
6.3 THE INTERNET AND THE SELF
You probably have an intuitive idea of what we mean when we say “my self,” but in the
rest of this chapter it is important for us to distinguish between the terms self and
self-concept. The Blackwell Dictionary of Sociology (by writer and activist Allan
Johnson) defines these terms:
From a classical sociological perspective, the self is a relatively stable set of perceptions of who we
are in relation to ourselves, to OTHERS, and to SOCIAL SYSTEMS. The self is organized around a
self-concept, the ideas and feelings that we have about ourselves.
Our self-concept greatly shapes our behavior and affects our interactions with
others. In this section we will examine some ways that Internet technologies,
especially social networking and virtual worlds, are reshaping our concepts of
ourselves.
6.3 CASE 1: A Health Warning For Fashion Photos
In October 2009, a series of advertisements for Ralph Lauren’s “Blue Label” line of clothing brought
new scrutiny to the use of digital image manipulation in fashion photographs. A picture of model
Filippa Hamilton was modified to make her appear even skinnier than she is in real life, so skinny that
bloggers took notice and started circulating (and mocking) the image. Most assumed that posting the
image would be a fair use, under copyright law, because they were posting it for the purposes of news
reporting and commentary
There is a growing movement, particularly among English and French health agencies, to regulate the
use of digital image manipulation to modify images that are meant to be realistic. Sophie Hardach, a
reporter for Reuters, reported that the French government is considering requiring “health warning”
disclaimers on heavily modified photographs. Hardach states that
Under the proposed law, all enhanced photos would be accompanied by a line saying: “Photograph retouched to modify
the physical appearance of a person.”
The approach in Britain is slightly different. In the summer of 2011, the British Advertising Standards Authority banned
two cosmetics ads because it ruled that the manipulation of the images made them misleading. This ruling did not
specifically address the question of how these images affect self-concept, but the lawmaker who filed the complaints
about the ads, Member of Parliament Jo Swinson, was clearly motivated by this concern.
In discussing the case with reporters for the Daily Mail, she cited her concern about how “these idealized images are
distorting our ideas of beauty.” (Poulter)
6.3 CASE 1: A Health Warning For Fashion Photos
Reflection Question:
Do you agree with the proposed French law? Should the United States enact a similar
law? Explain your reasoning.
It has always been possible to modify photographs. Before digital image manipulation,
it was common to airbrush photographs to remove wrinkles or spots. (An airbrush is a
spray-painting device that gives the artist a very high degree of control.) Why do you
think people are more concerned about digital image manipulation than they are about
airbrushing?
Fashion photographers are not the only ones using digital image manipulation.
Newsweek used it on the cover of its March 7, 2005 issue to make Martha Stewart look
thin. Paris Match, a celebrity tabloid, removed the love handles of French President
Nicolas Sarkozy in the August 9, 2007 issue. Of these three uses of digital image
manipulation (the Ralph Lauren ad and the two mentioned here), which is the most
ethically troubling, and why? Which is the least ethically troubling, and why?
6.3 CASE 2: Multiple Online Personas
Author and editor Chris Gonsalves writes about technology for business audiences.
He introduces the idea of online personas by discussing several different online
personas with whom an advertiser or business person might want to interact:
● Bill on Facebook.com and Fark.com—A professional in his 40s who should be approached in a
professional way.
● NecroticOne1 on MySpace.com—A music fan who likes heavy metal music, as well as clothing
and jewelry that promote his favorite bands; he is inclined to buy things that make him feel
unique and noticeable
He concludes: [These online personas] all have traits and desires unique to their online
personalities. They all communicate in ways specific to their virtual environments, ways businesses
need to understand to reach all of them. The difficulty? They’re all the same person
6.3 CASE 2: Multiple Online Personas
In other words, how a person acts and what he or she likes is shaped by context. For
example, how you act at the office will be different from how you act on a business trip, at
the doctor’s office, or at a baseball game. Though Gonsalves and Sarner clearly recognize
that this segmentation of the self into multiple personas predates the Internet, they
believe that Internet technologies are causing the typical person to adopt a much greater
number and variety of personas. In the 1980s and 1990s, it was common to talk about the
“work/life balance,” which implied that most people had two main personas, an “at work”
persona and an “at home” persona.
6.3 CASE 2: Multiple Online Personas
Reflection Question:
Make a list of your personas, along with a brief description of the context in which each persona
becomes active. It might be helpful to give each persona a descriptive name (for example, “The Rule
Enforcer” or “The Social Butterfly”), so that you can refer to them later.
Do your personas share a common set of values, or are there conflicts between them?
Do you think that having multiple personas with conflicting systems of values is inherently immoral?
Explain your reasoning.
How many of your personas depend on the Internet for their existence? In other words, if there were
no cell phones, Facebook, Twitter, text messaging, and so on, which personas would still be
applicable? Explain your reasoning.
Reflect back on our discussions of professional ethics in Chapter 2. Explain why it might be
necessary for a person to have multiple personas with conflicting systems of values in order to do
certain jobs. Give at least one example of such a profession, and explain your thinking.
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet
Griefers are one example of a new type of creature who lives on the Internet and finds its entertainment in
hassling others. Another example is a troll, a user who posts in a public forum or chat room, with the goal
of either subverting the conversation or otherwise provoking an emotional response. A third type is the
cyberbully, or cyberstalker, who uses the Internet to harass a particular target, often using fake identities
or public Web sites to enable the harassment
What makes cybersociopathy (that is, sociopathic behavior specific to the Internet) particularly troubling
is that the Internet seems to be making these behaviors easier. The Internet allows trolls and griefers to
find like-minded people. Banding together gives them a shared sense of purpose, and they receive
positive feedback and attention for their exploits. The Internet makes it much easier for cyberstalkers to
invade another’s privacy and to mask their 202 CHAPTER 6 Copyright 2012 Cengage Learning. All Rights
Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some
third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed
that any suppressed content does not materially affect the overall learning experience. Cengage Learning
reserves the right to remove additional content at any time if subsequent rights restrictions require it.
own identities. The following examples of griefer, troll, and cyberbully behavior may be helpful in
understanding the issue:
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet
Cyberbullying— A Long Island woman was charged with aggravated harassment after she posted an ad offering sexual
services on Craigslist, giving the name and phone number of one of her daughter’s rivals. The girl targeted was nine years old. This
resulted in more than twenty harassing phone calls to the girl’s home. In another case, a woman from Santa Ana reported that her
ex-boyfriend and sister-in-law were sending her threatening text messages, and had them arrested. It turned out, however, that
she had impersonated her sister-in-law to purchase the phone, and was using it to send harassing messages to herself, in an
attempt to frame her ex-boyfriend and sister-in-law.
Griefing— In EVE Online, an online role-playing game, the most powerful spaceship is called a Titan. Making a Titan costs the
equivalent of about $10,000 US dollars, so there are very few of them in existence. The GoonFleet, a team of self-described
griefers, organized an attack that focused on finding and destroying the first Titan. Describing the attack to Dibbell, GoonFleet’s
leader said, “The ability to inflict that huge amount of actual, real-life damage on someone is amazingly satisfying.… The way that
you win in EVE is you basically make life so miserable for someone else that they actually quit the game and don’t come back.”
Although griefing seems less worrisome than cyberharassment, developers of online games and services take it very seriously.
Griefers tend to drive away current customers and ruin a new customer’s first impression of a service. Linden Lab (creators of the
Second Life virtual world) often deploys friendly greeters to parts of the world intended for new players, much like Walmart places
friendly greeters at the entrances to their stores
Trolling— There are many sites on the Internet where users can post questions, which are then answered by other users on the
site. It is fairly common for trolls to respond to these questions with bad advice. For example, a user might ask how to save a file in
a particular photo-editing program. A troll might tell them to “press Ctrl+Alt+Delete” (which reboots the computer) or “press Alt+F4”
(which closes the current window, possibly losing unsaved work)
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet
1. Consider the activities and statements of griefers presented here. Do you think that they are
“sociopathic” in the general sense? Explain your reasoning.
2. Based on the described activities and statements of griefers presented here, which of the seven
DSM-IV criteria do griefers definitely violate, definitely not violate, or probably violate? For each one,
explain your reasoning in a sentence or two.
3. In the diagnostic criteria for antisocial personality disorder, criteria 4 and 5 seem to focus on
physical acts of violence. Should they be broadened to include nonphysical harms? Explain your
reasoning.
4. Is griefing in online games morally wrong? Use one of the ethical theories from Chapter 1 to
explain your answer.
5. Do you think the existence of Internet forums, social networks, and multiplayer online games is
causing people to develop sociopathic tendencies, when they might not have otherwise? Give
evidence and explain your reasoning
6.3 CASE 4: Virtual and Online Addictions
In the previous section we discussed two definitions of an antisocial personality
disorder, a mental disorder that seems to be encouraged by the Internet. In that case,
the mental disorders we studied are widely recognized, and the controversy revolves
around whether or not griefers, trolls, and cyberbullies meet the diagnostic criteria for
those disorders. In this section we look at a more controversial topic, behavioral
addiction. By behavioral addiction we mean addiction to certain online behaviors like
gambling, video games, internet surfing, sex, extreme sports, and so on
The proposed criteria for sex addiction, and the existing criteria for drug addiction, are
very similar to the criteria, with the word “gambling” removed and replaced with “sex” or
“substance use,” respectively.
Write the best argument you can that there is no such thing as video game addiction.
Look at your argument for the previous question. Would the argument apply equally well to showing
that there is no such thing as gambling addiction? If so, explain whether or not you believe in
gambling addiction, and why. If not, explain the key differences between gaming addiction and
gambling addiction that cause your argument to not apply to gambling.
Psychologists treat compulsive behaviors differently from addictive behaviors. Some people seem
to be addicted to checking their Facebook or Twitter updates. Do you think this is an addictive
behavior or a compulsive one? Explain your reasoning. One way to answer this question without
doing further research is to see whether or not the nine diagnostic criteria for gambling disorder
make sense when adapted to this new problem. If not, it is probably not an addictive behavior
04
INTERDISCIPLINARY TOPICS:
SOCIAL NETWORK ANALYSIS
6.4 SOCIAL NETWORK ANALYSIS
Today we use the phrase social network to
describe Internet sites like Facebook and
LinkedIn.
Reflection Question:
They would like companies like Facebook and Twitter to provide them
with the social network of all users (even those not under suspicion of any crime or
criminal intent) for their analysis to work.
The Facebook “Like” button is at the heart of this. Whenever a Facebook user clicks
the Like button on a Web page, Facebook learns something about that user’s
attitudes and preferences. As it begins to compile information about what a
particular user likes, and about what that user’s friends like, Facebook can start to
make guesses about what products are likely to interest the user. For example, if
many of your friends have liked a particular band, and you have not, then that band
might pay Facebook to target you with ads. An understanding of homophily tells the
marketers at Facebook that you are probably predisposed to enjoy a particular kind
of music; targeting you with an ad for a band that your friends like is much more
likely to pay off than showing the same ad to a random person.
6.5.1 Birds of a Feather, and the “Like” Button
Facebook calls this service, which makes it possible to present you with ads
and content specifically suited to you, “instant personalization.” Many companies
use Facebook’s instant personalization system on their Web sites to tailor content
to the user, Some examples of instant personalization are:
Microsoft’s search engine Bing.com—This site searches not only the Web, but also the users’ Facebook
friends to find items the friends like that also match the search query.
There are two very different arguments to support the position that students should not cite Wikipedia
as an authoritative source.
The first argument focuses on the fact that Wikipedia is a Tertiary Source, that is, a survey or summary
of other work that does not include full evidence, sources, or technical details. a tertiary source points
you towards other sources. By definition, it does not stand on its own as an authoritative source.
The second argument focuses on the fact that Wikipedia can be edited by
anyone.
6.5.2 Why Some Experts Fear Wikipedia
If you are compiling an encyclopedia, whether in print or online, you have at least three major problems:
What topics do you want to cover and what topics do you want to exclude?
Once you have selected a topic, how do you find an author to contribute an article on that topic?
Once you receive a contributed article on a particular topic, how do you ensure that the article is accurate, fair,
and well written?
■In March 2009, a student added a fake quote to the Wikipedia page of composer Maurice Jarre a
few hours after Jarre’s death. The fabricated quote subsequently appeared in newspaper obituaries
for Jarre, including in Britain’s “The Guardian” newspaper.
■ At various times, Wikipedia has prematurely announced the deaths of public figures, including
Senator Edward Kennedy and teen pop star Miley Cyrus.
■ At the time of this writing, there is a minor edit war in the article on “NP Completeness,” a
key topic in the theory of computer science. One editor is attempting to add a quote from
Nature News. Though the quote could be considered informative, it is technically incorrect, and
so it has been repeatedly removed by other editors. So far it has been added, and then removed
again, at least three times.
6.5.3 Is Cyberdating Really Dating?
We conclude this exploration of how the Internet changes how we know by discussing the
link between self-concept (the topic of section 6.3) and epistemology (the topic of section
6.5). In Section 6.3.2 we contrasted the idea of one’s “authentic self” with the idea that
each person is a combination of multiple context-dependent selves, or personas, all of
which are equally valid. There is still considerable debate about whether one approach is
better than the other. Some say we ought to strive to be our authentic selves, and that
anything else is dishonest. Others claim that all human interactions are
context-dependent performances,
and there is no such thing as an authentic self.
6.5.3 Is Cyberdating Really Dating?
Consider the following scenario: Ryan and Kayla are two high school sophomores
who live 500 miles apart. They met through a mutual friend on Facebook.
Over time they communicated more and more through Facebook’s chat feature,
then started texting each other, and eventually started video-chatting several times
per week over the Internet. They eventually updated their status on Facebook to
indicate that they were “in a relationship.” Ryan and Kayla even went so far as to
introduce their parents over video chat. Finally, Kayla convinced her parents to visit
a family member who lives near Ryan so that she and Ryan could meet in person.
Is it really possible or reasonable to fall in love with someone you have never
met in person? Some would argue that any feelings of intimacy or affection that
you feel for a person are illusory if you have not met the person face to face.
One way to analyze this question is to consider the medium of interaction, and
whether or not it is useful in discovering the authentic self of the other person.
6.5.3 Is Cyberdating Really Dating?
Consider the following ways of interacting with a potential partner:
● Sharing a meal in a restaurant or going to a movie together
● Volunteering together on a service project
● Going on vacation together
● Text chat via text message or private Internet chat
● Voice conversation via phone or Internet
● Video chat via the Internet
● Text or voice chat in a public forum, such as a public chat room or virtual world
● Play an online game together (such as World of Warcraft or EVE Online), which includes either voice or
text chat
Now think about how likely these methods of interaction are to shed the most light on
these key questions about a potential mate:
● Is the person generous?
● Is the person trustworthy?
● Do you enjoy talking with the other person?
● Do you enjoy working together with him or her on shared problems?
● Does the person listen when you talk and value your point of view?
6.5 How the Internet Changes How We Know
Reflection Questions:
Assume that, no matter what, the Internet will always include advertisements. Would
you prefer to see advertisements that are randomly selected, or would you prefer to
see advertisements for things that your friends like? Explain your reasoning.
In evaluating the quality of information you use in your academic work, how
important is it to you that the author is an expert in the topic? For example, would
you be more likely to trust a Wikipedia article on U.S. history if the author is a history
professor, instead of an average person? Why or why not?
Is it possible or reasonable for people to fall in love if they have never met face to
face? Explain your reasoning.
04
6.6 DIVERSE PERSPECTIVES: RACE IN
VIDEO GAMES
Representation in video games
6.6 DIVERSE PERSPECTIVES: RACE IN VIDEO GAMES
Designers of video games are currently struggling to incorporate racial diversity in their games. Most
big-budget video games feature white protagonists, though video game studios recognize that they
ought to portray a wider spectrum of human experience. Attempting to do so, however, comes with a
wide variety of pitfalls
6.6 DIVERSE PERSPECTIVES: RACE IN VIDEO GAMES
One classic example is Carl “CJ” Johnson, the African American
protagonist of Grand Theft Auto: San Andreas. Like many of the most
successful big-budget video games, Grand Theft Auto: San Andreas is
highly scripted.
The player solves puzzles and completes missions, and after most
missions is rewarded with a cut scene, a short movie that advances
the plot. The game follows CJ, a gang member, as he attempts to
resurrect his defunct gang, take over various criminal businesses, and
get revenge on crooked cops and treasonous former friends.
Reflection Questions
RESEARCH Find plot summaries of Grand Theft Auto: San Andreas online. Is the portrayal of the main
character, CJ, demeaning? Is Grand Theft Auto: San Andreas an example of digital minstrelsy? Explain
your reasoning.
POSITION Our definition of “digital minstrelsy” specifically focuses on disadvantaged groups. Based on
this definition, a game that makes fun of the rich would be less problematic than one that makes fun of
the poor. Do you agree that games that make fun of disadvantaged groups are ethically worse than
ones that make fun of advantaged groups? Explain your reasoning
04
6.8 OUR CYBERNETIC FUTURE
Cybernetics to enhance us
6.8 OUR CYBERNETIC FUTURE
The definition of cybernetics is not universally agreed upon. According to one definition,
cybernetics is the study of self-regulating or self-controlling systems. One example of such a
self-regulating system is a human’s internal heat regulation system. When we overheat, we
perspire, so that we will be cooled by the evaporation of sweat. When we are too cold, we
shiver. The rapid contractions of our muscles, in shivering, burns energy, and gives off heat,
which warms us back up.
Engineers who study cybernetics often use examples from nature to try to solve similar
problems in machines. For example, like a human, your computer has an internal heat
regulation system that consists primarily of a variable-speed fan that blows air across the
computer CPU. This heat regulation system is a lot less efficient than the human version,
because it uses air-cooling rather than liquid cooling. However, some of the most expensive
custom-built computers have efficient liquid cooling systems, which mimic the human
circulatory system.
The word “cybernetic” is also used to refer to a biological organism that has computer or
machine components. Some people use the word cyborg, short for cybernetic organism to
distinguish between the scientific study of cybernetics and such hybrid organisms.
6.8 OUR CYBERNETIC FUTURE
Reflection Questions
It could be claimed that most humans, today, are cyborgs. For example,
many people use smartphones to take notes and keep a schedule. It
could be argued that this is extending and taking the place of human
memory, so the person that acts this way is a cybernetic organism.
Write an argument either defending or refuting this position
THE END
References
Brinkman, W., & Sanders, A. (2013). Chapter 6: How Computing is Changing Who We Are. In Ethics
in a computing culture. essay, Course technology.
The amount of blame assigned to a person does not depend on the number of people involved,
but on whether or not that person should have been able to foresee the consequences.
The user of a computing artifact is morally responsible for the consequences of that use.
People must always make a reasonable effort to foresee the societal effects of a technology they
design or use.
People who design computing artifacts must provide enough information about them so that
others can foresee the consequences of using them.
Ad Hoc Committee for Responsible Computing Created 5 rules
Augmented Reality a computer graphics technology that draws virtual objects laid over the
real world
Shock Images incredibly graphic images posted on the internet; designed to shock or sicken
ordinary people
Algorithmic trading the process of using computers programed to follow a defined set of
instructions (an algorithm) for placing a trade in order to generate profits at a speed and
frequency that is impossible for a human trader. The defined sets of rules are based on timing,
price, quantity or any mathematical model. Apart from profit opportunities for the trader, algo-
trading makes markets more liquid and makes trading more systematic by ruling out the impact
of human emotions on trading activities.
Artifact one of many kinds of tangible by-products produced during the development of
software
Artificial intelligence the theory and development of computer systems able to perform tasks
that normally require human intelligence, such as visual perception, speech recognition,
decision-making, and translation between languages.
Flash Crash a very rapid, deep, and volatile fall in security prices occurring within an
extremely short time period. A flash crash frequently stems from trades executed by black-box
trading, combined with high-frequency trading, whose speed and interconnectedness can result
in the loss and recovery of billions of dollars in a matter of minutes and seconds
High-frequency trading a program trading platform that uses powerful computers to
transact a large number of orders at very fast speeds. It uses complex algorithms to analyze
multiple markets and execute orders based on market conditions.
QR code he trademark for a type of matrix barcode (or two-dimensional barcode)
Spider a program that visits Web sites and reads their pages and other information in order to
create entries for a search engine index. The major search engines on the Web all have such a
program, which is also known as a "crawler" or a "bot."
Unmanned Aerial Vehicle an aircraft piloted by remote control or onboard computers
Web crawler Internet bot that systematically browses the World Wide Web
Ad Hoc Committee for Responsible Computing a committee of ethicists and computer
science researchers who formulated a set of principles, known as the Five Rules, for apportioning
blame for harm caused by complicated computer systems
Algorithmic trading the practice of allowing a computer program to make decisions about what
shares to buy and sell
Artifact an object made by humans
Artificial intelligence a human-made artifact's ability to learn and reason
Augmented reality a computer graphics technology that draws virtual objects laid over the
real world
Autonomy the freedom to make decisions without outside constraints or interference
Flash Crash an incident that occurred on May 6, 2010, during which time the Dow Jones
Industrial Average dropped 900 points (9%) in the span of about 15 minutes, then recovered
almost as quickly.
High-frequency trading the practice of using computers to trade investments back and forth
much more quickly than humans can
Machine learning an algorithm that allows computers to take in data and automatically learn
to recognize patterns and make predictions about them
PageRank an algorithm that looks at the links between Web pages to figure out which Web
pages are most important
Pervasive technology technology that has spread widely throughout society
QR code a sort of 2-dimensional bar code that can be read by camera phones and
computers
Robot an electro-mechanical device capable of movement or action
Spider a type of Web crawler that gains its name because it "crawls the Web"
Unmanned Aerial Vehicle (UAV) a small airplane that flies autonomously; widely adopted by
both militaries and police forces; often called a drone
Web crawler a program whose job is to surf the Web autonomously and remember the content
and location of everything it encounters
2. The amount of blame assigned to a person does not depend on the number of people involved,
but on whether or not that person should have been able to foresee the consequences.
3. The user of a computing artifact is morally responsible for the consequences of that use.
4. People must always make a reasonable effort to foresee the societal effects of a technology
they design or use.
5. People who design computing artifacts must provide enough information about them so that
others can foresee the consequences of using them. 5 Rules for apportioning blame for harm
caused by complicated computer systems
Augmented reality a computer graphics technology that draws virtual objects laid over the
real world
Shock images incredibly graphic images posted on the Internet; designed to shock or sicken
ordinary people
Lecture 1 - Systems:
The trends that make ubicomp possible. The trends that make the Ubicom vision become
reality are:
* device miniaturization,
* wireless communication,
* mobile devices,
* implicit human‐computer interaction,
* powerful artificial intelligence algorithms,
* new materials,
* and energy resources.
Lecture 1 - Systems:
The waves in computer technology evolution. * First wave: the mainframe era, when many
persons were served by one huge computer,
* Seconf wave: followed by the age of personal computers (PC),with one computer serving one
person
* Third wave: Ubiquitous computing (pervasive computing) was defined by Weiser as the third
wave in the evolution of computer science, where one person is served by many computers.
Lecture 1 - Systems:
The properties of pervasive computing system. * Property #1. The computers are
networked:
Computers need to be networked, distributed and
transparently accessible.
https://bb.vu.nl/bbcswebdav/pid-2740936-dt-content-rid-
6495990_2/courses/FEW_X_400552_2016_120/Chapter1-Percomsystems-
LectureNotes%2Bpreface.pdf
Lecture 1 - Systems:
The problems in pervasive computing. There are some technical problems that still need to
be solved, such as:
* energy,
* scalability,
* mobility management.
Moreover, even if the background of pervasive computing is mainly technical, this field
penetrates areas in which not only technical considerations, but also social and cognitive aspects
are relevant. Problems related:
* to privacy,
* ethics and
* usability
The main pervasive computing system building blocks. The basic building block ( building
block = a basic unit from which something is built up.) for computer
architectures based on two‐state logic is the transistor, that works as a simple on/off switch. The
type of
transistor used over the past three decades is the Metal Oxide Semiconductor Field Effect
Transistor or
MOSFET.
Lecture 2 - Signals:
How to mathematically describe a signal: its amplitude, phase, frequency, period * x(t) = x0 +
ASin(ω*t + Φ) = x0 + ASin(2πft + Φ)
* A(Amplitude) = D/f, where D is the distance units of meters
* Φ(Phase shift) = N/A
* f (frequency) = 1/T (Hz)
* T (period) = 1/f (seconds)
Lecture 2 - Signals:
What is spatial resolution and colour resolution in a sampled digital image? In a sampled
digital image what is:
* Colour resolution:
The number of bits necessary to represent the colour or intensity is called the colour or intensity
resolution.
Lecture 2 - Signals:
Types of images (RGB, gray scale,black and white) and how are these types of images
represented in a computer * RGB: (True colour or red‐green‐blue): Here each pixel has a
particular colour, described by the amount of red, green and blue in it. If each of these
components has a range 0‐255, this gives 2^8x2^8x2^8 = 2^24 =16777216 colours for any
image. Since the number of bits required for each pixel is 3 x 8 =24, these images are also called
24‐bit colour images.
* Gray Scale: image. Each pixel is a shade of gray, normally from 0(black) to 255(white). Each
pixel is represented by 8 bits.
* Black and white: Binary image. Each pixel is just black or white. We need only one bit per
pixel.
Lecture 2 - Signals:
What is sampling, what is an ADC a DAC, what is sampling frequency, sampling period , how
high has to be this frequency , Shannon theorem, what happends if we do not obey the Shannon
theorem? undersampling, oversampling, aliasing. * Sampling: Many signals originate as
continuous‐time signals. However, for a variety of reasons it is desirable to obtain a discrete‐time
representation of a signal. This can be done by sampling a continuous‐time signal. at isolated
equally‐spaced points in time.
* ADC (Analog‐to‐Digital‐Converter): Digitalization is done by ADC.
* Fs(sampling frequency or sampling rate): 1/Ts Hz, samples taken each second.
* Ts (Sampling period): Ts=1/fs=(seconds): The time distance between any pair of consecutive
sample times
* Nyquist rate: It says in effect that the sampling frequency has to be at least twice the maximum
frequency in the signal. The minimal sampling frequency 2 fmax is called the Nyquist rate.
* * Sampling with a higher rate than the Nyquist rate, called oversampling, is not a problem. It
will even improve the situation and create a smoother reconstructed waveform. But what
happens if we don't sample fast enough? Using a too low sampling frequency (undersampling)
has a negative effect called aliasing.
* Alising: false frequencies that appears during the reconstruction (This cause by
undersampling). In ohter words, the sampled signal is not similar to the original signal.
Lecture 3 - Control:
The principles of deliberative and reactive control and some examples of areas where they are
mosly used * Principle of deliberative control: Its principle is Think hard, Act later!
*"Open‐loop" and "closed‐loop" are common control theory terms, that indicate whether
information is (closed) or not (open) fed back to the system to achieve control objectives. For
example, the microwave oven is set to run for two minutes. After that, it turns off. It has no idea
whether your food is still frozen, burnt, or cooked perfectly.
Lecture 3 - Control:
feedback control (principle, block diagram, examples) * feedback control: The system gets
the desired state by continuously feeding back ( to have an effect on something) the current state,
and comparing it to the desired state. An error is calculated, and depending on the sign of this
error, the current state is adjusted to minimize this error. The process continues until the goal is
achieved. This is a closed‐loop control.
** We can keep the temperature constant at a certain preset value by a feedback control
Lecture 3 - Control:
How a smart vehicle can detect obstacles? sensors principles, you should be able to write some
controllers in pseudocode. * Touch sensors:
The simplest solution, but obviously not the most elegant one, is to first bump into the obstacle.
This can be done with a touch or switch sensor.
-Principles: The principle of this sensor is simple: normally the output of a switch sensor is 0, but
when contact happens, an electrical contact is closed, and the output switches to 1.
- A reactive controller for a robot that drives until an obstacle is detected, is shown below:
* Ranging sensors:
A more elegant way to detect an object is to use ranging sensors, that can detect an object
without bumping into it. Ranging means that they measure the distance to the objects. The first
example of ranging sensors is the ultrasound sensor, or sonar. Sonar comes from sound
navigation and ranging. Initially developed for underwater applications, they have been also used
in Polaroid cameras. They use a range of sound frequencies that are beyond human hearing.
- The principle is called echolocation, the same principle bats and dolphins use.
The sensors send out a sound beam, and measure the time needed to receive the echo reflected by
the object, called time of flight (ToF).
- A controller for a robot equipped with a ranging sensor (sonar or LIDAR) that drives until the
distance to an obstacle is for example 20 cm, is shown below:
while distance > 20 cm
drive forward
end_while
stop the motors
* A line follower:
The problem of keeping a car in its designated lane is very important for traffic safety. Vehicles
with a lane departure warning system can save many lives, because many accidents happen when
the driver falls asleep for a second, and the car leaves its designated lane.
- Principle: This system has to alert the driver as soon as the car drifts close to the lane markings.
A lane departure alert systems are already implemented in modern, expensive cars.
- The reactive controller for the line follower could look like this:
while (true)
while (both sensors detect white)
drive straight forward
end_while
if (left sensor sees black) then turn left
if (right sensor sees black) then turn right
end_while
Lecture 3 - Control:
How to follow a black line? sensors, controllers in pseudocode //TODO maybe
Lecture 4 - image processing:
What means point processing? We have an input image f (x, y), and we wish to manipulate
it resulting in a different image, denoted by the output image g(x, y). Point processing is defined
as an operation which calculates the new value of a pixel in g(x, y) based on the value of the
pixel in the same position in f (x, y), and some operation (Fig.1). This means that the values of a
pixel's neighbors in f (x, y) have no effect whatsoever.
Lecture 4 - image processing:
Image histograms ‐ not the Matlab code but what it is , how does it look like, why is it useful,
what means histogram stretching, without the formula * Histogram: A histogram in general,
is a graphical representation of the frequency of events. Think about a histogram of ages of
students listening to this lecture.
* Image histogram: is a plot of the relative frequency of occurrence of each of the permitted
pixel values in the image, against the values themselves. For a gray scale image, the histogram
can be constructed by simply counting how many times each gray value (0‐255) occurs within
the image.
- how does it look like?: The histogram is actually a bar graph.
- Why is it used?: In many image processing systems, thresholding is a key step to segmenting
(separating) the foreground (information) from the background (noise).
- What is the result? : We separate the foreground from the background
Lecture 4 - image processing:
What means neighbourhood processing? Filtering: what does it mean, how does the mean filter,
median filter work? * Neighbourhood processing: In neighbourhood processing the value of a
pixel in the output image is determined by the value of the pixel at the same position in the input
and the neighbours together with a neighbourhood processing operation
- Neighbourhood processing can be used to filtered an image
* Filtering: Filtering means to improve the image quality by reducing, or even removing, the
noise.
* Mean filter: noise, for instance, of the type salt‐and‐pepper, this noise consist of isolated pixels.
By isolated we mean that the pixels have a brightness which is very different from their
neighbors. We could improve the image quality if we somehow identify such pixels, and replace
them by a value which is more similar to their neighbors.
We can improve this situation by changing its intensity to the mean value of its neighbours,
including itself.
* Median filter: replace the noisy pixel with the median value of its neighbours, including itself.
The median value of a group of numbers is found by ordering the numbers in increasing order,
and picking the middle value.
**Extra: Filtering the image refers to the process of applying a filter (here the mean or median
filter) to the entire image. It is important to note that by filtering the image, we apply the filter to
each and every pixel.
Lecture 4 - image processing:
What is correlation and how does it work? * Correlation: Correlation is another neighbourhood
processing, which also works by applying a filter to each pixel in an image. In correlation, the
filter is called kernel, and plays a more active role.
Lecture 4 - image processing:
Edge detection An edge is a curve that follows a path of rapid change in image intensity. Edge
detection can be achieved by correlating the image with a kernel. There are many methods
(kernels) to determine the edges of an image such as : Prewitt, Roberts, Sobel, etc.
Lecture 4 - image processing:
What is morphological operation? Give one example. Erosition, dilatation, closing, opening,
basic idea, where do we need them? * Morphological operation: Morphology is a branch of
image processing which is particularly useful for analyzing shapes in images.
Morphology operates like the other neighbourhood processing methods, by applying a kernel to
each pixel in the input image. The kernel is a key element in a morphological operation and is
called structuring element (STREL).
The art of morphological processing is to choose the right shape of the structuring element to suit
the particular application.
* Erosition: It is a morphological operation. The term erosion refers to the fact that the object in
the binary image is decreased in size. In general, erosion of an image results in objects becoming
smaller, small objects disappearing, and larger objects splitting into smaller objects.
* Delision: The term dilation refers to the fact that the object in the binary image is increased in
size. In general, dilating an image results in objects becoming bigger, small holes being filled,
and objects being merged.
- Delision is used : Combining dilation and erosion in different ways results in a number of
different image processing tools. These are called compound operations. Here we present two of
the most common compound operations, namely Opening, and Closing.
* Closing: is the name given to the morphological operation of dilation followed by erosion with
the same structuring element. It deals with the problem associated with dilation, namely that the
objects increase in size when we use dilation to fill the holes in objects. This is a problem in
situations where, for example, the size of the object (number of pixels) matters.
* Opening: is the morphological operation of erosion followed by dilation with the same
structuring element. It deals with the problem associated with erosion, namely that the objects
decrease when we use erosion to erase small noisy objects or fractured parts of bigger objects.
The decreasing object size is a problem in situations where for example the size of the object
(number of pixels) matters. The general effect of opening is to remove small, isolated noisy
objects while the main object preserves its original size
- We used opening for: An opening can be also used to retain only objects of one shape.
Lecture 4 - image processing:
What is a BLOB? What means connectivity and what kind of connectivity we usually have?
What means connected component labeling? What do we get as a result of this labeling? *
BLOB: BLOB stands for Binary Large OBject and refers to a group of connected pixels in a
binary image, also called connected components. The term "Large" indicates that only objects of
a certain size are of interest and that "small" binary objects are usually noise.
- The purpose of BLOB extraction is to isolate the BLOBs (objects) in a binary image.
* Connectivity: means, which pixels are neighbours and which are not.
* Connected component labeling (or connected component analysis): the algorithms used for
finding the BLOB's. These algorithms search for connected pixels and assigns a label to each
found BLOB. Background is usually 0, and then the first BLOB gets the label 1, the second 2,
etc.
- As a result of the labeling we get the number of objects or BLOB's
Lecture 5 - sound:
The basics parameters of sound * A(Amplitude) = D/f, where D is the distance units of
meters
* Φ(Phase shift) = N/A
* f (frequency) = 1/T (Hz)
* T (period) = 1/f (seconds)
Note: All these parameters are constant and only the time t varies.
Lecture 5 - sound:
What means Fourier analysis? What is FFT? inputs, outputs? **EXTRA**
**Fourier transform, an algorithm to transform a time domain representation of a signal into a
frequency domain one.
* Fourier analysis: provides an alternative representation of a signal, not in the time domain
(with time on the x‐axis) but in the frequency domain (with frequency on the x‐axis). This
representation is equivalent with the one in the time domain and in some cases even more useful.
We say that the Fourier analysis turns a time‐varying signal (plotted on a graph amplitude vs.
time as in Fig. 4(a) into a frequency‐varying signal (plotted on a graph of amplitude vs.
frequency)
*The Fast Fourier Transform (FFT): is an efficient way to do the Fourier transform, and there are
many different algorithms to accomplish the FFT.
- (inputs/outputs)This box has two inputs: a vector with the signal samples, x[n] and the number
of samples, N. The output is a vector a, with the amplitudes of the component frequencies,
denoted by ak.
Lecture 5 - sound:
How to represent signals in frequency domain (sinusoidal signals, sum of sinusoids, periodic
signals, short time Fourier analysis, spectogram). *sinusoidal signals: One of the basic
families of periodic signals , very useful in modeling common processes in nature, are the
sinusoidal signals, or more concisely, sinusoids. Sinus, or sine is a trigonometric function of an
angle θ (see Fig. 3).
* Sum of sinusoids: If each instrument produced a pure sinusoidal tone at the frequency of the
note that is assigned to it, then the composite orchestra signal would be simply a sum of
sinusoids with different frequencies and amplitudes.
* periodic signals: Let's take the case of a signal x(t), which is not sinusoidal, but still periodic
with a period of T0. In this case, the Fourier analysis can decompose (break) the signal in a set of
sinusoids called a Fourier series, described by equation (2):
*STFT (Short Time Fast Fourier Transform): We apply this technique to aperiodic signals. The
sampled signal first needs to be windowed.
Windowing: Short‐time signal processing is practically always done using windowing. In short‐
time signal processing, signals are cut into small pieces called frames, which are processed one
at a time. Frames are windowed with a window function in order to improve the frequency‐
domain representation. The problem with windowing is that by cutting a signal (for example a
vowel) in frames, a certain feature might be lost because a part of the vowel signal is in one
segment and a part of a signal in another. The solution for the lost feature problem is to overlap
frames (see Fig. 21). Usually for speech processing windows of 20ms are taken with an overlap
of 10ms (50%).
The problem with windowing is that by cutting a signal (for example a vowel) in frames, a
certain feature might be lost because a part of the vowel signal is in one segment and a part of a
signal in another. The solution for the lost feature problem is to overlap frames (see Fig. 21).
Usually for speech processing windows of 20ms are taken with an overlap of 10ms (50%).
Lecture 5 - sound:
How can we filter a sound signal? In time domain, in frequency domain * filtering - in time
domain:
Filtering in time domain by averaging signal: Possibly the most obvious approach to reduce the
noise is to take an average. Here we show two options: simple averaging over a number of
readings and taking an exponentially weighted moving average (EWMA).
- low‐pass filter. A low‐pass filter is one which does not affect low frequencies and rejects high
frequencies.
Lecture 6-7-9 - classification:
The components of a classification system **Extra**
* preprocessing: everything that is required to apply a function, for instance, eat apple, the
preprocessing would be: wash the apple, peal the apple... once all is ready we can eat the apple
(apple the function eat apple). preprocessing a.k.a parsing.
* a sensing module,
* a preprocessing mechanism,
* a feature extraction mechanism,
* a classifier,
* and if the classifier uses supervised learning, then a set of already classified examples (training
set).
Lecture 6-7-9 - classification:
Features, features space, what makes a good feature? * feature: The next step is to select
some measurable quantities, called features, that can help us to reliably separate between two
different coins (classes). This property is called discriminatory power.
*features space: It is the distance between each feature
* What makes a good feature?: If the classes are situated far from each other and create clusters
(regions distinct from each other), then we can say that we have chosen good features.
Lecture 6-7-9 - classification:
Supervised vs unsupervised learning classifiers * Supervised learning classifiers:
The machine learning classifiers we have seen until now have made use of a training set
consisting of a collection of labeled data, each class having one particular label. The classifier
had a kind of teacher, who showed a few examples first, before asking to classify. This is
obviously useful, since it enables us to show the classifier the correct answers for each class, but
in many circumstances this is difficult to obtain. It could for example involve somebody labeling
each instance by hand. In addition, it does not seem to be very biologically plausible because
most of the time, when we are learning, we don't get told exactly what the right answer should
be.
* Zoning:
It means to subdivide the digital image into several equal quadrants (2,4,8 etc.) and count the
black pixels in each quadrant. These numbers create a features vector.
Lecture 6-7-9 - classification:
Note: The formulas for statistical moments are only for interested people, you do not have to
memorize them. // TODO maybe
Lecture 6-7-9 - classification:
Features for speech recognition (just enumerate a few) * Frequency spectrum:
calculated by using the Fast Fourier Transform (FFT). The feature vectors are then the vectors
with the FFT coefficients. This can work fine if we want to classify periodic sounds, such as
vowels.
* Spectrograms:
The problem with using the frequency spectrum as a classification feature is that words are not
stationary signals with a constant frequency spectrum.
A solution in this case is to cut the speech data into 10‐30ms frames before the analysis. If for
every time frame we calculate the short‐term frequency spectrum (FFT) and we plot them next to
each other, then we will obtain a so‐called spectrogram. The spectrogram shows the change in
amplitude spectra over time. It has three dimensions:
The cepstrum is called so because it turns the spectrum inside‐out. The x‐axis of the cepstrum
has units of quefrency, and peaks in the cepstrum (which relate to periodicities in the spectrum)
are called rahmonics.
Typically, in speech recognition the signal is divided in windows (frames) of 20ms with an
overlap of 50% and the resulting feature vector is the set of equalized mel‐cepstrum cepstral
coefficients, typical 12 or 13 MFCC coefficients for each frame.
* Energy:
Another feature that might be useful in classification is the energy or power over a frame, given
by the sum of the squared magnitude of samples values x[n] in a frame with N samples. It can be
also calculated as the sum of the Fourier coefficients, where x[n] is the sampled signal in time
domain and X[k] is the k‐th Fourier coefficient. Energy is a useful feature to distinguish between
voiced and unvoiced speech signals, because the latter tend to have much lower energy values
than the former. Energy is also useful to discriminate silent periods in a sound recording.
Lecture 6-7-9 - classification:
Note: The formula for energy spectrum, cepstrum coefficients and mel cepstrum coefficient don't
have to be memorized. You should know that such coefficients exist and are good for
classification. // TODO maybe
Lecture 6-7-9 - classification:
Rule based classifiers (principles, examples) * Rule based classifier:
Rules‐based classifiers distinguish between different classes by using a collection of "if...then"
decision rules.
*
- The advantage of this method is that it is simple and fast.
- The disadvantage is that the input image and the templates have to be always of the same size.
Different size or character orientation will cause misclassification.
that "event B is true given that A is true". For example if A is the event "I have flu" and B is the
event "I
have headache", then P(A|B) is the probability that I have flu, if I know already that I have
headache. In
values of the input variables (features vector). For example, the probability that it is a bird
knowing that it is yellow and it can fly.
Lecture 6-7-9 - classification:
Hidden Markov Models - How do they work as classifiers? HMM is a graphical probabilistic
reasoning algorithm that works well on a set of temporal data. At each
clock tick the system moves to a new state, which can be the same as the previous one or not.
The HMM
power comes from the fact that it deals with situations where you do not know the state you are
in (the
state is not visible, it is hidden). Instead, you see some observations that depend on the state.
Given the
* The k‐means clustering: algorithm attempts to split a given data set into a fixed number (k) of
clusters.
Lecture 6-7-9 - classification:
Classifiers evaluation. Confusion matrix - what it is && example, TP, TN, FP, FN. What is a
ROC graph? * Classifiers evaluation:
The simplest way to evaluate the classifier's performance is to measure the classification error,
defined as the ratio between the number of "classification errors" and the number of
classifications attempted. For example, an optical character recognizer has been tested for 100
letters 'A', and it recognized them as 'A' in 85 cases. This means that the classification error was
15%. The "classification accuracy" is defined as (1‐classification error) = 85%.
*Confusion matrix: summarizes the results of a classification test. It gives information on how
frequently instances of class A were correctly classified as class A or misclassified as another
class. The entries in a confusion matrix are counts, i.e. integers. The total of the four entries TP+
TN + FP + FN is equal to n, the number of test examples.
* But we can also evaluate the classifier's performance in a more refined way:
- True positive (TP) ‐ an instance of class A is correctly classified as being from class A
- True negative (TN) - an instance not from class A is correctly rejected as not being from class
A
- False positive (FP) - an instance not from class A is wrongly classified as being in class A
- False negative (FN) ‐ an instance of class A was wrongly rejected as not being from A
*Non‐functional requirements, as the name suggests, are requirements that are not directly
concerned with the specific functions delivered by the system. They define "how well" the
system must perform its functions, i.e. how well the behavior is achieved, such as look and feel,
usability (simplicity of use), performance (response time, accuracy), reliability, safety,
affordability, cost, maintainability, privacy or security. We will discuss more about safety
requirements later in this chapter. In contrast to functional requirements, non‐functional
requirements state the adverbs of the system. For example:
- Unambiguous - an SRS is unambiguous if each specification can have only one interpretation.
- Complete -SRS contains all requirements and all requirements are completely specified.
-------
I have slept 3 hours (human error). I have been coding for almost 10 hours (I made a fault a bug).
The plane has crashed because a system failure on the software(failure).
* The waterwall: the oldest and most widely used waterfall model, the phases follow each other
on the time line (Fig. 2). A project may take a few months until completion.
* agile: development, exposing the intermediate product to user feedback, and evolving it
through several versions. Development happens in sprints of 2‐3 weeks, where each sprint is a
sequence of the same phases: requirements, design, implementation, testing (see Fig. 3). Agile
methods only define very minimalistic requirements beforehand and work out the more advanced
on the way.
- Advan:
. One of advantages of Agile model is that working software is delivered very often, and
requirements can be changed on the fly.
. Also the cost of accommodating changes needs and correcting errors is reduced.
. Moreover, it is easier to get customer feedback, because the customer can actually see the
product.
- Disa: Takes a lot time. There is no any extra test after the product is completed
* Test driven development: First the tests for a small functionality are written. They will of
course immediately fail, because there is no corresponding code yet. Then code is written just
enough to pass these tests. Then new tests are added, followed by coding and the iteration
continues until all the functionality has been implemented.
- Adva: the advantage is that there is always a set of tests ready and also a not complete, but
working code. Safety critical systems are mainly developed with waterfall model, but attempts
are being made to move towards Agile practices.
- Disad: (I think that corrections): cost of accommodating changes needs and correcting errors is
expensive.
Lecture 8 && 10 - System engineering:
The V-model, validation, verification, and testing levels Intro: Testing involves different
verification and validation (V&V) activities that should happen in parallel with all development
phases.
* Verification: Verification checks whether we build the system right (are the algorithms good, is
the code conform the design, etc).
* Validation:Validation checks whether we are building the right system, by asking the user
whether the intermediate artifacts still look according to his ideas and expectations. Fig. 24
shows the V system development model enriched with V&V annotations.
* Testing levels:
• System testing is based on and testing the fulfillment of the software system requirements
• Acceptance testing - based on and testing the fulfillment of the user requirements (contract
acceptance test, alpha test, beta test)
Lecture 8 && 10 - System engineering:
What is a hazard and how to perform a hazard analysis? Safety requirements belong to the
non‐functional requirements group in a SRS. They are formulated as result of a hazard analysis.
* A hazard, or an undesirable behavior represents a potential source of harm (i.e., physical injury
or damage to the health of people, or damage to property or the environment). Hazards in a
system can be of many origins, such as operational, electrical, mechanical, environmental,
hardware, software, biological and chemical, etc. A hazard analysis starts with
- First(1) an identification of all known and foreseeable hazardous situations and their possible
causes. The analysis can be performed through a meeting with all domain experts involved, and
using simple brainstorming or a well‐defined procedure (FMEA, FTA, etc).
- Second, (2) the risk of each hazard has to be estimated, calculated as the product between the
probability that it will happen, and its severity or impact.
- Third (3) risk evaluation is conducted, to decide if every identified risk is acceptable based on
pre‐defined acceptability criteria. The outcomes of the risk evaluation can be assessed as:
intolerable, as low as reasonably possible (ALARP), or acceptable. Ideally, all hazard risks
should be reduced to zero. In a realistic situation, the goal is to reduce (mitigate) the risk to an
accepted level through risk control measures and changes in design.
- Fourth, (4) if a risk is decided as unacceptable, control measures are designed and implemented
to eliminate it or to mitigate it to an acceptable
Lecture 8 && 10 - System engineering:
Understand how an automatic insulin pump works. automatic insulin pump. The system consists
of the pump itself, a disposable reservoir that stores the insulin, and a disposable infusion set
(which is the tubing that connects to the reservoir and which terminates in a cannula or needle
through which the insulin is infused). The needle or cannula is inserted under the skin, and the
insulin pump itself is worn externally.
Lecture 8 && 10 - System engineering:
What is a test case, what is an oracle? * Test case: case. A test case is a set of input values
and the corresponding expected output.
* Oracle: A trustful source of information that can provide us with the expected output is called
an oracle. For example the BMI
Lecture 8 && 10 - System engineering:
Testing techniques (scenario based, BVA, EP, model based testing) ** Testing: Testing is
more or less hunting for bugs or defects.
**Black-box: Some testing techniques are called black‐box techniques, because they only use
information from the requirements document.
**white-box: Other techniques are from the category white‐box, because they use additional
information from the internal structure of the module,
* Scenario based: A scenario is a hypothetical story, used to help a person think through a
complex problem or system. This method can be also used in software testing. Scenario testing
emulates the actual use of the software from the user's perspective. A scenario test is a test based
on a scenario. The scenario is a story about someone trying to accomplish something with the
product under test.
* BVA(Boundary value analysis): BVA is a black‐box test generation method suitable for
requirements where the input variable is restricted to a certain range. This method is based on the
fact that very often faults are introduced at the edges of valid intervals. The rule is as follows: if a
variable is restricted by requirements to a certain interval [xmin, xmax] and the increment is 1,
then test cases should be generated for at least the following 5 values: xmin, xmin+1, a nominal
value in the middle of the interval, xmax‐1 and xmax.
For example if we test a program that requires a variable called age to be between 18 and 55,
then we have to generate 5 test cases, that execute the module for age = 19, age = 19, age = 35,
age = 54, age = 55.
* Model based testing: we can extract test cases from a use case (see Fig. 26), by asking that all
flows of events specified in the use case must be covered. Similarly, we can generate test cases
form a UML state diagram, by asking that these test cases should cover all possible transitions.
The big advantage of this model based testing is that the test generation process can be
automated.
Lecture 8 && 10 - System engineering:
Two ethical theories * Top down rule‐based approaches understand ethics as the investigation
of the right action. They answer to the question: what are the rules to follow in order to be
morally right? You can see here an analogy with the legal system. If one obeys the rules, one is
moral. An example is the --Deontological-- moral systems that are characterized by a focus upon
adherence to independent moral rules or duties. To make the correct moral choices, we have to
understand what our moral duties are, and what correct rules exist to regulate those duties. When
we follow our duty, we are behaving morally. When we fail to follow our duty, we are behaving
immorally.
* The --Utilitarism-- theory considers that an action is "right" as long as it satisfactorily causes
good consequences, compared to alternative actions, and it will be "wrong" if it doesn't. In order
to know if something is morally preferable for a utilitarian, we must ask: "Will it lead to more
benefits and less harms than the alternatives?" If the answer is, Yes, then it is morally preferable.
For example a utilitarian answer to the ethical question: "Is it good to kill people? "might be:
"Killing people is usually wrong either because people have value (and they might not exist after
dying), because everyone has a desire to stay alive, or because killing people makes other people
unhappy. This is a bottom up approach that understands ethics as the art/science of living a good
life, not as being bound by some set of rules. For the pervasive systems it involves a trial and
error learning of what constitutes an acceptable behavior.
Lecture 8 && 10 - System engineering:
You should be able to formulate an ethical question related to a given pervasive system. Who
pays damages in an accident?
How far should doctors trust intelligent systems?
Should the robot be taken away from the user if he gets emotionally attached?
........
Designers should provide enough information about them so others can foresee the consequences
algorithmic trading the use of computer programs to make rapid trading decisions
high frequency trading a subset of algorithmic trading that relies on computer programs to
make very rapid trading decisions
Flash Crash an incident that occurred on May 6, 2010, during which time the Dow Jones
Industrial Average dropped 900 points (9%) in the span of about 15 minutes, then recovered
almost as quickly.
Applications in:
Smart Dust
Environmental Monitoring
Non invasive Medical Monitoring
Smart Appliances
Smart Living Spaces
Homeland Security
Smart Dust "dust motes"
- Autonomous sensing & communication for <$1
- Sensors for temp, humidity, light, motion, direction, tilt, video, orientation (for inventory
monitoring, defense, etc)
- + bidirectional radio or laser + battery
Cloud Computing "Large groups of remote servers are networked to allow centralized data
storage & online access to computer services or resources"
- Distributed processing & network infrastructure
- Security, availability, auditability, isolation
- But no standardization
3 Service Models of Cloud Computing 1) Infrastructure
2) Platform
3) Application
Infrastructure as a Service (IaaS) Provisioning of fundamental *computing resources* incl
Server hardware, storage, networking, OS, DB, CPU, Memory, VMs
- Provider owns assets, is responsible for facilities
- "On demand" access to computing resources
Platform as a Service (PaaS) Delivery of a *computing platform* & *solution stack* as a
service
- "On demand" access to [Utilities, network, security, storage, cpu, server, OS]
Software as a Service (SaaS) *Applications* available to service consumers via browser-based
interfaces (run on cloud infrastructure)
- "On demand" software delivery
RFID (Radio Frequency Identification Devices) Lets retailers track goods from point of
manufacture all the way to store shelf
Digital Skin Made of silicon transistors that are grafted to the body
- Can monitor & wirelessly report bodily functions & chemistry
Bio Computing Use of molecules, DNA & nano materials to create computing structures
based on organic materials
Battery Capacity trend Increasing much slower than Moore's Law
Makes Power Consumption an issue (not speed)
Multimedia environment 1) *Authoring* (Live or stored content)
2) Media Encoder
3) *Distribution* (Media Services Server streams media)
4) *Playback* (Unicast/Multicast on Media Players)
Content drives trends - Content-rich servers
- Bandwidth will continue to incr at decr cost
- Computing power will continue to incr at decr cost
- Content that takes advantage of bandwidth & computing power will drive the value chain &
justify future investments in broadband capacity
It restricts freedom of expression to words that do not lead to criminal acts. What is the
impact on 1st Amendment rights of the Supreme Court ruling in Schenck v. United States?
libel, slander, or endanger another person. 'Reasonable restrictions' are allowed on freedom of
expression to prohibit the expression of words that
The Court interpreted Texas as protected, and Virginia as not protected. How does the Court's
interpretation of symbolic speech in Virginia v. Black compare with its interpretation in Texas v.
Johnson?
Americans need to be able to hear and discuss a variety of opinions. Why is freedom of
speech important in a democracy?
It helps people make the best choices on public issues. What is one reason that freedom of
speech is still important in American democracy today?
their broadcasts can be regulated to ensure they do not infringe on the rights of the public. Which
of the following is TRUE about the Court's ruling in Red Lion Broadcasting Co. v. FCC?
Because broadcasters use public airways,
The students' actions had 1st Amendment protection because they did not cause a disruption of
normal school activities. How does the case of Tinker v. Des Moines School District
illustrate constitutional provisions for limited government in the protection of individual rights?
cannot curb ideas shown in the film before they are expressed. In Burstyn, Inc. v. Wilson,
the Court cited "prior restraint on freedom of speech and the press" as reason to void a New York
law forbidding the showing of a particular motion picture. Prior restraint means that the
government
a form of expression that is protected by the Constitution. In Texas v. Johnson, the Supreme
Court held that burning the American flag is
laws prohibiting libel Which of the following explains one reason why States might be allowed
to stop people from posting certain comments on social media sites?
guarantee of free speech and limits on prior restraint Software companies have challenged State
laws aimed at restricting the sale of violent video games to minors. What aspects of the 1st
Amendment support the software companies' position?
Freedom of Speech is a type of liberty right. We have the right to express our opinions without
interference from the goverment or other people. Promotion of truth and expresison.
Hate Speech is defined as "epithets conventionally understood to be insulting references to
characteristics such as race, gender, nationality, ethniticy, religion, and sexualality."
What did John Stuart Mill say about freedom of speech? In his essay on liberty he argues that
freedom of speech is at the heart of democracy. Expression of ideas cannot be prohibited simply
bc people find them offensive.
What was the original purpose of the 1st Amendment? was to delegate the power to restrict
freedom of speech to the states; although the federal government could not restrict speech, the
state and municipal could
The 'marketplace of ideas', the tyranny of the majority, and powerless people in a society Ideas
are like a product on the market. Just as the free market tends to deliver the best consumer goods,
if everyone comes to the marketplace of ideas to express their opinions, the best ones will
eventually win out the others.
Tyranny: Mill was aware of this. In a democracy "there needs to be protection also against the
tyranny of the prevailing opinion and feeling, against the tendency of society to impose, by other
means then civil penalties, its own ideas and practices as rules of conduct on those of dissent
from them."
Senator Joseph McCarthy In the 1950s he reported on his investigations of Communist
subversion in the United States. His sensationalist report was followed by a series of public
hearings in which the careers of many prominent Americans were ruined on the most flimsy,
hearsay evidence. Defenders of McCarthyism argued that Communist ideas should be repressed
to "protect freedom" and democratic values. He was formally censored by the senate his demise
was follewed by a rapid expansion of the first Amendment. Speech other than political speech-
such as sexual speech, porn, entertainment, commerical, and nonverbal expressions were
allowed.
Patriot Act Gives the government official increased powers to eavesdrop on phone calls and
search pp records
Catharine MacKinnon on Pornography argues that it is immoral bc it poses a substantial
threat to women's equality and harms women. Her view is based on radical feminism which
focuses on the oppressive patriarchal hierarchy
~Porn has no value in the marketplace of ideas bc it presents a distorted view of women and is
based on a lie of womens sexuality
John Stuart Mills and freedom of speech argues that the state does not with citizens freedom
except where restricitions is necesary to protect the person and property of others. According to
him the harm caused by censorship far outweighs any harm that might result from spreading
false opinions
Boss's Conclusion As moral agents we also have a moral obligation to respond to hate speech
Speech Codes on college campuses places restrictions on some forms of speech, such as hate
speech, fighting words, obscenity.
Was created to cut down on the frequency racism, sexism, and other hate speech.
Were intended to restrict offensive and bigoted forms of expression and encourage diversity.
Creates open and safe learning environments
Political Correctness Movement was the most successful in American history to restrict hate
speech. It was also the first time students asked professors and administrations to place
restriction on offensive speech.
Charles R. Lawrence argues that racist speech and discriminatory conduct are part of a totality
that is incompatible with equality
~Social context in which hate speech takes place is morally relevant to whether it should be
tolerated. Rather than defending abstract principles such as impartitiality, we should be more
concerned with defending the real victims
~Counters that censoring hate speech is not a infringement on our right to free speech. Hate speech,
he maintains, is not really speech or an expression of an idea but an attack
The First Amendment ■ Congress shall make no laws respecting the establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press...
■ Did not apply to the state governments until twentieth century when they were incorporated
via the Fourteenth Amendments Due Process Clause
- Free Speech Clause in the 1920s
- Establishment and Free Exercise clauses in the 1950s
Seditious libel "Malicious, scandalous falsehoods of a political nature that tended to breach the
peace, instill revulsion or contempt in the people against their government, or lower their esteem
for their rulers." (Levy, Original Intent, 211) rarely enforced
Liberal understanding of Free Speech Past: did not exist
Present: broad but no absolute, freedom to express opinions
The Marketplace of ideas supposedly best ideas will win out and create well informed public
in practice has not worked out this way
modern liberal democracies often draw the line in different places
Free speech v academic freedom ■ Not absolute but distinct from free speech
- Ideas are tested by standards of logic, evidence, and coherence
■ Professors have been harassed inside and outside the classroom
■ Outside the classroom
- Limits on student speech (Student Code of Conduct)
- Protest is free speech
- Denying speakers a platform on campus not a violation of free speech rights
Did the states in the early republic have free speech protections? If they did, did they offer broad
protections for speech? ■ Even with protections for speech and the press, the states
frequently passed laws that limited them, especially concerning the common law concept of
"seditious libel"
Did Jefferson and Madison believe that there should be some restrictions for speech before the
passage of the Alien and Sedition Acts? Yes
Madison's Proposed Amendment: Free Speech and Press
■ "The people shall not be deprived or abridged or their right to speak, to write, or to publish
their sentiments; and the freedom of the press, as one of the great bulwarks of liberty, shall be
inviolable."
■ Jefferson's Recommendation to Madison's Amendment:
■ "The people shall not be deprived or abridged of their right to speak or write or otherwise to
punish anything but false facts affecting injuriously the life, liberty, property, or reputation of
others or affecting the peace of the confederacy with foreign nations."
Did the first amendment apply to the states before the 20th century? No
What are the threats to free speech on campus today? ■ In the classroom
- Limits on student speech (see syllabus)
- Some students afraid to speak out
■ However, this is not new and it is a broadly felt sentiment regardless of position on the topic
■ * criticism is not censorship or an attempt to silence the speaker
Do students have absolute free speech rights on campus? no
Compare and contrast how queens Mary and Elizabeth dealt with religious dissenters/heretics
during their reigns. Was Elizabeth's approach more enlightened? Explain. Queen Mary dealt
with heresy differently than Queen Elizabeth during her reign in England. Mary was a devout
Catholic who had no toleration and would burn people at the stake for heresy. Mary
approximately killed 300 people, giving her the nickname "bloody Mary". Elizabeth hung people
instead, killing about 280. Elizabeth had a more enlightened approach than Mary because she
considered not following her rules of religion and heretical acts to be treasonous. Elizabeth was
going towards a more tolerant way of ruling. People would not be killed for their faith, but for
their actions and choices against the monarch.
Explain the differences between Originalism and Living Constitutionalism. What are the problems
with both methods of interpretation? Which one makes more sense to you, and why? There
are differences between Originalism and Living Constitutionalism. Originalism is interpreting the
constitution as it was meant to be interpreted. Living constitutionalism can take into account
changes in society and be interpreted according to that. One problem with originalism is that there
is very little evidence to determine original intent and what we do have is very flawed. Another
reason is that we would be stuck to the 18th century and we would have to ignore the changing
values and changing society. Also, originalism lets lawyers intentionally distort the history for
political purposes. A problem with living constitutionalism is that it often is open to personal
preferences and bias. In addition, it cannot open the document for any interpretations. Living
constitutionalism makes more sense to me, because it can adapt to how society is changing.
Adapting to a changing society is helpful so that we can resolve problems easier in our time, as
opposed to going back to the 18th century.
- Basic Implications:
•FoE is necessary but not at the expense of justice and protection
• depends on distinction between expression and action (state has to be able to control action but
expression is protected)
• thought and communication make up individuality
- Limitations:
•limiting FoE as defective (as emotional involvement goes up; peace goes down)
• requires self-restraint, self-discipline, maturity (able to sacrifice the individual and the short-
term for collective long-term
• limitations can hurt a healthy society (creating public fear and hysteria)
- Terms:
•constitutional liberalism: the values and functions which underlie our freedom of expression
Sunstein: "Free Speech is Not an Absolute"; 2001 - The government is allowed to regulate
speech by imposing neutral rules of property law.
- The Surpreme Court continues to say that political speech receives the highest protection
- Gov't is more likely to regulate commercial speech, obscenity, libel.
- Do not assume that free speech is an absolute, the government has many ways of regulating
speech
Constant: "The Liberty of Ancients Compared to Moderns"; 1816 - Liberty definition (ancient):
• sovereignty, deliberating in public squares, assembled masses
•collective freedom = authority of the community
(severe surveillance/religious freedom as a crime)
• domestic relations had public authority
• laws regulate customs
• reliance on war
• power in dependence
-terms:
• active liberty: sharing a nation's sovereign authority with people
-> can easily trace line of authority to the people
->most forceful when participation is direct; weak when there is choice
-> people & leaders should have the tools to participate & govern
Lasch: "Lost Art of Political Argument"; 1995 - info is gathered through debate; not info
- arguments produce attention and relevancy
- role of the press is to encourage debate; not put out info
- schools and journalists are to blame for lack of debate
*Lippman's Argument
- Lippman's idea of new journalism where politics are limited to those with information (experts)
- public can not govern itself
- argument is not necessary if information is correct
*Counterargument to Lippman
- debate = the right questions = correct answers
- need to argue to know opinions
- necessary for learning/education
- Dewey idea: Press is the town meeting: has to inform and keep the conversation going
*Role of Advertising
- advertisers = hidden persuaders
- readers wanted newsworthy material but newspapers cater to advertisers
Sunstein: "Social Glue & Spreading Information"; 2001 - free speech and free press adds
pressure to the government to prevent things like famine -> knowledge so the government can
dodge public retribution
• knowledge cut off in non-democratic societies
- shared experience and knowledge is countered by niche media-> shared info benefits a society
- Terms: pseudo-environment: human flaw where the world is created by symbolic versions of
the world that is more manageable to the human
• people make decisions about things that are only imagined
• limiting access to facts:
1. artificial censorships
2. limited social contact
3. constrained time
4. distortion of short messages
5. difficulty in explanation
6. threat to established routine
- Start of liberalism
• Christian ideal that all men are equal in sight of God
• reformation destroyed concept of intervening hierachy or priesthood -> man had full access to
God
• man in renaissanc became more conscious of will and power to create his own pleasure
• system of status: more flexible due to contracts and individual initiative (no more privilege
based on birth/social position)
- Commercial Class
• spoke of more rights (labor, body, speech, writing, fair trial)
• share in administration of gov't
- New Individualism:
• autonomy: no individual submit to the will of another
• freedom: common authority and responsibility
• struggle in balancing freedom and taking political control
- 3 species of Government
1. republican: power in the people or part of the people (democratic and aristocratic)
2. monarch: single person by established laws
3. despotic: single person by his own will
Transition of Government Styles: Unequal Capacity But Equal Moral Worth 1.
authoritarianism: authority of Right Man/absolutism
• moral equality in man but man has fallen so mediator of pope or king has direct contact to God
- Two places for God: theism (pray to God) and deism (God created reason)
• Man has access to God on his own
- Rules:
• only rules necessary are those which allow the rights of man
• moral and natural rules are all the same: all part of a natural, reasonable world
- Unreasonableness of Restraints
• one nation's gain as another's loss = source of dischord
-Terms:
- invisible hand: value of product is dependent on profits to employer (point where buyer and
seller to exchange goods)
•if economics stay constantly and naturally regulated then everyone wins
• people can negotiate on their own
• working for his own gain and security -> his own interests support society unknowingly
Locke: "The Second Treatise of Government"; 1689 -State of Nature- the idea that affairs are
ordered to societies liking. MAN IS NOT TO HURT SOMEONE ELSE
•Prosecute the transgressor - if someone hurts you, then you can prosecute. this causes a war,
when the state of nature is disrupted
•State of Nature is not a state of War, but if there is a time of war then you need "fight"/ punish
the transgressor then the state of nature becomes one of war.
•Will ultimately return to the state of nature
•Punishments need to be on equal scale as the crime "eye for an eye, tooth for a tooth "
-State of Society
•Allows for a more organized state of nature
•Social Compact- the agreement the individuals make to be a member of a society with a
common authority
•Men must have a majority decide to be in the social compact- once you join you are bound by
its laws
• However, if many and the society is truly unhappy, then can dissolve it.
Locke (Lecture Notes) - State of Nature
•man is perfectly free to order his actions
• limited by nature's laws -> reason
1. masterless man
2. man ought not harm one another
3. right to punish the transgressor
- State of War
• active design between people to attack each other
• intention to impose rules on other people
- State of Slavery
• wrong by taking away the rights/power of life and death over someone else -> a type of war
- Property: foundational property is our bodies
• labor and feeding ourselves: mixing body with the land
- man is not completely sure of the laws of nature but learn it through experience
- Milton's Arguments:
• problematic to not be exposed -> bad is necessary to know the good
• concerned with licensers as gatekeepers -> censors can not be exempt from bad influence either
• dangerous to impose limits since other pop cult can be corruptive too
• learn more in honesty in exchanged than in false pretenses
• contrasts Plato because it was a fictional republic; even he wouldn't dare to put it into action
(Plato, like Lippman, argues for experts)
• God gave us reason to know the bad from the good (God created bad so there must be a
purpose for it)
- Limits to Milton:
• if what's published is terrible, then gov't should step in but should not be censored in advance
Levy: "Emergence of a Free Press"; 1985 - Current Knowledge of Free Speech
• freedom is not speaking with reservations
• parliament has to be strong enough to ignore the criticism
• people considered the masters of gov't; not subject to it
• printing magnified the dangers of opinion
• could print but liable to libel: criminal if provokes revenge and ends peace
- 4 Classes of Libel
1. blasphemous: defaming religion typically coupled with laws against heresy
2. obscene: protected public morality but limited literary, dance and personal expression
3. private: protected individual reputations
4. seditious: crime of condemning or ridiculing the government to jeopardy of public peace
• skeptical because boundaries and definitions are unclear
- Seditious Libel: against the law to speak out against the government, nervous of revolts due to
criticism, criticism can be believed by other citizens -> putting the government at risk
Timeline:
- 1275: Government of England began speech control
• stop speech in advance (prior restraint)
• punish people after publication
-1642-1651: abolish Henry VIII idea by establish licensing
- 1643: licensing act occurs
- 1644: Milton writes for free speech
- 1689: free speech for Parliament officials
- 1694: repeal of the Licensing Act
- 1690: Locke writing on ideal society
- 1776: U.S. revolution
- 1789: French Revolution
* William Blackstone in the 1700s as a progressive view of free speech
Lecture: Prior Restraint 1. imprimatur and Licensing Act: curb speech before its written
2. Blackstone: against prior restraint for the liberty of the press
• press is essential to a free government: rights have to be responsibly
• social compact: give rights to the government; punishment if free will is abused
• have the personal right to believe whatever you want but public is concerning
Bill of Rights Foundation of Constitution:
- use Locke ideas for foundation: can make their own government
- Blackstone concept: prior restraint as unnecessary
- seditious libel: speaking out against government in a way that lowers people's opinions of
government
• criminal law to speak out -> considered treason
• requirements for looser seditious libel: strong government that can take criticism, differentiate
opinion from truth
Constitution:
- tea party: 13 individual colonies must agree for things to progress -> eventually move towards a
majority
- Two parties: federalists and anti-federalists
• anti-federalists: concerned about gov't having too much power so they are for the BoR to
restrain the government (mainly concerned with taxation)
**JEFFERSON**
• federalists: want a major connection
**MADISON & HAMILTON**
- constitution only need 9 states to adopt it but anti-federalists want to stop it. Want to hold
everything up so a second convention would need to be held
• amendments would require all 13 votes
• most states have a BoR
- Jefferson convinces Madison to have BoR -> constitution has to be passed before BoR
• Madison created the 10 amendments
First Amendment - Levy: historian who published in 1960 funded by non-profit group in
1957
• during the McCarthy period
• communist who wanted to overthrow capitalist
• history of first amendment was needed
- Framers: not discussing the First Amendment, more concerned with trial, taxes, etc.
• speech as a non-factor
• took law of seditious libel as Blackstone -> gov't could be criminally assaulted
Describe Free Speech in the American Democracy Citizens and noncitizens alike have the right
to speak freely, to read and write what they choose, and to worship as they wish or not worship
at all. The Bill of Rights - the first ten amendments to the U.S. Constitution - protect those rights
and others.
Pure Speech verbal expression before an audience that has chosen to listen
Symbolic Speech (Provide Example) the use of actions and symbols, in addition to or instead of
words, to express ideas
Ex. Symbolic speech involves actions, the government can sometimes restrict it in ways that do
not apply to pure speech - for example, if it endangers public safety.
-Stromberg v. California (1931)
-U.S v. O'Brien (1968)
-Tinker v. Des Moines (1969)
-Texas v. Johnson (1989)
Obscenity anything that treats sex or nudity in an offensive or lewd manner, violates
recognized standards of decency, and lacks serious literary , artistic, political, or scientific value
Defamation false expression that injures a person's reputation
Slander false speech that damages a person's reputation
Libel false written or published statements that damage a person's reputation
Fighting Words words spoken face-to-face that are likely to cause immediate violence
Commercial Speech speech where the speaker is more likely to be engaged in commerce and
the intended audience is commercial, actual, or potential consumers
Seditious Speech (Provide Example) speech urging the resistance to lawful authority or
advocating the overthrow of the government
Speech that urges the resistance to lawful authority or advocating the overthrow of the
government
Ex. Schenck vs. United States
How can the government regulate each of the following aspects of speech?
a. Time
b. Place
c. Manner The government can regulate how and when people have rallies and such things.
Most cities require permits to hold a march or use sound trucks
Describe Free Speech in Public Schools The rights of public school students may at times
conflict with the rights of others or interfere with the need to maintain a good learning
environment.
In addition, courts consider the age of the student and the precise educational setting when
deciding these cases: a student at a public university is likely to have greater expression rights
than a middle school student.
U.S. v. O'Brien Four young men burned their draft cards to protest the Vietnam War. The
were arrested for violating a law that required them to keep their draft cards in their possession at
all times. The Supreme Court ruled that the law did not violate the First Amendment because it
served a valid government interest and was not intended to suppress speech. The men could have
sent the same message in other formats.
Tinker v. Des Moines Students wore black armbands to school to protest the Vietnam War. They
were suspended, but the Supreme Court ruled that the school could not punish the student for this
symbolic speech. It said students do not "shed their constitutional rights to freedom of speech or
expression at the schoolhouse gate" and this particular symbolic speech did not substantially
disrupt the school's educational environment.
Texas v. Johnson A protester burned the American flag, which was against the law in Texas.
The Supreme Court said the law banning flag burning was unconstitutional because it infringed
on the right to free speech.
Schenck v. U.S. The Court ruled that Schenck's conviction was unconstitutional because
his actions took place during wartime when there was a "clear and present danger" that they
would bring about "substantive evils." If conflict occurs between free expression and public
safety, judges often look at whether the speech present and immediate danger.
Hazelwood v. Kuhlmeier The Court ruled that school officials can regulate student speech in
school-sponsored activities, like the school newspaper and theater productions.
Preferred position doctrine Interpretation of the First Amendment that holds that freedom of
expression is so essential to democracy that governments should not punish persons for what
they say, only for what they do.
vagueness test A constitutional rule that requires criminal laws to state explicitly and definitely
what conduct is punishable. Criminal laws that violate this requirement are said to be void for
vagueness
prior restraint Censorship imposed before a speech is made or a newspaper is published; usually
presumed to be unconstitutional.
symbolic speech is a legal term in United States law used to describe actions that
purposefully and discernibly convey a particular message or statement to those viewing it.
political speech is the type of speech that receives the most protection under the First
Amendment. Political speech is the core expressive activity that forms the foundation of our
democracy; it receives the highest level of protection under the First Amendment
least restrictive means test standard imposed by the courts when considering the validity of
legislation that touches upon constitutional interests. If the government enacts a law that restricts
a fundamental personal liberty, it must employ the least restrictive measures possible to achieve
its goal
defamation the action of damaging the good reputation of someone; slander or libel
libel Written defamation of another person. For public officials and public figures, the
constitutional tests designed to restrict libel actions are especially rigid.
slander make false and damaging statements about (someone).
clear and present danger doctrine Interpretation of the First Amendment that holds that the
government cannot interfere with speech unless the speech presents a clear and present danger
that it will lead to evil or illegal acts.
commercial speech has been defined by the Supreme Court as speech where the speaker is
more likely to be engaged in commerce, where the intended audience is commercial or actual or
potential consumers, and where the content of the message is commercial in character
fighting words Words that by their very nature inflict injury on those to whom they are addressed
or insight them to acts of violence.
hate speech speech that offends, threatens, or insults groups, based on race, color, religion,
national origin, sexual orientation, disability, or other traits.