The imaginary friend that I picked is Lou, the article I think that he would find most convincing is “Don’t Withhold Violent Games” because one of his hobbies is to play games. This is a summary of the article “Don’t Withhold Violent Games” by Jessica Robbins. In this article, Robbins begins by acknowledging how far technology has come and how video games have become more graphic and violent (1). Due to a lot of crazy events that have taken place in the recent years involving violent acts, there has been concerns if violent media games have influence. Robbins spoke on the laws that some states have passed banning minors from viewing or purchasing violent video games without an adult and feels such law should not exist (1).
Week 1: * Question 1 * Question 2 | | | A policy vacuum, according to James Moor, is best described as | | | | | Answers: | A. occurring in new situations where there are no policies for conduct | | B. occurring in new situations where old policies seem inadequate | | C. neither a or b | | D. both a or b | | | | | * Question 3 | | | A good example of an issue in computer ethics is someone coming into your home and stealing your computer. | | | | | Answers: | True | | False | | | | | * Question 4 | The main point of Nicholas Carr's article, "Is Google Making Us Stupid?" is | | | | | Answers: | A. to explain what is so particularly terrifying about a particular scene in the movie 2001: A Space Odyssey. | | B. that our increasing use of computers makes it harder for us to read novels. | | C. that relying on computers negatively affects our intellectual tendencies and capacities | | D. that using technology of any sort affects the way we think.
It seems to be a legal blunder that is very straight forward, but becomes a heated debate. It begins with the argument should we prosecute a gamer for stealing via the virtual world? Alex Weiss is correct in saying that prosecution for virtual theft is wrong in the scheme of things, because each player reacts differently to behaviors. Even though a person is a “raider” in a game, it doesn’t make them a criminal in the real world. Weiss opens up his article with, “As a reformed online gaming thief, this ruling makes no sense to me.
He uses logic to set up the article and by posing the analogy “We seem to forget that kids can be as tech-savvy as Bill Gates but as gullible as Bambi,” he introduces a dimension of reasoning to shows that we live in an age of technology and that the child pornography laws are defeated when they are being used to prosecute teens instead of protecting them. The authors tone is strong and opinionated when he includes that “judges and prosecutors need to understand that a lifetime of cyber humiliation shouldn’t be ground for a lifelong real criminal record.” The article concludes with he is opinion on how the situation should be handled, by suggesting that parents should be the one to remind their teens of the potential risks of this trending epidemic. He bluntly mentions that “the criminal-justice system is too harsh of an instrument to resolve a problem that reflects more about the volatile combination of teens and technology than about some national cybercrime
Jose Cervantes Period 6 SPANISH AND AMERICAN WAR Although some historians believe that the Spanish and American war was not a turning point in American foreign policy, it is more correct to say that it is a turning point due to the following causes in this time. Before the Spanish and American war the US was neutralizing following the Farewell Address and Monroe Doctrine. These policies helped keep the US safe by not intervening in any foreign countries that are in battle or war also, if intervening with them it’ll put the people in danger not knowing how powerful the other countries could be. America had notice that the USS Maine was exploded mysteriously, the Yellow journalist
In an attempt to prepare for and prevent future acts of terror, the government implemented the USA PATRIOT Act on October 26, 2001. This act lessened the restrictions on law enforcement agencies in regards to their gathering of intelligence within the United States. The act also gives law enforcement officers the right to search a home or business without the owner’s or the occupant’s consent or knowledge. The act of making these clear violations of a person’s privacy was highly controversial but approved in the unremitting post 9/11 pursuit of justice. According to The Washington Post, more than 263 government organizations were either created or reorganized following the attacks.
Because of the fear of privacy invasion, the different federal agency databases were held on individual agency specific computer systems and were not accessible to anyone, but the owner. Having such a compartmentalized system did not give law enforcement nor intelligence the ability to assist each other in putting together potentially complex terror plots, and often the more sophisticated the terror plot, the more potential for mass killing (White, 2006). Communication is key in all parts of life, and especially important when dealing with such dire consequences. The USA PATRIOT Act, in Title VII, granted the expansion of information sharing systems in order to better facilitate communication between all agencies involved in counterterrorism. This called for the implementation of the Regional Information Sharing System (RISS) as a central database for all law enforcement to use (USA PATRIOT Act, 2001).
Down with the Patriot Act The Patriot Act is a very controversial law. It allows the government much more room to do as they please. Some of these practices that government officials can do are monitoring phone calls, emails, and going through personal records. They say this will help prevent terrorism, but is losing one’s privacy really worth it? Could there be a better way to prevent terrorism?
In 2000, the United States government erected the Victims of Trafficking and Violence Protection Act of 2000 in hopes of halting this tragedy. The act “was [later] amended in 2003 by the Trafficking Victims Protection Reauthorization Act (P.L. 108-193)… [after recognizing] that existing laws often fail to protect victims of trafficking and… punish victims more severely than they do traffickers”(Hodge 5). The government is not unaware and is working to put an end to this horrible act. However, there’s a few things wrong with the government’s approach.
Prioritizing the reasons, the foremost reason for the security breach can be the healthy competition turned wicked one, and that the rivals of Sony may have wanted to push them back in this race. The overwhelming response by the public for the emerging Sony could have made their rivals to plan for a security breach by identifying the minuscule deadlocks in the Sony security system. Also, this was scheduled to be very close to the launch of “Sony Tablet” so that the launch could be delayed which would result in heavy loss. This massive security breach has led to the brand name of Sony being criticized by the public. Though the press release given by Sony is quite satisfactory, many users still continue to urge for the proper reason and persons behind this breach.