You are on page 1of 143

Question 1 1 out of 1 points

Freedom of speech, press, religion, assembly, and petition. Which amendment is this?

1st

Question2 1 out of 1 points

The right to express oneself, guaranteed in the First Amendment to the US Constitution

Freedom of Speech

Question 3 1 out of 1 points

They take pleasure in taking the fun away other people and are usually encountered in video games.

Griefers

Question 4 1 out of 1 points

Your account setting is used to respect the choices made to limit sharing or visibility settings in the
account

True

Question 5 1 out of 1 points

A legal contract between the manufacturer and/or the author and the end user of an application.

EULA – End-User License Agreement

Question 6 1 out of 1 points

Which of the following is not part of the 1st amendment?

Right to fair trail

Right to associate

Question 7 1 out of 1 points

A general statement intended to specify or delimit the scope of rights and obligations that may be
exercised and enforced by parties in a legally recognized relationship.

Disclaimer

Question 8 1 out of 1 points

Noee says he has the right to criticize the government. That means…

He can say when he thinks a law is unfair


Question 9 1 out of 1 points

If a reporter can get three different sources to confirm the same factual allegation, he or she cannot be
successfully sued for libel.

False

Question 10 1 out of 1 points

Cartoonists – because they are trying to be funny – cannot be successfully sued for libel.

False

Question 11 1 out of 1 points

A reporter printing untrue information about President Duterte in the newspaper.

Freedom of the Press

Question 12 1 out of 1 points

It is the right of every individual to hold opinions without interference and to seek, receive and impart
information and ideas through any media.

Freedom of Expression

Question 13 1 out of 1 points

Control of what people read, write, see or hear; efforts to prohibit free expression of ideas

Censorship

Question 14 1 out of 1 points

Internet Censorship is the control or suppression of what can be accessed, published, or viewed on the
Internet enacted by regulators, or on their own initiative.

True

Question 15 1 out of 1 points

Why is protecting the right to freedom of expression important?

Promote individual growth and human dignity

Question 16 1 out of 1 points

What act is discussed in the image below which regulates the processing of personal information of
individuals collected by both public and private entities as a way to protect one’s privacy.

RA 10173 Pag may breach


Question 17 1 out of 1 points

They intentionally upset other people on the internet by starting flame wars or posting content that are
designed to spark negative emotions.

Trolls

Question 18 1 out of 1 points

Cyborgs are called biological organism whose physical or mental abilities are extended beyond normal
limitations by either electronic, mechanical or robotic elements built into the body.

True

Question 19 1 out of 1 points

It outlines the exceptions for public disclosure and the procedures for accessing public documents.

Freedom of Information

Question 20 1 out of 1 points

If you give your information to a company, they will never share that information with anyone else.

False

Question 21 1 out of 1 points

Can the data subject withdraw his consent?

Subscriber may request for the suspension, withdrawal, blocking, removal, and destruction of
Personal Information from processing systems.

When the subscriber already opted in there’s no way we can withdraw the given consent.

Question 22 2 out of 3 points

Which is correct about freedom of expression? Select three (3)

May be restricted in order to protect against defamation.

Can be restricted to prevent religious intolerance.

May be restricted in order to protect against slander

Question 23 1 out of 1 points

Internet addiction is a disorder wherein the person has an excessive impulse to use the internet.

True
Question 24 1 out of 1 points

Slander can occur through the use of a hand gesture or verbal communication that is not recorded.

True

Question 25 1 out of 1 points

It protects the right to obtain and publish information or opinions without government censorship or
fear of punishment.

Freedom of the Press

Question 26 4 out of 4 points

What are included in the McLuhan’s Tetrad analysis. Arrange your answer in proper order.

Enhances

Reversal

Retrieval

Obsolete

Question 27 1 out of 1 points

Internet addiction is not yet recognized by Diagnostic and Statistical Manual of Mental Disorder to be a
real addiction.

True

Question 28 1 out of 1 points

What freedom gives you the right to say anything you want just long as you are not threatening safety of
anyone?

Speech

Question 29 1 out of 1 points

An image manipulation is an online platform where people build social relationships with other people
on the same platform that share similarities with them.

False

Question 30 1 out of 1 points

Who might see a comment you make on your friend Sarah’s Facebook status?

Sarah, Sarah’s friends, your friends, and the friends of Sarah’s friends
Question 31 1 out of 1 points

Self-Concept is consists of an individual’s own personal experiences, attributes, and traits that
differentiates them from other individuals.

False

Question 32 1 out of 1 points

The right to publish newspapers, magazines, and other materials without government restriction

Freedom of the Press

Question 33 1 out of 1 points

Sending a text to your friend saying you don’t like Donald Trump is an example of freedom of the press.

False

Question 34 1 out of 1 points

Cookie is a type of technology placed on a website or within the body of an email for the purpose of
tracking activity on websites, or when emails are opened or accessed, and is often used in combination
with cookies.

False

Question 35 1 out of 1 points

Material published on an “Opinion Page” or as part of an editorial cannot be libelous.

False

Question 36 1 out of 1 points

Which of the following statements is true?

Sharing your location data can be useful OR harmful

Question 37 1 out of 1 points

What two amendments rights does the image exercise? Click on the 2 freedoms that identify the rights
being performed in the image

Assembly

Speech
Question 38 1 out of 1 points

Robotics is the science of communications and automatic control systems in both machines and living
things.

False Cybernetic

Question 39 1 out of 1 points

Match Column A with Column B. Select the letter of the BEST answer.

Question

A student writing a letter to the school principal asking to have free seating at lunch. Freedom of
Speech

A protest march against illegal immigration Freedom of Assembly

A cartoon in a newspaper that makes fun of religion Freedom of the Press

An ongoing project of the government posted in a tarpaulin Freedom of Information

Question 40 1 out of 1 points

Multiple online personas allows a person to maintain two (or more) mutually incompatible value
systems.

True

Question 41 1 out of 1 points

Malicious intent is…

Intentionally hurting someone in any way

Question 42 1 out of 1 points

Match Column A with Column B. Select the letter of the BEST answer

Question

RA 10175 Cybercrime Prevention Act of 2012

RA 10173 Data Privacy Act of 2012

RA 7610 Special Protection of Children Against Abuse, Exploitation and Discrimination Act

PD 603 The Child and Youth Welfare Code

RA 9262 Anti-Violence Against Women and their Children Act

Batas Pambansa 880 Public Assembly Act of 1985


Question 43 1 out of 1 points

Control of what people read, write, see or hear; efforts to prohibit free expression of ideas

Censorship

Question 44 1 out of 1 points

Written publication, tangible in form of a defamatory remark that has the tendency to injure another’s
reputation or character.

Libel

Question 45 1 out of 1 points

Epitemology is a branch of philosophy that studies about theory of knowledge

False

Question 46 1 out of 1 points

False and malicious use of spoken words

Slander
Hardware Physical computer itself, CPU, Hard Drive, Inputs
Software Instructions(programs) designed to be executed by the hardware
Causes of Computer Failure Hardware Errors (malfunction), Software Errors(bugs),
Programmed to solve the wrong problem, Misuse/given the wrong data, Communication failure,
Malice
Human Error The software may fail for other human reasons. The software may work but its
use may be misunderstood or program misunderstood problem
Malice People create software intended to do harm: viruses, spyware, trojan horse, DDOS
Ariane 5 Flight 501 Careless bug. used old software that didn't account for bit overflow with
new max velocity
Safety-Critical Software software that may affect someones safety if it fails to work
properly
Decision point A place in computer code when the next instruction executed depends on input
data
Control Programs Control Some sort of machinery, hardest to get right due to the necessity
for the program to run in real time and multiple processes
Real time programs that must do something within specific amounts of time
Multi-process programs that execute at the same time as one or more other programs
Advances in Software Engineering better education, more sophisticated testing, better
maintenance, and prevention of bugs
Major tasks of development Requirements, Specifications and design, implementation
Brook's law Adding people to a late project makes it later
Therac-25 Made by Atomic Energy of Canada Limited, used old software, 6 accidents with 3
resulting in death
Douglas Birsch Applied Ethicist
Birsch's Criteria for Moral Responsibility 1)A person's action must have caused the harm or
been a significant causal factor

2) A person must have intended or willed harm, or it must be a result of his or her negligence,
carelessness or recklessness.

3)The person must be able to have known, or must know the consequences of the action, or must
have deliberately remained ignorant of them.
Mitigating Circumstances 1)program was entirely developed by one person, working alone.
TODAY considered extremely poor programming practice.

2)software contained elementary errors,


indicates programmer lacked formal training.
TODAY, software used to control such potentially dangerous equipment would not be developed
by amateurs.

3) Written in an assembly language-very low level language that similar to machine language.
Decision dependent upon time

4) Therac-20 software reused almost intact in Therac-25 since appeared to be error free. Not
ERROR FREE but hardware safeguards removed on Therac-25
Malware Malicious Software
Worm A program that makes copies of itself, then propagates those copies through a network to
infect other computers
Virus Malware that is similar to a worm, but resides inside another program. The program must
execute for it to propagate
Trojan Horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but that is actually designed for a malicious purpose.
Rootkit A program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system.
Ransomware Encrypts files for ransom
Hackers people who write and deploy malware are commonly called this and the act of
doing it is called hacking
day zero attack An attack that exploits a previously unidentified vulnerability
white hat hackers their goal is to seek out vulnerabilities so they can be removed before a
malicious intruder discovers them and launches an attack
Stuxnet a computer worm that significantly set back the Iranian nuclear development
program
Assembly Language Low level coding language used in computer architecture
Phishing Scams Hackers trying to get private information by acting as a trustworthy source
or resource

What are the main ways causes of computer failure? 1. Hardware Errors.
2. Software Errors.
3. The computer solves the wrong problem.
4. Misuse
5. Communication Failure
6. Malice
Define Safety Critical Software. Safety critical software is software that may affect
someone's safety if it fails to work properly.
Define Decision Point. A decision point is a place in computer code where the next
instruction executed depends on input data. You can use this concept to roughly calculate the
number of executions required to exhaustively test a program.
Define Control Programs. These are programs that control some sort of machinery.
Explain Real Time. The term real time simply means that the program must do something
within a specific amount of time.
Define Multiprocess. Programs that execute at the same time as one or more other programs.
List the advances in software development that enable most programs to execute daily without
computer failure. 1. Better education of software engineers, programmers, and analysts.
2. More sophisticated testing procedures.
3. Better maintenance.
4. Refocusing the software development process on the prevention of bugs rather than the
detection and correction of bugs.
What is the single most important component of reliable software? The quality of the people
who create it.
What are the major tasks of the software development process? 1. Requirements
2. Specifications and Design
3. Implementation
Explain the requirements task in the software development process. Engineers determine
exactly what the system needs to do to best serve the clients. They find out what is required of
the software.
Explain the specification and design task in the software development process. Once the
requirements of a system are established, designers develop the particular set of component
program modules, or subprograms of the software system.
Explain the implementation task in the software development process. Programmer then use
the design to create code in an appropriate programming language. The program is considered a
correct program when it matches the specification.
What does it mean to prove a program to be correct? Proving a program correct means
that the program matches a specification. A correctness proof for a program does not prove that
the specification itself is correct. The specifications are based on requirements, which are derived
largely through human communication.
What is the most important aspect of software development? Communication.
What is Brooke's Law? Adding people to a late project makes it later. Adding new people
adds new lines of communication, which increase the chances of miscommunication or missed
communication.
What are Birsch's criteria that must be met for a person to bear moral responsibility? 1. The
person's actions must have caused the harm, or been a significant casual factor.
2. The person must have intended or willed the harm, or it must be a result of his or her
negligence, carelessness or recklessness.
3. The person must be able to have known, or must know the consequences of the action, or must
have deliberately remained ignorant of them.
What are the most prevalent types of malware? 1. Worm
2. Virus
3. Spyware
4. Trojan Horse
5. Rootkit
What is a worm? A program that makes copies of itself and propagates those copies through
a network to infect other computers.
What is a virus? Malware that is similar to a worm, but which resides in another program.
That program must execute in order for the virus to propagate itself.
What is spyware? A computer program secretly installed for the purpose of collecting
information about the computer's user or users.
What is a trojan horse? A piece of software that masquerades as an innocent, and perhaps
useful, program, but that is actually designed for a malicious purpose.
What is a rootkit? A program that embeds itself into a computer's operating system and
acquires special privileges that would normally be available to the operating system.
Define Hackers. People who write and deploy malware are commonly called hackers.
What are the two connotations of the term hacker? 1. Simply people who were good at problem
solving via programming.
2. Most people today use "hacker" to describe someone who uses computer knowledge for
unethical purposes.
What is a day zero attack or a zero day attack? An attack that exploits a previously
unidentified vulnerability. Zero day attacks are commonly the most dangerous and unexpected.
What is the goal of white hat hackers? Their goal is to seek out vulnerabilities so they can
be removed before a malicious intruder discovers them and launches an attack.
What are the ethical and legal issues of ethical hacking? 1. Hiring a team of hackers is always
a risk because it possible that someone on the team may have illegitimate goals.
2. Sometimes even legitimate hacking necessarily violates the law. White hat hackers have been
arrested before.
3. The education and training of ethical hackers is controversial. Teaching hacking can equip a
person to prevent hacking but on the other hand it trains them to be a criminal.
What is a phishing scam? Phishing scams attempts to fool or frighten a person in to revealing
key information.

Hardware Errors The hardware might malfunction, causing erroneous results.


Software Errors Sometimes called bugs
The computer solves the wrong problem When programmers do not correctly understand the
wishes of the clients
Misuse A computer is provided erroneous data
Communication Failure The person who is prompted for some action misunderstands what
is being asked.
Malice Hackers
Safety-Critical Software Software that may affect someone's safety if it fails to work
properly.
Decision Point A place in computer code where the next instruction executed depends on input
data.
Control Programs Programs that control some sort of machinery.
Real Time A program must do something within a specific amount of time.
Multiprocess Used to refer to programs that execute at the same time as one or more other
programs.
Brook's Law Adding people to a late project makes it later.
Douglas Birsch Applied ethicist who argues that both the programmer who designed
Therac's software and the company's quality assurance officer bear significant moral
responsibility for the accidents
Malware Short for "malicious software"
Worm Program that makes copies of itself and propagates those copies through a network to
infect other computers
Virus Similar to a worm, but resides in another program program that must execute in order for
the virus to propagate
Spyware A computer program that is secretly installed for the purpose of collecting
information about the computer's users.
Trojan Horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but that is actually designed for a malicious purpose.
Rootkit Program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system
Hackers People who write and deploy malware
Hacking The activity of writing and deploying malware
Zero Day Attack An attack that exploits a previously unidentified vulnerability.
Phishing ScamAttempts to fool or frighten a person into revealing key information.
Stuxnet A computer worm that has significantly set back the Iranian nuclear development
program
Darlington Nuclear Generating Station The first Canadian nuclear station to use computers
to run the emergency shutdown systems for its reactors

Hardware Errors When the hardware malfunctions and causes erroneous effects
Software Errors Mistakes in either the programming or the design of the software that
causes bugs (solving the wrong problem)
Misuse when a computer is provided erroneous data and usign the computer for the rong purpose
or using the computer incorrectly for the right purpose
Communication Error Human misunderstands a computer prompt
Malice Often the product of a full-blown vendetta caused by hackers for profit crime, terrorism,
or warfare (software created to do harm)
Safety-Critical Software Software that may affect someone's safety if it fails to work
properly
Decision Point A place in computer code where the next instruction executed depends on input
data
Control Programs Programs that control some sort of machinery (multi-process programs
w/real-time constraints)
Real Time A program must do something within a specific amount of time
Multi-Process Programs that execute at the same time as other programs (must coordinate with
each other)
Requirements (1) What is required of the software
Specifications & Design (2) Designers develop a particular set of component program
modules, or subprograms of the software
Implementation (3) Using the design to create code in an appropriate programming
language
Communication Another way the overall software process has improved; also the most
important component of software development
Brooke's Law Adding people to a pate project makes it later: creates new lines of
communication that leads to more chances of miss- or missed communication
Therac-25 The machine created by the Atomic Energy of Canada Limited (AECL) caused
overdoses that killed 6 cancer patients do to software bugs
Douglas Birsch Applied ethicist who claimed the software programmer and the company's
quality assurance officer bear moral responsibility for Therac-25
Birch's 1st Crieteria The person's actions must have caused the harm, or been a significant
causal factor
Birch's 2nd Criteria The person must have willed/intended the harm, or been the cause of
negligence, recklessness, or carelessness
Birch's 3rd Criteria The person must be able to have known, or must know the consequences
of the action, or must have deliberately remained ignorant of them
Assembly Language Very low level language that's similar to machine language used in the
Therac-25, where the decision is dependent on time
Malware Malicious software
Worm Software that copies itself and propagates those copies through a network to infect other
computers
Virus Malware that is similar to a worm, but resides in another program, of which must execute
inorder to propagate itself
Spyware Software that is secretly installed in a computer in order to collect data about the
computer's user(s)
Trojan Horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but is actually designed for a malicious purpose
Rootkit A program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system
A&P's Cash Register Scandal The cash register was programmed to charge an extra percentage if
the total amount was greater than a certain amount
sourceforge.net Known as a place where software developers could distribute their open
source software projects and started "wrapping" downlads with adware
Crypto-Locker Ransomware would encrypt files on your computer and make them unusable until
you paid a ransom
Hackers People who write and deploy malware
Zero Day Attack An attack the exploits a previously unidentified vulnerability
White Hat Hackers Seek out vulnerabilities to fix before a malicious intruder discovers them
and launches an attack
Phishing ScamAn attempt to fool or frighten a person into revealing key information
Stuxnet Worm A worm created by the CIA to set back the Iranian nuclear program
Ariane 5 Flight 501 Software bug that caused the rockets to self-destruct by trying to convert a
64-bit floating point to a 16-bit integer
Pentium Floating Point Divide Software caused dividion errors, but only for high precision
arithmetic

Hardware error the hardware might malfunction, causing erroneous results


Software errors (bugs) mistakes in either the programming or the design of the software
Misuse involves attempting to use a computer for the wrong purpose or using one incorrectly for
the right purpose.
Communication Failure a human misunderstands a computer prompt
Malice (hackers) often the product of a full blown vendetta, for profit crime, terrorism, or
warfare
Safety Critical software software that may affect someones safety if it fails to work
properly
Decision Point a place in computer code where the next instruction executed depends on input
data
Control Programs programs that control some sort of machinery
Real time a program must do something within a specific amount of time
multi-process programs that execute at the same time as one or more other programs
Brooke's Law "adding people to a late project makes it later"
Douglas Birsch applied ethicist who argues that both the programmer who designed
Therac's software and the company's quality assurance officer bear significant moral
responsibility for the accidents
Birsch's criteria of responsibility (3) 1) The person's actions must have caused the harm, or been
a significant causal factor.
2) The person must have intended or willed the harm, or it must be a result of his or her
negligence, carelessness or recklessness.
3) The person must be able to have known, or must know the consequences of the action, or must
have deliberately remained ignorant of them.
Malware malicious software
worm A program that makes copies of itself and propagates those copies through a network to
infect other computers
virus Malware that is similar to a worm, but which resides in another program. That program
must execute in order for the virus to propagate itself.
spyware A computer program secretly installed for the purpose of collecting information
about the computer's user or users.
Trojan horse A piece of software that masquerades as an innocent, and perhaps useful,
program, but that is actually designed for a malicious purpose.
Rootkit A program that embeds itself into a computer's operating system and acquires
special privileges that would normally be available to the operating system

Assembly language a very low-level language that is similar to machine language


Control program a program that controls some sort of machinery
Decision point a place in computer code where the next instruction executed depends on input
data
Floating point a method of representing real numbers in a way that can support a wide range of
values; numbers are, in general, represented approximately to a fixed number of significant digits
and scaled using an exponent
Hackers people who write and deploy malware
Malware a term for malicious software; comes in a variety of forms, including worms,
viruses, Trojan horses, spyware, and rootkits.
Multi-process a term used to refer to programs that execute at the same time as one or more
other programs
Phishing scam a program that attempts to fool or frighten a person into revealing key information
Real time a term that indicates that a particular program must do something within a specific
amount of time
Safety-critical software software that may affect someone's safety if it fails to work
properly
Zero day attack an attack that exploits a previously unidentified vulnerability

A Computer Might Fail to Meet Expectations By 1. Hardware errors


2. Software errors
3. Solve the wrong problems (Not requirements)
4. Misuse (Using incorrectly)
5. Communication failure (human misunderstands a computer prompt)
6. Malice (hacker)
Safety-critical software Software that may affect someones safety if it fails to work
properly (Could hurt environment, harm humans, air traffic control)
Test a program Impossible to test every single decision points
Decision point A place in computer code where the next instruction executed depends on input
data. (if statements)
Brooks Law More people into a late project, later project
Douglas Birsch Look in PPT
Birch's Criteria 1. Person's actions must have caused harm
2. The person must have intended or willed the harm, or it must be a result of his negligence
3.LOOK IN PPT
Therac issue PPT. Birch is based on the Therac issue

Lying not every falsehood is a lie.


lies have three elements:

1. a lie involves something that is believed by the liar to be false or seriously misleading.
2. a lie is ordinarily stated in words.
3. a lie is made with the intention to deceive.
Deception and Withholding Information one is practicing a form of dishonesty by omission:

1. if one fails to convey information that the audience would reasonably expect would not be
omitted and
2. if the intent of the omission is to deceive.
Honesty as a Virtue The more you practice honesty, the less likely you are to be dishonest
Failure to Seek Out the Truth
Suspect of inaccurate information: In using the results as they are, he is neither lying nor
concealing the truth.
But he may be irresponsible in using the results without inquiring further into their accuracy.
Utilitarian Considerations requires that our actions promote human happiness and well-being
and avoid the opposite.

engineer contributes by offering things society needs (products and information)

Dishonesty in engineering research can undermine these functions.


Dishonesty vs. Decision-making Dishonesty can also undermine informed decision-making
If engineers are unreliable the ability of those who depend on engineers to make good decisions
is undermined.
Dishonesty and Respect for Persons Approach Engineers need to ensure that employers,
clients and general public can make informed decisions

Disclose promptly factors that might endanger the public or the environment" - IEEE Code of
Ethics
Dishonesty in Research & Testing Falsification of data
Fabrication of data
Failure to respect intellectual property of others
Plagiarism
Inappropriate attribution of authorship
Intellectual Property creations of the intellect that can be protected in several ways, including as
trade secrets, patents, trademarks, and copyrights
Types of intellectual Property Trade secrets
Patents
Trademarks
Copyrights
Authorship Plagiarism
Rules for Expert Witnesses 1.Do not take a case if there is not enough time for a thorough
investigation
2.Do not accept a case if this cannot be done with good conscience.
3.The engineer should consult extensively with the lawyer
4.The witness should maintain an objective and unbiased
5.The witness should always be open to new information
Informing the Public The obligation of engineers to protect the health and safety of the public
requires more than refraining from telling lies or simply refusing to withhold information.

Requires that engineers aggressively do what they can to ensure that the consumers of
technology are not forced to make uninformed decisions
Confidentiality , there is an obligation to protect the confidentiality of the client-
professional relationship, just as with lawyers and physicians

An engineer can mishandle client-professional confidentiality in two ways:


1. The engineer may break confidentiality when it is not warranted.
2. The engineer may refuse to break confidentiality when the higher obligation to the public
requires it.
Potential conflict of interest A situation in which if one does x, there will be an actual conflict
of interest.
Appearance of a conflict of interest : A situation in which others might think that there is a
conflict of interest, even if there isn't really one.
Conflicts of Interest A conflict between an obligation to exercise good judgment and interest(s)
that may compromise that judgment

The interests of the client, employer, or public that the engineer must protect are restricted to
those that are morally legitimate.

self perception of who we are in relation to ourselves, others, and social systems
self-concept the ideas and feelings we have about ourselves
persona Idea of a person based on role, likes, dislikes, etc. and depending on context
people who believe in true selves Dr. Phil (Authentic self), Oprah
people who don't believe in true selves Gonsalves and Sarner
What do opponents to personas believe? People with multiple personas may become
hypocrites if the personas are morally incompatible
sociopath someone who suffers from dissocial personality disorder
types of online sociopaths griefer, cyberbully/cyberstalker, troll
griefer online sociopath that is a spoilsport. Makes it miserable for others to play an online game.
cyberbully/cyberstalker online sociopath who uses internet to harass a particular target
troll online sociopath who posts in public forum/chat room to subvert conversation or provoke
an emotional response
antisocial personality disorder Name for dissocial personality disorder given by the DSM-
IV
physical bullying vs cyberbullying physical- bully more depressed, victim can see harasser
cyber- victim more depressed, harasser anonymous or obscured by internet
normalization process in which an aspect of society becomes "normal"
behavioral addiction addiction to certain online behaviors, such as gambling, video games,
internet surfing, sex, extreme sports, etc.
not officially in the DSM
social network today- sites like Facebook and LinkedIn
in the past- structure formed by human relationships
social network analysis branch of applied mathematics that helps us understand and
explore social organization
one-to-one relationships relationship between two people
graph theory branch of math used to analyze social networks
graph in math, a construct of nodes
nodes representation of an individual entity
edge connection between related nodes
network synonym for graph
six degrees of separation in social network graph of whole world, everyone in world is at
most 6 steps away from you
path sequence of edges between two nodes
shortest path path that uses least number of edges
length number of edges in path
Milgram experiment with letters where he sent out letters to random people asking them to
give them to people that he thought would be more likely to know the final intended recipient in
Boston
epistemology branch of philosophy that studies the nature of knowledge and how we know what
we know
ex. determining what is true and what is not true
direct acquisition of knowledge knowledge built for yourself through direct observation
indirect acquisition of knowledge knowledge acquired through language
homophily tendency for people to have close friendships with people similar to themselves
ex. Facebook like button- companies can guess what friends like too, better generate ad revenue
tertiary source survey/summary of of other work that does not include full evidence, sources, or
technical details
ex. some things on Wikipedia
secondary source discusses information presented elsewhere
ex. authoritative history of revolutionary war
ex. textbook, sometimes Wikipedia
primary source a source that is as close as possible to the topic being studied
ex. Ben Franklin's own letters
crowdsourcing taking tasks that would normally be performed by experts and allowing the public
to do them
ex. Wikipedia's editorial model
digital minstrelsy role play in which:
- person of advantaged group irl plays role of person in disadvantaged group
- role play purposefully demeans members of disadvantaged group
- the experience is mainly played out on a computer or gaming console
McLuhan's "media" extensions of humanity.
- not neutral, shapes way we think
McLuhan's tetrad four questions designed to help us analyze a new medium and force its
effects
- What does artifact enhance or make possible?
- If aspect of a situation is enhanced, what is obsolesced?
- What older ground is brought back in this new form?
- What is the reversal potential of the new form?
cybernetics the study of self-regulating/self-controlling systems
ex. human's internal heat regulation system
cyborg/cybernetic organism biological organism that has computer/machine components
Weiner's view of cybernetics machines give us new powers, but the organism remains in control.
We are already cyborgs!
cybernetic augmentation a computerized prothesis that gives the user abilities that normal
human beings do not have
ex. implementing chip in retina to allow direct interface between brain and computer
elective surgery surgery that is not medically necessary, but desired by patient
ex. elective ampuation
Body integrity identity disorder when someone feels that current bodies do not match image
of selves. May feel that they need elective amputation.
Should surgeons perform surgeries for this reason?

Behavioral addiction addiction to certain online behaviors like gambling, video games, internet
surfing, sex, extreme sports, etc.
Crowdsourcing taking tasks that would normally be performed by experts (such as writing
and editing articles), and allowing the public to do them
Cut scene short movie in a video game in which the player has little or no control; cut scenes
are designed to advance the plot of a game
Cyberbully (a.k.a. cyberstalker): someone who uses the Internet to harass a particular target,
usually one known in everyday life, often using fake identities or public Web sites to enable the
harassment
Cybernetic augmentation a computerized prosthesis that gives the user abilities that normal
human beings do not have
Cybernetics the study of self-regulating or self-controlling systems
Digital minstrelsy refers to types of role play in which a person who is a member of an
advantaged group in real life plays the role of a person from a disadvantaged group; the role play
purposefully demeans members of the disadvantaged group; the experience is primarily played
out on a computer or gaming console
Elective surgery a surgery that is not medically necessary, but is desired by the patient
Epistemology the study of the nature of knowledge and how we know what we know
Graph a construct in which individual entities are represented as nodes, with related nodes
connected by an edge; the word 'network' is sometimes used as a synonym for 'graph'
Graph theory a branch of mathematics used to analyze social networks
Griefer an online version of the spoilsport; someone who takes pleasure in shattering the world of
play itself
Homophily the tendency for people to have close friendships primarily with people similar to
themselves
Media according to McLuhan, extensions of humanity, in which each media extends some
natural human process; can be used interchangeably with the word 'technology'
Normalization the way that an aspect of society becomes "normal"
Primary source a source that is as close as possible to the topic being studied
Secondary source a source that discusses information presented elsewhere
Self according to the Blackwell Dictionary of Sociology, a relatively stable set of perceptions
of who we are in relation to ourselves, to others, and to social systems
Self-concept the ideas and feelings that we have about ourselves
Shortest path the path between two particular nodes that uses the least number of edges
Six degrees of separation hypothesis says that in the social network graph of the whole world,
everyone in the world is at most six steps away from you.
Social network a dedicated website or other application that enables users to communicate
with each other by posting information, comments, messages, images, etc.
Sociopath a person with a personality disorder manifesting itself in extreme antisocial
attitudes and behavior and a lack of conscience
Tertiary source a survey or summary of other work that does not include full evidence,
sources, or technical details
Tetrad four questions introduced by McLuhan designed to help us analyze a new medium and
foresee its effects
Troll a user who posts in a public forum or chat room, with the goal of either subverting the
conversation or otherwise provoking an emotional response

Self A relatively stable set of perceptions of who we are in relation to ourselves, to others, and
to social systems
Self-concept The ideas and feelings that we have about ourselves
Griefer Online version of a spoilsport; enjoys making other players not enjoy online games
Cyberbully Uses the Internet to harass a particular target, often using fake identities or public
Web sites to enable harassment; often chooses targets known in real life
Sociopath Someone who suffers from the dissocial personality disorder.
Troll Posts in a public forum or chat room, with the goal of either subverting the conversation
or otherwise provoking an emotional response
Normalization The way that an aspect of society becomes "normal"
Behavioral Addiction Addiction to certain online behaviors like gambling, video games, internet
surfing, sex, extreme sports, and so on.
Social Network Internet sites like Facebook and LinkedIn
Social Network Analysis Help people understand and explore social organization.
Graph Theory Branch of mathematics to analyze the social networks.
Graph A construct in which individual entities are represented as nodes.
Network Used as a synonym for "graph".
Six Degrees of Separation Says that, in the social network graph of the world, everyone in the
world is at most six steps away from you.
Paths A mathematician would describe the six degrees of separation hypothesis in terms of this.
Shortest Path The path that uses the least number of edges.
Epistemology Study of the nature of knowledge and how we know what we know
Homophily The tendency for people to have close friendships primarily with people similar to
themselves
Primary Source As close as possible to the topic being studied
Secondary Source Discusses information presented elsewhere
Tertiary Source Survey or summary of other work that does not include full evidence
sources, or technical details
Crowdsourcing Taking tasks that would normally be performed by experts and allowing
the public to do them.
Digital Minstrelsy Types of role play
Media Extensions of humanity
Tetrad Four questions designed by McLuhan to help analyze a new medium and foresee its
effects
Cybernetics Study of self-regulating or self-controlling systems.
Cyborg Short for cybernetic organism
Cybernetic Augmentation A computerized prosthesis that gives the user abilities that normal
human beings do not have.

Nascent beginning to exist or develop


Ethnographer a branch of anthropology dealing with the scientific description of individual
cultures
Sacrosanct extremely sacred or inviolable
Incursions a hostile entrance into or invasion of a place or territory, especially a sudden one;
raid
Pedagogy the art or science of teaching; education; instructional methods
Moratorium a suspension of activity
Aesthetic concerned with notions such as the beautiful and the ugly
Cogent to the point; relevant; pertinent
Cognitive concerned with the act or process of knowing, perceiving, etc.
Equates to state the equality of or between; put in the form of an equation
Infatuated to inspire or possess with a foolish or unreasoning passion, as of love
Fetishized to be excessively or irrationally devoted to (an object, activity, etc)
Paradoxically self-contradictory
Epistemic of or relating to knowledge or the conditions for acquiring it
Opacity the state or quality of being opaque - not transparent or translucent
Inter (face) prefix- "between," "among," "in the midst of,""mutually," "reciprocally,"
"together," "during" (interface: a common boundary or interconnection between systems,
equipment, concepts, or human beings)
Passivity inactivity or state of not participating readily or actively

Computer affecting many professions Computer use has had profound impact on
numerous professions.
Medicine
Business and Finance
Science and Engineering
Social Sciences
Sports and Physical Education
Government and Law
Publishing and Communication
Travel
Arts and Fine Arts
Education
business and finance Successes in business depends on provides quality goods at a competitive
price to customers. Computer use has penetrated all business including:
Manufacturing
Finance
Sales
Planning
science and engineering Computers were born from science and engineering and use is
wide spread:
Research
Aviation
Chemistry
social sciences The social sciences involve research, social policy planning, and delivering
services Computers have impacted all areas:
Social Policy
Research
Program delivery
sports and physical education Computers are found in sports and physical education uses that
range from management performance to analysis of athletes.
Records
Sports Management
Numerical analyses
government and law Governments use computer technology to perform law enforcement
activities. Gov'ts also enact laws to protect citizens using computers.
publishing and communication The communication industry's job is to deliver information
to those who desire it. No other industry, except perhaps financial services, is better suited to use
of computer automation.
Custom publishing
24-hour news cycle
WWW
travel The travel industry has changed dramatically due to computing.
Vacation planning
Reservations
Cross-selling
art and fine arts Artists use computers as media as a tool.
Videography
Display
Virtual galleries
Graphic design
Theatre
education Online classes
Access to class material on tools like WebCT, Blackboard, and eCollege.
Online peer reviewed articles available on library sites.
Groupware and collaboration tools.
The computer profession The explosion of computing technology has spawned a whole new
career area called Information Systems or IS. Businesses employ many people as programmers,
system analysts, and as other related professionals. They work in a corporation's IS department.
System analyst Solves computer problems and design the application of computer
technology to meet the needs of an organization. They help to maximum benefits from
investment in equipment, personnel, and business process design. The may plan and develop new
computer systems or devise ways to modify existing systems to meet new requirements. They
are aware of the potential of technology but must also understand the business of the
organization they are working for. The tend to work in domains that use specific types of
systems including: accounting, financial, scientific, or engineering systems. They are not
technical developers, they don't write computer programs, design networks, or develop
databases.
Software engineer Translate the recommendations of the system analyst into designs that are
implemented by a development staff. They establish testing criteria to certify that programs were
written correctly and that completed systems perform as required. While software engineers
usually possess strong programming skills, they are more concerned with designing algorithms,
analyzing and solving programming problems, and testing outcomes than with actually writing
code.
Programmer Writes computer programs in what are called programming languages such as
Java, C#, and Visual Basic. This person must have the ability to take a design specification
prepared by a system analyst or software engineer and implement the concepts as computer
programs.
System administrator The information systems employees responsible for the efficient use of
computers and networks by organizations. Their job is to ensure that an organization's processing
environment is designed with compatible equipment, including computers, the network, and
software that work reliably. They also monitor and adjust the performance of networks and
continually survey the current processing center to determine future network needs. They
troubleshoot problems reported by users and network monitoring systems and recommend fixes
and enhancements.
Computer operator Someone who has to keep the computers running. Responsible for
scheduling processing jobs, mounting tapes and disks on drives, and making sure the printer is
loaded with paper.
Webmaster The person responsible for designing, developing, and maintaining a Web site.
Database designer and administrator (DBA) Has jurisdiction over the organization's data storage
and works with database management systems, and determines ways to organize and store data.
Network administrator (NA) Responsible for making sure that the data gets delivered to the
right people at the right time. The selection, purchase, installation, and maintenance of network
servers, communication gateways, modems, and terminals.
IS Director This person runs a organization IS department. The IS director is responsible for
the IS department's budget hiring and firing of staff, staff development and retention, computer
operations, and negotiating with other senior managers for project selection,financing and
priority.
Chief information officer (CIO) Sits as a senior officer on the strategic decision-making
committees of the company.
Health issues Repetitive stress (or strain) injuries (RSIs)
Computer vision syndrome (CVS)
Low level electromagnetic fields
Psychological stress
Information overload
Isolation
Cyberbullies
Environment
Repetitive Stress Injury (RSI) Repetitive action, often to fingers, wrists, and arms, can create
discomfort or even permament disability.
Carpal Tunnel Syndrome (CTS) pain and weakness in lower arms and hands.
Computer Vision Syndrome (CVS) A frequent computer user's eyes may become irritated,
vision may blur, and they may experience headaches and even exhaustion.
Information overload Having too much information to make a decision or remain informed
about a topic. If not dealt with, Information overload can cause a person to freeze when asked to
make a decision.
Psychological stress A first time computer user may be anxious about making mistakes and
consequences. Lack of sufficient training can lead a user to experience loss of data and
communication messages and produce anxiety.
Isolation Significant correlations between computer-mediated-communication and
loneliness have not been detected. A study as Penn State University found that those who send e-
mail more frequently are more social and even less socially isolated, because the computer is
now being used as an additional means of communicating socially with others.
Work and workspace design Most IS professionals assume responsibility for challenging
assignments, using technology that continues to change. It is quite common for an organization
to provide continuing education programs just so that its staff can remain current.
De-skilling If lower skills are expected then more people are qualified for the job. With more
people qualified, the salary can be lower.
Job losses Technology replacing workers leads to this.
Communication and organizational structure The automation of information flow has changed
the way that people communicate within organizations, and the consequences has been job loss,
this time middle managers. Email and other communication tools make parts of these jobs
unnecessary.
Geography An expert in some aspect of the organization's production process need not be
stationed at each plant or factory. Instead that person can use video conferencing technology,
inexpensively through the Internet, to communication face to face with plant engineers around
the world. Companies are finding that they can reduce the travel expenses of bringing experts to
where they are needed by using communication technology instead.
Telecommuting Commuting to central work place is provided by telecommunication links.
Allows employees to have flexible hours that can often help when the need to care for young
children or elderly parents is involved. The handicapped and people living in remote areas may
also become employable due to telecommunicating. Society benefits, too, as fuel is consumed for
transportation and less pollution is produced. There is a downside. People are social and
telecommunicating breeds business isolation making job advancement more difficult to achieve.
Informal communication is largely lost. Corporations also face the increase risk of data loss and
compromise to data integrity resulting from the loss of direct corporate control over the
telecommuter's physical work environment.
Ergonomics Human factors is the scientific application of information about humans to the
design of objects, systems, and environments that humans use and interact with. This field has
made contributions to the design of computing equipment making use of computers and
peripheral technology more comfortable and less likely to induce strain or injury.
Assistive technology Erogonomics plays an important role in the conceptualization and design
of technology solutions for people with impairments.
Braille keyboard Have Braille symbols on top of each key. The output will be conventional
ASCII characters processed as if from any keyboard
Magnifier People with limited sight can benefit by using screen magnifiers.
Screen reader software This software aides those with hearing impartment by reading
documents, Web pages, or other content and transforming the typed words into synthesized
speech.
JAWS
EYES
Speech recognition Windows provides a way to command using spoken commands instead of
mouse clicks and keyboard strokes. Software that hears and understands human speech is
sophisticated technology.
Social concerns Use of computers is not without societal concerns. Initiatives range from
protecting children from undesirable material and predators, to banning certain materials are
discussed frequently by the public.
Child protection Blocking web sites
Sting operations
Legislation The federal and state governments have enacted child protection laws. Children's
Online Privacy Protection Act of 2000. This act requires a Web site that collects information
from or about children under 13 to publish a privacy policy which parent should read before
allowing access to the Web site. Protection is really only as good as the vigilance of parents and
their determination to teach their children to act responsibly.
Computer addiction There are people who feel the compulsion to spend so much of their time
computing that is causes problems with their health, finances, relationships, and career.
Green computing The study and practice of using resources efficiently and with a world
perspective. Green computing principles take into account these factors:
Economic viability
Social responsibility
Environmental impact
Business concerns Fraud
Computer Crime
Data and Equipment protection
Diasaters and Recovery
Fraud Online fraud rates for merchants are higher than fraud rates of brick and mortar stores.
Fraud rates for transactions where a customer personally presents a credit card are usually about
1 percent of sales but only fraud rates exceed 1.4%
Computer crime Theft of computer resources or use of computer systems while committing
a crime.
Types of computer crimes Computer as the target
Computer as the instrument of the crime
Computer is incidental to other crimes
Crimes associated with the prevalence of computers.
Property rights Generally software remains the property of the author. A staff programmer who
works for a company usually agrees to give ownership to the employer. But the end-user rarely
obtains ownership. When you purchase software, you are really purchasing permission to use the
software, but you don't own it. Since you are not the owner, you may not give copies of it to
anyone.
Data and equipment protection All computers users will want to protect data and
equipment.
Disaster and recovery plan Security is a system of safeguards designed to protect a computer-
bases information system from accidental or deliberate damage or access.

abolish to put an end to something, such as an organization, rule, or custom


attainment the act of achieving something
compelling very exciting and interesting and making you want to watch or listen
concerned worried
devour to eat something eagerly and in large amounts so that nothing is left
downside a disadvantage of a situation
emerge to appear by coming out of something or out from behind something
flatten to stop rising, falling, or changing so quickly, or to make the rate of change slower
forgetfulness the quality of being forgetful (= often forgetting things)
genuine being what something or someone appears or claims to be; real, not false
grit courage and determination despite difficulty
head to go in a particular direction
immersive seeming to surround the audience, player, etc. so that they feel completely
involved in something
omniscient having or seeming to have unlimited knowledge
outline to give the main facts about something
pie-in-the-sky something that you hope will happen but is very unlikely to happen
readily quickly, immediately, willingly, or without any problem
supposedly used to show that you do not believe that something you have been told is true
tedious boring
tiresome annoying and making you lose patience

source card 1
"How Technology Has Changed Our Lives in the Last Five Years." - The Center of Technology.
N.p., n.d. Web. 29 Sept. 2014. http://www.centertech.org/
source card 2
"PBS LearningMedia." Technology Over Time. N.p., n.d. Web. 30 Sept. 2014.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
source card 3
"Top 12 Ways Technology Changed Learning." TeachHUB. N.p., n.d. Web. 02 Oct. 2014.
http://www.teachhub.com/how-technology-changed-learning
source card 2
"HowStuffWorks "How Has Technology Changed the Way We Conduct Business?""
HowStuffWorks. N.p., n.d. Web. 02 Oct. 2014.
http://money.howstuffworks.com/technology-changed-business.htm
source card 5
"How Technology in Schools Has Changed Over the Years." - EdTechReview™ (ETR). N.p.,
n.d. Web. 02 Oct. 2014. http://edtechreview.in/e-learning/386-change-in-school-technology
source card 6
"The World Economy and Technological Change." Global. N.p., n.d. Web. 02 Oct. 2014.
http://www.foreignaffairs.com/articles/42799/w-michael-blumenthal/the-world-economy-
and-technological-change
source card 7
"8 Ways the World Has Changed Since Obama's Election." Foreign Policy. N.p., n.d. Web. 02
Oct. 2014.
http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_sinc
e_obamas_election
source card 8
"Modern Technology Is Changing the Way Our Brains Work, Says Neuroscientist." Mail Online.
Associated Newspapers, n.d. Web. 02 Oct. 2014.
http://www.dailymail.co.uk/sciencetech/article-565207/Modern-technology-changing-
way-brains-work-says-neuroscientist.html
source card 9
"How Technology Is Affecting Our Lives." How Technology Is Affecting Our Lives. N.p., n.d.
Web. 03 Oct. 2014.
http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_affe
cting_our_lives.html
note card 1
How technology changed:In the last five years technology is growing and expanding worldwide
in just about every field and everywhere. Many people think technology is at its limit but what
those people don't know is that technology is rapidly changing. http://www.centertech.org/
source card 10
Carlson, W. Bernard. "Technology." World Book Advanced. World Book, 2014. Web. 7 Oct.
2014.
http://www.worldbookonline.com/advanced/article?id=ar549400&st=modern+technolog
y
note card 1a
Technology has changed everything that the nations do and how they function.
http://www.centertech.org/
note card 2
Technology has been changing and evolving over time. It has been changing since the 19th
century and is continuesly changing. It has made life easier and better.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
note card 2a
Its been changing over time and still changing today.
http://www.pbslearningmedia.org/resource/ate10.sci.engin.design.techovertime/technolog
y-over-time/
note card 3
Technology changed how we learn by developing devices we use in school. (Computers,ebooks)
...
note card 3a
Technology changed how we do homework and projects. It changed how we take notes. We can
just pull up memopad,notes,word to type them up. ...
note card 4
Technology has changed the way we do business. Now the business people can take work on the
go just about anywhere. ... http://money.howstuffworks.com/technology-changed-
business.htm
note card 4a
Technology changed the way busniess communicate and speed up the pace.Instead of having to
to be face to face with you boss or another company they can easily email you. ...
http://money.howstuffworks.com/technology-changed-business.htm
note card 5
Technology in school has been changing since the 18th century. From the one-room to almost all
the kids under 18 have a mobile device. ...
note card 6
How technology changed the economy and global. ...
note card 6a ...
note card 7
Technology is helping Obama reach out to people. Telling people what is going on with things
within the government.
...http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_si
nce_obamas_election
note card 7a
Obama is reaching out to people with healthcare benefits etc. He is making it so people can
afford it.
...http://www.foreignpolicy.com/articles/2012/11/06/8_ways_the_world_has_changed_si
nce_obamas_election
note card 8
Technology is changing the way we function. The way we behave, and adjusting the capacity of
reaching our full potential. ...http://www.dailymail.co.uk/sciencetech/article-565207/Modern-
technology-changing-way-brains-work-says-neuroscientist.html
note card 8a
Our brain is under threat from the modern day. Unless we see and look at how much technology
is actually doing to this world. ...http://www.dailymail.co.uk/sciencetech/article-
565207/Modern-technology-changing-way-brains-work-says-neuroscientist.html
note card 9
Technology is constantly changing our lives and the way we do things. Technology has made it
so we base everything off of it. Technology is needed to do every thing possible.
...http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_af
fecting_our_lives.html
note card 9a
It has made the people very lazy. They rely on technology to do everything for them.
...http://www.streetdirectory.com/travel_guide/159550/technology/how_technology_is_af
fecting_our_lives.html
note card 10
The way we communicate to others has changed from letters to emails and texts. ...how-
technology-has-changed-workplace-communication
note card 10a
Technology now lets us see the people through video chatting. ...how-technology-has-
changed-workplace-communication
note card 11
Technology has changed the way we socialize with people. (Facebook, MySpace, Instagram,
twitter) http://webseo22.hubpages.com/hub/How-Social-Media-Has-Changed-the-World-Impact-
of-Social-Media-on-Our-Lives
"How Social Media Has Changed the World? 5 Impacts of Social Media on Our Lives."
HubPages. N.p., n.d. Web. 08 Oct. 2014.
note card 11a
Technology has made socializing addicting to the people who use it. It has become were people
use the internet almost 24 hours. http://webseo22.hubpages.com/hub/How-Social-Media-
Has-Changed-the-World-Impact-of-Social-Media-on-Our-Lives
"How Social Media Has Changed the World? 5 Impacts of Social Media on Our Lives."
HubPages. N.p., n.d. Web. 08 Oct. 2014.
note card 12
Technology is remaking society. Society is changing all around us. Its changing for the good and
the bad. http://www.businessinsider.com/15-ways-tech-is-reinventing-society-2013-
4?op=1
Dickey, Megan Rose. "15 Ways Technology Is Reinventing Society." Business Insider. Business
Insider, Inc, 28 Apr. 2013. Web. 07 Oct. 2014.
note card 12a
Its changing the way our cars are, there driving themselves. Its helping people become more fit
and healthier. ...http://www.businessinsider.com/15-ways-tech-is-reinventing-society-2013-
4?op=1
Dickey, Megan Rose. "15 Ways Technology Is Reinventing Society." Business Insider. Business
Insider, Inc, 28 Apr. 2013. Web. 07 Oct. 2014.
note card 13
How technology changed politics. The radios and the TV's have changed the viewers vote due to
the campaign and the details told. http://whichwaync.com/2012/10/08/qa-technology-on-the-
campaign-trail/
"Q&A: Technology on the Campaign Trail | WhichWayNC." WhichWayNC. N.p., n.d. Web. 09
Oct. 2014.
note card 13a
They change the mind of the viewers because some people listen to every word that the TVs tell
them to do. The social media and network help raise money for the candidates.
http://whichwaync.com/2012/10/08/qa-technology-on-the-campaign-trail/
"Q&A: Technology on the Campaign Trail | WhichWayNC." WhichWayNC. N.p., n.d. Web. 09
Oct. 2014.
note card 14
Technology has changed medicine. It help reaching patients. It improves the patients care and
health. http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 14a
It gives the patient better treatments without having to suffer with the pain. It has saved many
lives and increased the chance of recovering for some people.
http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 14b
It helps the doctors be more efficient with their jobs and easier to get in touch with. Doctors can
see medical textbooks on their device to answer and check people out.
...http://www.businessinsider.com/6-ways-technology-is-improving-healthcare-2010-
12?op=1
Krueger, Alyson. "6 Ways Technology Is Improving Healthcare." Business Insider. Business
Insider, Inc, 20 Dec. 2010. Web. 08 Oct. 2014.
note card 15
Technology disadvantages: Technology's disadvantages include addiction to what ever device it
may be. A lot of people become addicted to technology. People can lose jobs and be replaced by
machines. ...http://www.slideshare.net/elivar92/technological-advantages
"Technological Advantages." Technological Advantages. N.p., n.d. Web. 09 Oct. 2014.
note card 15a
Technology advantages: Technology's advantages include communication. Technology made
communicating with other easier and quicker with the tap of a button.
...http://www.slideshare.net/elivar92/technological-advantages
"Technological Advantages." Technological Advantages. N.p., n.d. Web. 09 Oct. 2014.
note card 16
Technology changed the way the military strategies, help win the battles, and wars.
...http://science.howstuffworks.com/10-game-changing-technologies.htm
note card 16a
The military have learned were the enemy were. It helped the military become quicker and
stronger. ...http://science.howstuffworks.com/10-game-changing-technologies.htm
note card 17
Technology is making it easier to find jobs. They can now apply for a job in the comfort of their
home. ...http://www.huffingtonpost.com/josh-tolan/4-ways-technology-is-chan_b_2736375.html
note card 17a
It helps find people more qualified people for the job.
...http://www.huffingtonpost.com/josh-tolan/4-ways-technology-is-chan_b_2736375.html
note card 18
Farming has changed a lot due to the new upgrades in tools. It helps farming be a lot easier.
...http://www.significancemagazine.org/details/webexclusive/2198651/The-Rural-
Revolution-How-technology-has-changed-farming.html
note card 18a
It helps the farmers finish their work faster with the new tools. It helps keep their lands nutrient
and fertile. ...http://www.significancemagazine.org/details/webexclusive/2198651/The-Rural-
Revolution-How-technology-has-changed-farming.html
note card 19
Technology changed the way people view art. Now people can look it up on their mobile device
and see how it looks. ...http://www.theverge.com/2014/7/3/5867225/digital-revolution-barbican-
london-exhibition-photo-essay
note card 19a
People can make art on their device whenever they feel inspired.
...http://www.theverge.com/2014/7/3/5867225/digital-revolution-barbican-london-
exhibition-photo-essay
note card 20
Technology has made business post a lot of ads everywhere. They are trying to catch the peoples
eye and the way to do that is through technology. ...http://www.directcreative.com/how-
technology-has-changed-creativity-in-the-ad-business.html
note card 20a
Technology has made so many ad that people tune out. People have started seeing ads as just any
other commercial ...http://www.directcreative.com/how-technology-has-changed-creativity-
in-the-ad-business.html
note card 21
Technology has helped polices train. It helps them communicate with the main base to know
were the crime is. ...http://criminologycareers.about.com/od/Career_Trends/a/Technologies-
That-Are-Changing-the-Way-Police-Do-Business.htm
note card 21a
Technology helps train the dogs that the polices have.To train them and let their boss see how it's
going. ...
note card 22
Technology has changed the way we see sports. Instead of listening to it on the radio we now
watch the game on our tablets,phones,laptops,and TV's.
...http://www.therichest.com/sports/top-10-ways-technology-has-changed-
sports/?view=all
"Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22a
Technology has made altheletes,teams,and the owners wealthy. It gave them more publicity.
..."Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct.
2014.
note card 22b
Technology has made nit so the owners of the team can find new talent for their teams. It helps
find the people with talent and people with the least. ..."Top 10 Ways Technology Has Changed
Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22c
Technology has made altheles connected with their fans. The fans can tweet them or inbox them.
They can tell them how they feel about the game. ..."Top 10 Ways Technology Has Changed
Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22d
Technology allowes althelets to help themselves. They can get better by watching themselves
play or watching other people play. "Top 10 Ways Technology Has Changed Sports."
TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22e
Technology has helped the althelets and managers keep up with the points that where scored by
each player. Who scored the most points are all online. "Top 10 Ways Technology Has
Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22f
Technology made it here you can tune into the game from the comfort of your own home. You
can watch it on espn and hear what thee reporters and viewers are all saying. "Top 10 Ways
Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct. 2014.
note card 22g
Technology has helped the people who are addicted to watching sports able to watch the games
andy part of the game at any time. They can view it from a worldwide site and see the differnt
games. "Top 10 Ways Technology Has Changed Sports." TheRichest. N.p., n.d. Web. 09 Oct.
2014.
note card 22h
Technology lets people bet online. People bet on the team that they think will win. they put their
money where they trust is . Sometimes people are forced to bet on a team for big money ...
note card 22i
Technology has changed how the sports are viewed.They are seen scheduled on demand. ...
note card 22j
People dont always wanna go to the game and go therer sometimes they want it to come to
them. ...
note card 22k
People may feel like that they should be able to interact with their favorite player and with
facebook and twitter they can ...
note card 22i
Technology has made it so games are accessable at any time of the day. ...
note card 22m
technically this will likely run afoul of local ordinances, very few cases of underage gambling
have been brought to trial, ...
note card 22n
Technology has made it so they know their expectations for whos going to the playoffs and or
the finals. ...
note card 22o
Technology helps people see the highlights of the games. Maybe even the sponsores. ...
note card 22p
Technology has helped with so many things in the world but it has helped sports more than
anything in the world. ...
note card 22q
Technoloy has made it so that its viewable anywhere at any time of the day. Even when you may
be bored. ...
note card 23
Technology has destoyed the relationship with nature. its all about technology now.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/
note card 23a
Kids choose technology over nature everyday. Now kids don't like going outside.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/
note card 23b
Technology has helped make parks. Kids don't go to them very often cause of the way their
lifestyle. ...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-
knowledge/
note card 23c
Technology has torned down many trees and forest to make restaraunts,and many other
businesses. ...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-
knowledge/
note card 23d
Many people don't know is that by making more pollutions and not going to play and have fun
outside that nature is starting to take a turn for the worst. Business owners will start taking
wildlifes homes and making them find another only for that home to get detroyed.
...http://www.tonybates.ca/2009/03/12/does-technology-change-the-nature-of-knowledge/

Technology _____________today is not just a means for career advancement or merely a skill
set needed to survive in society. It's a tool that enables us all to make an impact beyond our own
lives. Technology can be your ticket to doing just that, to influencing and participating in
projects that will change the world. Your talents and skills in technology will let you contribute
on a larger scale, beyond personal benefits.
Technology Recent political and global issues are showing that _____________ is accelerating
change around the world and galvanizing groups of people in new ways.
Social networking tools ___________ ____________ __________ like Facebook and
Twitter enable the gathering together of groups of people to connect and exchange ideas. They
have brought together people facing repression and censorship in many countries in the Arab and
North African regions.
Crisis-mapping tools _________ __________ ___________ helped to share messages
describing violence occurring all over Kenya after a disputed election. They collect and map
information.
Health care and the Environment Technology could help improve _______ ______ and the
____________.
Technology Researchers say there is a nearly 100 percent chance of a flu pandemic in the next
century. ____________ could help us develop and deliver vaccines to save lives.
Retinal prosthetics are another example of global health concerns being addressed with
technology.
Environment Tagged with geographical information, the data could alert scientists to new
trends in our ___________.
Digital Divide.There is a great gap in the levels of Internet access and the availability of
technical tools in different regions of the world. The term coined for this difference in ease of
access to technology is the ___________ __________. One danger of a digital divide is that it
prevents us from using all the minds on the planet to solve the planet's problems. But this
challenge created by technology is also being answered by technology.
Web 2.0 As more web applications appeared that allowed everyone to become a "creator"
of the web, a new kind of Internet came into being. Nicknamed _____ _______, it had a set of
new features and functionality that allowed users to contribute content easily and to be easily
connected to each other. Now everyone could collaborate internationally at the click of a mouse.
Cognitive surplus _______________ __________ is the combination of leisure time and the
tools to be creative.
Autonomy, mastery, and purpose. Modern theories of motivation show that what pushes
people to apply their free time in altruistic causes, for no money, is the excitement of
__________, _____________, and ____________.
Autonomy __________ the freedom to work without constant direction and control.
Mastery _____________ the feeling of confidence and excitement from seeing your own
skills progress.
Purpose _____________ the understanding that you are working for something larger than
yourself.
Technology _____________ has added breadth to music. The first piece from the Virtual
Choir was released with 50 recorded voices. A blog connects the members and builds a real
sense of community between them.
Crowdfunding Kickstarter helps us connect by allowing people to post their ideas for community
projects, games, and inventions and to ask for funding directly. This style of generating capital to
start businesses is known as ____________.
Technology _______________ is changing how to decide what to purchase and how we
actually purchase goods and services.
Crowdsourcing QR (quick response) codes link to online information and video content.

Apps scan the bar code of an item and compare prices with nearby stores and online prices.

Tech-savvy shoppers get mobile coupons delivered to their cell phones (mobicoupons).

Marketers are aware of the phenomenon of __________________ (checking in with the voice of
the crowd.)
Access vs. ownership Even the idea of ownership is evolving thanks to new technologies. Items
like cars and bicycles can become "subscriptions" instead of large one-time purchases.
ZipCar _____________allows hundreds of thousands of people to use shared cars, and Call a
Bike is a popular bike-sharing program in Germany.
Collaborative consumption ____________ _____________ implies that we are joining
together as a group to use a specific product more efficiently.
Computer-literate Being _____________ ______________ means being familiar enough
with computers that you understand their capabilities and limitations and that you know how to
use them safely and efficiently.
Being Computer Literate Being _______ ____________means you can...
Avoid falling prey to hackers and viruses because you are aware of how they operate, you know
how to protect yourself from identity theft, you can separate the real privacy and security risks
from things you don't have to worry about, you know how to find information and use the web
effectively, you can avoid being overwhelmed by spam, adware, and spyware, and you know
how to diagnose and fix problems with your hardware and software.
True Being aware of how hackers and viruses operate can help you avoid falling prey to them.
Do you know how to protect yourself from identity theft when you're online?
Can you recognize real privacy and security risks?
Finding information and finding good information are two different things.
Do you know what programs to install to avoid online annoyances?
Caring for, maintaining, and knowing how to diagnose and fix problems can save you time and
hassle.
Information technology (IT) _______________ _________________ is a field of study focused
on the management and processing of information and the automatic retrieval of information.
One of the benefits of being computer literate is that you will be able to perform your job more
effectively. It also will make you more desirable as an employee. Your understanding of key
concepts in technology can "future-proof" you, letting you easily and quickly react to the next
round of new technologies.
Data mining Businesses use a technique known as _________ _________, the process of
searching huge amounts of data with the hope of finding a pattern. Managers can use mined data
to determine that if a certain product is to sell well, they must lower its price—especially if they
cut the price at one store and see sales increase, for example. This allows retailers to respond to
consumer buying patterns.
Artists Many ________ today work with computers. Mastery of software programs is essential
to creating digital art.
Artists may need to showcase their designs. It is helpful to know how to create and manage a
website.
Dance and music programs use computers. Sensors capture a dancer's movements. The computer
then generates a virtual dancer which the operator can manipulate.
Museums use technology to enhance visitors' experiences. Museums offer a full range of options
for tech-savvy visitors.
Computer technology The education industry uses ____________ ___________. Courses are
designed around course management software such as Blackboard and Moodle.
The Internet has advantages in the classroom as a research tool for students.
There are simulations and instructional software programs teachers can use to give students a
taste of running a global business or the experience of the Interactive Body.
Many museums offer virtual tours on their websites that allow students to examine the museum
collections.
Computer forensics Computers are being used in police cars and crime labs to solve an
increasing number of crimes.
One technique used by modern detectives to solve crimes uses computers to search the vast
number of databases on the Internet.
A law enforcement specialty called ___________ ___________ is growing in importance in
order to fight modern crime. Computer forensics analyzes computer systems with specific
techniques to gather potential legal evidence.
VeriMed The goals of modern biomedical chip research are to provide technological
solutions to physical problems and for identifying individuals.
_________, a "personal ID chip," is being implanted in humans as a means of verifying a
person's identity. When exposed to radio waves, it emits a signal that transmits its unique serial
number to a scanner, which connects to a database.
This might be used to keep Alzheimer's patients safe.
True Simulations model the structure of solar magnetic flares. By studying the data, forecasters
hope to improve their predictions about weather phenomena.
Scientists use three-dimensional scanners and imaging software to capture a detailed record of
the condition of ancient ruins. The virtual re-creation is very lifelike. Archaeologists study the
ruins on-screen instead of at the actual site.
MACH (My Automated Conversation CoacH) Researchers have developed a system to
help improve interpersonal skills for people with autism. _________________ is a computer
system that generates an on-screen person that can conduct a job interview or appear ready for a
first date.
Effective computing is computing that can recognize and simulate human emotions. Engineers
work to create computers that process data faster. Psychologists and computer scientists are
working toward a more complete understanding of human behavior.
Affective Computing A type of computing that relates to emotion or that deliberately tries to
influence emotion.
Augmentative Reality (AR) A combination of our normal sense of the objects around us with
an overlay of information displayed.
Big Data Very large data sets that are analyzed to reveal patterns, trends, and associations.
Software The set of computer programs or instructions that tells the computer what to do
and that enables it to perform different tasks.
Spam Unwanted or junk e-mail.
Virtual Reality (VR) Instead of adding information to the reality you perceive, __________
___________ replaces it with a different world. It creates an artificial environment that is
immersive and interactive.
How Computers
are Changing
Who We Are
GROUP 6
Donato, Ross Bradley
Elbo, Gerard Munchen
Pua, Gian Kyle
Salak, Angelo Luis
Serrano, Ariel John
TABLE OF CONTENT

CASE CASE
01 02
KRATOS AND POSEIDON’ S
VIRTUAL TWO-TIMING
PRINCESS

03 CASES 04 CASE
● A HEALTH WARNING FOR FASHION SOCIAL NETWORK
PHOTOS ANALYSIS
● MULTIPLE ONLINE PERSONAS
● GRIEFER MADNESS: BEHAVIOR ON
THE INTERNET GRIEFER
● VIRTUAL AND ONLINE ADDICTIONS
TABLE OF CONTENT

CASE CASE
05 06
DIVERSE PERSPECTIVES:
HOW THE INTERNET RACE IN VIDEO GAMES

08 CASE
OUR CYBERNETIC
FUTURE
INTRODUCTION
INTRODUCTION

Having read the first five chapters of the


book, you are most likely comfortable with
the idea that computing in general, and the
Internet in particular, have radically
changed our social institutions. We have
seen how advances in computer technology
have eroded the twentieth-century
conception of privacy and changed the way
we think of property. We have also seen the
tremendous harm that software can inflict,
with evidence that safety issues in software
are taken less seriously than safety issues in
physical products.
01
CASE 1: KRATOS AND POSEIDON’S PRINCESS
Questionable In-Game Decisions
What is God of War?

In the very successful God of War series of video-games, the player


controls a Spartan warrior named Kratos on a mission of revenge
against the Greek gods.
What is God of War?

Kratos displays many of the symptoms of


dissocial personality disorder, which, according
to the World Health Organization, is
characterized by:

… disregard for social obligations, and callous


unconcern for the feelings of others.…. There is
a low tolerance to frustration and a low
threshold for discharge of aggression, including
violence; there is a tendency to blame others…
(ICD-10, 204)
Actual Gameplay

Fluid and fast paced combat, God of War excels in this area of
gameplay.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS

Jamal is the father of two boys, one 17 and one 14. He enjoys playing
video games with his sons, but he usually plays through the games
himself, first, to make sure that they are suitable for his kids to play.

Jamal is generally not concerned with cartoonish violence in games,


or even the semi-realistic violence in games where there are clear good
guys and bad guys, or in situations that are clearly self-defense or
otherwise morally justified by the story
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS

The solution to this puzzle is to “rescue” the Princess from a room


where she is trapped, and then push her into the crank mechanism. As
Kratos walks towards the door, the Princess begs for mercy, but Kratos
ignores her.

As Kratos continues towards the door, the player hears the Princess
begin to scream, and then the gruesome sounds of the princess being
crushed by the mechanism.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS

Jamal finds himself disturbed by this scene, and spends some time
looking for alternate solutions to the puzzle, but there are none. The
player cannot complete the game without pushing Poseidon’s Princess
into the crank.
CASE 6.1: KRATOS AND POSEIDON’S PRINCESS
Reflection Question:

Based on this description of Kratos’s behavior, do you agree that Kratos (if
he were real) should be diagnosed with dissocial personality disorder?

Jamal felt disturbed by the Poseidon’s Princess scene. Does that mean that
he is more moral than someone who was not disturbed by the scene? Would
you consider him to be more moral than someone who actually enjoyed the
scene?

In Section 1.4.4, we discussed Aristotle’s idea that we become virtuous by


mimicking and repeating virtuous acts. Explain why Aristotle might argue
that Jamal should not let his sons play this game

In Section 1.4.6 we presented Kant’s “principle of the end in itself.” If the


player does, as the game requires, sacrifice the Princess, is the player
violating Kant’s principle? In particular, does it matter that the Princess is
not a real person, but simply a computer construct?
02
CASE : VIRTUAL TWO-TIMING
TWO-TIMING IS BAD WHATEVER THE CONTEXT
6.2 CASE: VIRTUAL TWO-TIMING

Mitch and Meghan have been close friends since junior high. They
attend the same college, but they rarely see each other because they
are pursuing different majors.

Last year, Meghan started dating Erik, who is in many of Mitch’s classes.
Mitch discovered that he and Erik share an interest in massively
multiplayer online games and they’ve recently started teaming up in one
game.
CASE: VIRTUAL TWO-TIMING

Erik is part of an online guild, a group of players with whom he regularly meets to
work on challenging parts of the game.

A month or two after Mitch joined the guild, he started to notice that Erik spent the
majority of his time in the game teaming up with a female guild member named
Raquel.
6.2 CASE: VIRTUAL TWO-TIMING

Mitch did not think much of it until Valentine’s Day. On Valentines Day the game
has a special event that allows players to wear a sash that says “—’s
Sweetheart.” Erik’s character was wearing a sash that said “Raquel’s
Sweetheart” and Raquel was wearing one that read “Erik’s Sweetheart.”

Mitch started to worry about his friend Meghan. Was Erik cheating on her with
Raquel? Mitch confronted Erik about this, but Erik’s position was that he was
not doing anything wrong.
6.2 CASE: VIRTUAL TWO-TIMING

His reasoning was that:

● They were playing a role-playing game. Raquel and Erik were only
pretending to be boyfriend/girlfriend. Even though they were emotionally
very close, and spent a lot of time together online, the boyfriend/girlfriend
relationship was just part of the game.

● Raquel and Erik have never physically met, so they cannot really be
considered boyfriend/girlfriend anyway.

● Because Meghan does not care about or understand online games, it is


best not to tell her about Raquel; she will misinterpret the relationship.
6.2 CASE: VIRTUAL TWO-TIMING

Reflection Question:

Was Mitch right to approach Erik, and question him about his relationships? If
possible, use one of the moral theories from Chapter 1 to support your position.

Is it possible to cheat on a boyfriend/girlfriend with someone you have never met


face to face? Name some behavior that does not occur face to face that would be
evidence that a person was being unfaithful to his/her significant other.

Does it matter that the role-playing game that Erik and Raquel are playing is online?
Would your assessment of the situation
02
CASE 3: THE INTERNET AND THE SELF
Ourselves in the virtual world.
6.3 THE INTERNET AND THE SELF

You probably have an intuitive idea of what we mean when we say “my self,” but in the
rest of this chapter it is important for us to distinguish between the terms self and
self-concept. The Blackwell Dictionary of Sociology (by writer and activist Allan
Johnson) defines these terms:

From a classical sociological perspective, the self is a relatively stable set of perceptions of who we
are in relation to ourselves, to OTHERS, and to SOCIAL SYSTEMS. The self is organized around a
self-concept, the ideas and feelings that we have about ourselves.

Our self-concept greatly shapes our behavior and affects our interactions with
others. In this section we will examine some ways that Internet technologies,
especially social networking and virtual worlds, are reshaping our concepts of
ourselves.
6.3 CASE 1: A Health Warning For Fashion Photos
In October 2009, a series of advertisements for Ralph Lauren’s “Blue Label” line of clothing brought
new scrutiny to the use of digital image manipulation in fashion photographs. A picture of model
Filippa Hamilton was modified to make her appear even skinnier than she is in real life, so skinny that
bloggers took notice and started circulating (and mocking) the image. Most assumed that posting the
image would be a fair use, under copyright law, because they were posting it for the purposes of news
reporting and commentary

There is a growing movement, particularly among English and French health agencies, to regulate the
use of digital image manipulation to modify images that are meant to be realistic. Sophie Hardach, a
reporter for Reuters, reported that the French government is considering requiring “health warning”
disclaimers on heavily modified photographs. Hardach states that

Under the proposed law, all enhanced photos would be accompanied by a line saying: “Photograph retouched to modify
the physical appearance of a person.”

The approach in Britain is slightly different. In the summer of 2011, the British Advertising Standards Authority banned
two cosmetics ads because it ruled that the manipulation of the images made them misleading. This ruling did not
specifically address the question of how these images affect self-concept, but the lawmaker who filed the complaints
about the ads, Member of Parliament Jo Swinson, was clearly motivated by this concern.

In discussing the case with reporters for the Daily Mail, she cited her concern about how “these idealized images are
distorting our ideas of beauty.” (Poulter)
6.3 CASE 1: A Health Warning For Fashion Photos
Reflection Question:
Do you agree with the proposed French law? Should the United States enact a similar
law? Explain your reasoning.

It has always been possible to modify photographs. Before digital image manipulation,
it was common to airbrush photographs to remove wrinkles or spots. (An airbrush is a
spray-painting device that gives the artist a very high degree of control.) Why do you
think people are more concerned about digital image manipulation than they are about
airbrushing?

Fashion photographers are not the only ones using digital image manipulation.
Newsweek used it on the cover of its March 7, 2005 issue to make Martha Stewart look
thin. Paris Match, a celebrity tabloid, removed the love handles of French President
Nicolas Sarkozy in the August 9, 2007 issue. Of these three uses of digital image
manipulation (the Ralph Lauren ad and the two mentioned here), which is the most
ethically troubling, and why? Which is the least ethically troubling, and why?
6.3 CASE 2: Multiple Online Personas

Author and editor Chris Gonsalves writes about technology for business audiences.
He introduces the idea of online personas by discussing several different online
personas with whom an advertiser or business person might want to interact:

● Bill on Facebook.com and Fark.com—A professional in his 40s who should be approached in a
professional way.

● TrakBurner115 on CarSpace.com—A potential car buyer who focuses on a car’s performance


specifications when deciding whether or not to buy one.

● NecroticOne1 on MySpace.com—A music fan who likes heavy metal music, as well as clothing
and jewelry that promote his favorite bands; he is inclined to buy things that make him feel
unique and noticeable

He concludes: [These online personas] all have traits and desires unique to their online
personalities. They all communicate in ways specific to their virtual environments, ways businesses
need to understand to reach all of them. The difficulty? They’re all the same person
6.3 CASE 2: Multiple Online Personas

Gonsalves and others have argued that it is counter-productive to think of people as


having “true selves” or “true personas” that explain all of their actions, all of their likes and
dislikes. Adam Sarner, an analyst for the technology consulting company Gartner Group,
says that businesses should “Sell to the persona, not the person. A persona will show you
how it wants to be treated.” (Pettey)

In other words, how a person acts and what he or she likes is shaped by context. For
example, how you act at the office will be different from how you act on a business trip, at
the doctor’s office, or at a baseball game. Though Gonsalves and Sarner clearly recognize
that this segmentation of the self into multiple personas predates the Internet, they
believe that Internet technologies are causing the typical person to adopt a much greater
number and variety of personas. In the 1980s and 1990s, it was common to talk about the
“work/life balance,” which implied that most people had two main personas, an “at work”
persona and an “at home” persona.
6.3 CASE 2: Multiple Online Personas

Reflection Question:
Make a list of your personas, along with a brief description of the context in which each persona
becomes active. It might be helpful to give each persona a descriptive name (for example, “The Rule
Enforcer” or “The Social Butterfly”), so that you can refer to them later.

Do your personas share a common set of values, or are there conflicts between them?

Do you think that having multiple personas with conflicting systems of values is inherently immoral?
Explain your reasoning.

How many of your personas depend on the Internet for their existence? In other words, if there were
no cell phones, Facebook, Twitter, text messaging, and so on, which personas would still be
applicable? Explain your reasoning.

Reflect back on our discussions of professional ethics in Chapter 2. Explain why it might be
necessary for a person to have multiple personas with conflicting systems of values in order to do
certain jobs. Give at least one example of such a profession, and explain your thinking.
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet

Griefers are one example of a new type of creature who lives on the Internet and finds its entertainment in
hassling others. Another example is a troll, a user who posts in a public forum or chat room, with the goal
of either subverting the conversation or otherwise provoking an emotional response. A third type is the
cyberbully, or cyberstalker, who uses the Internet to harass a particular target, often using fake identities
or public Web sites to enable the harassment

What makes cybersociopathy (that is, sociopathic behavior specific to the Internet) particularly troubling
is that the Internet seems to be making these behaviors easier. The Internet allows trolls and griefers to
find like-minded people. Banding together gives them a shared sense of purpose, and they receive
positive feedback and attention for their exploits. The Internet makes it much easier for cyberstalkers to
invade another’s privacy and to mask their 202 CHAPTER 6 Copyright 2012 Cengage Learning. All Rights
Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some
third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed
that any suppressed content does not materially affect the overall learning experience. Cengage Learning
reserves the right to remove additional content at any time if subsequent rights restrictions require it.
own identities. The following examples of griefer, troll, and cyberbully behavior may be helpful in
understanding the issue:
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet
Cyberbullying— A Long Island woman was charged with aggravated harassment after she posted an ad offering sexual
services on Craigslist, giving the name and phone number of one of her daughter’s rivals. The girl targeted was nine years old. This
resulted in more than twenty harassing phone calls to the girl’s home. In another case, a woman from Santa Ana reported that her
ex-boyfriend and sister-in-law were sending her threatening text messages, and had them arrested. It turned out, however, that
she had impersonated her sister-in-law to purchase the phone, and was using it to send harassing messages to herself, in an
attempt to frame her ex-boyfriend and sister-in-law.

Griefing— In EVE Online, an online role-playing game, the most powerful spaceship is called a Titan. Making a Titan costs the
equivalent of about $10,000 US dollars, so there are very few of them in existence. The GoonFleet, a team of self-described
griefers, organized an attack that focused on finding and destroying the first Titan. Describing the attack to Dibbell, GoonFleet’s
leader said, “The ability to inflict that huge amount of actual, real-life damage on someone is amazingly satisfying.… The way that
you win in EVE is you basically make life so miserable for someone else that they actually quit the game and don’t come back.”
Although griefing seems less worrisome than cyberharassment, developers of online games and services take it very seriously.
Griefers tend to drive away current customers and ruin a new customer’s first impression of a service. Linden Lab (creators of the
Second Life virtual world) often deploys friendly greeters to parts of the world intended for new players, much like Walmart places
friendly greeters at the entrances to their stores

Trolling— There are many sites on the Internet where users can post questions, which are then answered by other users on the
site. It is fairly common for trolls to respond to these questions with bad advice. For example, a user might ask how to save a file in
a particular photo-editing program. A troll might tell them to “press Ctrl+Alt+Delete” (which reboots the computer) or “press Alt+F4”
(which closes the current window, possibly losing unsaved work)
6.3 CASE 3: Griefer Madness: Sociopathic Behavior on the
Internet

1. Consider the activities and statements of griefers presented here. Do you think that they are
“sociopathic” in the general sense? Explain your reasoning.

2. Based on the described activities and statements of griefers presented here, which of the seven
DSM-IV criteria do griefers definitely violate, definitely not violate, or probably violate? For each one,
explain your reasoning in a sentence or two.

3. In the diagnostic criteria for antisocial personality disorder, criteria 4 and 5 seem to focus on
physical acts of violence. Should they be broadened to include nonphysical harms? Explain your
reasoning.

4. Is griefing in online games morally wrong? Use one of the ethical theories from Chapter 1 to
explain your answer.

5. Do you think the existence of Internet forums, social networks, and multiplayer online games is
causing people to develop sociopathic tendencies, when they might not have otherwise? Give
evidence and explain your reasoning
6.3 CASE 4: Virtual and Online Addictions
In the previous section we discussed two definitions of an antisocial personality
disorder, a mental disorder that seems to be encouraged by the Internet. In that case,
the mental disorders we studied are widely recognized, and the controversy revolves
around whether or not griefers, trolls, and cyberbullies meet the diagnostic criteria for
those disorders. In this section we look at a more controversial topic, behavioral
addiction. By behavioral addiction we mean addiction to certain online behaviors like
gambling, video games, internet surfing, sex, extreme sports, and so on

The proposed criteria for sex addiction, and the existing criteria for drug addiction, are
very similar to the criteria, with the word “gambling” removed and replaced with “sex” or
“substance use,” respectively.

Currently, the American Psychological Association (APA) is not proposing to add


“Internet addiction” or “video game addiction” to the DSM. This is because there is not
yet enough scientific evidence to show that these negative behaviors result from
psychological processes similar to the other addictions. Many psychologists and lay
people have already been using these terms, however, because the outward behaviors
do seem similar to other addictions. Is it really true that video gaming can become an
addiction? We do not know the answer to this question, but by applying the proposed
DSM-5 diagnostic criteria for gambling (in a form modified for video games) we can see
whether or not it is at least plausible that video gaming addiction is real.
6.3 CASE 4: Virtual and Online Addictions

The Case of Gacha Games:


6.3 CASE 4: Virtual and Online Addictions
Reflection Questions:
The nine criteria we suggested for our proposed “multiplayer online game disorder” make sense only
if the behaviors actually occur in real life. Search the Internet for recent media reports about
“gaming addiction” (there are many of these). Use these stories to provide evidence of whether or
not there are actually people who meet the nine criteria. You may also find it helpful to interview
friends who are game players to find evidence.

Write the best argument you can that there is no such thing as video game addiction.

Look at your argument for the previous question. Would the argument apply equally well to showing
that there is no such thing as gambling addiction? If so, explain whether or not you believe in
gambling addiction, and why. If not, explain the key differences between gaming addiction and
gambling addiction that cause your argument to not apply to gambling.

Psychologists treat compulsive behaviors differently from addictive behaviors. Some people seem
to be addicted to checking their Facebook or Twitter updates. Do you think this is an addictive
behavior or a compulsive one? Explain your reasoning. One way to answer this question without
doing further research is to see whether or not the nine diagnostic criteria for gambling disorder
make sense when adapted to this new problem. If not, it is probably not an addictive behavior
04
INTERDISCIPLINARY TOPICS:
SOCIAL NETWORK ANALYSIS
6.4 SOCIAL NETWORK ANALYSIS
Today we use the phrase social network to
describe Internet sites like Facebook and
LinkedIn.

Social network analysis, a field originally


pioneered by sociologists and economists, now
allows marketers and scholars alike to use
Facebook’s massive social network to study
our society.
6.4 SOCIAL NETWORK ANALYSIS
Today’s social networks are an attempt to directly
represent and leverage the social connections between
people and institutions.

As you probably have already seen on Facebook, you can


click a “Like” button to show that you like a particular post,
photo, product, or other item.

Everything you “like” becomes a node in Facebook’s social


network, and each time you click “Like,” a new edge is
created in the network
6.4 SOCIAL NETWORK ANALYSIS

Reflection Question:

Several government agencies (the Defense Advanced Research


Projects Agency or DARPA) have explored using social network analysis
to identify potential terrorists.

They would like companies like Facebook and Twitter to provide them
with the social network of all users (even those not under suspicion of any crime or
criminal intent) for their analysis to work.

Should social networking companies comply with these requests


voluntarily, or should they hold out until they receive a court order?
05
CASE 5 : How the Internet Changes How We Know

Where our knowledge comes from


6.5 How the Internet Changes How We Know

When you look at a piece of information on the Internet, how do you


decide
whether or not it is trustworthy?

The branch of philosophy that studies this problem is called


Epistemology,In this book we stress the role of reason as the primary
way of constructing knowledge, but reason alone is clearly not
sufficient.
6.5.1 Birds of a Feather, and the “Like” Button

The Facebook “Like” button is at the heart of this. Whenever a Facebook user clicks
the Like button on a Web page, Facebook learns something about that user’s
attitudes and preferences. As it begins to compile information about what a
particular user likes, and about what that user’s friends like, Facebook can start to
make guesses about what products are likely to interest the user. For example, if
many of your friends have liked a particular band, and you have not, then that band
might pay Facebook to target you with ads. An understanding of homophily tells the
marketers at Facebook that you are probably predisposed to enjoy a particular kind
of music; targeting you with an ad for a band that your friends like is much more
likely to pay off than showing the same ad to a random person.
6.5.1 Birds of a Feather, and the “Like” Button

Facebook calls this service, which makes it possible to present you with ads
and content specifically suited to you, “instant personalization.” Many companies
use Facebook’s instant personalization system on their Web sites to tailor content
to the user, Some examples of instant personalization are:

Microsoft’s search engine Bing.com—This site searches not only the Web, but also the users’ Facebook
friends to find items the friends like that also match the search query.

Movie review website RottenTomatoes.com—This site provides movie


ratings and recommendations based on your Facebook friends.

Music site Pandora.com—This site makes it easy to listen to music that is


“Liked” by your friends on Facebook.

Location-based search and review site Yelp.com—When you use Yelp to


search for a restaurant, you receive links to reviews written by your
Facebook friends for nearby restaurants.
6.5.2 Why Some Experts Fear Wikipedia

Wikipedia is the popular online encyclopedia.

There are two very different arguments to support the position that students should not cite Wikipedia
as an authoritative source.

The first argument focuses on the fact that Wikipedia is a Tertiary Source, that is, a survey or summary
of other work that does not include full evidence, sources, or technical details. a tertiary source points
you towards other sources. By definition, it does not stand on its own as an authoritative source.

Secondary Source - discusses information presented elsewhere.

Primary Source - is a source that is as close as possible to the topic being


Studied.

The second argument focuses on the fact that Wikipedia can be edited by
anyone.
6.5.2 Why Some Experts Fear Wikipedia
If you are compiling an encyclopedia, whether in print or online, you have at least three major problems:

What topics do you want to cover and what topics do you want to exclude?

Once you have selected a topic, how do you find an author to contribute an article on that topic?

Once you receive a contributed article on a particular topic, how do you ensure that the article is accurate, fair,
and well written?

■In March 2009, a student added a fake quote to the Wikipedia page of composer Maurice Jarre a
few hours after Jarre’s death. The fabricated quote subsequently appeared in newspaper obituaries
for Jarre, including in Britain’s “The Guardian” newspaper.

■ At various times, Wikipedia has prematurely announced the deaths of public figures, including
Senator Edward Kennedy and teen pop star Miley Cyrus.

■ At the time of this writing, there is a minor edit war in the article on “NP Completeness,” a
key topic in the theory of computer science. One editor is attempting to add a quote from
Nature News. Though the quote could be considered informative, it is technically incorrect, and
so it has been repeatedly removed by other editors. So far it has been added, and then removed
again, at least three times.
6.5.3 Is Cyberdating Really Dating?
We conclude this exploration of how the Internet changes how we know by discussing the
link between self-concept (the topic of section 6.3) and epistemology (the topic of section
6.5). In Section 6.3.2 we contrasted the idea of one’s “authentic self” with the idea that
each person is a combination of multiple context-dependent selves, or personas, all of
which are equally valid. There is still considerable debate about whether one approach is
better than the other. Some say we ought to strive to be our authentic selves, and that
anything else is dishonest. Others claim that all human interactions are
context-dependent performances,
and there is no such thing as an authentic self.
6.5.3 Is Cyberdating Really Dating?
Consider the following scenario: Ryan and Kayla are two high school sophomores
who live 500 miles apart. They met through a mutual friend on Facebook.
Over time they communicated more and more through Facebook’s chat feature,
then started texting each other, and eventually started video-chatting several times
per week over the Internet. They eventually updated their status on Facebook to
indicate that they were “in a relationship.” Ryan and Kayla even went so far as to
introduce their parents over video chat. Finally, Kayla convinced her parents to visit
a family member who lives near Ryan so that she and Ryan could meet in person.
Is it really possible or reasonable to fall in love with someone you have never
met in person? Some would argue that any feelings of intimacy or affection that
you feel for a person are illusory if you have not met the person face to face.
One way to analyze this question is to consider the medium of interaction, and
whether or not it is useful in discovering the authentic self of the other person.
6.5.3 Is Cyberdating Really Dating?
Consider the following ways of interacting with a potential partner:
● Sharing a meal in a restaurant or going to a movie together
● Volunteering together on a service project
● Going on vacation together
● Text chat via text message or private Internet chat
● Voice conversation via phone or Internet
● Video chat via the Internet
● Text or voice chat in a public forum, such as a public chat room or virtual world
● Play an online game together (such as World of Warcraft or EVE Online), which includes either voice or
text chat

Now think about how likely these methods of interaction are to shed the most light on
these key questions about a potential mate:
● Is the person generous?
● Is the person trustworthy?
● Do you enjoy talking with the other person?
● Do you enjoy working together with him or her on shared problems?
● Does the person listen when you talk and value your point of view?
6.5 How the Internet Changes How We Know
Reflection Questions:

Assume that, no matter what, the Internet will always include advertisements. Would
you prefer to see advertisements that are randomly selected, or would you prefer to
see advertisements for things that your friends like? Explain your reasoning.

In evaluating the quality of information you use in your academic work, how
important is it to you that the author is an expert in the topic? For example, would
you be more likely to trust a Wikipedia article on U.S. history if the author is a history
professor, instead of an average person? Why or why not?

Is it possible or reasonable for people to fall in love if they have never met face to
face? Explain your reasoning.
04
6.6 DIVERSE PERSPECTIVES: RACE IN
VIDEO GAMES
Representation in video games
6.6 DIVERSE PERSPECTIVES: RACE IN VIDEO GAMES

Designers of video games are currently struggling to incorporate racial diversity in their games. Most
big-budget video games feature white protagonists, though video game studios recognize that they
ought to portray a wider spectrum of human experience. Attempting to do so, however, comes with a
wide variety of pitfalls
6.6 DIVERSE PERSPECTIVES: RACE IN VIDEO GAMES
One classic example is Carl “CJ” Johnson, the African American
protagonist of Grand Theft Auto: San Andreas. Like many of the most
successful big-budget video games, Grand Theft Auto: San Andreas is
highly scripted.

The player solves puzzles and completes missions, and after most
missions is rewarded with a cut scene, a short movie that advances
the plot. The game follows CJ, a gang member, as he attempts to
resurrect his defunct gang, take over various criminal businesses, and
get revenge on crooked cops and treasonous former friends.

In an article in the New York Times Magazine, Michel Marriott criticizes


Grand Theft Auto for its portrayal of African-Americans like CJ: The
sense of place, peril and pigmentation evident in previews of the
game, Grand Theft Auto: San Andreas, underscores what some critics
consider a disturbing trend: popular video games that play on racial
stereotypes, including images of black youths committing and
reveling in violent street crime.
6.6 DIVERSE PERSPECTIVES: RACE IN VIDEO GAMES

Reflection Questions

RESEARCH Find plot summaries of Grand Theft Auto: San Andreas online. Is the portrayal of the main
character, CJ, demeaning? Is Grand Theft Auto: San Andreas an example of digital minstrelsy? Explain
your reasoning.

POSITION Our definition of “digital minstrelsy” specifically focuses on disadvantaged groups. Based on
this definition, a game that makes fun of the rich would be less problematic than one that makes fun of
the poor. Do you agree that games that make fun of disadvantaged groups are ethically worse than
ones that make fun of advantaged groups? Explain your reasoning
04
6.8 OUR CYBERNETIC FUTURE
Cybernetics to enhance us
6.8 OUR CYBERNETIC FUTURE
The definition of cybernetics is not universally agreed upon. According to one definition,
cybernetics is the study of self-regulating or self-controlling systems. One example of such a
self-regulating system is a human’s internal heat regulation system. When we overheat, we
perspire, so that we will be cooled by the evaporation of sweat. When we are too cold, we
shiver. The rapid contractions of our muscles, in shivering, burns energy, and gives off heat,
which warms us back up.

Engineers who study cybernetics often use examples from nature to try to solve similar
problems in machines. For example, like a human, your computer has an internal heat
regulation system that consists primarily of a variable-speed fan that blows air across the
computer CPU. This heat regulation system is a lot less efficient than the human version,
because it uses air-cooling rather than liquid cooling. However, some of the most expensive
custom-built computers have efficient liquid cooling systems, which mimic the human
circulatory system.

The word “cybernetic” is also used to refer to a biological organism that has computer or
machine components. Some people use the word cyborg, short for cybernetic organism to
distinguish between the scientific study of cybernetics and such hybrid organisms.
6.8 OUR CYBERNETIC FUTURE

Reflection Questions

Based on your reading of Section 6.7, do you think that Marshall


McLuhan would agree with the claim that “machines give us new
powers, but the organism remains in control?” Explain your reasoning.

It could be claimed that most humans, today, are cyborgs. For example,
many people use smartphones to take notes and keep a schedule. It
could be argued that this is extending and taking the place of human
memory, so the person that acts this way is a cybernetic organism.
Write an argument either defending or refuting this position
THE END
References

Brinkman, W., & Sanders, A. (2013). Chapter 6: How Computing is Changing Who We Are. In Ethics
in a computing culture. essay, Course technology.

Slides template: https://slidesgo.com/theme/retro-style-pitch-deck#position-4


Ad Hoc Committee for Responsible Computing a group of ethicists and computer science
researchers formulate a set of principles known as the Five Rules for appropriating blame for
harm caused by complicated computer systems
Algorithmic Trading using computers programmed to follow a defined set of instructions for
placing a trade in order to generate profits at a speed and frequency impossible for a human
trader
Artifact any object made by humans
Artificial Intelligence an human-made artifact's ability to lear and reason
Augmented Reality a computer graphics technology that draws virtual objects laid over the
real world
Autonomy the freedom to make decisions without outside constraints or interference
Flash Crash a extremely rapid decline in the price of one or more commodities/securities in
financial markets, specifically those with automized trading software
High-Frequency Trading significantly increased the efficiency of the stock market by using
algorithms to automatically buy/sell large shares at a high speeds
Machine Learning a type of artificial intelligence where algorithms allow computers to take
in data and automatically learn to recognize patterns and make distinctions
PageRank an algorithm that looks at the links between web pages to figure out which web
pages are most important
Pervasive Technology technology that has spread widely throughout society
Spider another word for a web crawler
Unmanned Aerial Vehicle (UAV) typically known as drones are controlled by ground
controlled systems (GCS) using a point and click interface so that a human can click the target
and the machine autonomously plans and follows a flight path that keeps the target in view
Web Crawler program that autonomously surfs the web and remembers the content and location
of everything it encounters
Autonomous Computer Systems intentionally designed to make decisions without direct
human control or supervision
Ubiquitous Computing the idea that technology is moving beyond he personal computer to
everyday devices with embedded technology and connectivity as computing devices
progressively smaller and more powerful
Lifelogging wearing a computer that records every moment of the day/life bc the camera is
never turned off, usually in both audio and video but does not necessarily publicly post the
recordings
Robot an electro-mechanical device capable of movement an action
Face-Recognition Technology a computer with access to a large database of images can
identify people as they walk past a security camera
Gait-Recognition Technology a group at the Georgia Institute of Technology are working on
technology that can identify individuals as they walk
Shock Images incredibly graphic images posted on the internet that are designed to sicken
people
Ad Hoc Committee for Responsible Computing A committee of ethicists and computer
science researchers that formulated a set of principles, known as the Five Rules, for apportioning
blame for harm caused by complicated computer systems.
Algorithmic Trading
Artifact Any object made by humans.
Artificial Intelligence A human-made artifact's ability to learn and reason.
Augmented Reality A computer graphics technology that draws virtual objects laid over the
real world.
Autonomy The freedom to make decisions without outside constraints or interference.
Flash Crash
High-Frequency Trading
Machine Learning A type of artificial intelligence; algorithms that allow computers to take in
data and automatically learn to recognize patterns and make predictions.
PageRank An algorithm that looks at the links between Web pages to figure out which Web
pages are most important . By linking to a Web page, other Web pages vote for that Web page,
or vouch for its quality.
Pervasive Technology Technology that has spread widely throughout society.
QR Code A tech thing that is useful for spreading shock images.
Spider A web crawler-program which autonomously surfs the Web and remembers the content
and location of everything it encounters.
Unmanned Aerial Vehicle (UAV) Technology that uses machine learning for military/police
uses.
Web Crawler Web-surfing search engines, synonymous with "spiders"
Autonomy and Pervasiveness Two qualities of modern technology that are especially
problematic.
Pervasive Computing The idea that technology is moving beyond the personal computer to
everyday devices with embedded technology and connectivity as computing devices become
progressively smaller and more powerful.
Lifelogging A person who wears a computer that records every moment of his or her life,
usually in both audio and video. The camera and audio recording devices are never turned off, no
matter what, but the recorded data is not necessarily publicly posted.
Robot An electro-mechanical device capable of movement or action.
Five Rules 1. People who make computing artifacts are morally responsible for the fore-
seeable effects of those artifacts.
2. The amount of blame assigned to a person does not depend on the number of people involved,
but on whether or not that person should have been able to foresee the consequences.
3. The user of a computing artifact is morally responsible for the consequences of that use.
4. People must always make a reasonable effort to foresee the societal effects of a technology
they design or use.
5. People who design computing artifacts must provide enough information about them so that
others can foresee the consequences of using them.
Shock Image Incredibly graphic images posted on the Internet; designed to shock or sicken
ordinary people.

pervasive technology technology that has spread widely throughout society


autonomy freedom to make decisions without outside contraints or interference
nintendo 3DS
Smart phone
Laptop Computer
High quality digital Camera Example of gadgets with cameras
personal locator beacon device which takes the form of a small yellow box about the size
of walkie talkie, contains a button the user can press if he or she is in trouble and needs to be
rescued
Search and Rescue Satellite Aided TRacking System (SARSAT) personal locator beacon uses
GPS to calculate the user's location, then directly uploads this information to the ____
satellite SARSAT uses ___ communication instead of cellular communication
$250 personal locator beacons cost about ___
robot electro-mechanical device capable of movement or action
Artificial Intelligence human-made artifact's ability to learn and reason
Artifact any object made by humans
Autnomous and Robotic Roomba, vacuum cleaner robot sold by iRobot is ____, in terms of
capabilities of various technologies
Robotic Bomb-DEfusing Robots are ____, in terms of capabilities of various technologies
Autonomous and sometimes intelligent Stock-Trading software used in algorithmic trading
is ___, in terms of capabilities of various technologies
Autnomous and intelligent TD-Gammon Algorithm for playing backgammon is ____ in terms
of capabilities of various technologies
not autonomous,not intelligent nor robotic a marble rolling down a hill is ____, in terms of
capabilities of various technologies
Automatic Number Plate Recognition (ANPR) __ cameras automatically read license plates
as cars drive by
Face REcognition technology a computer with access to a large database of images can identify
people as they walk past a security camera
Gait Recognition Technology technology that can identify individuals by how they walk
Web Crawler program whose job is to autonomously surf the Web and remember the content
and location of everything it encounters
Spiders
Robots/bot Web crawlers are often called ___, because they work autonomously and because
of the crawling web metaphor
PageRank Algorithm looks at the links between Web Pages to figure out which Web Pages are
most important
True In computer technology, Autonomy leads to pervasiveness and pervasiveness necessitates
autonomy (t or f)
Graduate Management Admissions Test required standardized test for students applying to
many MBA programs
e-rater GMAT uses a program called ___ to evaluate everything from student answers to essay
questions
TurnItIn.com most commercially successful plagiarism prevention and detection services
GradeMark suite of software tools, provided through TurtItIn's Web site, that helps instructors
grade essays
end-user bystander in the decision-making process
Machine Learning algorithms that allow computer to take in data and automatically learn to
recognize patterns and make predictions about them.
Unmanned Aerial Vehicles
drone small airplanes that fly autonomously
also called ___
point-and-click UAV uses ___interface
Ad Hoc Committee for Responsible Computing
Five Rules committee of ethicists and computer science researchers who formulated a set of
principles, known as the ____, for apportioning blame for harm caused by complicated computer
systems
Five Rules Rules that imply that if you cannot accurately predict what a system will do, then
you should not allow it to be used
Artificial Intelligence Robot Dogs (AIBO) dogs that decrease loneliness and that there was no
significant difference between real dogs.
Tamagotchi little egg-shaped device with an LCD Screen and a small number of buttons
Sony EyePet virtual pet that can actually see the user using a camera plugged into the
Playstation game console.
Algorithmic Trading practice of allowing a computer program to make decisions about what
shares to buy and sell
High-frequency Trading practice of using computers to trade investments back and forth
much more quickly that humans can
Flash Crash massive stock market crash that lasted only a few minutes, was caused by the
interactions of several different pieces of automated stock trading software
Augmented Reality computer graphics technology that draws virtual objects laid over the real
world
virtual objects appear to inhabit the real world, and the user cannot always easily tell which
objects are real and virtual
QR Code 2-dimensional bar code that can be read by camera phones and computers

Pervasive technology that has spread widely through society


Autonomy the freedom to make decisions without outside constraints or interference
Ubiquitous Computing The idea that technology is moving beyond the personal computer
to everyday devices with embedded technology and connectivity as computing devices become
progressively smaller and more powerful
Lifelogging wearing a computer and recording every moment of life, usually both in audio and
in video
Face recognition a computer with access to large databases of images can identify people as
they walk past security cameras
Gait recognition identifies individuals by how they walk
PageRank algorithm looks at links between web pages to figure out which web pages are
most important
Machine learning type of AI; algorithms that allow computers to take in data and
automatically learn to recognize patterns and make predictions
Five Rules People who make computing artifacts are morally responsible for the fore-seeable
effects of those artifacts. ( Recall that the term " artifact" means any object made by humans.)

The amount of blame assigned to a person does not depend on the number of people involved,
but on whether or not that person should have been able to foresee the consequences.

The user of a computing artifact is morally responsible for the consequences of that use.

People must always make a reasonable effort to foresee the societal effects of a technology they
design or use.

People who design computing artifacts must provide enough information about them so that
others can foresee the consequences of using them.
Ad Hoc Committee for Responsible Computing Created 5 rules
Augmented Reality a computer graphics technology that draws virtual objects laid over the
real world
Shock Images incredibly graphic images posted on the internet; designed to shock or sicken
ordinary people
Algorithmic trading the process of using computers programed to follow a defined set of
instructions (an algorithm) for placing a trade in order to generate profits at a speed and
frequency that is impossible for a human trader. The defined sets of rules are based on timing,
price, quantity or any mathematical model. Apart from profit opportunities for the trader, algo-
trading makes markets more liquid and makes trading more systematic by ruling out the impact
of human emotions on trading activities.
Artifact one of many kinds of tangible by-products produced during the development of
software
Artificial intelligence the theory and development of computer systems able to perform tasks
that normally require human intelligence, such as visual perception, speech recognition,
decision-making, and translation between languages.
Flash Crash a very rapid, deep, and volatile fall in security prices occurring within an
extremely short time period. A flash crash frequently stems from trades executed by black-box
trading, combined with high-frequency trading, whose speed and interconnectedness can result
in the loss and recovery of billions of dollars in a matter of minutes and seconds
High-frequency trading a program trading platform that uses powerful computers to
transact a large number of orders at very fast speeds. It uses complex algorithms to analyze
multiple markets and execute orders based on market conditions.
QR code he trademark for a type of matrix barcode (or two-dimensional barcode)
Spider a program that visits Web sites and reads their pages and other information in order to
create entries for a search engine index. The major search engines on the Web all have such a
program, which is also known as a "crawler" or a "bot."
Unmanned Aerial Vehicle an aircraft piloted by remote control or onboard computers
Web crawler Internet bot that systematically browses the World Wide Web
Ad Hoc Committee for Responsible Computing a committee of ethicists and computer
science researchers who formulated a set of principles, known as the Five Rules, for apportioning
blame for harm caused by complicated computer systems
Algorithmic trading the practice of allowing a computer program to make decisions about what
shares to buy and sell
Artifact an object made by humans
Artificial intelligence a human-made artifact's ability to learn and reason
Augmented reality a computer graphics technology that draws virtual objects laid over the
real world
Autonomy the freedom to make decisions without outside constraints or interference
Flash Crash an incident that occurred on May 6, 2010, during which time the Dow Jones
Industrial Average dropped 900 points (9%) in the span of about 15 minutes, then recovered
almost as quickly.
High-frequency trading the practice of using computers to trade investments back and forth
much more quickly than humans can
Machine learning an algorithm that allows computers to take in data and automatically learn
to recognize patterns and make predictions about them
PageRank an algorithm that looks at the links between Web pages to figure out which Web
pages are most important
Pervasive technology technology that has spread widely throughout society
QR code a sort of 2-dimensional bar code that can be read by camera phones and
computers
Robot an electro-mechanical device capable of movement or action
Spider a type of Web crawler that gains its name because it "crawls the Web"
Unmanned Aerial Vehicle (UAV) a small airplane that flies autonomously; widely adopted by
both militaries and police forces; often called a drone
Web crawler a program whose job is to surf the Web autonomously and remember the content
and location of everything it encounters

Pervasive technology that has spread widely throughout society


Autonomy the freedom to make decisions without outside constraints or interference
pervasive computing/ ubiquitous computing The idea that technology is moving beyond the
personal computer to everyday devices with embedded technology and connectivity as
computing devices become progressively smaller and more powerful
Lifelogging wears a computer that records every moment of his or her life, usually in both
audio and video. The camera and audio recording devices are never turned off, no matter what,
but the recorded data is not necessarily publicly posted
Robot an electro- mechanical device capable of movement or action.
Artificial intelligence a human- made artifact's ability to learn and reason.
Artifact any object made by humans
Web crawler program which autonomously surfs the Web and remembers the content and
location of everything it encounters.
Machine learning type of artificial intelligence; algorithms that allow computers to take in
data and automatically learn to recognize patterns and make predictions
Unmanned Aerial Vehicles ( UAVs) also called drones; machine learning
Ad Hoc Committee for Responsible Computing formulated a set of principles, known as the
Five Rules, for apportioning blame for harm caused by complicated computer systems
1. People who make computing artifacts are morally responsible for the fore-seeable effects of
those artifacts.

2. The amount of blame assigned to a person does not depend on the number of people involved,
but on whether or not that person should have been able to foresee the consequences.

3. The user of a computing artifact is morally responsible for the consequences of that use.

4. People must always make a reasonable effort to foresee the societal effects of a technology
they design or use.

5. People who design computing artifacts must provide enough information about them so that
others can foresee the consequences of using them. 5 Rules for apportioning blame for harm
caused by complicated computer systems
Augmented reality a computer graphics technology that draws virtual objects laid over the
real world
Shock images incredibly graphic images posted on the Internet; designed to shock or sicken
ordinary people

Lecture 1 - Systems:

The ubiquitous computing vision of Mark Weiser. Ubiquitous or pervasive:

Ubiquitous computing was defined by Weiser as


the third wave in the evolution of computer science, where one person is served by many
computers.
Lecture 1 - Systems:

The trends that make ubicomp possible. The trends that make the Ubicom vision become
reality are:
* device miniaturization,
* wireless communication,
* mobile devices,
* implicit human‐computer interaction,
* powerful artificial intelligence algorithms,
* new materials,
* and energy resources.
Lecture 1 - Systems:
The waves in computer technology evolution. * First wave: the mainframe era, when many
persons were served by one huge computer,
* Seconf wave: followed by the age of personal computers (PC),with one computer serving one
person
* Third wave: Ubiquitous computing (pervasive computing) was defined by Weiser as the third
wave in the evolution of computer science, where one person is served by many computers.
Lecture 1 - Systems:

The properties of pervasive computing system. * Property #1. The computers are
networked:
Computers need to be networked, distributed and
transparently accessible.

* Property #2. The system is context ‐aware:

The system is aware of its context, meaning the state of its


user and of its surroundings. Context is a very broad concept , it can be time, location,
temperature,
weather, emotions, mood, etc

* Property #3. Human computer interaction becomes more hidden:

ideally a pervasive computing system should act in the background, in a transparent,


invisible way (calm computing), so that the user doesn't even realize it is there.

See more in:

https://bb.vu.nl/bbcswebdav/pid-2740936-dt-content-rid-
6495990_2/courses/FEW_X_400552_2016_120/Chapter1-Percomsystems-
LectureNotes%2Bpreface.pdf
Lecture 1 - Systems:

The problems in pervasive computing. There are some technical problems that still need to
be solved, such as:

* energy,
* scalability,
* mobility management.

Moreover, even if the background of pervasive computing is mainly technical, this field
penetrates areas in which not only technical considerations, but also social and cognitive aspects
are relevant. Problems related:

* to privacy,
* ethics and
* usability

issues still have to be addressed and solved.


Lecture 1 - Systems:

The main pervasive computing system building blocks. The basic building block ( building
block = a basic unit from which something is built up.) for computer

architectures based on two‐state logic is the transistor, that works as a simple on/off switch. The
type of

transistor used over the past three decades is the Metal Oxide Semiconductor Field Effect
Transistor or

MOSFET.
Lecture 2 - Signals:
How to mathematically describe a signal: its amplitude, phase, frequency, period * x(t) = x0 +
ASin(ω*t + Φ) = x0 + ASin(2πft + Φ)
* A(Amplitude) = D/f, where D is the distance units of meters
* Φ(Phase shift) = N/A
* f (frequency) = 1/T (Hz)
* T (period) = 1/f (seconds)
Lecture 2 - Signals:
What is spatial resolution and colour resolution in a sampled digital image? In a sampled
digital image what is:

* Spacial resolution: The number of pixels to represent an image.

* Colour resolution:
The number of bits necessary to represent the colour or intensity is called the colour or intensity
resolution.
Lecture 2 - Signals:
Types of images (RGB, gray scale,black and white) and how are these types of images
represented in a computer * RGB: (True colour or red‐green‐blue): Here each pixel has a
particular colour, described by the amount of red, green and blue in it. If each of these
components has a range 0‐255, this gives 2^8x2^8x2^8 = 2^24 =16777216 colours for any
image. Since the number of bits required for each pixel is 3 x 8 =24, these images are also called
24‐bit colour images.

* Gray Scale: image. Each pixel is a shade of gray, normally from 0(black) to 255(white). Each
pixel is represented by 8 bits.

* Black and white: Binary image. Each pixel is just black or white. We need only one bit per
pixel.
Lecture 2 - Signals:
What is sampling, what is an ADC a DAC, what is sampling frequency, sampling period , how
high has to be this frequency , Shannon theorem, what happends if we do not obey the Shannon
theorem? undersampling, oversampling, aliasing. * Sampling: Many signals originate as
continuous‐time signals. However, for a variety of reasons it is desirable to obtain a discrete‐time
representation of a signal. This can be done by sampling a continuous‐time signal. at isolated
equally‐spaced points in time.
* ADC (Analog‐to‐Digital‐Converter): Digitalization is done by ADC.

* DAC (Digital‐to‐Analog Converter): The reverse process of Digitalization is done by DAC,


and it is called reconstruction.

* Fs(sampling frequency or sampling rate): 1/Ts Hz, samples taken each second.

* Ts (Sampling period): Ts=1/fs=(seconds): The time distance between any pair of consecutive
sample times

* Shannon theorem (or Nyquist criterion):


To ensure that we have enough sampled points for reconstruction, we require that the sampling
period is not greater that one half of the finest detail in our original signal.

* Nyquist rate: It says in effect that the sampling frequency has to be at least twice the maximum
frequency in the signal. The minimal sampling frequency 2 fmax is called the Nyquist rate.

* * Sampling with a higher rate than the Nyquist rate, called oversampling, is not a problem. It
will even improve the situation and create a smoother reconstructed waveform. But what
happens if we don't sample fast enough? Using a too low sampling frequency (undersampling)
has a negative effect called aliasing.

* Alising: false frequencies that appears during the reconstruction (This cause by
undersampling). In ohter words, the sampled signal is not similar to the original signal.
Lecture 3 - Control:
The principles of deliberative and reactive control and some examples of areas where they are
mosly used * Principle of deliberative control: Its principle is Think hard, Act later!

Examples: Computer‐based navigation systems

* Principle of reactive control: It is based on the principle Don't think, react!

Examples: A smart home or office


Lecture 3 - Control:
The modules of navigation system and their roles (tables in fig. 10 and fig. 14 are given just as
illustration, you do not have to memorize them) * positioning module: computes the current
position using incoming sensor data.
*route calculation module: calculates the best (shortest, fastest, cheapest) route from the current
position to a defined target destination.
* route guidance unit: is responsible for providing driving instructions.
Lecture 3 - Control:
Open loop control(principle, block diagram, examples) * Open loop control: Why is it called
so? Because it only looks at its input signal (the light level outside) in order to decide what to do.
It does not take into account what is happening to its output (the curtains)

*"Open‐loop" and "closed‐loop" are common control theory terms, that indicate whether
information is (closed) or not (open) fed back to the system to achieve control objectives. For
example, the microwave oven is set to run for two minutes. After that, it turns off. It has no idea
whether your food is still frozen, burnt, or cooked perfectly.
Lecture 3 - Control:
feedback control (principle, block diagram, examples) * feedback control: The system gets
the desired state by continuously feeding back ( to have an effect on something) the current state,
and comparing it to the desired state. An error is calculated, and depending on the sign of this
error, the current state is adjusted to minimize this error. The process continues until the goal is
achieved. This is a closed‐loop control.

** We can keep the temperature constant at a certain preset value by a feedback control
Lecture 3 - Control:
How a smart vehicle can detect obstacles? sensors principles, you should be able to write some
controllers in pseudocode. * Touch sensors:
The simplest solution, but obviously not the most elegant one, is to first bump into the obstacle.
This can be done with a touch or switch sensor.
-Principles: The principle of this sensor is simple: normally the output of a switch sensor is 0, but
when contact happens, an electrical contact is closed, and the output switches to 1.

- A reactive controller for a robot that drives until an obstacle is detected, is shown below:

while (no contact)


drive-straight-forward
end_while
stop driving

* Ranging sensors:
A more elegant way to detect an object is to use ranging sensors, that can detect an object
without bumping into it. Ranging means that they measure the distance to the objects. The first
example of ranging sensors is the ultrasound sensor, or sonar. Sonar comes from sound
navigation and ranging. Initially developed for underwater applications, they have been also used
in Polaroid cameras. They use a range of sound frequencies that are beyond human hearing.

- The principle is called echolocation, the same principle bats and dolphins use.

The sensors send out a sound beam, and measure the time needed to receive the echo reflected by
the object, called time of flight (ToF).

- A controller for a robot equipped with a ranging sensor (sonar or LIDAR) that drives until the
distance to an obstacle is for example 20 cm, is shown below:
while distance > 20 cm
drive forward
end_while
stop the motors

* A line follower:
The problem of keeping a car in its designated lane is very important for traffic safety. Vehicles
with a lane departure warning system can save many lives, because many accidents happen when
the driver falls asleep for a second, and the car leaves its designated lane.

- Principle: This system has to alert the driver as soon as the car drifts close to the lane markings.
A lane departure alert systems are already implemented in modern, expensive cars.

- The reactive controller for the line follower could look like this:

while (true)
while (both sensors detect white)
drive straight forward
end_while
if (left sensor sees black) then turn left
if (right sensor sees black) then turn right
end_while
Lecture 3 - Control:
How to follow a black line? sensors, controllers in pseudocode //TODO maybe
Lecture 4 - image processing:
What means point processing? We have an input image f (x, y), and we wish to manipulate
it resulting in a different image, denoted by the output image g(x, y). Point processing is defined
as an operation which calculates the new value of a pixel in g(x, y) based on the value of the
pixel in the same position in f (x, y), and some operation (Fig.1). This means that the values of a
pixel's neighbors in f (x, y) have no effect whatsoever.
Lecture 4 - image processing:
Image histograms ‐ not the Matlab code but what it is , how does it look like, why is it useful,
what means histogram stretching, without the formula * Histogram: A histogram in general,
is a graphical representation of the frequency of events. Think about a histogram of ages of
students listening to this lecture.

* Image histogram: is a plot of the relative frequency of occurrence of each of the permitted
pixel values in the image, against the values themselves. For a gray scale image, the histogram
can be constructed by simply counting how many times each gray value (0‐255) occurs within
the image.
- how does it look like?: The histogram is actually a bar graph.

* histogram stretching: so‐called histogram stretching. Often called normalization or


equalization, histogram stretching is a simple image enhancement that tries to `stretch' the range
of intensity values it contains to span a desired range of values.
Lecture 4 - image processing:
Thresholding - what it is, why is it useful, what is the result? * Threholding:
Thresholding is another useful point‐processing operation. It transforms a gray‐scale image into
a black and white (binary) one, by choosing a gray level T in the original image, and then turning
every pixel black or white, according to whether its gray value is greater than or less than T.
white, if its grey level is > T
black, if its grey level is ≤ T

T is called the threshold level.

- Why is it used?: In many image processing systems, thresholding is a key step to segmenting
(separating) the foreground (information) from the background (noise).
- What is the result? : We separate the foreground from the background
Lecture 4 - image processing:
What means neighbourhood processing? Filtering: what does it mean, how does the mean filter,
median filter work? * Neighbourhood processing: In neighbourhood processing the value of a
pixel in the output image is determined by the value of the pixel at the same position in the input
and the neighbours together with a neighbourhood processing operation
- Neighbourhood processing can be used to filtered an image

* Filtering: Filtering means to improve the image quality by reducing, or even removing, the
noise.

* Mean filter: noise, for instance, of the type salt‐and‐pepper, this noise consist of isolated pixels.
By isolated we mean that the pixels have a brightness which is very different from their
neighbors. We could improve the image quality if we somehow identify such pixels, and replace
them by a value which is more similar to their neighbors.
We can improve this situation by changing its intensity to the mean value of its neighbours,
including itself.

* Median filter: replace the noisy pixel with the median value of its neighbours, including itself.
The median value of a group of numbers is found by ordering the numbers in increasing order,
and picking the middle value.

**Extra: Filtering the image refers to the process of applying a filter (here the mean or median
filter) to the entire image. It is important to note that by filtering the image, we apply the filter to
each and every pixel.
Lecture 4 - image processing:
What is correlation and how does it work? * Correlation: Correlation is another neighbourhood
processing, which also works by applying a filter to each pixel in an image. In correlation, the
filter is called kernel, and plays a more active role.
Lecture 4 - image processing:
Edge detection An edge is a curve that follows a path of rapid change in image intensity. Edge
detection can be achieved by correlating the image with a kernel. There are many methods
(kernels) to determine the edges of an image such as : Prewitt, Roberts, Sobel, etc.
Lecture 4 - image processing:
What is morphological operation? Give one example. Erosition, dilatation, closing, opening,
basic idea, where do we need them? * Morphological operation: Morphology is a branch of
image processing which is particularly useful for analyzing shapes in images.

Morphology operates like the other neighbourhood processing methods, by applying a kernel to
each pixel in the input image. The kernel is a key element in a morphological operation and is
called structuring element (STREL).

The art of morphological processing is to choose the right shape of the structuring element to suit
the particular application.

* Erosition: It is a morphological operation. The term erosion refers to the fact that the object in
the binary image is decreased in size. In general, erosion of an image results in objects becoming
smaller, small objects disappearing, and larger objects splitting into smaller objects.

- Erosion is used for example to count objects on an image

* Delision: The term dilation refers to the fact that the object in the binary image is increased in
size. In general, dilating an image results in objects becoming bigger, small holes being filled,
and objects being merged.

- Delision is used : Combining dilation and erosion in different ways results in a number of
different image processing tools. These are called compound operations. Here we present two of
the most common compound operations, namely Opening, and Closing.

* Closing: is the name given to the morphological operation of dilation followed by erosion with
the same structuring element. It deals with the problem associated with dilation, namely that the
objects increase in size when we use dilation to fill the holes in objects. This is a problem in
situations where, for example, the size of the object (number of pixels) matters.

* Opening: is the morphological operation of erosion followed by dilation with the same
structuring element. It deals with the problem associated with erosion, namely that the objects
decrease when we use erosion to erase small noisy objects or fractured parts of bigger objects.
The decreasing object size is a problem in situations where for example the size of the object
(number of pixels) matters. The general effect of opening is to remove small, isolated noisy
objects while the main object preserves its original size

- We used opening for: An opening can be also used to retain only objects of one shape.
Lecture 4 - image processing:
What is a BLOB? What means connectivity and what kind of connectivity we usually have?
What means connected component labeling? What do we get as a result of this labeling? *
BLOB: BLOB stands for Binary Large OBject and refers to a group of connected pixels in a
binary image, also called connected components. The term "Large" indicates that only objects of
a certain size are of interest and that "small" binary objects are usually noise.

- The purpose of BLOB extraction is to isolate the BLOBs (objects) in a binary image.
* Connectivity: means, which pixels are neighbours and which are not.

* What kind of connectivity we usually have?:


The two most often applied types of connectivity are 4‐connectivity and 8‐connectivity, 8
connectivity is more accurate than 4‐connectivity, but 4‐connectivity is often applied since it
requires fewer computations, hence it can process the image faster.

* Connected component labeling (or connected component analysis): the algorithms used for
finding the BLOB's. These algorithms search for connected pixels and assigns a label to each
found BLOB. Background is usually 0, and then the first BLOB gets the label 1, the second 2,
etc.
- As a result of the labeling we get the number of objects or BLOB's
Lecture 5 - sound:
The basics parameters of sound * A(Amplitude) = D/f, where D is the distance units of
meters
* Φ(Phase shift) = N/A
* f (frequency) = 1/T (Hz)
* T (period) = 1/f (seconds)

Note: All these parameters are constant and only the time t varies.
Lecture 5 - sound:
What means Fourier analysis? What is FFT? inputs, outputs? **EXTRA**
**Fourier transform, an algorithm to transform a time domain representation of a signal into a
frequency domain one.

* Fourier analysis: provides an alternative representation of a signal, not in the time domain
(with time on the x‐axis) but in the frequency domain (with frequency on the x‐axis). This
representation is equivalent with the one in the time domain and in some cases even more useful.
We say that the Fourier analysis turns a time‐varying signal (plotted on a graph amplitude vs.
time as in Fig. 4(a) into a frequency‐varying signal (plotted on a graph of amplitude vs.
frequency)

*The Fast Fourier Transform (FFT): is an efficient way to do the Fourier transform, and there are
many different algorithms to accomplish the FFT.
- (inputs/outputs)This box has two inputs: a vector with the signal samples, x[n] and the number
of samples, N. The output is a vector a, with the amplitudes of the component frequencies,
denoted by ak.
Lecture 5 - sound:
How to represent signals in frequency domain (sinusoidal signals, sum of sinusoids, periodic
signals, short time Fourier analysis, spectogram). *sinusoidal signals: One of the basic
families of periodic signals , very useful in modeling common processes in nature, are the
sinusoidal signals, or more concisely, sinusoids. Sinus, or sine is a trigonometric function of an
angle θ (see Fig. 3).
* Sum of sinusoids: If each instrument produced a pure sinusoidal tone at the frequency of the
note that is assigned to it, then the composite orchestra signal would be simply a sum of
sinusoids with different frequencies and amplitudes.

* periodic signals: Let's take the case of a signal x(t), which is not sinusoidal, but still periodic
with a period of T0. In this case, the Fourier analysis can decompose (break) the signal in a set of
sinusoids called a Fourier series, described by equation (2):
*STFT (Short Time Fast Fourier Transform): We apply this technique to aperiodic signals. The
sampled signal first needs to be windowed.

* A spectrogram is a visual rendering of the signal's frequency spectrum as a function of time. A


spectrogram is essentially a set of short‐time Fourier transforms plotted in parallel. It is a 3D‐plot
with frequency on y‐axis, time on x‐axis and amplitude on z‐axis, given by the color of the pixel.
Most spectrograms are displayed in shades of gray. The darker the shade, the more energy at the
corresponding point in the time‐frequency plane.
Lecture 5 - sound:
What means windowing? Why do we need it? Why do we use other windows than rectangular?
* What means windowing? Why do we need it?:

Windowing: Short‐time signal processing is practically always done using windowing. In short‐
time signal processing, signals are cut into small pieces called frames, which are processed one
at a time. Frames are windowed with a window function in order to improve the frequency‐
domain representation. The problem with windowing is that by cutting a signal (for example a
vowel) in frames, a certain feature might be lost because a part of the vowel signal is in one
segment and a part of a signal in another. The solution for the lost feature problem is to overlap
frames (see Fig. 21). Usually for speech processing windows of 20ms are taken with an overlap
of 10ms (50%).

* Why do we use other windows than rectangular?:

The problem with windowing is that by cutting a signal (for example a vowel) in frames, a
certain feature might be lost because a part of the vowel signal is in one segment and a part of a
signal in another. The solution for the lost feature problem is to overlap frames (see Fig. 21).
Usually for speech processing windows of 20ms are taken with an overlap of 10ms (50%).
Lecture 5 - sound:
How can we filter a sound signal? In time domain, in frequency domain * filtering - in time
domain:
Filtering in time domain by averaging signal: Possibly the most obvious approach to reduce the
noise is to take an average. Here we show two options: simple averaging over a number of
readings and taking an exponentially weighted moving average (EWMA).

* filtering - in frequency domain:


Filtering in frequency domain:

- low‐pass filter. A low‐pass filter is one which does not affect low frequencies and rejects high
frequencies.
Lecture 6-7-9 - classification:
The components of a classification system **Extra**
* preprocessing: everything that is required to apply a function, for instance, eat apple, the
preprocessing would be: wash the apple, peal the apple... once all is ready we can eat the apple
(apple the function eat apple). preprocessing a.k.a parsing.

* a sensing module,
* a preprocessing mechanism,
* a feature extraction mechanism,
* a classifier,
* and if the classifier uses supervised learning, then a set of already classified examples (training
set).
Lecture 6-7-9 - classification:
Features, features space, what makes a good feature? * feature: The next step is to select
some measurable quantities, called features, that can help us to reliably separate between two
different coins (classes). This property is called discriminatory power.
*features space: It is the distance between each feature
* What makes a good feature?: If the classes are situated far from each other and create clusters
(regions distinct from each other), then we can say that we have chosen good features.
Lecture 6-7-9 - classification:
Supervised vs unsupervised learning classifiers * Supervised learning classifiers:
The machine learning classifiers we have seen until now have made use of a training set
consisting of a collection of labeled data, each class having one particular label. The classifier
had a kind of teacher, who showed a few examples first, before asking to classify. This is
obviously useful, since it enables us to show the classifier the correct answers for each class, but
in many circumstances this is difficult to obtain. It could for example involve somebody labeling
each instance by hand. In addition, it does not seem to be very biologically plausible because
most of the time, when we are learning, we don't get told exactly what the right answer should
be.

* Supervised learning classifiers:


Unsupervised learning is the exactly opposite case where there is no information about the
correct outputs available at all. We don't have a teacher. The idea is to identify similarities
between inputs that belong to the same class and let the classifier algorithm do it by itself.
Lecture 6-7-9 - classification:
Features for image classification (just enumerate a few) * Statistical moments:
The concept of statistical moments comes from probability theory, where they describe the shape
of a probability density function (pdf).

* Zoning:
It means to subdivide the digital image into several equal quadrants (2,4,8 etc.) and count the
black pixels in each quadrant. These numbers create a features vector.
Lecture 6-7-9 - classification:
Note: The formulas for statistical moments are only for interested people, you do not have to
memorize them. // TODO maybe
Lecture 6-7-9 - classification:
Features for speech recognition (just enumerate a few) * Frequency spectrum:
calculated by using the Fast Fourier Transform (FFT). The feature vectors are then the vectors
with the FFT coefficients. This can work fine if we want to classify periodic sounds, such as
vowels.

* Spectrograms:
The problem with using the frequency spectrum as a classification feature is that words are not
stationary signals with a constant frequency spectrum.
A solution in this case is to cut the speech data into 10‐30ms frames before the analysis. If for
every time frame we calculate the short‐term frequency spectrum (FFT) and we plot them next to
each other, then we will obtain a so‐called spectrogram. The spectrogram shows the change in
amplitude spectra over time. It has three dimensions:

X‐axis: Time (s)


Y‐axis: Frequency(Hz)
Z ‐axis: Color intensity, that represents magnitude.
This spectrogram could serve as a feature for classification.

* Mel‐frequency cepstral coefficients (MFCC):


An even better choice of acoustic features for classification are the Mel‐frequency cepstral
coefficients (MFCC). This method provides a more stable representation from one repetition to
another of a particular speaker's utterances.
The cepstrum is a Fourier analysis of the logarithmic amplitude spectrum of the signal. The
cepstrum is the spectrum of a spectrum (see Fig. 19). You know that a spectrum gives you
information about the frequency components of a signal. A cepstrum gives you information
about how those frequencies change.

The cepstrum is called so because it turns the spectrum inside‐out. The x‐axis of the cepstrum
has units of quefrency, and peaks in the cepstrum (which relate to periodicities in the spectrum)
are called rahmonics.

Typically, in speech recognition the signal is divided in windows (frames) of 20ms with an
overlap of 50% and the resulting feature vector is the set of equalized mel‐cepstrum cepstral
coefficients, typical 12 or 13 MFCC coefficients for each frame.

* Energy:

Another feature that might be useful in classification is the energy or power over a frame, given
by the sum of the squared magnitude of samples values x[n] in a frame with N samples. It can be
also calculated as the sum of the Fourier coefficients, where x[n] is the sampled signal in time
domain and X[k] is the k‐th Fourier coefficient. Energy is a useful feature to distinguish between
voiced and unvoiced speech signals, because the latter tend to have much lower energy values
than the former. Energy is also useful to discriminate silent periods in a sound recording.
Lecture 6-7-9 - classification:
Note: The formula for energy spectrum, cepstrum coefficients and mel cepstrum coefficient don't
have to be memorized. You should know that such coefficients exist and are good for
classification. // TODO maybe
Lecture 6-7-9 - classification:
Rule based classifiers (principles, examples) * Rule based classifier:
Rules‐based classifiers distinguish between different classes by using a collection of "if...then"
decision rules.

If (colour == Copper) and (diameter == 20.50mm) then class = 10c


If (colour == Nickel) and (diameter == 21 mm) then class = 20c
Lecture 6-7-9 - classification:
Template matching (principles, distance, examples, advantages, disadvantages ) * Template
matching is a natural approach to pattern classification. We assume that each class is represented
by a single reference pattern, or template. A set of such templates or their feature vectors
(fingerprints) is available and stored in a database. Given a new, unknown test pattern, template
matching consists of searching the database for the reference pattern most "similar" to the given
test pattern.

*
- The advantage of this method is that it is simple and fast.
- The disadvantage is that the input image and the templates have to be always of the same size.
Different size or character orientation will cause misclassification.

**The question is now how to measure this resemblance:


- maximum correlation approach: The maximum correlation approach calculates the correlation
between the two images (test input and each template) and the class with the highest correlation
wins.
- minimum error approach: Pick the class with the lowest number of disagreements. This
approach needs to calculate an error, the distance between the two images (input and each
template).
Lecture 6-7-9 - classification:
Neural networks (what are they, a diagram, how do they work as classifiers, an example)
//TODO maybe
Lecture 6-7-9 - classification:
The essence of Bayes approach The essence of Bayes approach: is to provide a
mathematical rule explaining how our existing beliefs, P(B), should change in the light of new
evidence, A. Usually the probabilities P(A|B), P(B) and P(A) in (1) are known, and P(B|A) is not
known and can be calculated by using Bayes rule.
Lecture 6-7-9 - classification:
You should know how to calculate P(A | B) using Bayes rule The Bayes rule only connects
two rondom events A and B

The rule based states:

(1) ---> P(B|A) = (P(A|B) x P(B))/(P(A))


where A and B are random events, and P(B|A) is the conditional probability, meaning the
probability

that "event B is true given that A is true". For example if A is the event "I have flu" and B is the
event "I

have headache", then P(A|B) is the probability that I have flu, if I know already that I have
headache. In

contrast, P(B) is called the unconditional or prior probability that B is true.


Lecture 6-7-9 - classification:
Naïve bayes classifier - principle Bayesian classifiers in general try to infer the conditional
probability of the class, given the observed

values of the input variables (features vector). For example, the probability that it is a bird
knowing that it is yellow and it can fly.
Lecture 6-7-9 - classification:
Hidden Markov Models - How do they work as classifiers? HMM is a graphical probabilistic
reasoning algorithm that works well on a set of temporal data. At each

clock tick the system moves to a new state, which can be the same as the previous one or not.
The HMM

power comes from the fact that it deals with situations where you do not know the state you are
in (the

state is not visible, it is hidden). Instead, you see some observations that depend on the state.
Given the

observations, the model helps to deduce the states.


Lecture 6-7-9 - classification:
Unsupervised learning - clustering - principle * Unsupervised learning : Unsupervised
learning is the exactly opposite case of supervised where there is no information about the
correct outputs available at all. We don't have a teacher. The idea is to identify similarities
between inputs that belong to the same class and let the classifier algorithm do it by itself. In
fact, the classifier is provided with training cases without class labels. It learns by finding
compact and disjoint regions (clusters) for classes in a d‐dimensional feature space.

* The k‐means clustering: algorithm attempts to split a given data set into a fixed number (k) of
clusters.
Lecture 6-7-9 - classification:
Classifiers evaluation. Confusion matrix - what it is && example, TP, TN, FP, FN. What is a
ROC graph? * Classifiers evaluation:
The simplest way to evaluate the classifier's performance is to measure the classification error,
defined as the ratio between the number of "classification errors" and the number of
classifications attempted. For example, an optical character recognizer has been tested for 100
letters 'A', and it recognized them as 'A' in 85 cases. This means that the classification error was
15%. The "classification accuracy" is defined as (1‐classification error) = 85%.

*Confusion matrix: summarizes the results of a classification test. It gives information on how
frequently instances of class A were correctly classified as class A or misclassified as another
class. The entries in a confusion matrix are counts, i.e. integers. The total of the four entries TP+
TN + FP + FN is equal to n, the number of test examples.

* But we can also evaluate the classifier's performance in a more refined way:

- True positive (TP) ‐ an instance of class A is correctly classified as being from class A

- True negative (TN) - an instance not from class A is correctly rejected as not being from class
A

- False positive (FP) - an instance not from class A is wrongly classified as being in class A

- False negative (FN) ‐ an instance of class A was wrongly rejected as not being from A

* ROC (Receiver Operating Characteristics) graph:


ROC graph shows the classifiers performance in 2D with FP on the x‐axis and TP on the y‐axis.
Each classifier is represented by one point on the graph
Lecture 8 && 10 - System engineering:
The system engineering V-model The main technical activities needed in developing a
system are illustrated in a so‐called system engineering V diagram (Fig. 1).
- On the left side of this V diagram, the system definition progresses form a general view of the
user to a specific design.
- Based on this design, the hardware and software are implemented at the bottom of the "V",
- and the components of the system are then integrated and verified in iterative fashion on the
right side. Ultimately, the completed system is validated to measure how well it meets the user's
needs.
Lecture 8 && 10 - System engineering:
What are stakeholders? Give examples Stakeholders include anyone with an interest in or
an effect on, the outcome of the product. This includes customers, that can be the system's
intended users, but also the persons who commission the construction of the system, called
clients, sponsors, all responsible technical persons, managers, regulators (government), society
and environment. For example for the insulin pump, the stakeholders are the user, i.e. the
diabetes patient, the client is a company such as Medtronic, that will commission to build this
system, the medical doctors who treat the patient, the technical staff who will build and maintain
the system, the experts in Internet security, legislation (FDA), etc.
Lecture 8 && 10 - System engineering:
Functional vs nonfunctional requirements * Functional requirements: specify what the system
must do: the behavior of the system, how it interacts with its users and other systems, what
capabilities it provides and what information it consumes and delivers. For example: The system
should compute the FFT. Functional requirements state the verbs of the system. They do not
address how the system should accomplish this what. An example of a functional requirement
for the insulin pump is: "The controller shall compute the necessary insulin dose".

*Non‐functional requirements, as the name suggests, are requirements that are not directly
concerned with the specific functions delivered by the system. They define "how well" the
system must perform its functions, i.e. how well the behavior is achieved, such as look and feel,
usability (simplicity of use), performance (response time, accuracy), reliability, safety,
affordability, cost, maintainability, privacy or security. We will discuss more about safety
requirements later in this chapter. In contrast to functional requirements, non‐functional
requirements state the adverbs of the system. For example:

The system will recognize a written character with an accuracy of 98%.


Lecture 8 && 10 - System engineering:
Properties of a good specification document Properties of a good specification document:

- Correct - any requirement listed is one that needs to be met.

- Unambiguous - an SRS is unambiguous if each specification can have only one interpretation.

- Complete -SRS contains all requirements and all requirements are completely specified.

- Consistent - not in conflict with other requirements

- Verifiable (testable) - a SRS is verifiable if satisfaction of each requirement can be established


using measurement. Does each requirement have a fit criterion?

- Traceable ‐ focuses on the interrelationship between requirements and their sources,


stakeholders, tests, standards, regulations, etc.
Lecture 8 && 10 - System engineering:
UML use case, state, activity diagrams. You should know how to draw a simple one * Use
case:
A use case depicts the interactions between the system and the environment around the system,
in particular human users and other systems. Use cases describe scenarios of operation of the
system from the designer's (as opposed to customer's) perspective. Use cases are represented
using a use case diagram.
Lecture 8 && 10 - System engineering:
The definition of error, fault, failure. Examples * Error: A human error, also called mistake,
is defined as a human action that produces an incorrect result.
* A fault is a defect in the hardware or an incorrect step, process or data definition in software.
This is also called bug or defect.
* A failure is the inability of a system or component to perform as required or intended.
- Examples: Medical devices fail to operate properly, privacy‐sensitive data leak, planes crash,
space missions get lost, systems are recalled from the market because of poor usability, etc.

-------
I have slept 3 hours (human error). I have been coding for almost 10 hours (I made a fault a bug).
The plane has crashed because a system failure on the software(failure).

The failures may or may not apper immidately.


Lecture 8 && 10 - System engineering:
The waterwall, agile, Test driven development models: how does it work, advantages,
disadvantages. Development of a software product:

* The waterwall: the oldest and most widely used waterfall model, the phases follow each other
on the time line (Fig. 2). A project may take a few months until completion.

- Adva: The waterfall model is stable and well documented


-Disad: , but it requires the requirements to be frozen before the design and implementation can
start.

* agile: development, exposing the intermediate product to user feedback, and evolving it
through several versions. Development happens in sprints of 2‐3 weeks, where each sprint is a
sequence of the same phases: requirements, design, implementation, testing (see Fig. 3). Agile
methods only define very minimalistic requirements beforehand and work out the more advanced
on the way.

- Advan:
. One of advantages of Agile model is that working software is delivered very often, and
requirements can be changed on the fly.
. Also the cost of accommodating changes needs and correcting errors is reduced.
. Moreover, it is easier to get customer feedback, because the customer can actually see the
product.

- Disa: Takes a lot time. There is no any extra test after the product is completed

* Test driven development: First the tests for a small functionality are written. They will of
course immediately fail, because there is no corresponding code yet. Then code is written just
enough to pass these tests. Then new tests are added, followed by coding and the iteration
continues until all the functionality has been implemented.

- Adva: the advantage is that there is always a set of tests ready and also a not complete, but
working code. Safety critical systems are mainly developed with waterfall model, but attempts
are being made to move towards Agile practices.
- Disad: (I think that corrections): cost of accommodating changes needs and correcting errors is
expensive.
Lecture 8 && 10 - System engineering:
The V-model, validation, verification, and testing levels Intro: Testing involves different
verification and validation (V&V) activities that should happen in parallel with all development
phases.
* Verification: Verification checks whether we build the system right (are the algorithms good, is
the code conform the design, etc).

* Validation:Validation checks whether we are building the right system, by asking the user
whether the intermediate artifacts still look according to his ideas and expectations. Fig. 24
shows the V system development model enriched with V&V annotations.

* Testing levels:

• Unit testing is based on and testing the implementation of a detailed design

• Integration testing is based on and testing the implementation of architectural design

• System testing is based on and testing the fulfillment of the software system requirements

• Acceptance testing - based on and testing the fulfillment of the user requirements (contract
acceptance test, alpha test, beta test)
Lecture 8 && 10 - System engineering:
What is a hazard and how to perform a hazard analysis? Safety requirements belong to the
non‐functional requirements group in a SRS. They are formulated as result of a hazard analysis.

* A hazard, or an undesirable behavior represents a potential source of harm (i.e., physical injury
or damage to the health of people, or damage to property or the environment). Hazards in a
system can be of many origins, such as operational, electrical, mechanical, environmental,
hardware, software, biological and chemical, etc. A hazard analysis starts with
- First(1) an identification of all known and foreseeable hazardous situations and their possible
causes. The analysis can be performed through a meeting with all domain experts involved, and
using simple brainstorming or a well‐defined procedure (FMEA, FTA, etc).
- Second, (2) the risk of each hazard has to be estimated, calculated as the product between the
probability that it will happen, and its severity or impact.
- Third (3) risk evaluation is conducted, to decide if every identified risk is acceptable based on
pre‐defined acceptability criteria. The outcomes of the risk evaluation can be assessed as:
intolerable, as low as reasonably possible (ALARP), or acceptable. Ideally, all hazard risks
should be reduced to zero. In a realistic situation, the goal is to reduce (mitigate) the risk to an
accepted level through risk control measures and changes in design.
- Fourth, (4) if a risk is decided as unacceptable, control measures are designed and implemented
to eliminate it or to mitigate it to an acceptable
Lecture 8 && 10 - System engineering:
Understand how an automatic insulin pump works. automatic insulin pump. The system consists
of the pump itself, a disposable reservoir that stores the insulin, and a disposable infusion set
(which is the tubing that connects to the reservoir and which terminates in a cannula or needle
through which the insulin is infused). The needle or cannula is inserted under the skin, and the
insulin pump itself is worn externally.
Lecture 8 && 10 - System engineering:
What is a test case, what is an oracle? * Test case: case. A test case is a set of input values
and the corresponding expected output.
* Oracle: A trustful source of information that can provide us with the expected output is called
an oracle. For example the BMI
Lecture 8 && 10 - System engineering:
Testing techniques (scenario based, BVA, EP, model based testing) ** Testing: Testing is
more or less hunting for bugs or defects.
**Black-box: Some testing techniques are called black‐box techniques, because they only use
information from the requirements document.
**white-box: Other techniques are from the category white‐box, because they use additional
information from the internal structure of the module,

* Scenario based: A scenario is a hypothetical story, used to help a person think through a
complex problem or system. This method can be also used in software testing. Scenario testing
emulates the actual use of the software from the user's perspective. A scenario test is a test based
on a scenario. The scenario is a story about someone trying to accomplish something with the
product under test.

* BVA(Boundary value analysis): BVA is a black‐box test generation method suitable for
requirements where the input variable is restricted to a certain range. This method is based on the
fact that very often faults are introduced at the edges of valid intervals. The rule is as follows: if a
variable is restricted by requirements to a certain interval [xmin, xmax] and the increment is 1,
then test cases should be generated for at least the following 5 values: xmin, xmin+1, a nominal
value in the middle of the interval, xmax‐1 and xmax.

For example if we test a program that requires a variable called age to be between 18 and 55,
then we have to generate 5 test cases, that execute the module for age = 19, age = 19, age = 35,
age = 54, age = 55.

* EP(Equivalence partitioning): EP is another black‐box test generation technique. The purpose


is as usually to reduce the huge number of tested inputs. The idea of this method is to divide the
input domain in equivalence classes. Two inputs will belong to the same class if we suspect that
they are processed in the same way by the software. Of course we don't know this for sure,
because we don't have access to the code (black box!), but at least we can make a guess based on
our programing experience. From each class, we take one representative as input in a test case.
So we will have as many test cases as many classes.

* Model based testing: we can extract test cases from a use case (see Fig. 26), by asking that all
flows of events specified in the use case must be covered. Similarly, we can generate test cases
form a UML state diagram, by asking that these test cases should cover all possible transitions.
The big advantage of this model based testing is that the test generation process can be
automated.
Lecture 8 && 10 - System engineering:
Two ethical theories * Top down rule‐based approaches understand ethics as the investigation
of the right action. They answer to the question: what are the rules to follow in order to be
morally right? You can see here an analogy with the legal system. If one obeys the rules, one is
moral. An example is the --Deontological-- moral systems that are characterized by a focus upon
adherence to independent moral rules or duties. To make the correct moral choices, we have to
understand what our moral duties are, and what correct rules exist to regulate those duties. When
we follow our duty, we are behaving morally. When we fail to follow our duty, we are behaving
immorally.

* The --Utilitarism-- theory considers that an action is "right" as long as it satisfactorily causes
good consequences, compared to alternative actions, and it will be "wrong" if it doesn't. In order
to know if something is morally preferable for a utilitarian, we must ask: "Will it lead to more
benefits and less harms than the alternatives?" If the answer is, Yes, then it is morally preferable.
For example a utilitarian answer to the ethical question: "Is it good to kill people? "might be:
"Killing people is usually wrong either because people have value (and they might not exist after
dying), because everyone has a desire to stay alive, or because killing people makes other people
unhappy. This is a bottom up approach that understands ethics as the art/science of living a good
life, not as being bound by some set of rules. For the pervasive systems it involves a trial and
error learning of what constitutes an acceptable behavior.
Lecture 8 && 10 - System engineering:
You should be able to formulate an ethical question related to a given pervasive system. Who
pays damages in an accident?
How far should doctors trust intelligent systems?
Should the robot be taken away from the user if he gets emotionally attached?
........

pervasive Spread widely through society


autonomy Freedom to make decisions without constraints or interference
Lauren Rosenberg, Google Maps Sued Google for software negligently providing unsafe
walking directions (took her a long a no-sidewalk highway). Google stated that it was entitled to
First Amendment protection
GPS (global positioning system) a system that accurately determines the precise position of
something on Earth based on satellites orbiting earth.
SARSAT Search and Rescue Satellite Aided Tracking can now be bought by many
individuals who set off unnecessary searches or feel safe because of its presence
artificial intelligence a human-made artifact's ability to learn and reason
ANPR Software which processes video camera data to read vehicle number plates and compare
it to those stored in a database.
Face Recognition Technology Large database of images can identify people as they walk
by
Gait recognition technology Identify people by how they walk
Misuse of surveillance cameras FBI employees spying on teen girls
People charged because of video but images were lied about
Transport for London pointed a camera at a woman's bedroom
Web Crawler A softbot responsible for following hyperlinks throughout the Internet to provide
information for the creation of a web index.
spiders, web crawlers, software robots Software that traverses available Web sites in an
attempt to perform a given task. Search engines use spiders to discover documents for indexing
and retrieval.
PageRank Algorithm "An algorithm used by Google Search to rank websites in their search
engine results. It works by counting the number and quality of links to a page to determine a
rough estimate of how important the website is. The underlying assumption is that more
important websites are likely to receive more links from other websites."
e-rater Program that evaluates essays and student answers, based on twelve criteria.
TD-Gammon Backgammon playing software programmed to play legal moves against itself and
learn from experience, playing 1,500,000 times and becoming master like, used temporal
difference learning
Machine Learning Technique for making a computer produce better results by learning from
past experiences.
Unmanned Aerial Vehicle or Drones An unmanned aerial vehicle often used by the military for
surveillance operations.
Can also attack a target directly
Ad Hoc Committee for Responsible Computing a committee of ethicists and computer
science researchers who formulated a set of principles, known as the Five Rules, for apportioning
blame for harm caused by complicated computer systems
the Five Rules People who make the things are responsible for the foreseeable effects

Blame not dependent on people involved but ability for it to be foreseen

User is morally responsible for consequences of use

Make a reasonable effort to foresee the effects

Designers should provide enough information about them so others can foresee the consequences
algorithmic trading the use of computer programs to make rapid trading decisions
high frequency trading a subset of algorithmic trading that relies on computer programs to
make very rapid trading decisions
Flash Crash an incident that occurred on May 6, 2010, during which time the Dow Jones
Industrial Average dropped 900 points (9%) in the span of about 15 minutes, then recovered
almost as quickly.

An automated system sold a lot of stock really fast


Threat analysis a procedure to determine how a technology might be vulnerable to a
malicious attack
digital divide A worldwide gap giving advantage to those with access to technology
Claim right a right that one cannot obtain without the help of other people
liberty right when left alone
Luddites Any of a group of British workers who between 1811 and 1816 rioted and
destroyed laborsaving textile machinery in the belief that such machinery would diminish
employment.
deskilling Reduction in the skill needed to do a job, due to technology
neo-Luddites people who see technology as symbolizing the coldness and alienation of modern
life and as a threat to workers
prior restraint A government preventing material from being published. This is a common
method of limiting the press in some nations, but it is usually unconstitutional in the United
States.
The First and Fourteenth Amendments
Sedition Act made it a crime to write, print, utter, or publish criticism of the president of
government
New York Times v. Sullivan 1964; established guidelines for determining whether public
officials and public figures could win damage suits for libel. To do so, individuals must prove
that the defamatory statements were made w/ "actual malice" and reckless disregard for the truth
Universal City Studios, Inc. v. Corley "[L]eader of the computer hacker of community"
sued for distributing a program capable of decrypting DVDs with CSS technology. 2d Cir. says
fair use defense is not constitutionally required, and further it's irrelevant to anti-trafficking
provisions restricting access rather than use.
DVD Copy Control Association (DVDCCA) vs MclaughlinSuit against 72 individuals for making
DeCSS available online

Pervasive Computing / IoT Numerous, easily accessible, often inconspicuous computing


devices & sensors/effectors

Trend towards IoT


Computer User benefits from IOT Simplicity of use
Ubiquitous access
Minimal technical expertise
More intuitive interaction
Reliability & availability
Sensor Technology Miniaturized cameras & microphones
Fingerprint sensor
Radio sensors (RFID)
Location sensors (ie GPS)

Applications in:
Smart Dust
Environmental Monitoring
Non invasive Medical Monitoring
Smart Appliances
Smart Living Spaces
Homeland Security
Smart Dust "dust motes"
- Autonomous sensing & communication for <$1
- Sensors for temp, humidity, light, motion, direction, tilt, video, orientation (for inventory
monitoring, defense, etc)
- + bidirectional radio or laser + battery
Cloud Computing "Large groups of remote servers are networked to allow centralized data
storage & online access to computer services or resources"
- Distributed processing & network infrastructure
- Security, availability, auditability, isolation
- But no standardization
3 Service Models of Cloud Computing 1) Infrastructure
2) Platform
3) Application
Infrastructure as a Service (IaaS) Provisioning of fundamental *computing resources* incl
Server hardware, storage, networking, OS, DB, CPU, Memory, VMs
- Provider owns assets, is responsible for facilities
- "On demand" access to computing resources
Platform as a Service (PaaS) Delivery of a *computing platform* & *solution stack* as a
service
- "On demand" access to [Utilities, network, security, storage, cpu, server, OS]
Software as a Service (SaaS) *Applications* available to service consumers via browser-based
interfaces (run on cloud infrastructure)
- "On demand" software delivery
RFID (Radio Frequency Identification Devices) Lets retailers track goods from point of
manufacture all the way to store shelf
Digital Skin Made of silicon transistors that are grafted to the body
- Can monitor & wirelessly report bodily functions & chemistry
Bio Computing Use of molecules, DNA & nano materials to create computing structures
based on organic materials
Battery Capacity trend Increasing much slower than Moore's Law
Makes Power Consumption an issue (not speed)
Multimedia environment 1) *Authoring* (Live or stored content)
2) Media Encoder
3) *Distribution* (Media Services Server streams media)
4) *Playback* (Unicast/Multicast on Media Players)
Content drives trends - Content-rich servers
- Bandwidth will continue to incr at decr cost
- Computing power will continue to incr at decr cost
- Content that takes advantage of bandwidth & computing power will drive the value chain &
justify future investments in broadband capacity

How do we define information systems security? Processes and methodologies involved in


protecting *information* and *information systems* against unauthorized access, use,
disclosure, disruption, modification or destruction. (while resting & during transmission)
Define information systems security from a risk-management perspective. Security is risk
management, taking into account:
*Asset*- anything that could be of value
*Threat*- any potential danger to info lifecycle
*Vulnerability*- weakness or flaw that provides an opportunity for a threat to be exploited.
Risk = probability (threats, vuls) x impact (assets)
--> from this derive countermeasures/ safeguards
What is good enough security? Why apply it? All security mechanisms are crackable with
infinite processing power. Instead seek to minimize total expected cost where expected cost for
security incident = cost for security mechanisms
What are the 3-4 typical security services and mechanisms? *C*onfidentiality
*I*ntegrity
*A*vailability
(A)uthentication
-----
Encryption
Hashing
Digital Signatures
Passwords
How de we define confidentiality? The threat it safeguards with which mechanism?
Ensuring that only authorized principals can read the information. Safeguards against
disclosure using encryption.
How were encryption algorithms attacked? Brute force, cryptanalysis
How do we define integrity? What threat does it safeguard against with which mechanisms?
Integrity ensures that only authorized principals can modify the information. It safeguards
against corruption using Hashing, MAC code, digital signatures.
What is a hash and what does it do? It's a mathematical function that converts a string of
arbitrary length into a representative string of fixed length.
+ easy to compute in forward direction
+ non-invertibility: no two strings generate same hash
- impossible to reverse compute
What are the other integrity mechanisms MAC and digital signatures? *MAC*- message
authentication code. It's a has parametrized with a secret key for verification.
*Dig. signature*- only sender can generate and is verifiable by all, based on public key
cryptography
How does Bob digitally sign a message sent to Alice using the public/ private key technology?
Bob encrypts the message with his own private key. Everyone can use his public key and
verify that only he could have signed his message with his private key.
How do we define availability and against which threat does it safeguard against with which
Ensuring that authorized principals can access and use the system as intended, without
undue delays. It safeguards against Denial of Service (DoS) attacks using redundancy and load
balancing
What are the availability mechanisms redundancy and load balancing? *Redundancy*-
secondary copies of components take workload in case of failure
*Load balancing*- transfer workloads from overloaded components to others with lighter loads
How do we define authentication, against which threats does it safeguard with which
mechanisms? Identification and verification of a principal's claimed identity. Protects against
impersonation with username/ password.
How does authentication by passwords actually happen on the server side? User A enters
identifier A and password P to server M. M doesn't store passwords, but their has values. It
verifies a match by combining P and a salt value (extra protection) and inputting into hash
algorithm. A match verifies identity
What's the difference between positioning and tracking? *Positioning*- entity determines its
own location
*Tracking*- system determines entity location (privacy concern)
What's different about pervasive computing regarding security? *Extended computing
boundaries* (1 user n devices, IoT, limited devices)
*Context-aware* (location)
*Non-intrusive*
*Adaptive*
How are new attack vectors opened up by pervasive computing? Ubiquitous computing means
networked computer systems are deeply embedded into societal fabric. Our new usage patterns
of them open new vulnerabilities and opportunities. Damage from malicious attacks on them
becomes more varied and pervasive
Name three new attack vector examples regarding IoT, location, and extended computing
boundaries. IoT- integrated pacemaker communication can be hacked and person sent shocks
*Location*- tinder location triangulation
*Extended comp. boundaries*- ultrasonic tones gathered by user devices to see which ads seen,
where someone was, etc.
Name three categories of authentication methods with an example for each. Something
you *know*- i.e. password
Something you *are*- i.e. fingerprint
Something you *have*- USB key, smart card
What are two improvements to passwords, how do they work? *Federated AuthN*- Identity
provider authenticates user for many services , gives better user experience. --> SSO
*Password Manager*- SW app for creating, storing, organizing passwords using master key
How do we define adaptive authentication? Intelligent system selects the best mechanism
dynamically, depending on the context
Is adaptive authentication a complement or alternative to PMs / federated log-ins? Adaptive
Authentitcation *as first mile* and federations/ PMs as *second mile*
What are some examples of adaptive authentication methods? PICO- hardware based with
siblings and
CASA- context-dependent authentication
What is the new approach to designing comprehensive, versatile, & flexible adaptive
authentication systems? Follow well-known adaptive systems modelling principles
--> Monitor & Analyze, Plan & Execute based on Knowledge
What is meant by designing a "brain" for adaptive authentication? Brain analyzes and monitors
context and thereby plans for which authenticators can be used based on contextual information
and application sensitivity. Uses standardized interfaces/ APIs for flexibility
What future areas does the adaptive authentication logic need to address regarding implemented
authenticators, proxy application, and adaptation logic planning? *Implemented Auth*-
incorporate new authenticators and devices
*Proxy application*- integrate with applications
*Adapt. logic planning*- incorporate context, selection algorithms
What are the challenges/ open questions for adaptive authentication going forward?
*Security*-security of distributed components, analyze new attack vectors
*Privacy*- unobtrusive authentication is privacy intrusive
*Acceptance*- will users trust invisible authentication?, privacy/usability trade-off

It restricts freedom of expression to words that do not lead to criminal acts. What is the
impact on 1st Amendment rights of the Supreme Court ruling in Schenck v. United States?
libel, slander, or endanger another person. 'Reasonable restrictions' are allowed on freedom of
expression to prohibit the expression of words that
The Court interpreted Texas as protected, and Virginia as not protected. How does the Court's
interpretation of symbolic speech in Virginia v. Black compare with its interpretation in Texas v.
Johnson?
Americans need to be able to hear and discuss a variety of opinions. Why is freedom of
speech important in a democracy?
It helps people make the best choices on public issues. What is one reason that freedom of
speech is still important in American democracy today?
their broadcasts can be regulated to ensure they do not infringe on the rights of the public. Which
of the following is TRUE about the Court's ruling in Red Lion Broadcasting Co. v. FCC?
Because broadcasters use public airways,
The students' actions had 1st Amendment protection because they did not cause a disruption of
normal school activities. How does the case of Tinker v. Des Moines School District
illustrate constitutional provisions for limited government in the protection of individual rights?
cannot curb ideas shown in the film before they are expressed. In Burstyn, Inc. v. Wilson,
the Court cited "prior restraint on freedom of speech and the press" as reason to void a New York
law forbidding the showing of a particular motion picture. Prior restraint means that the
government
a form of expression that is protected by the Constitution. In Texas v. Johnson, the Supreme
Court held that burning the American flag is
laws prohibiting libel Which of the following explains one reason why States might be allowed
to stop people from posting certain comments on social media sites?
guarantee of free speech and limits on prior restraint Software companies have challenged State
laws aimed at restricting the sale of violent video games to minors. What aspects of the 1st
Amendment support the software companies' position?

libel false or unjust statements in writing


slander false or unjust statements in speech
Why is freedom of expression important to the American system of government? It allows
voters to discuss matters of public interest.
The Constitution guarantees the right to free expression because a democracy depends on people
being informed and being able to freely discuss public affairs in order to make the best choices
about public issues. x
Which activity is an example of slander? giving a speech that spreads harmful lies about a
private citizen
Slander is a restriction on the freedom of expression. The Constitution does not protect the use of
false or unjust statements whether they are spoken (slander) or in writing (libel). x
sedition an effort of people or groups to overthrow or harm the government by using
violence
seditious speech speech that encourages an effort of people or groups to overthrow or harm
the government by using violence
espionage spying
What does the Espionage Act make illegal? to encourage disloyalty in the military or to speak or
print disloyal statements about the government
obscenity material that is indecent
Which law or principle gives Congress the right to ban certain kinds of speech? the "clear and
present danger" rule
The clear and present danger rule states that some forms of speech pose a risk to the country and
that Congress should have the right to prevent that danger. x
Why is it difficult to legally determine whether material is obscene? Moral standards differ
widely among American citizens and communities.
Obscenity is material that is considered indecent, but it has been difficult to determine a common
standard of decency because moral standards differ among people. x
prior restraint placing a ban on written or spoken words before they are expressed
What was the court's ruling for the paper in Near v. Minnesota? The Court ruled that the state
could not place prior restraint on the paper; that is, it could not stop publication of the paper on
the basis of what the paper might publish.
shield laws laws that give reporters some protection against having to reveal their sources
What may happen if news reporters' sources are not kept private? Those sources may leave out
important information when talking with reporters or may refuse to be interviewed at all.
How does the Court ruling prohibiting prior restraint enhance the right of expression? It
states that the government may not censor most kinds of speech before they are expressed.
symbolic speech communicating ideas through facial expressions, body language, or by
carrying a sign or wearing an arm band
picketing the gathering of striking workers at a business site as a sign of protest
commercial speech speech for business purposes, most often for advertising
The Supreme Court has protected flag burning as what kind of speech? symbolic speech

Freedom of Speech is a type of liberty right. We have the right to express our opinions without
interference from the goverment or other people. Promotion of truth and expresison.
Hate Speech is defined as "epithets conventionally understood to be insulting references to
characteristics such as race, gender, nationality, ethniticy, religion, and sexualality."
What did John Stuart Mill say about freedom of speech? In his essay on liberty he argues that
freedom of speech is at the heart of democracy. Expression of ideas cannot be prohibited simply
bc people find them offensive.
What was the original purpose of the 1st Amendment? was to delegate the power to restrict
freedom of speech to the states; although the federal government could not restrict speech, the
state and municipal could
The 'marketplace of ideas', the tyranny of the majority, and powerless people in a society Ideas
are like a product on the market. Just as the free market tends to deliver the best consumer goods,
if everyone comes to the marketplace of ideas to express their opinions, the best ones will
eventually win out the others.

Tyranny: Mill was aware of this. In a democracy "there needs to be protection also against the
tyranny of the prevailing opinion and feeling, against the tendency of society to impose, by other
means then civil penalties, its own ideas and practices as rules of conduct on those of dissent
from them."
Senator Joseph McCarthy In the 1950s he reported on his investigations of Communist
subversion in the United States. His sensationalist report was followed by a series of public
hearings in which the careers of many prominent Americans were ruined on the most flimsy,
hearsay evidence. Defenders of McCarthyism argued that Communist ideas should be repressed
to "protect freedom" and democratic values. He was formally censored by the senate his demise
was follewed by a rapid expansion of the first Amendment. Speech other than political speech-
such as sexual speech, porn, entertainment, commerical, and nonverbal expressions were
allowed.
Patriot Act Gives the government official increased powers to eavesdrop on phone calls and
search pp records
Catharine MacKinnon on Pornography argues that it is immoral bc it poses a substantial
threat to women's equality and harms women. Her view is based on radical feminism which
focuses on the oppressive patriarchal hierarchy

~Accuse libertarians of placing freedom of speech above womens well being

~Porn restricts womens freedom and hence cannot be free speech

~Porn has no value in the marketplace of ideas bc it presents a distorted view of women and is
based on a lie of womens sexuality
John Stuart Mills and freedom of speech argues that the state does not with citizens freedom
except where restricitions is necesary to protect the person and property of others. According to
him the harm caused by censorship far outweighs any harm that might result from spreading
false opinions
Boss's Conclusion As moral agents we also have a moral obligation to respond to hate speech
Speech Codes on college campuses places restrictions on some forms of speech, such as hate
speech, fighting words, obscenity.

Was created to cut down on the frequency racism, sexism, and other hate speech.

Were intended to restrict offensive and bigoted forms of expression and encourage diversity.
Creates open and safe learning environments
Political Correctness Movement was the most successful in American history to restrict hate
speech. It was also the first time students asked professors and administrations to place
restriction on offensive speech.
Charles R. Lawrence argues that racist speech and discriminatory conduct are part of a totality
that is incompatible with equality

~Social context in which hate speech takes place is morally relevant to whether it should be
tolerated. Rather than defending abstract principles such as impartitiality, we should be more
concerned with defending the real victims

~Leader of movement to curb hate speech on campuses

~Counters that censoring hate speech is not a infringement on our right to free speech. Hate speech,
he maintains, is not really speech or an expression of an idea but an attack

The First Amendment ■ Congress shall make no laws respecting the establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press...
■ Did not apply to the state governments until twentieth century when they were incorporated
via the Fourteenth Amendments Due Process Clause
- Free Speech Clause in the 1920s
- Establishment and Free Exercise clauses in the 1950s
Seditious libel "Malicious, scandalous falsehoods of a political nature that tended to breach the
peace, instill revulsion or contempt in the people against their government, or lower their esteem
for their rulers." (Levy, Original Intent, 211) rarely enforced
Liberal understanding of Free Speech Past: did not exist
Present: broad but no absolute, freedom to express opinions
The Marketplace of ideas supposedly best ideas will win out and create well informed public
in practice has not worked out this way
modern liberal democracies often draw the line in different places
Free speech v academic freedom ■ Not absolute but distinct from free speech
- Ideas are tested by standards of logic, evidence, and coherence
■ Professors have been harassed inside and outside the classroom
■ Outside the classroom
- Limits on student speech (Student Code of Conduct)
- Protest is free speech
- Denying speakers a platform on campus not a violation of free speech rights
Did the states in the early republic have free speech protections? If they did, did they offer broad
protections for speech? ■ Even with protections for speech and the press, the states
frequently passed laws that limited them, especially concerning the common law concept of
"seditious libel"
Did Jefferson and Madison believe that there should be some restrictions for speech before the
passage of the Alien and Sedition Acts? Yes
Madison's Proposed Amendment: Free Speech and Press
■ "The people shall not be deprived or abridged or their right to speak, to write, or to publish
their sentiments; and the freedom of the press, as one of the great bulwarks of liberty, shall be
inviolable."
■ Jefferson's Recommendation to Madison's Amendment:
■ "The people shall not be deprived or abridged of their right to speak or write or otherwise to
punish anything but false facts affecting injuriously the life, liberty, property, or reputation of
others or affecting the peace of the confederacy with foreign nations."
Did the first amendment apply to the states before the 20th century? No
What are the threats to free speech on campus today? ■ In the classroom
- Limits on student speech (see syllabus)
- Some students afraid to speak out
■ However, this is not new and it is a broadly felt sentiment regardless of position on the topic
■ * criticism is not censorship or an attempt to silence the speaker
Do students have absolute free speech rights on campus? no
Compare and contrast how queens Mary and Elizabeth dealt with religious dissenters/heretics
during their reigns. Was Elizabeth's approach more enlightened? Explain. Queen Mary dealt
with heresy differently than Queen Elizabeth during her reign in England. Mary was a devout
Catholic who had no toleration and would burn people at the stake for heresy. Mary
approximately killed 300 people, giving her the nickname "bloody Mary". Elizabeth hung people
instead, killing about 280. Elizabeth had a more enlightened approach than Mary because she
considered not following her rules of religion and heretical acts to be treasonous. Elizabeth was
going towards a more tolerant way of ruling. People would not be killed for their faith, but for
their actions and choices against the monarch.
Explain the differences between Originalism and Living Constitutionalism. What are the problems
with both methods of interpretation? Which one makes more sense to you, and why? There
are differences between Originalism and Living Constitutionalism. Originalism is interpreting the
constitution as it was meant to be interpreted. Living constitutionalism can take into account
changes in society and be interpreted according to that. One problem with originalism is that there
is very little evidence to determine original intent and what we do have is very flawed. Another
reason is that we would be stuck to the 18th century and we would have to ignore the changing
values and changing society. Also, originalism lets lawyers intentionally distort the history for
political purposes. A problem with living constitutionalism is that it often is open to personal
preferences and bias. In addition, it cannot open the document for any interpretations. Living
constitutionalism makes more sense to me, because it can adapt to how society is changing.
Adapting to a changing society is helpful so that we can resolve problems easier in our time, as
opposed to going back to the 18th century.

Why is free speech essential to well-functioning democracy? 1. Adaptation


2. Self-correction
What are examples of adaptation? Changing marijuana policy
What are examples of self-correction? People debating policies, programs, and people
Why is there a tendency for people to want to censor speech? 1. Prevent criticism
2. Limit offensive, irritating, controversial speech
What are the dangers associated with censorship? Limits ideas and opinions that can be
expressed
Who has the power to determine what speech is prohibited? Trust people to be smart enough to
decide what is worth listening to/worth believing
Why is speech protected? 1. Human need to express one's self
2. Needed for democracy to function
3. Helps determine truth/quality of an idea
What is the marketplace of ideas? Best test of truth is power of the thought to get itself
accepted in the competition of the market
What are the two basic assumptions of the marketplace of ideas? 1. Trust in people to make
decisions
2. Pluralism
What is pluralism? There are many opinions and ideas; for market to work, need all of them
out there
What is relativism? Not all ideas are people worth; we can judge what is good or bad
What is the chilling effect? When people see others getting in trouble for saying certain things,
they restrict themselves
What is the chilling effect a form of? Self-censorship
What is the process of the chilling effect? Unprotected speech --> Protected speech considered
risky --> Person only says what is "safe"; inward --> outward
What is narrowly tailored speech? Speech written very specifically not to offend anyone -
when government constricts speech
What are 3 government regulations on speech? 1. Public Forums
2. Content/Viewpoint Neutral
3. Time, place, and manner regulations
What is a traditional public forum? Most freedom - sidewalk, park
What is a limited public forum? May need permit to use it; restricted by time of day, airport
What are time, place, and manner regulations? Have to be neutral, can't restrict because you
don't like what someone is saying
What is an example of a time, place, and manner regulation? Not being able to rally
outside of dorms at 3AM on a Wednesday
What is content discrimination? When something is banned based on its subject matter
What is an example of content discrimination? Banning political groups; allowing park to
be used for war protests but not abortion protests
What is viewpoint discrimination? More specific than content; when one side of argument is
banned from speaking
What is an example of viewpoint discrimination? Allowing Hillary and Trump supporters to
speak, but not Bernie supporters; allowing pro-life protesters and not pro-choice
What are 7 forms of unprotected speech? 1. Obscenity
2. Imminent Lawless Action
3. Defamation
4. Fighting Words
5. Criminal Speech
6. True Threats
7. Invasion of Privacy
What is obscenity? If speech has prurient interest; no redeeming political, social, or artistic
value plus a sexual element
What is prurient interest? Speech with some sort of erotic element to it
What is imminent lawless action? When speech is directed to inciting or producing
inappropriate action and is likely to incite and produce that action
What is an example of imminent lawless action? Can't get in trouble for saying let's go crazy
after the game 3 days before; can get in trouble for egging people on after game
What is defamation? Libel, slander; people can say a lot more about public figures than regular
citizens
What is libel? Written false information about someone meant to hurt their reputation
What is slander? Verbally spoken false information about someone meant to hurt their
reputation
What are fighting words? Very utterance inflicts injury or tends to incite and immediate
breach of peace; have to be specifically said to another individual, trying to provoke a fight
What is criminal speech? Speech directly leading to illegal actions
What are examples of criminal speech? Talking about robbing bank in abstract is okay, but
getting a van and guns is not; can get arrested for planning crime even if it never happens
(conspiracy)
What are true threats? Intent to commit an act of unlawful violence to a particular individual or
group of individuals; must prove intent (hard to do)
What is privacy? 1. Right to seclusion
2. Right to autonomy
What is autonomy? Certain behaviors government has no business restricting
What are examples of autonomy? Intimate things, reproductive rights, child rearing rights,
right to abortion, gay rights
What is seclusion? Right to personal space
When can private information be published? If proven newsworthy, if there was previous
publicity, public vs. private figures; intimacy of information
What 2 factors are relevant for determining an invasion of privacy? 1. Public vs. Private Figure
2. Previous Publication of Information
Why is the right to privacy controversial? Because of it's association with reproductive rights
What is symbolic speech? Encompasses many expressive activities - actions mixed with
elements of speech that express an idea or position
What is an example of symbolic speech? Picketing
Why is the First Amendment considered the "first among equals" in the Bill of Rights?
Thought of as most important; central to government and nation's survival; ensures
debate and allows for self-correciton
What was the primary motivation for the Establishment Clause? Reaction to England's
establishment of Anglican Church as nation's official religion
What is the clear and present danger test? Speech unprotected if words used are used in
circumstance and nature as to create clear and present danger that would bring about substantive
evils that Congress has right to prevent
Why is it difficult to determine if something is obscene? Because great degree of subjectivity
Freedom of speech The power or right to express one's opinions without censorship, restraint
or legal penalty - democratic ideal that dates back to Ancient Greece
Defense lawyer Argues the defendants case to try and clear them of all charges
Witness Gives evidence to the court
Defendant The person accused of the crime in court
Juror A member of the jury - decides the verdict based on evidence
Judge Make sure both sides present their case fully and fairly in accordance with the law
Magistrate A trained volunteer who hears cases in court
Prosecution lawyer Presents facts against the defendant to try and prove that the defendant
committed the crime
Usher/macer Helps with court administration
Court clerk Make sure the case runs smoothly and swears in witnesses
Legal advisor Gives advice to magistrates regarding points of law
Crown court Deals with serious criminal cases
Magistrates court All criminal court cases start here (around 95% are completed here) and
deal with less serious cases

Emerson: "The System of Freedom of Expression"; 1970


CLASSICAL LIBERALIST - 4 Premises of FoE in Democratic Societies
1. assuming individual self-fulfillment (humanity = a free mind; simply being 'human'
2. advancing knowledge to discover truth
3. participation in decision making by all society members - politics and building a culture
4. community stability - balance healthy cleavage and consensus

• suppression of expression makes rational judgement impossible


• people accept opposing positions if they are a part of the process

- Basic Implications:
•FoE is necessary but not at the expense of justice and protection
• depends on distinction between expression and action (state has to be able to control action but
expression is protected)
• thought and communication make up individuality
- Limitations:
•limiting FoE as defective (as emotional involvement goes up; peace goes down)
• requires self-restraint, self-discipline, maturity (able to sacrifice the individual and the short-
term for collective long-term
• limitations can hurt a healthy society (creating public fear and hysteria)

- Role of Law & Legal Institutions


• FoE fosters conflict but through persuasion, not violence
• Law needs to keep order

- Terms:
•constitutional liberalism: the values and functions which underlie our freedom of expression
Sunstein: "Free Speech is Not an Absolute"; 2001 - The government is allowed to regulate
speech by imposing neutral rules of property law.
- The Surpreme Court continues to say that political speech receives the highest protection
- Gov't is more likely to regulate commercial speech, obscenity, libel.
- Do not assume that free speech is an absolute, the government has many ways of regulating
speech
Constant: "The Liberty of Ancients Compared to Moderns"; 1816 - Liberty definition (ancient):
• sovereignty, deliberating in public squares, assembled masses
•collective freedom = authority of the community
(severe surveillance/religious freedom as a crime)
• domestic relations had public authority
• laws regulate customs
• reliance on war
• power in dependence

- Liberty definition (modern):


• individual rights are valued
• individual is stronger than the government
• power in private time
• less time in politic = more representatives = more surrendering of rights
• reliance on commerce
Dewey: "Creative Democracy"; 1939 - Main points:
• change in the frontier from physical to moral
• unused resources are human - not material
• false notion that democracy is automatic or innate
• democracy as a personal way of individual life -> institutions as extension of personal attitudes
• faith in intelligent judgment if conditions exist; democracy grants free conversation
• belief in cooperation as democratic
• faith in democracy = faith in experience & education

-downside: if we focus on legal structure than we think democracy is automatic


•have to believe that human nature is good if it is personal
Breyer: "Active Democracy"; 2005 - Main Points:
• liberty in the U.S. is freedom from government coercion and freedom to participate in the
government
• balance the liberty of the ancients and the moderns: active liberty of sharing national authority
and civil liberty from the government to pursue interests
- Role of Government
• democratic
• avoids concentration of power
• laws respect individuals equally
• acts according to basis of the law itself

-terms:
• active liberty: sharing a nation's sovereign authority with people
-> can easily trace line of authority to the people
->most forceful when participation is direct; weak when there is choice
-> people & leaders should have the tools to participate & govern
Lasch: "Lost Art of Political Argument"; 1995 - info is gathered through debate; not info
- arguments produce attention and relevancy
- role of the press is to encourage debate; not put out info
- schools and journalists are to blame for lack of debate

*Why debate declined?


-role of press shifted from partisan to civic obligations
- professionalization of politics: experts moved in; issues above the need for public debate

*Lippman's Argument
- Lippman's idea of new journalism where politics are limited to those with information (experts)
- public can not govern itself
- argument is not necessary if information is correct

*Counterargument to Lippman
- debate = the right questions = correct answers
- need to argue to know opinions
- necessary for learning/education
- Dewey idea: Press is the town meeting: has to inform and keep the conversation going

*Role of Advertising
- advertisers = hidden persuaders
- readers wanted newsworthy material but newspapers cater to advertisers
Sunstein: "Social Glue & Spreading Information"; 2001 - free speech and free press adds
pressure to the government to prevent things like famine -> knowledge so the government can
dodge public retribution
• knowledge cut off in non-democratic societies

- shared experience and knowledge is countered by niche media-> shared info benefits a society

- solidarity goods: items of shared meaning and purpose (national holidays)


• provides a meeting ground for interaction
• view one another through similarities (unfamiliar becomes familiar)
• fewer shared experiences due to the more options
• diversity is desirable in topics and POV

- info as public good: benefits of learning something that is not internalized


• downfall on relying strictly on individual choices because you need info that can strictly help
others
Lippman: "Public Opinion"; 1922 - Symbolism and Public Opinion
•competing symbols: charged with emotional and only representing a segment of the population
• public opinion has to balance the various voices/opinions
• fictions and symbols are important to social order -> machinery of human communication
• concerned that a complete fiction by external facts can alter perception dangerously (we
respond to fictions as we do realities, sometimes creating them)

- Terms: pseudo-environment: human flaw where the world is created by symbolic versions of
the world that is more manageable to the human
• people make decisions about things that are only imagined
• limiting access to facts:
1. artificial censorships
2. limited social contact
3. constrained time
4. distortion of short messages
5. difficulty in explanation
6. threat to established routine

- counter these limitations by bringing in experts to advise leaders


Lippman (Lecture) - What is truth?
• Plato's Allegory of the Cave
• Lippman's fight is whether truth is external or internal -> concept of the outside world
• groups of experts that try to figure out that truth
• wants to control information: believes that truth is an identifiable thing
Dewey (Lecture) - What is truth?
• considers Emerson's limitations as a virtue
• we have to come together to collectively make decisions
• both sides of the debate: work on outside world, people have to create 'truth' as a product of
their own environment and experiences
• believes truth can be achieved by free speech governed by moral rules, not being hateful or
harmful
Plato: "The Republic"; 380BC - concerned with the teachings to children; suggests
censorship to curb false images through speech
- young unable to distinguish the allegories of the Gods as example; need the stories to be
virtuous
- state decides what should be governed but not the composers of the literature
- truth prized highly but rulers can lie at the benefit of the state
- not all attributes of the Gods are beneficial: some are against the government: not convince
boys of the wrongdoings of the gods

- Plato on Authoritarian Theory (Siebert reading)


• believer in aristocratic form
• nature of man would degrade gov't to tyranny
• gov't should control unity in cultural/political goals -> control opinion and discussion
Siebert: "The Authoritarian Theory of the Press"; 1963 Authoritarian Theory
- adopted when society and technology developed 'mass media'
- two systems of social control
1. common sense of right of community and enforced by social pressure
2. institutional organization and operated by legal mandates and penalties (authoritarian =
institutional)
- basic definition: press as an institution is controlled through government institutions
•press operated under the principles of society at the time of emergence

- Basic Assumptions (determining relationship between man and state)


1. nature of man: can only reach full potential as a member of society
• individuals reach is limited; societies are built for greater success
• group as more important than the individual

2. nature of society and state: combo of all desirable attributes


• achieved through divine guidance, dependence on intellect and fate

3. relation of man to the state


4. nature of knowledge: discoverable through mental effort
• wise men = leaders or advisors
• knowledge is the standard for the whole community
• gov't only functioned if everyone participated
Will: "Nazis in Skokie Are Confusing"; 1978 - nazis have challenged the constitutionality
of laws forbidding demonstrations with swastikas
- rationale is that public policy will develop through clash of ideas, evil and benign
- ideas being accepted in market competition is a test of truth
- political purpose for protecting free speech by some speech is incompatible
- belief is connected to action
- incitement or motivation for action
- swastikas and symbols can not be persuasion -> logical attack of personal beliefs
- marketplace can only guide popularity, not truth
- freedom of speech that does not injure the overall public
Authoritarian System in Europe (Lecture 5) - medieval Europe: kings have all of the authority
from God; men do not have access due to sinning nature
- church is in it for the saving of souls
- written authority is the Bible: only the learned can access it
• can not be changed
• the constitution as the unchanging doctrine: supreme Court as the priests
Hallowell: "Rise of Liberalism", 1950 - What is liberalism?
• emerged at the time of the Renaissance & Reformation
• expression of new individualism -> faith in the autonomy of human reason and the goodness of
man
• notion of the commercial class
• God no longer the focal point, man is!

- Start of liberalism
• Christian ideal that all men are equal in sight of God
• reformation destroyed concept of intervening hierachy or priesthood -> man had full access to
God
• man in renaissanc became more conscious of will and power to create his own pleasure
• system of status: more flexible due to contracts and individual initiative (no more privilege
based on birth/social position)

- Commercial Class
• spoke of more rights (labor, body, speech, writing, fair trial)
• share in administration of gov't

- New Individualism:
• autonomy: no individual submit to the will of another
• freedom: common authority and responsibility
• struggle in balancing freedom and taking political control

- Personal Liberty vs. Authority:


• law as the only restraint (eternal, universal, rational, IMPERSONAL)
• conscious reliance that individuals rely on reason; not personal interests (conscience)
Classical Liberal Criteria (Hallowell reading) • absolute value of human personality
• autonomy of individual will
• essential rationality and goodness of man
• existence of inalienable rights due to humanity
• state exists to preserve and protect rights
• state and individual are under contract -> individuals can revolt if contract is breached
• social control is best secured by law, not command
• gov't with less involvement is best
•individual freedom in all spheres of life
• truth is accessible through natural reason
Classical Liberal Notions of Knowledge (Hallowell) - intelligent beings are of a finite nature ->
more knowledge = governed by nature's laws
- ignorance as obstacle to real freedom
- entering society = state of war due to inequalities
- 3 kinds of law:
1. political: governors to be governed
2. civil: relations from individuals to each other
3. international

- 3 species of Government
1. republican: power in the people or part of the people (democratic and aristocratic)
2. monarch: single person by established laws
3. despotic: single person by his own will
Transition of Government Styles: Unequal Capacity But Equal Moral Worth 1.
authoritarianism: authority of Right Man/absolutism
• moral equality in man but man has fallen so mediator of pope or king has direct contact to God

2. Classical Liberalism: authority of right reason; cosmic and man-made law


- 14th-16th century: picks up strand of equal moral worth: RENAISSANCE

- nature of man: Man is good overall


• man as self-owning and self-motivated
• using reason

- Two places for God: theism (pray to God) and deism (God created reason)
• Man has access to God on his own

- Inalienable Rights of Man


• rights of life, liberty, and pursuit of happiness
• right to life = right to biological existence
• liberty = right to complete control over your own life (if we're all equal than no one can have
more authority than another)

- Rules:
• only rules necessary are those which allow the rights of man
• moral and natural rules are all the same: all part of a natural, reasonable world

-Sovereign is decided by individuals on the common basis of reason and conscience


Smith: "The Wealth of Nations"; 1776 -Economic activity is part of human nature
• Self interested
• To exchange and trade- mans symbolic function

-Economic activity has its own regulations


•Supply and demand
• Regulates to point where the seller will make a profit, yet the buyer will get a good price- point
of equilibrium
• The best interests of everyone are at this point
• No laws are needed
• every man to apply himself to a particular occupation to cultivate his talent

- Classical liberal elements


•Self interested human beings- looking out for themselves
•Engaging with others to better help yourself

- Unreasonableness of Restraints
• one nation's gain as another's loss = source of dischord

-Terms:
- invisible hand: value of product is dependent on profits to employer (point where buyer and
seller to exchange goods)
•if economics stay constantly and naturally regulated then everyone wins
• people can negotiate on their own
• working for his own gain and security -> his own interests support society unknowingly
Locke: "The Second Treatise of Government"; 1689 -State of Nature- the idea that affairs are
ordered to societies liking. MAN IS NOT TO HURT SOMEONE ELSE
•Prosecute the transgressor - if someone hurts you, then you can prosecute. this causes a war,
when the state of nature is disrupted
•State of Nature is not a state of War, but if there is a time of war then you need "fight"/ punish
the transgressor then the state of nature becomes one of war.
•Will ultimately return to the state of nature
•Punishments need to be on equal scale as the crime "eye for an eye, tooth for a tooth "

-Natural Liberty vs. Slavery


• Slavery is when you declare war on someone
•Take away their natural rights
Property
•Everyone has ground to their own property- BODY
•Uses the apple on the tree example- if you pick the apple the apple is your property
• Man should only take as much property as he needs- however there are imbalances (Slavery)

-State of Society
•Allows for a more organized state of nature
•Social Compact- the agreement the individuals make to be a member of a society with a
common authority
•Men must have a majority decide to be in the social compact- once you join you are bound by
its laws
• However, if many and the society is truly unhappy, then can dissolve it.
Locke (Lecture Notes) - State of Nature
•man is perfectly free to order his actions
• limited by nature's laws -> reason
1. masterless man
2. man ought not harm one another
3. right to punish the transgressor
- State of War
• active design between people to attack each other
• intention to impose rules on other people
- State of Slavery
• wrong by taking away the rights/power of life and death over someone else -> a type of war
- Property: foundational property is our bodies
• labor and feeding ourselves: mixing body with the land

- man is not completely sure of the laws of nature but learn it through experience

- why start a political system?


• protection against others
• men are too self-loving
• more efficient morally to manage conflict
• men get together to create a social compact to create commonwealth (mutual consent to be
bound with authority to vindicate natural rights; majority of men make laws together
• unjust laws can result in people leaving
• have to consciously decide to join society

- how can one be free and under authority?


• must give up the right to punish the transgressor to the state; collective punishment of people
Declaration of Independence; 1776 ** Classical Liberalist document outlining the reason for
separation from England**

- separation from England is God's drama not people's


- political bands aren't automatic so they have the rights to disband it
- opinions of men count now opposed to the Christian ideal
• men as rational so ideas should be respected
• men sitting around a table deciding
- "we hold these truths to be self-evident"
• truth exists and everyone can see it
• all men are created equal with inalienable rights
• concerned with life, liberty and the pursuit of happiness: happiness = wealth; very unchristian
since not concerned with the next world
- only purpose of the government is to make sure rights are upheld
- people will suffer to an extent because government is not perfect but enough is enough
- don't want to call out parliament because it is a type of social compact like the founding fathers
Milton: "Areopagitica"; 1644 - written at the time of the Puritan led Parliament
- Background to book: The Licensing order required all publications to be officially licensed by
parliament before they could legally be printed; mandated the registration of all authors, printers
and publishers with the government; agents could search for, seize and destroy any publications
that were offensive to the government and arrest authors, booksellers and printers
- against the abuse and persecution of good men but not against the limitations of bad books
(Plato-like)
- by stopping books, you are discouraging learning and stopping the advancement of truth
- reason (books) represent immortality
- placing 2 or 3 people in charge of the press is problematic because they have their own biases:
placing the licensers above everyone else in the land
- inventors are being silenced
- knowledge can not overpower the conscious: if you know evil and you still abstain then you are
morally bound --> need evil to figure out the good
- if we regulate printing then we must regulate all other forms of that could be corrupt -> never
ending cycle
- discouraging learning and insulting intellectuals who are being judged by people of lesser
expertise
• people are not publishing false accounts on the fear of the licensers
Milton (Lecture) - Background of Milton
• incredible writer who talked about classical authors of Rome and Greece
• famous work was "Paradise Lost"
• father was a protestant who was disowned by his Catholic grandfather; father gets rich and puts
him in Cambridge but Milton gets kicked out for fighting
• wants to be able to get a divorce like Anglicans but politically finds himself on the wrong side
(prior restraint against his pamphlet)

- Milton's Arguments:
• problematic to not be exposed -> bad is necessary to know the good
• concerned with licensers as gatekeepers -> censors can not be exempt from bad influence either
• dangerous to impose limits since other pop cult can be corruptive too
• learn more in honesty in exchanged than in false pretenses
• contrasts Plato because it was a fictional republic; even he wouldn't dare to put it into action
(Plato, like Lippman, argues for experts)
• God gave us reason to know the bad from the good (God created bad so there must be a
purpose for it)

- Limits to Milton:
• if what's published is terrible, then gov't should step in but should not be censored in advance
Levy: "Emergence of a Free Press"; 1985 - Current Knowledge of Free Speech
• freedom is not speaking with reservations
• parliament has to be strong enough to ignore the criticism
• people considered the masters of gov't; not subject to it
• printing magnified the dangers of opinion
• could print but liable to libel: criminal if provokes revenge and ends peace

- 4 Classes of Libel
1. blasphemous: defaming religion typically coupled with laws against heresy
2. obscene: protected public morality but limited literary, dance and personal expression
3. private: protected individual reputations
4. seditious: crime of condemning or ridiculing the government to jeopardy of public peace
• skeptical because boundaries and definitions are unclear

- Role of the Press and Seditious Libel


• early 18th century had a lot of partisanship but little persecution
• 17th century works on harming a king = treason to be hange
• persecution tricks: charge with libel and force them to leave to avoid trial, outlaw him and
prevent his return
• system lifted in 1694, did not free the press
• parliament had free speech but nonmembers did not
• only wanted intellectual, Protestant publications
• advocated for the use of Latin to block out uneducated
Lecture: Emergence of the Free Press Review:
- Milton: idea and fundamental argument that truth is going to win, evil serves a purpose
• radical for believing that Anglicans should have the right to speech

- Locke: main limits were people overturning or ignoring contracts

- Seditious Libel: against the law to speak out against the government, nervous of revolts due to
criticism, criticism can be believed by other citizens -> putting the government at risk

Timeline:
- 1275: Government of England began speech control
• stop speech in advance (prior restraint)
• punish people after publication
-1642-1651: abolish Henry VIII idea by establish licensing
- 1643: licensing act occurs
- 1644: Milton writes for free speech
- 1689: free speech for Parliament officials
- 1694: repeal of the Licensing Act
- 1690: Locke writing on ideal society
- 1776: U.S. revolution
- 1789: French Revolution
* William Blackstone in the 1700s as a progressive view of free speech
Lecture: Prior Restraint 1. imprimatur and Licensing Act: curb speech before its written
2. Blackstone: against prior restraint for the liberty of the press
• press is essential to a free government: rights have to be responsibly
• social compact: give rights to the government; punishment if free will is abused
• have the personal right to believe whatever you want but public is concerning
Bill of Rights Foundation of Constitution:
- use Locke ideas for foundation: can make their own government
- Blackstone concept: prior restraint as unnecessary
- seditious libel: speaking out against government in a way that lowers people's opinions of
government
• criminal law to speak out -> considered treason
• requirements for looser seditious libel: strong government that can take criticism, differentiate
opinion from truth

Constitution:
- tea party: 13 individual colonies must agree for things to progress -> eventually move towards a
majority
- Two parties: federalists and anti-federalists
• anti-federalists: concerned about gov't having too much power so they are for the BoR to
restrain the government (mainly concerned with taxation)
**JEFFERSON**
• federalists: want a major connection
**MADISON & HAMILTON**
- constitution only need 9 states to adopt it but anti-federalists want to stop it. Want to hold
everything up so a second convention would need to be held
• amendments would require all 13 votes
• most states have a BoR

- Federalists: don't want the BoR (lead by Madison)


• believe that man has certain rights that do not get violated just because of the government
• unnecessary and dangerous to state rights due to those that get left out
• there are certain rights which are derived from natural rights

- Jefferson convinces Madison to have BoR -> constitution has to be passed before BoR
• Madison created the 10 amendments
First Amendment - Levy: historian who published in 1960 funded by non-profit group in
1957
• during the McCarthy period
• communist who wanted to overthrow capitalist
• history of first amendment was needed

- Framers: not discussing the First Amendment, more concerned with trial, taxes, etc.
• speech as a non-factor
• took law of seditious libel as Blackstone -> gov't could be criminally assaulted

Describe Free Speech in the American Democracy Citizens and noncitizens alike have the right
to speak freely, to read and write what they choose, and to worship as they wish or not worship
at all. The Bill of Rights - the first ten amendments to the U.S. Constitution - protect those rights
and others.
Pure Speech verbal expression before an audience that has chosen to listen
Symbolic Speech (Provide Example) the use of actions and symbols, in addition to or instead of
words, to express ideas

Ex. Symbolic speech involves actions, the government can sometimes restrict it in ways that do
not apply to pure speech - for example, if it endangers public safety.
-Stromberg v. California (1931)
-U.S v. O'Brien (1968)
-Tinker v. Des Moines (1969)
-Texas v. Johnson (1989)
Obscenity anything that treats sex or nudity in an offensive or lewd manner, violates
recognized standards of decency, and lacks serious literary , artistic, political, or scientific value
Defamation false expression that injures a person's reputation
Slander false speech that damages a person's reputation
Libel false written or published statements that damage a person's reputation
Fighting Words words spoken face-to-face that are likely to cause immediate violence
Commercial Speech speech where the speaker is more likely to be engaged in commerce and
the intended audience is commercial, actual, or potential consumers
Seditious Speech (Provide Example) speech urging the resistance to lawful authority or
advocating the overthrow of the government

Speech that urges the resistance to lawful authority or advocating the overthrow of the
government
Ex. Schenck vs. United States
How can the government regulate each of the following aspects of speech?

a. Time
b. Place
c. Manner The government can regulate how and when people have rallies and such things.
Most cities require permits to hold a march or use sound trucks
Describe Free Speech in Public Schools The rights of public school students may at times
conflict with the rights of others or interfere with the need to maintain a good learning
environment.

In addition, courts consider the age of the student and the precise educational setting when
deciding these cases: a student at a public university is likely to have greater expression rights
than a middle school student.
U.S. v. O'Brien Four young men burned their draft cards to protest the Vietnam War. The
were arrested for violating a law that required them to keep their draft cards in their possession at
all times. The Supreme Court ruled that the law did not violate the First Amendment because it
served a valid government interest and was not intended to suppress speech. The men could have
sent the same message in other formats.
Tinker v. Des Moines Students wore black armbands to school to protest the Vietnam War. They
were suspended, but the Supreme Court ruled that the school could not punish the student for this
symbolic speech. It said students do not "shed their constitutional rights to freedom of speech or
expression at the schoolhouse gate" and this particular symbolic speech did not substantially
disrupt the school's educational environment.
Texas v. Johnson A protester burned the American flag, which was against the law in Texas.
The Supreme Court said the law banning flag burning was unconstitutional because it infringed
on the right to free speech.
Schenck v. U.S. The Court ruled that Schenck's conviction was unconstitutional because
his actions took place during wartime when there was a "clear and present danger" that they
would bring about "substantive evils." If conflict occurs between free expression and public
safety, judges often look at whether the speech present and immediate danger.
Hazelwood v. Kuhlmeier The Court ruled that school officials can regulate student speech in
school-sponsored activities, like the school newspaper and theater productions.

Preferred position doctrine Interpretation of the First Amendment that holds that freedom of
expression is so essential to democracy that governments should not punish persons for what
they say, only for what they do.
vagueness test A constitutional rule that requires criminal laws to state explicitly and definitely
what conduct is punishable. Criminal laws that violate this requirement are said to be void for
vagueness
prior restraint Censorship imposed before a speech is made or a newspaper is published; usually
presumed to be unconstitutional.
symbolic speech is a legal term in United States law used to describe actions that
purposefully and discernibly convey a particular message or statement to those viewing it.
political speech is the type of speech that receives the most protection under the First
Amendment. Political speech is the core expressive activity that forms the foundation of our
democracy; it receives the highest level of protection under the First Amendment
least restrictive means test standard imposed by the courts when considering the validity of
legislation that touches upon constitutional interests. If the government enacts a law that restricts
a fundamental personal liberty, it must employ the least restrictive measures possible to achieve
its goal
defamation the action of damaging the good reputation of someone; slander or libel
libel Written defamation of another person. For public officials and public figures, the
constitutional tests designed to restrict libel actions are especially rigid.
slander make false and damaging statements about (someone).
clear and present danger doctrine Interpretation of the First Amendment that holds that the
government cannot interfere with speech unless the speech presents a clear and present danger
that it will lead to evil or illegal acts.
commercial speech has been defined by the Supreme Court as speech where the speaker is
more likely to be engaged in commerce, where the intended audience is commercial or actual or
potential consumers, and where the content of the message is commercial in character
fighting words Words that by their very nature inflict injury on those to whom they are addressed
or insight them to acts of violence.
hate speech speech that offends, threatens, or insults groups, based on race, color, religion,
national origin, sexual orientation, disability, or other traits.

You might also like