User Tools

Site Tools


governance_of_open_source

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
governance_of_open_source [2014/03/26 12:11]
bdemaster
governance_of_open_source [2014/03/31 12:07] (current)
bdemaster
Line 1: Line 1:
 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=13828b54-107a-48e0-9617-6ade47379d25%40sessionmgr4001&​vid=1&​hid=4112 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=13828b54-107a-48e0-9617-6ade47379d25%40sessionmgr4001&​vid=1&​hid=4112
-// +\\ 
-//+\\
 Weber, R.M. & Horn, B.D. (November 2012). Look, Up in the Sky! It’s a Bird…It’s a Plane…It’s a Cloud! Weber, R.M. & Horn, B.D. (November 2012). Look, Up in the Sky! It’s a Bird…It’s a Plane…It’s a Cloud!
-// +\\ 
-// +\\ 
-This article describes the idea of Cloud storage and discusses both the advantages and the disadvantages of using it. The article also addresses various alternatives to using Cloud storage. The article describes Cloud storage as “data ‘farms’…each data farm can incorporate 100,000 networked storage devices…connected to the Internet and ready to store data that ranges from vacation photos to iTunes tracks to sensitive financial information” (Weber & Horn). The article talks about how Google has small, artificial islands that use wave motion to generate the electricity that these islands require in order to hold all of this “Cloud” storage.// +This article describes the idea of Cloud storage and discusses both the advantages and the disadvantages of using it. The article also addresses various alternatives to using Cloud storage. The article describes Cloud storage as “data ‘farms’…each data farm can incorporate 100,000 networked storage devices…connected to the Internet and ready to store data that ranges from vacation photos to iTunes tracks to sensitive financial information” (Weber & Horn). The article talks about how Google has small, artificial islands that use wave motion to generate the electricity that these islands require in order to hold all of this “Cloud” storage.\\ 
-One of the disadvantages to this type of storage that is discussed in this article is that you need to have high speed internet in order to access and store photos, music, and the like. In that case, it severely limits who can access this storage. However, with the development of new technologies such as tables and smartphones,​ Cloud storage can be accessed in different places at different times.//  +One of the disadvantages to this type of storage that is discussed in this article is that you need to have high speed internet in order to access and store photos, music, and the like. In that case, it severely limits who can access this storage. However, with the development of new technologies such as tables and smartphones,​ Cloud storage can be accessed in different places at different times.\\  
-A final and important issue that this article addresses is the security issues that come with using the Cloud storage on any device. There have, according to the article, been a number of security breaches; even with the passwords and security some of these storage companies guarantee, sites such as dropbox.com were completely accessible for about four hours; this breach in security was a huge feast of information for hackers and was also bad news for dropbox.com. The article then goes to list various other free sites that allow for Cloud storage, and then other options for storage devices such as USB flash drives and portable hard drives. ​// +A final and important issue that this article addresses is the security issues that come with using the Cloud storage on any device. There have, according to the article, been a number of security breaches; even with the passwords and security some of these storage companies guarantee, sites such as dropbox.com were completely accessible for about four hours; this breach in security was a huge feast of information for hackers and was also bad news for dropbox.com. The article then goes to list various other free sites that allow for Cloud storage, and then other options for storage devices such as USB flash drives and portable hard drives. ​\\ 
-//+\\
 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=61cf3763-3b1b-4274-ac9d-08610966ea74%40sessionmgr4003&​vid=2&​hid=4112 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=61cf3763-3b1b-4274-ac9d-08610966ea74%40sessionmgr4003&​vid=2&​hid=4112
-// +\\ 
-//+\\
 Sosa-Sosa, V.J. & Hernandez-Ramirez,​ E.M. (December 2012). A File Storage Service on a Cloud Computing Environment for Digital Libraries. Sosa-Sosa, V.J. & Hernandez-Ramirez,​ E.M. (December 2012). A File Storage Service on a Cloud Computing Environment for Digital Libraries.
-// +\\ 
-// +\\ 
-When thinking of storage devices, it is important to think of how long you can store your information and how easily accessible that information is from the device you choose to use. For example, ten years ago, people were using devices such as floppy disks to store their data and information. Now, only a few laptops and computers come equipped with the proper devices to read floppy disks. That puts into perspective just how useful USB drives and Cloud storage are, and their potential for the future when looking at things such as tangible pictures and words on paper that are universal and will be around and relevant for much longer.// +When thinking of storage devices, it is important to think of how long you can store your information and how easily accessible that information is from the device you choose to use. For example, ten years ago, people were using devices such as floppy disks to store their data and information. Now, only a few laptops and computers come equipped with the proper devices to read floppy disks. That puts into perspective just how useful USB drives and Cloud storage are, and their potential for the future when looking at things such as tangible pictures and words on paper that are universal and will be around and relevant for much longer.\\ 
-However, having new technologies that allow for things such as digital storage have created new outlets for information technology such as predictions of storage requirements. For example, companies such as Google have to know how much storage to offer each person under their free digital storage offering. They also have to know how much storage to maintain overall in order to keep their systems from crashing, and to keep up with their consumers’ demands. The digital storage devices that have come about in more recent times have also allowed an environment where “high availability,​ fault tolerance, and services and administration at a low cost” are available.// +However, having new technologies that allow for things such as digital storage have created new outlets for information technology such as predictions of storage requirements. For example, companies such as Google have to know how much storage to offer each person under their free digital storage offering. They also have to know how much storage to maintain overall in order to keep their systems from crashing, and to keep up with their consumers’ demands. The digital storage devices that have come about in more recent times have also allowed an environment where “high availability,​ fault tolerance, and services and administration at a low cost” are available.\\ 
-This article then goes on to discuss the importance of having a physical source for access to information and the like in comparison to a digital media library. This is because you cannot take into account “natural disasters, attacks, or management errors” that can possibly threaten digital media libraries. Having a physical source of information such as a computer can also take into account for unpredictable workloads.// +This article then goes on to discuss the importance of having a physical source for access to information and the like in comparison to a digital media library. This is because you cannot take into account “natural disasters, attacks, or management errors” that can possibly threaten digital media libraries. Having a physical source of information such as a computer can also take into account for unpredictable workloads.\\ 
-//+\\
 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​detail?​sid=f741b1a9-8dae-4ee3-a3cb-f7e2800f38df%40sessionmgr4004&​vid=1&​hid=4112&​bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#​db=nfh&​AN=2W62W62262646815 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​detail?​sid=f741b1a9-8dae-4ee3-a3cb-f7e2800f38df%40sessionmgr4004&​vid=1&​hid=4112&​bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#​db=nfh&​AN=2W62W62262646815
-// +\\ 
-// +\\ 
-Democratic Appeal (19 October, 2007). Editorial: Intellectual property free-for-all.//  +Democratic Appeal (19 October, 2007). Editorial: Intellectual property free-for-all.\\ 
-// +\\ 
-This paper discusses the importance of intellectual property in regards to who should own what; in other words, if ideas should be owned or built upon. Intellectual property “originates in the minds of creative people, making it harder to see, feel, touch”. However, there is an importance to protecting intellectual property, especially when dealing with whether or not, in the digital era, copyrighted things such as music and films should be able to be pulled of the Internet as easily as they are. // +This paper discusses the importance of intellectual property in regards to who should own what; in other words, if ideas should be owned or built upon. Intellectual property “originates in the minds of creative people, making it harder to see, feel, touch”. However, there is an importance to protecting intellectual property, especially when dealing with whether or not, in the digital era, copyrighted things such as music and films should be able to be pulled of the Internet as easily as they are. \\ 
-The article goes on to discuss how buying intellectual properties such as music are important because the artist owns that song. Though the song is not tangible, the artist created it and thus should have rights over it. If the artist loses his or her ability to gain some sort of income through the music they put online via outlets such as iTunes, then how is that artist supposed to make money? The consumer should understand that in the digital media age, the artist’s rights as an owner of his or her song should not be transferred as easily.// +The article goes on to discuss how buying intellectual properties such as music are important because the artist owns that song. Though the song is not tangible, the artist created it and thus should have rights over it. If the artist loses his or her ability to gain some sort of income through the music they put online via outlets such as iTunes, then how is that artist supposed to make money? The consumer should understand that in the digital media age, the artist’s rights as an owner of his or her song should not be transferred as easily.\\ 
-This is, however, quite a controversial topic; some people say that music should be free because artists make enough money through their concerts, CDs, and other outlets. This is true, but when you think of the sheer amount of people who gain free access to artists’ music, the amount of income the artist has lost through illegal downloading can be quite a significant amount.// +This is, however, quite a controversial topic; some people say that music should be free because artists make enough money through their concerts, CDs, and other outlets. This is true, but when you think of the sheer amount of people who gain free access to artists’ music, the amount of income the artist has lost through illegal downloading can be quite a significant amount.\\ 
-This article brings up an important point of having such a large amount of information,​ be it music or pictures, available at a remote source that can be downloaded. Having this available creates a problem for people who want to use the Internet to share their intellectual properties.// +This article brings up an important point of having such a large amount of information,​ be it music or pictures, available at a remote source that can be downloaded. Having this available creates a problem for people who want to use the Internet to share their intellectual properties.\\ 
-//+\\
 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=7b1f6cdd-3234-4739-9ddf-0db1299ec4dd%40sessionmgr4003&​vid=1&​hid=4112 http://​web.a.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​pdfviewer/​pdfviewer?​sid=7b1f6cdd-3234-4739-9ddf-0db1299ec4dd%40sessionmgr4003&​vid=1&​hid=4112
-// +\\ 
-// +\\ 
-Juels, A. & Oprea, A. (February 2013). New Approaches to Security and Availability for Cloud Data. // +Juels, A. & Oprea, A. (February 2013). New Approaches to Security and Availability for Cloud Data.  
-// +\\ 
-This article describes cloud computing as “a service model that offers users on-demand network access to a large shared pool of computing resources.” The article also makes a point to say that cloud storage has a variety of benefits, including financial benefits such as a lowering of operational costs and ease of access with cloud computing.// +This article describes cloud computing as “a service model that offers users on-demand network access to a large shared pool of computing resources.” The article also makes a point to say that cloud storage has a variety of benefits, including financial benefits such as a lowering of operational costs and ease of access with cloud computing.\\ 
-However, the Cloud Storage does have some problems. Many people choose not to utilize Cloud storage devices because of liability and availability issues. For example, some Cloud storage providers have witnessed hours at a time where their services are unavailable. This is a huge turn off to consumers because, at the hours where these services are unavailable due to updates or other general maintenance,​ or security issues, the consumer could need their information from storage devices more than ever; what would happen if they could not access that information?​ That is another argument for why some consumers choose to utilize portable devices such as USB drives.// +However, the Cloud Storage does have some problems. Many people choose not to utilize Cloud storage devices because of liability and availability issues. For example, some Cloud storage providers have witnessed hours at a time where their services are unavailable. This is a huge turn off to consumers because, at the hours where these services are unavailable due to updates or other general maintenance,​ or security issues, the consumer could need their information from storage devices more than ever; what would happen if they could not access that information?​ That is another argument for why some consumers choose to utilize portable devices such as USB drives.\\ 
-Issues with Cloud storage also include its difficulty in “maintaining correctness of massive amounts of data over long periods of time is extremely difficult” and “collocation with potentially malicious tenants.” This article provides an Adversarial model for which to discuss the threats that are posed by the cloud storage; this model also provides data integrity and availability in which providers can be compromised. In order to “guarantee data integrity and freshness for an entire file system,” the authors’ model uses two layers in their system in order to determine what kind of blocks each cloud system uses to defend its consumers. There are also other failures posed by cloud storage including “bit rot, storage-device failures, corruption by buggy software” and other threats. The test by these authors looks into cryptographic approaches to assurances in the storage system.// +Issues with Cloud storage also include its difficulty in “maintaining correctness of massive amounts of data over long periods of time is extremely difficult” and “collocation with potentially malicious tenants.” This article provides an Adversarial model for which to discuss the threats that are posed by the cloud storage; this model also provides data integrity and availability in which providers can be compromised. In order to “guarantee data integrity and freshness for an entire file system,” the authors’ model uses two layers in their system in order to determine what kind of blocks each cloud system uses to defend its consumers. There are also other failures posed by cloud storage including “bit rot, storage-device failures, corruption by buggy software” and other threats. The test by these authors looks into cryptographic approaches to assurances in the storage system.\\ 
-Overall, this article discusses the security techniques used by various cloud storage companies, and how well they are securing the information of their consumers. It also discusses the data integrity and availability given by various problems. It shows through methods of research that data confidentiality is the real problem. The consumer can employ its own techniques of protection.// +Overall, this article discusses the security techniques used by various cloud storage companies, and how well they are securing the information of their consumers. It also discusses the data integrity and availability given by various problems. It shows through methods of research that data confidentiality is the real problem. The consumer can employ its own techniques of protection.\\ 
-//+\\
 http://​web.b.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​detail?​vid=4&​sid=c54b25b1-f04a-408a-9881-aaf76ee29944%40sessionmgr115&​hid=121&​bdata=JmxvZ2luLmFzcCZzaXRlPWVob3N0LWxpdmU%3d#​db=aph&​AN=86555715 http://​web.b.ebscohost.com.ezproxy.roosevelt.edu:​2048/​ehost/​detail?​vid=4&​sid=c54b25b1-f04a-408a-9881-aaf76ee29944%40sessionmgr115&​hid=121&​bdata=JmxvZ2luLmFzcCZzaXRlPWVob3N0LWxpdmU%3d#​db=aph&​AN=86555715
-// +\\ 
-// +\\ 
-Heavan, D. (30 March, 2013). Lost in the clouds.// +Heavan, D. (30 March, 2013). Lost in the clouds.\\ 
-// +\\ 
-This article discusses a very controversial topic in regards to uploading data to a remote storage device, known as “cloud” storage. Specifically,​ when a person uploads pictures, videos, or anything of the like to a remote storage device, does that person lose their rights to that information?​ Should the rights be given to whatever cloud storage company that person used? In this article, a single person’s case is discussed as well as the rights of that person’s data.// +This article discusses a very controversial topic in regards to uploading data to a remote storage device, known as “cloud” storage. Specifically,​ when a person uploads pictures, videos, or anything of the like to a remote storage device, does that person lose their rights to that information?​ Should the rights be given to whatever cloud storage company that person used? In this article, a single person’s case is discussed as well as the rights of that person’s data.\\ 
-The story in this article about an individual named Kyle who had stored videos onto a cloud storage facility. When he went to retrieve his information,​ he found that it had been confiscated and that even when he went to court to get his data back, the court ruled that as soon as he uploaded the data, the individual forfeited his property rights.// +The story in this article about an individual named Kyle who had stored videos onto a cloud storage facility. When he went to retrieve his information,​ he found that it had been confiscated and that even when he went to court to get his data back, the court ruled that as soon as he uploaded the data, the individual forfeited his property rights.\\ 
-The article then goes on to describe how cloud storage data will eventually run all digital media and whether or not this is a good idea, due to the fact that situations like Kyle’s do arise and are only a problem in regards to ownership of digital media. Another problem with cloud storage that is addressed is the fact that some “cloud-based services have been known to deliberately delete files” such as illegal or pornographic files. While this is all beneficial for the government and laws, it violates the privacy laws of some of the cloud storage services. Also, if you actually want to delete your files from the system, there is no guarantee that they have actually been erased from the facility itself. There are multiple locations for each “cloud” digital media storage device, so your files are never guaranteed to stay in only one place. ​// +The article then goes on to describe how cloud storage data will eventually run all digital media and whether or not this is a good idea, due to the fact that situations like Kyle’s do arise and are only a problem in regards to ownership of digital media. Another problem with cloud storage that is addressed is the fact that some “cloud-based services have been known to deliberately delete files” such as illegal or pornographic files. While this is all beneficial for the government and laws, it violates the privacy laws of some of the cloud storage services. Also, if you actually want to delete your files from the system, there is no guarantee that they have actually been erased from the facility itself. There are multiple locations for each “cloud” digital media storage device, so your files are never guaranteed to stay in only one place. ​\\ 
-One predicted outcome of the dilemma that cloud storage faces is that there will be a cloud “doomsday event” where multitudes of irreplaceable data will be lost. This suggests that every individual should find some way to back up their information with portable devices as well as the cloud storage devices they use in order to better protect their data and to have a back-up in case this “doomsday” ever does occur.// +One predicted outcome of the dilemma that cloud storage faces is that there will be a cloud “doomsday event” where multitudes of irreplaceable data will be lost. This suggests that every individual should find some way to back up their information with portable devices as well as the cloud storage devices they use in order to better protect their data and to have a back-up in case this “doomsday” ever does occur.\\ 
-//+\\
 https://​app.box.com/​acp250/​2/​777387598/​7259720662/​1 https://​app.box.com/​acp250/​2/​777387598/​7259720662/​1
-// +\\ 
-// +\\ 
-Kerr, D. (1 April 2013). MP3 resale violates copyright law, court rules.// +Kerr, D. (1 April 2013). MP3 resale violates copyright law, court rules.\\ 
-// +\\ 
-This article discusses the ruling by a judge that “MP3s can only be resold if granted permission by copyright owners.” In this case, the parties involved were that of Universal Music Group’s Capitol Records ​ and MP3 reseller Redigi. The court ruling essentially put an end to reselling digital media, which ended that branch of Redigi’s business. The ruling included all music “bought on iTunes, Amazon, or other digital music venues is akin to copyright infringement.” ​// +This article discusses the ruling by a judge that “MP3s can only be resold if granted permission by copyright owners.” In this case, the parties involved were that of Universal Music Group’s Capitol Records ​ and MP3 reseller Redigi. The court ruling essentially put an end to reselling digital media, which ended that branch of Redigi’s business. The ruling included all music “bought on iTunes, Amazon, or other digital music venues is akin to copyright infringement.” ​\\ 
-This ruling, however, only affected the company’s 1.0 service, as the judge did not address the company’s 2.0, 3.0, and 4.0 services. Redigi’s defense is that it was operating under the “first sale doctrine” ​ which states that people can resell or rent goods. Also, Redigi pointed out that used CDs and DVDs are allowed to be resold. In this case, however, the MP3s that Redigi resold were not considered under this doctrine because it is under the umbrella of “digital media” and the rules of operation and ownership are different than those of tangible items.// +This ruling, however, only affected the company’s 1.0 service, as the judge did not address the company’s 2.0, 3.0, and 4.0 services. Redigi’s defense is that it was operating under the “first sale doctrine” ​ which states that people can resell or rent goods. Also, Redigi pointed out that used CDs and DVDs are allowed to be resold. In this case, however, the MP3s that Redigi resold were not considered under this doctrine because it is under the umbrella of “digital media” and the rules of operation and ownership are different than those of tangible items.\\ 
-Given that digital media allows for the reproduction of someone’s music, the court ruled in favor of Universal Music Group’s Capitol Records because that person should have ownership and redistribution rights over his or her own music. The “first sale doctrine” used in the defense of Redigi applies more to companies such as Netflix, where the movies and TV shows cannot be redistributed by anyone other than Netflix. ​// +Given that digital media allows for the reproduction of someone’s music, the court ruled in favor of Universal Music Group’s Capitol Records because that person should have ownership and redistribution rights over his or her own music. The “first sale doctrine” used in the defense of Redigi applies more to companies such as Netflix, where the movies and TV shows cannot be redistributed by anyone other than Netflix. ​\\ 
-//+\\
 https://​app.box.com/​acp250/​1/​777387598/​7365463151/​1 https://​app.box.com/​acp250/​1/​777387598/​7365463151/​1
-// +\\ 
-// +\\ 
-Maass, D. (3 April 2013). Are you a teenager who reads news online? According to the justice department, you may be a criminal.// +Maass, D. (3 April 2013). Are you a teenager who reads news online? According to the justice department, you may be a criminal.\\ 
-// +\\ 
-In this article, it describes how the Computer Fraud and Abuse Act (CFAA) has been interpreted by the Bush and Obama administrations. In this case, it appears as though both administrations have such strict limitations over computer fraud that teenagers simply reading news online could be a potential crime.// +In this article, it describes how the Computer Fraud and Abuse Act (CFAA) has been interpreted by the Bush and Obama administrations. In this case, it appears as though both administrations have such strict limitations over computer fraud that teenagers simply reading news online could be a potential crime.\\ 
-This is due to the fact that the website’s Terms of Service or the employer’s Terms of Use policy can be violated, in which case a criminal act has been committed. There has been a proposal submitted that will make it possible to prosecute a user for using the information for something other than what the publisher intended. In most cases, the Terms of Service says that a user must be eighteen years of age or older in order to agree to the Terms of Service. Other publishers will address younger users (between ages 13 and 18) in the following manner: “you may browse the NPR Services or register for email newsletters or other features of the NPR Service, so long as you do not submit any User Materials.” Translated loosely, a twelve year old could be depicted as a criminal by agreeing to anything where he is younger than the age that is addressed by the Terms and Services.// +This is due to the fact that the website’s Terms of Service or the employer’s Terms of Use policy can be violated, in which case a criminal act has been committed. There has been a proposal submitted that will make it possible to prosecute a user for using the information for something other than what the publisher intended. In most cases, the Terms of Service says that a user must be eighteen years of age or older in order to agree to the Terms of Service. Other publishers will address younger users (between ages 13 and 18) in the following manner: “you may browse the NPR Services or register for email newsletters or other features of the NPR Service, so long as you do not submit any User Materials.” Translated loosely, a twelve year old could be depicted as a criminal by agreeing to anything where he is younger than the age that is addressed by the Terms and Services.\\ 
-There is no indication that the Justice Department is going to lighten up their views on this particular matter any time soon. However, the Ninth Circuit rejected this view with the defense that many unsuspecting citizens will get on the wrong side of the law under these harsh holdings of the Computer Fraud and Abuse Act.// +There is no indication that the Justice Department is going to lighten up their views on this particular matter any time soon. However, the Ninth Circuit rejected this view with the defense that many unsuspecting citizens will get on the wrong side of the law under these harsh holdings of the Computer Fraud and Abuse Act.\\ 
-A complete remodeling of the Computer Fraud and Abuse Act has been discussed because of these harsh interpretations of the law. Negotiations for reform are in the works.// +A complete remodeling of the Computer Fraud and Abuse Act has been discussed because of these harsh interpretations of the law. Negotiations for reform are in the works.\\ 
-//+\\
 https://​app.box.com/​acp250/​1/​777387598/​7689593664/​1 https://​app.box.com/​acp250/​1/​777387598/​7689593664/​1
-// +\\ 
-// +\\ 
-Kerr, O. & Lessig, L. (22 April 2013). Why is congress trying to make our internet abuse laws worse, not better?
// +Kerr, O. & Lessig, L. (22 April 2013). Why is congress trying to make our internet abuse laws worse, not better?
\\ 
-The first point in this article brings up the story of Aaron Swartz, a political activist and net guru who downloaded a database of academic files. He committed suicide after exhausting all his money and resources fighting a potential sentence of years in prison; this brought light to the Computer Fraud and Abuse Act. The actual reason for the development of this act in 1986 was to criminalize computer hackers, but since then the government has broadened the reach of this act to much more; it is now “a powerful and mysterious weapon that could potentially reach millions of ordinary Americans.”// +The first point in this article brings up the story of Aaron Swartz, a political activist and net guru who downloaded a database of academic files. He committed suicide after exhausting all his money and resources fighting a potential sentence of years in prison; this brought light to the Computer Fraud and Abuse Act. The actual reason for the development of this act in 1986 was to criminalize computer hackers, but since then the government has broadened the reach of this act to much more; it is now “a powerful and mysterious weapon that could potentially reach millions of ordinary Americans.”\\ 
-The Computer Fraud and Abuse Act is so powerful and mysterious because, like every political source, if uses very vague language; the act prohibits “unauthorized access” to a computer - but what exactly does that mean? It has been interpreted most commonly as a person gaining access to a computer in which they bypass technological restrictions such as passwords. Other people, including courts, have interpreted it as violation of terms of service, or using the published document in a manner that the publisher did not intend for the user.// +The Computer Fraud and Abuse Act is so powerful and mysterious because, like every political source, if uses very vague language; the act prohibits “unauthorized access” to a computer - but what exactly does that mean? It has been interpreted most commonly as a person gaining access to a computer in which they bypass technological restrictions such as passwords. Other people, including courts, have interpreted it as violation of terms of service, or using the published document in a manner that the publisher did not intend for the user.\\ 
-Since the suicide of Aaron Swartz, some people have come together to redraft a newer and more sensible act for computer fraud that would limit liability for violations. However, on the other hand, some people are actually delving more into the nonsensical fraud act by way of increasing the penalties.// +Since the suicide of Aaron Swartz, some people have come together to redraft a newer and more sensible act for computer fraud that would limit liability for violations. However, on the other hand, some people are actually delving more into the nonsensical fraud act by way of increasing the penalties.\\ 
-The bright side, though, is that only really dangerous hackers are supposed to be targeted. However, this is not a very comforting fact given that the more extreme proposed laws are very broad and could potentially criminalize all computer users, even if everyday computer users are not targeted.// +The bright side, though, is that only really dangerous hackers are supposed to be targeted. However, this is not a very comforting fact given that the more extreme proposed laws are very broad and could potentially criminalize all computer users, even if everyday computer users are not targeted.\\ 
-//+\\
 https://​app.box.com/​acp250/​2/​777387598/​7362310737/​1 https://​app.box.com/​acp250/​2/​777387598/​7362310737/​1
-// +\\ 
-// +\\ 
-Vara, V. & Fowler, G.A. (5 April 2013). New online-data bill sets up privacy fight.// +Vara, V. & Fowler, G.A. (5 April 2013). New online-data bill sets up privacy fight.\\ 
-// +\\ 
-This article discusses a new act brought up in California that “would require companies like Facebook Inc. and Google Inc. to disclose to users the personal data they have collected and with whom they have shared it.” This is a backlash in response to the “Right to Know Act,” which would make internet companies share personal information with California residents upon request. This includes information such as “buying habits, physical location and sexual orientation.” This would give California residents access to the information that has been given about them to outside sources from their social media or email accounts.// +This article discusses a new act brought up in California that “would require companies like Facebook Inc. and Google Inc. to disclose to users the personal data they have collected and with whom they have shared it.” This is a backlash in response to the “Right to Know Act,” which would make internet companies share personal information with California residents upon request. This includes information such as “buying habits, physical location and sexual orientation.” This would give California residents access to the information that has been given about them to outside sources from their social media or email accounts.\\ 
-The main problem that stemmed from the bill that allowed companies to share information from various outlets of their users was telemarketing. Also, the potential law mentioned above could be costly for FaceBook, Google, and other companies. If they have to worry about giving up information that they use from their users, it would cost them to track that information in order to give it to users upon request. ​// +The main problem that stemmed from the bill that allowed companies to share information from various outlets of their users was telemarketing. Also, the potential law mentioned above could be costly for FaceBook, Google, and other companies. If they have to worry about giving up information that they use from their users, it would cost them to track that information in order to give it to users upon request. ​\\ 
-The bill is in its early stages and is still going through editing processes and it is being decided the extremities of consequences if companies do not abide by the new law.// +The bill is in its early stages and is still going through editing processes and it is being decided the extremities of consequences if companies do not abide by the new law.\\ 
-//+\\
 http://​www.cnn.com/​2013/​03/​16/​opinion/​schneier-internet-surveillance/​ http://​www.cnn.com/​2013/​03/​16/​opinion/​schneier-internet-surveillance/​
-// +\\ 
-// +\\ 
-Schneier, B. (16 March 2013). The internet is a surveillance state.// +Schneier, B. (16 March 2013). The internet is a surveillance state.\\ 
-// +\\ 
-There are three cases that the author begins with in order to make his point. The first point the author makes is that a few Chinese military hackers who attacked the United States government were caught because they accessed FaceBook through the same network infrastructure in which they attacked the US government.// +There are three cases that the author begins with in order to make his point. The first point the author makes is that a few Chinese military hackers who attacked the United States government were caught because they accessed FaceBook through the same network infrastructure in which they attacked the US government.\\ 
-The second point the author makes is that Hector Monsegur, who was a leader of the Lulzsac hacker movement, “was identified and arrested last year by the FBI” because he slipped up in his computer use and security.// +The second point the author makes is that Hector Monsegur, who was a leader of the Lulzsac hacker movement, “was identified and arrested last year by the FBI” because he slipped up in his computer use and security.\\ 
-The third point the author mentions to illustrate his point is the case in which Paula Broadwell, who had an affair with CIA director David Petraeus, took extensive care to secure her identity and used hotels and other techniques such as anonymous email services. She was caught because the “FBI correlated hotel registration data from several different hotels — and hers was the common name.”// +The third point the author mentions to illustrate his point is the case in which Paula Broadwell, who had an affair with CIA director David Petraeus, took extensive care to secure her identity and used hotels and other techniques such as anonymous email services. She was caught because the “FBI correlated hotel registration data from several different hotels — and hers was the common name.”\\ 
-These three scenarios lead up to the author’s main point, which is that the internet has essentially become a way for the government to surveil the people - we are constantly being tracked, whether or not we accept that fact. Companies are constantly tracking us, including FaceBook and Google, and they are sharing our information and search histories in order to help themselves. FaceBook, for example, tracks your online behaviors in order to suggest offline buying behaviors.// +These three scenarios lead up to the author’s main point, which is that the internet has essentially become a way for the government to surveil the people - we are constantly being tracked, whether or not we accept that fact. Companies are constantly tracking us, including FaceBook and Google, and they are sharing our information and search histories in order to help themselves. FaceBook, for example, tracks your online behaviors in order to suggest offline buying behaviors.\\ 
-Tactics to protect ourselves, such as using cash, and disabling cookies, are becoming increasingly useless. Any sort of privacy is becoming impossible, and the data that is retrieved by any sites are used by companies to track our habits and the government to spy on us.// +Tactics to protect ourselves, such as using cash, and disabling cookies, are becoming increasingly useless. Any sort of privacy is becoming impossible, and the data that is retrieved by any sites are used by companies to track our habits and the government to spy on us.\\ 
 +\\ 
 +Overall, these articles portray some varying information and points of view in regards to how much control the government has over the internet, and how much control they should have. I feel that some of the articles bring up some really interesting points and make you think of how exactly government influence protects and harms us as individuals with ideas.
governance_of_open_source.txt · Last modified: 2014/03/31 12:07 by bdemaster