Networked Communications Overview
43 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a significant benefit of networked communications?

  • Higher costs for businesses
  • Enhanced entertainment options (correct)
  • Isolation from friends and family
  • Increased spam traffic
  • Spam accounted for more than 85% of email traffic by 2009.

    True

    What is the primary method spammers use to obtain email addresses?

    Websites and chat rooms

    Spam is defined as _____ email.

    <p>unsolicited, bulk</p> Signup and view all the answers

    Which of the following harms is associated with networked communications?

    <p>Bullying and harassment</p> Signup and view all the answers

    Match the following to their definitions:

    <p>Spam = Unsolicited bulk email Botnet = Network of compromised computers Spam filter = Software to block spam Socio-Technical Solutions = Approaches to address social issues arising from technology</p> Signup and view all the answers

    How did the spam tsunami affect email traffic from 2002 to 2009?

    <p>Spam rose from 9% to 85% of email traffic</p> Signup and view all the answers

    Ann did anything wrong by sending the email about the Girl Scout cookie sale.

    <p>False</p> Signup and view all the answers

    What is a significant factor that influences a webpage's ranking on Google?

    <p>The number of links pointing to it</p> Signup and view all the answers

    Cyberbullying is defined as the use of the Internet or phone system to inflict physical harm.

    <p>False</p> Signup and view all the answers

    What law aims to prevent cyberbullying in the case of Megan Meier?

    <p>Megan Meier Cyberbullying Prevention Act</p> Signup and view all the answers

    The three variants of Internet addiction identified by psychiatrist Jerald Block are excessive gaming, sexual preoccupations, and __________.

    <p>messaging</p> Signup and view all the answers

    Match the following countries with their respective regulations or actions regarding gaming for children:

    <p>South Korea = Prohibits children from gaming between midnight and 6 a.m. China = Discourages children under 18 from playing more than 3 hours/day. Germany = Criminalizes revenge porn. United Kingdom = Criminalizes revenge porn.</p> Signup and view all the answers

    What was the Supreme Court's ruling regarding the FCC and the First Amendment?

    <p>FCC did not violate the First Amendment.</p> Signup and view all the answers

    Kate's actions in posting Jerry's photo were considered right by four out of five ethical analyses.

    <p>False</p> Signup and view all the answers

    What is a web filter?

    <p>Software that prevents the display of certain web pages.</p> Signup and view all the answers

    Under the Child Internet Protection Act, libraries must filter pages containing ___ or ___ content.

    <p>obscenity, child pornography</p> Signup and view all the answers

    What role does Facebook play in the dissemination of news among Americans?

    <p>It caters to users' preferences by providing news they like.</p> Signup and view all the answers

    Match the following ethical theories to their evaluation of CIPA:

    <p>Kantian evaluation = CIPA is wrong Act utilitarian evaluation = Depends on the weighing of benefits and harms Social contract theory = Freedom of conscience should be prioritized Virtue ethics evaluation = Not explicitly mentioned in the document</p> Signup and view all the answers

    Which of the following is NOT a common method used by identity thieves to gain access to personal information?

    <p>Social engineering</p> Signup and view all the answers

    Censorship is primarily exercised by private companies rather than governments.

    <p>False</p> Signup and view all the answers

    The majority of identity theft cases originate from lost credit cards or bank information.

    <p>True</p> Signup and view all the answers

    What is self-censorship?

    <p>It is when a group or individual decides not to publish material to avoid persecution or maintain good relations.</p> Signup and view all the answers

    The practice of modifying or blocking access to information is known as ______.

    <p>censorship</p> Signup and view all the answers

    What percentage of teens are reported to be sexting?

    <p>Between 3 and 7 percent.</p> Signup and view all the answers

    Instant messaging software, such as ___, is commonly used by child predators to find victims.

    <p>Kik Messenger</p> Signup and view all the answers

    Match the following types of censorship with their characteristics:

    <p>Direct Censorship = Government monopolization of media Prepublication Review = Approval before dissemination Self-Censorship = Deciding not to publish to avoid consequences Licensing and Registration = Control of media with limited bandwidth</p> Signup and view all the answers

    What is the consumer's liability for credit card losses limited to?

    <p>$50</p> Signup and view all the answers

    Which of the following represents a challenge posed by the Internet regarding censorship?

    <p>Difficulty in distinguishing between minors and adults</p> Signup and view all the answers

    The 1st Amendment to the U.S. Constitution provides absolute freedom of expression.

    <p>False</p> Signup and view all the answers

    Who among the Enlightenment thinkers opposed censorship?

    <p>Kant and Mill</p> Signup and view all the answers

    In many cases, the ________ has acted as the Fourth Estate, informing citizens and holding power to account.

    <p>press</p> Signup and view all the answers

    What was the significance of the printing press?

    <p>It broke the monopoly on distributing information.</p> Signup and view all the answers

    According to the Kantian analysis, what should we always respect in others?

    <p>Their autonomy</p> Signup and view all the answers

    Ann's action of sending the email was strictly wrong according to the Act Utilitarian analysis.

    <p>False</p> Signup and view all the answers

    What was Ann's profit from selling Girl Scout cookies if she sold 36 boxes at $3 profit each?

    <p>$108</p> Signup and view all the answers

    The _____ Web is characterized by a networked hypertext system.

    <p>World Wide</p> Signup and view all the answers

    Match the following terms with their descriptions:

    <p>M-Pesa = Mobile money transfer service in Kenya Twitter = Web-based social networking service Internet Research Agency = Operated social media accounts with false personas Pro-Trump websites = Created by Macedonian entrepreneurs for ad revenue</p> Signup and view all the answers

    What was one negative consequence of everyone in the company using email for donations according to Rule Utilitarian analysis?

    <p>Lower employee morale</p> Signup and view all the answers

    The Internet Research Agency’s posts during the 2016 election were seen by approximately 10 million Americans.

    <p>False</p> Signup and view all the answers

    What was Ann's poor judgment symptom according to the Virtue Ethics analysis?

    <p>Excessive complaining by co-workers</p> Signup and view all the answers

    In the Act Utilitarian analysis, the time wasted at work resulted in a loss of productivity amounting to $_____ for the company.

    <p>70</p> Signup and view all the answers

    What method could Ann have utilized to avoid issues with her coworkers regarding the cookie sale?

    <p>Posting a sign-up sheet</p> Signup and view all the answers

    Study Notes

    Networked Communications

    • Internet and cellular networks are essential for modern life.
    • Benefits include conducting business, staying connected with loved ones, and entertainment options.
    • Harms consist of scams, bullying, harassment, and potential threats to democratic institutions.

    Spam

    • Spam is unsolicited bulk email, marked by significant profitability.
    • Sending ads to one million addresses costs $10, making it over 30,000 times cheaper than traditional junk mail.
    • Spam traffic rose dramatically from 9% of email in 2002 to 85% by 2009, now around 57%.
    • Companies gather email addresses via websites, chat rooms, and contests, while bot herders manage large botnets for spam distribution.
    • Despite spam filters, the economic impact of spam is estimated in tens of billions of dollars lost in productivity.

    Socio-Technical Solutions

    • New technologies can lead to new social dynamics, as seen with spam where low costs drive increased volume of messages.
    • The Internet’s design encourages one-way communication, complicating spam management.

    Case Study: Ann the Acme Accountant

    • Ann sent an email about a Girl Scout cookie sale, leading to mixed reactions from employees.
    • Analyses of her actions varied:
      • Kantian: No misrepresentation, but opt-in would have been better.
      • Act Utilitarian: Benefits (earnings for scouts) outweighed minor harms (time lost).
      • Rule Utilitarian: Predicted company-wide solicitation would lower morale and yield more harm.
      • Social Contract: No company policy against her email use; acted within rights.
      • Virtue Ethics: Showed honesty but lacked fairness and respect towards coworkers.

    Internet Interactions

    • The World Wide Web is decentralized with every object having a unique URL.
    • Increasing use of mobile devices has shifted access from browsers to mobile apps.
    • The Internet is used for various activities, including purchasing, socializing, and learning.

    Impact of Text Messaging

    • M-PESA in Kenya illustrates how mobile tech enables savings, bill payments, and fund transfers.
    • text messaging has reshaped political activism and communication, notably during events like the Arab Spring.

    Political Influence of Online Media

    • Social media platforms play a significant role in political activism and misinformation campaigns.
    • Russian interference in U.S. elections raised concerns about the influence of social media on democracy.

    Censorship

    • Censorship aims to regulate harmful or offensive content, traditionally by governments.
    • Direct and self-censorship both play roles, with the Internet’s vastness challenging regulation.
    • Governments like China and North Korea exemplify extreme censorship practices.

    Freedom of Expression

    • Historical evolution led to significant protections under the First Amendment.
    • These rights are not absolute and must be balanced against public good.
    • Court cases illustrate tensions between censorship and freedom of speech.

    Internet Ethics and Privacy

    • Several ethical evaluations, including Kantian and Utilitarian, analyze actions online with respect to privacy and autonomy.
    • Issues like sexting highlight ongoing conversations about appropriate content and online behavior.

    Cybercrime

    • Identity theft is a prevalent crime, especially online, with various methods used by thieves.
    • Instances of cyberbullying and revenge porn point to the darker side of online interactions.
    • Police techniques in tackling online predation raise ethical questions about method versus motive.

    Internet Addiction

    • There is ongoing debate about whether internet addiction qualifies as a mental disorder.
    • Symptoms identified include excessive use, withdrawal, and resultant negative social consequences.
    • Governments like South Korea and China have introduced regulations to manage excessive gaming in minors.### Internet Addiction and Its Consequences
    • In 2005, a South Korean man died after playing video games for nearly 50 hours continuously, highlighting severe cases of gaming addiction.

    Contributing Factors to Addiction

    • Social Factors: Peer groups heavily influence individuals, potentially fostering addictive behaviors.
    • Situational Factors:
      • Stress plays a significant role in developing dependencies.
      • Lack of social support and intimacy can lead to isolation and increased addiction risk.
      • Limited opportunities for productive activities can result in individuals seeking solace through addictive behaviors.
    • Individual Factors:
      • Those with a propensity for excess may engage more deeply in addictive activities.
      • A lack of personal achievement can drive individuals toward escapism through addiction.
      • Fear of failure can also contribute to continued engagement in addictive behaviors.

    Ethical Evaluation

    • Enlightenment View:
      • Perspectives from Kantianism and utilitarianism assert that individuals hold the power and responsibility to govern their lives and make choices consciously.
    • Jeffrey Reiman's View:
      • Suggests that the behavior of addicts can be understood in the context of hopelessness, arguing that society has a role in creating environments that foster such despair.

    Impact of the Internet and Social Media

    • Advances in internet and cellular technology have transformed communication, enabling unprecedented social interaction, business opportunities, and political organization.
    • This vast digital landscape mirrors both the best and worst aspects of humanity, presenting new opportunities for exploitation and addiction.
    • Social media has emerged as a crucial platform for news dissemination, while also potentially increasing political polarization among users.

    Governmental Response

    • Governments face challenges in deciding how to intervene regarding internet content control and tackling issues like internet addiction while balancing freedom of information.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the integral role of networked communications in modern life, including the benefits and harms of the internet and cellular networks. This quiz covers topics such as spam, business connectivity, social interactions, and the potential threats posed by these technologies.

    More Like This

    Networked Communications Overview
    128 questions
    Networked Communications Quiz
    60 questions

    Networked Communications Quiz

    IntelligentJasper852 avatar
    IntelligentJasper852
    Networked Communications and Spam Impact
    60 questions
    Use Quizgecko on...
    Browser
    Browser