Thursday, April 9, 2015

Online Speech and Appropriateness: Here Comes Everybody Analysis

Shouting “Fire!” in a crowded theater is, when there is not a fire, an irresponsible act. Doing so may cause a panic and, ultimately, could lead to injury and would at least disrupt whatever show was playing. This act is not that common, however, because there is a chance that the perpetrator would be recognized and chastised, and most people are not “brave” enough to do so in the first place. Yet, with the advent of the internet, similar acts of irresponsible communication have become prevalent. It is vital that we employ ethical choices when we communicate online. This idea is one that pervades the book Here Comes Everybody by Clay Shirky, and can be observed in his discussions about Wikipedia, the general way more people are gaining a voice online, and the ability for the internet to give a voice to those in need.
The main reason a person would needlessly shout “Fire!” is to sow discord or cause problems. These are the types of people who would go onto the Wikipedia page of a group or person they dislike and vandalize it. It is not unreasonable to assume that if there were no repercussions, both of these violations of common decency would still occur, but a Wikipedia article is far more susceptible than a theater. Especially because of the presumed anonymity the internet provides. A vandal may be IP banned, but the real power preventing lasting damage is the community that would swoop in and fix the problem, like when Shirky himself fixed “three in about a minute a half” (272). Herein lies our moral choice - do we graffiti the digital walls knowing one or two clicks would fix our innocent mischief, or do we scour the archives and look for articles to rescue? Perhaps most of us would simply fix a mistake we found or report a problem we encountered and would not be so proactive either way. This is our prerogative as the ability to impact the information online increases. With everybody online, we should not be surprised to find people in either group.
Obvious defamation of public works or events aside, a bigger question is just what is alright to put online? Finding a lost phone by posting online is not a bad message to send out to the world, but insulting and slandering the girl who has the lost phone is clearly not appropriate. “[D]iscussion by the male participants as to whether Sasha was attractive enough” (12), in no way related to the return of the lost phone and was simply a form of attack. Rude remarks and criticizing comments abound on the binary billboards of the internet. People feel more and more free to speak with no filter thanks to “user-generated content” (83). This can promote frank discussion, but it can also allow hateful, hurtful speech to come out and tarnish reputations and distance people. Even simple exuberance can lead people to post far more information than they intended and, in addition to damaging others, they may put themselves at risk. This is an even larger problem with children, whose trusting natures may lead them to compromise themselves to the predators that lurk online. Thus, we must strive to be ethical in our postings and educate ourselves and our youth so that people are more sensitive about what is appropriate to put online. Shouting “Fire!” may cause panic, but shouting out embarrassing secrets or private thoughts is just as harmful.
However, not all is doom and gloom. Shouting “Fire!" when there is a fire is the right thing to do, and using a megaphone to do so is even better. This is why we have fire alarms and why the internet, and its ability to give a voice to the voiceless, is so valuable. When abuse occurs or human rights are violated, the internet can draw attention and ensure those in need can receive aid or support. This was the case Shirky described as happened in Egypt when the government was detaining bloggers whose best method of gaining their and their comrades' freedom was continuing to blog (185). Many of the poor practices our leaders or corporations engage in can be brought to light by such various blogs or “Wikileaks-like” sites of the net. It is not hard to imagine how differently the myriad revolutions of the last few decades would have gone without the global communication afforded by technology. More and more, the internet is the main tool being used in this effort. In this regard, it is important that society as a whole embraces the positive benefits and uses of the computer and the networks it connects to around the world. It may be used trivially to unite those with common interests who want to use Meetup and “come together” (196), or vitally to reunite those separated after a natural disaster (293). Online social interaction has the potential to save lives and improve the world for everybody.
As the internet grows and more people gain an outlet and an audience, it is important that we dissuade vandals, promote sensitivity and discretion, and help those in need gain attention and support. The internet is a tool (267), one that has changed the world similar to the printing press and the radio, but still a tool nonetheless. Society adapts in response to the effect of a social tool, but the use of it will also promote a new approach or magnify an old one (294). However, we are still the ones who are holding the tool. A fire alarm in a public space is available to all, so we must use restraint and control ourselves when deciding to pull it or not. Yet the lever is often out of reach of children or behind a cover and, on the off chance a miscreant pulls it, some will spray out a dye. Considering the internet has a far wider reach than a single fire alarm, we must use similar protections so everyone may ethically exercise their freedom of speech online. Because in this day and age, “shouting ‘FIRE!’” is just five keystrokes away (with caps lock on of course).


Shirky, Clay. Here Comes Everybody: The Power of Organizing without Organizations.
New York: Penguin, 2008. Print.

Study Journal 7

Technology and the Church

3/31
The technology or websites involved change, but the messages the Lord provides about technology are always pertinent.

We need to keep the bigger picture in mind when we are programming or using a computer, not just focus on one aspect we enjoy.

We can share so many good things on social media, it is inconceivable that we would instead waste so much time instead; we must learn how to best use our time.

4/2
The Lord will help protect His church and its various digital services, but we must do our part to create systems that don't rely on miracles to work or stay stable.

Privacy and ownership of data is something the church takes very seriously, and we should emulate this dedication as well.

The Lord and His servants want us to have as much access as possible to the Gospel, and the internet is a primary tool to provide that access. We must remember the purpose of the digital age and not just live in it.

4/7
The tools we have online were inspired by the Lord to serve His purposes, not just entertain us.

We have an obligation to help with the redemption of the dead. This is done not just in the Temples, but online as well.

We should never underestimate the human element when we automate systems pertaining to the salvation of man.

4/9
Just because we have high fidelity in our digital world, that world is not the real one and we must remember that distinction.

How we represent ourselves online should be true to who we are in life.

It is important that we spend time away from the computer to work on our own lives and not just our digital presence.

Post 5

Every invention has the potential to improve our lives or enable some task we never before considered. This is due in large part to the Lord inspiring those who invent these new devices and systems. Yet any tool can be perverted for inappropriate uses. We often seem to forget why the Lord provides the tools He does. It is crucial that we remember that the computer exists in order to facilitate the work of the Lord. A key function of this is the work we do to redeem the dead. I hope that as we are faced with thy myriad distractions online that we spend some time regularly to help those who came before us prepare for their eternal salvation. Just as they built the cities and temples during their lives so we can be blessed in our time, we must use the tools available to us to help their spiritual growth now. We must remember the adage of doing the best things available with our time instead of things that are merely good. Because the Lord does not care about our high scores or funny blog posts, but He does expect us to do our part to further His work.

Thursday, April 2, 2015

Post 4

As members of the Church we are blessed to have the Lord's guidance in spiritual and temporal matters. This naturally extends to the technologies we have in this era of human history. It would be easy to fall into many traps with regards to the use of the digital tools we enjoy, but the Lord not only inspires the creation of these tools, He also, just as with the procreation powers He grants us, tells us how to use them through His servants. I am so grateful the Lord has enabled us to hasten the work of the Gospel through the judicious use of the internet and the many devices and gadgets we have. It is a testament to the truth of the Gospel to know the Church is at the forefront of using these tools, and that the Lord and His Apostles are aware of the benefits and challenges they provide. I cannot imagine my own life without technology and hope to do my best to use it wisely. We are able to do so much good or bad with only a few keystrokes or mouse clicks, yet, if we will hearken to the Lord, our efforts will be to the benefit of not only ourselves, but those around us. It is our duty to follow such inspiration, especially as we create the software that will build the future.

Tuesday, March 31, 2015

Study Journal 6

Social Issues in Computing

3/17
Male or Female, harassment has no place in any setting and is a sure sign of a lack of respect.

It is important to make promotion decisions based on merit, not cronyism; we cheat our business and our friends if we do so.

As a parent or educator we need to do our best to inspire children to broaden their horizons and not limit their goals or options.

3/19
How we present ourselves impacts who will want to join us, or who will feel welcome; we should put our best self on display.

If we judge others based on superficial factors, we may offend some and lose out on good idea input or growth overall.

Speaking badly about coworkers or people online does nothing constructive and may cause lasting harm and loss of trust.

3/24
Our time on earth is limited, sowe must use it wisely and efficiently to maximize what we are able to accomplish.

We should be careful as we generate code or programs to ensure they will benefit others and not hinder or harm them.

Discretion is vital when we comment online, without it we can endanger our personal information or unwittingly insult or impact others.

3/26
Assuming we know the best or only approach can limit our ability to help others develop their own skills or ideas.

We should be willing to engage others in new forms of media, but still realize the world is not just a digital one, and that real human interaction is vital.

Any media can be used for good or evil, but it is our responsibility to conduct ourselves properly online and help others do so as well.

Thursday, March 19, 2015

Post 3

We live in an era of instant gratification. Via cars, microwaves, or the internet, if you want it, it can be yours almost immediately. This is great for the pursuit of worthy endeavours, but can be a liability for those with an addictive personality. The internet is awash with information, but much of it is of an entirely useless or destructive nature. The opportunities to waste time in virtual pursuits are also a potential trap for many. It is all too easy to spend an entire evening boredly browsing, following friends, engaged in games, or surfing salacious sites. Yet we are trading valuable time for something of little or negative worth. It is important that society at large learns moderation and responsibility in regard to the use of internet and computers. It may be hard for those trapped by these addictions, but they can be overcome. As the computer becomes a larger feature of our daily lives, we must act responsibly in teaching future generations, and ourselves, how to seek the best things so we are both gratified, and edified.

Tuesday, March 17, 2015

Study Journal 5

Technology Business, Finance, & Capital

3/5
Falsely presenting yourself or your business is a clear ethics violation.

Banks have a responsibility to the public as well as their investors.

It may not be illegal to quickly flip a stock, but creating a situation that allows such actions should be heavily regulated.

3/10
It is important to think above the problem at hand to abstract it to a general solution.

There are chains of authority we should follow to help those around us rather than just be self serving.

It may be difficult, but if we properly utilize our resources, we can find solutions that may have eluded us otherwise.

3/12
We are blessed with a divine ability that we must use responsibly.

It is impossible or improbable we will avoid all forms of temptation online, we must learn how to respond properly.

Part of what makes our mortal experience so important is learning to correct our shortcomings and improve our view of right and wrong.

Thursday, March 12, 2015

Current Event Post 3

http://www.engadget.com/2015/01/10/tv-technology-of-ces-2015/

My dog is bigger than your dog. This common adage is one that drives the industry and perhaps no better example is the existence of 4K TV. Realistically, humans can't even perceive the added definition 4K provides, except when unusually close to the monitor they are using. Yet this technology is showing up in smaller screens every few months. It is easy to produce for companies despite the lack of demand, so they are ruthlessly pushing it into the public consciousness. Content is so scarce most ignore the technology, but this year at CES there was a major push. The sad part is people see the number of dots is higher and they "have to get one." But I think this trend will be just like the old Pentium processor marketing campaign and, once the number of megapixels or lines hits the next iteration, we will stop seeing more needlessly well-defined screens. Advertisers can only push the number on the box so high before people realize there is no benefit and that they are being duped. 16K, 64K, wherever it stops, I'm sure they will find another number to over-hype and slap on their marketing materials. Maybe 3D will even come back. Or 4D. Or maybe smellovision perhaps?

Thursday, March 5, 2015

Study Journal 4

Cybersecurity & Espionage

2/19
We often mature in our views as we work in our fields.

Diligence in finding problems in code is a sign of good work ethic.

Some people won't practice ethics because it is inconvenient or "not worth their time."

2/24
Many times it takes a group of people to ensure one person's ethical behavior.

Do not discredit your own ability to inspire good ethics in others.

Often those with the largest moral failings are unwilling to see them in themselves.

2/26
The government is not the most ethical party in all situations.

Do not assume that your ethical failings will not be noticed by others, especially the Lord.

Internet security is a personal responsibility, as well as one held by service providers.

3/3
It is sometimes ethical to do that which brings the most good, but is wrong in some eyes.

Honoring the laws of the land you live in is crucial to ethics.

Preying on others weaknesses is a clear lack of moral fiber.

Tuesday, March 3, 2015

Post 2

Online security is a large issue facing the world today. Most of our modern world relies on some internet activity, and it is critical that activity is safe. Sadly this also means it must be monitored at times. While I think most would prefer true anonymity online, there are invariably times when such freedom would mean there were opportunities for abuse. Just as a bank puts up cameras to observe the comings and goings of customers by day or night, having a record of online interactions and traffic is invaluable in protecting those who follow the law from those who don't. Systems need to be in place so it is harder, if not impossible, for illegal activities to occur, but surveillance, with proper checks and restrictions in place, is the last resort we need when abuse does occur. I will always do my best in the industry to put in the safeguards to prevent a problem, but I am not so unrealistic as to not put in the monitoring systems to enable prosecution of those who infringe. It would be nice to live in a world of pure ideology, but it is a sad truth that we have to be realistic and pragmatic.

Thursday, February 26, 2015

Current Event Post 2

http://www.ign.com/articles/2015/02/26/fcc-to-make-historic-net-neutrality-ruling-today

Telephone, electric, water, gas, and now internet. I had never realized the internet was not grouped with these other services but thanks to the new FCC ruling, it will be. The whole issue of Net Neutrality is a quagmire of "he said, she said" misquotes, and it has been hard to follow in general, but I am glad to hear of this new decision. It is a vital part of modern life to have access to the information freely distributed on-line, as well as the many useful services, and I feel this ruling will further promote the way we use the internet and put a stop to the unethical price gouging of various providers. I generally trust the government to regulate things well, and I think that of the many proposed laws the internet has been subject to over the years, this one will actually do some good for society at large. There are still many tough legal questions to answer, but this is a good step forward.

Tuesday, February 24, 2015

Ignoring the Issue: Cuckoo’s Egg and Internet Security


There is a Japanese proverb, “kaigai no kaji” which roughly translated means “a fire on the opposite riverbank” and is more freely translated as “it’s not my problem.” This idea is one that, while pragmatic at times, is often responsible for long lasting security issues that never seem to get better. After all, why should we fix a problem if it doesn’t impact us? It is this poor attitude that Clifford Stoll fights against in his experiences detailed in The Cuckoo’s Egg and, in a larger sense, the roadblock that the realm of internet security is often stuck against. However, ethics dictates that security issues not be ignored. This issue can be viewed in three areas: those who truly don’t see the need to fix a problem, those who want to provide a solution but can’t, and those who feel responsible and will, essentially, “put out the fire.”
Cliff Stoll spends more than a year of his life trying to track the hacker who had caused a 75 cent accounting error in the system he was in charge of monitoring. It is fair to say that all of his efforts were something that could have been written off early on, but the initial issue was in a real sense “his problem.” On the other end of this spectrum are those people and groups that have no desire or interest of getting involved. Stoll’s first several attempts to get help from the FBI were met with a resounding “No” (Stoll, 35). The perceived loss was too small and the effort required to fix it would be too large, a common excuse for leaving security threats open and not addressing or fixing them. This disinterested attitude was also held by several of the agencies Stoll called to warn and by many from which he tried to get help. Sadly, this is the sentiment many internet users succumb to today. Why bother solving a problem that is in somebody else’s system? Why fix a problem if nobody will find it or reward me if I do? Many users would rather exploit such issues than fix them, acting much like the hacker in Stoll’s story. Lack of interest or acknowledgement is a troubling obstacle.
More vexing for the proactive problem solver is getting stuck in a situation where another person or group wants to help, but can’t. In terms of internet security, this is likely the largest obstacle where most issues and solutions get stopped. Stoll first hits this wall when he tries to get a phone trace, but is missing the warrant to do so (36). It is not that the agencies don’t want to help him, but rather that they are legally unable to do so. Indeed, internet legal policies and privacy rights are a fickle field, miring many in their idiosyncrasies. Sometimes there simply are no practical means to solve the problem at hand. Perhaps this is because the tools don’t exist, or maybe nobody knows how to start fixing the bugs and backdoors in a program. Most frustrating are cases where the users of a system don’t want to make things less convenient for themselves, and so system managers must stand back and hope for the best ala Stanford’s approach (94). If it were possible, these problems would be solved and fixed speedily. However, outside factors cause the status quo to remain, despite any glaring weaknesses to the system they present.
Yet there is hope when people like Stoll are on the job. He spent many sleepless nights and invested time and effort creating systems, tools, and traps to solve his security problem (209). His persistence and discoveries were a result of his unwillingness to let go of the problem or say it wasn’t his to fix. This is the realm of internet security where hackers find problems, trace and test them, and then warn those responsible so they are fixed. Here, not only do the developers feel responsible, but the users make them responsible. Stoll was only able to get the big players involved when they realized the threat and felt a need to act (168). Similarly, many companies only work to fix security issues after a breach or loss of data. It is preferable to have responsible, security-minded coders involved early on so such issues are found in the design phase of development and never reach the internet proper. Basically, it is better to fix a security threat before it ever exists, and that only happens when people feel responsible and act accordingly.
Disinterest, inability, and responsibility are the three mindsets that hinder or help internet security. Clifford Stoll was fortunate to have a personality and attitude which allowed him to take responsibility for the error found on his watch, overcome the technological and legal roadblocks, and motivate those who were uninterested in helping him solve his problem. Because of his efforts, a minor problem that was caused by a major threat was properly found and many security issues were fixed along the way. As the world becomes more dependent on the internet for business and everyday life, it is important to learn from The Cuckoo’s Egg and take responsibility for finding and fixing the myriad issues that may arise. Security and privacy will only become more important as networks grow, so diligence, too, must increase. Even though the fire may be burning on the other side of an ocean instead of just a river, putting it out is still the most ethical thing to do.










Stoll, Clifford. The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage. New York: Doubleday, 1989. Print.

Thursday, February 19, 2015

Study Journal 3


Law & Computing


2/10
Patent trolls skirt the law, but they certainly dismiss ethical practices.

Code should be patentable when it is a truly unique application, not just math.

Anything that is written is copyrighted and I should remember that more when I am quoting people or things to be ethical.

Thursday, February 12, 2015

Post 1


I feel it is not unethical for a businessman type to profit from the work of nerds. In our studies, I have seen a trend where a smooth businessman type will profit off of the work of a nerd. I have heard the line that CEOs get Cs, managers get Bs, and coders get As and I think it may have some truth. Looking at Jobs and Wozniak, and even Gates and Ballmer, it seems to me that the people who are better at coding are often not the best at presenting the product the code becomes. It might be unfair that the nerds are relegated to code monkey status, but at least this way the oft-times brilliant work they do can be sold and they get some profit via this almost symbiotic relationship with the business sharks. Finding out Jobs was around ten times richer that Wozniak was a bit distressing, yet Wozniak probably wouldn't have had even that success without Jobs's efforts. Sometimes it truly is unfair, like when Jobs copied Xerox's workers' GUI ideas with no compensation; but those ideas would have gone nowhere at Xerox due to their poor management decisions. Were I to be the businessman in this sort of relationship or situation, I hope I would at least compensate the code producers better.

Tuesday, February 10, 2015

Study Journal 2

History of the Computer Industry (Hardware & Software)
 
1/22
I think it is good to share info among colleagues, but when money is involved prudence is required.

Often early machines are just a proof of concept, but that sort of risk taking can pay off.

It often takes a nerd and a business man to get things done and cover each others weaknesses.

1/27
I think stealing ideas that are not being used is not that bad.

It is important to shake up the internal proceses of a company when they stagnate like IBM.

Hypocrisy and ego are hurdles for the future development of newer technologies.

1/29
A drive to succeed is important to foster, but it can become its own barrier.

It can seem easy to screw over the little guy or company, but it is better to be fair.

Modern practices often demand ruthlessness, but I don't want to be so callous.

BONUS: Conflicts of interest are shady in many different ways.

2/3
Often timing is the only difference between fame and failure.

Ego is a major driver for many who work for "free."

I believe in fairness and open source, but I think the "free code" movement is for hippies.

2/5
There is a lot to be said for working as a two man team, but one guy will always be in the shadow.

Coding as a group and working with others is vital to finding small bugs - many eyes idea.

I think it is unfortunate that so many companies with potential are sold for a quick buck.

Thursday, January 29, 2015

Current Event Post 1

http://www.forbes.com/sites/patrickmoorhead/2015/01/28/microsoft-hololens-gets-faces-wearables-right/

As we have been watching the films in class, I have been intrigued by the idea that it can take a while to develop a technology correctly. This process is often influenced by the collection of "unknowledge" and the practice of stealing ideas. Microsoft is entering the heads up display field after Google Glass has mostly fallen by the wayside, but they are using the failures of Glass to improve their new Hololens product. The decision to make a limited use product that is not always on, removing some privacy concerns, makes the Hololens more attractive to consumers. They also add value by incorporating ideas from Occulus Rift and other VR goggles. I believe that through this synthesis, Microsoft has created a hit product and has demonstrated that a good idea can be successful despite previous failures, but only by learning from the market.

Thursday, January 22, 2015

Study Journal 1

Ethics Foundations

1/13
Listing out an ethics guide is a good way to begin following your own values.

Don't be afraid to speak up to your superiors or the old guard when you find ethical failings.

Do not fall for logical fallacies and do not purposely mislead others with them.

1/15
It is important that we learn to generalize our skills beyond the task that teaches us them.

It is hard to follow instructions when we do not know the end goal, but we are responsible to keep them anyway and we may then learn their purpose.

Unknowledge that is shared is a good way of preventing others making the same mistakes.

1/20
We are not the ones that choose what is right or wrong, God sets our compass.

Morals are more often religious, Ethics are more often secular, but the former often determines the later.

It is more ethical to do that which brings the greatest good, and that should be our priority.