Podcast
Questions and Answers
Spam is defined as unsolicited, bulk _____.
Spam is defined as unsolicited, bulk _____.
The share of spam in email traffic peaked at ____% in 2009.
The share of spam in email traffic peaked at ____% in 2009.
85
Bot herders control networks of compromised computers known as _____.
Bot herders control networks of compromised computers known as _____.
botnets
New software industry emerged to combat _____.
New software industry emerged to combat _____.
Signup and view all the answers
Ann, the accountant at Acme Corporation, sends email advertising the Girl Scout cookie _____.
Ann, the accountant at Acme Corporation, sends email advertising the Girl Scout cookie _____.
Signup and view all the answers
Ann's action was not strictly wrong because she did not 'use' others and did not misrepresent what she was doing. She respected their ______.
Ann's action was not strictly wrong because she did not 'use' others and did not misrepresent what she was doing. She respected their ______.
Signup and view all the answers
The benefit to Girl Scouts from selling cookies was $108, which means they made a profit of $______ per box.
The benefit to Girl Scouts from selling cookies was $108, which means they made a profit of $______ per box.
Signup and view all the answers
The Internet is a decentralized ______ system that allows users to access unique objects identified by URLs.
The Internet is a decentralized ______ system that allows users to access unique objects identified by URLs.
Signup and view all the answers
Social networking played a debatable role in the ______ uprisings, with arguments both for and against its impact on political activism.
Social networking played a debatable role in the ______ uprisings, with arguments both for and against its impact on political activism.
Signup and view all the answers
The Internet Research Agency set up social media accounts using false U.S. ______ to post inflammatory material.
The Internet Research Agency set up social media accounts using false U.S. ______ to post inflammatory material.
Signup and view all the answers
Social media can undermine trust and create a shared sense of _____ among users.
Social media can undermine trust and create a shared sense of _____ among users.
Signup and view all the answers
Facebook builds profiles of user preferences to feed them content aligning with their _____ .
Facebook builds profiles of user preferences to feed them content aligning with their _____ .
Signup and view all the answers
Censorship is an attempt to suppress or regulate public access to material considered _____ or offensive.
Censorship is an attempt to suppress or regulate public access to material considered _____ or offensive.
Signup and view all the answers
The _____ classically represents the press's role in informing citizens and holding power accountable.
The _____ classically represents the press's role in informing citizens and holding power accountable.
Signup and view all the answers
Kant believed in the courage to use one's own _____ as essential to oppose censorship.
Kant believed in the courage to use one's own _____ as essential to oppose censorship.
Signup and view all the answers
Mill argued that truth is revealed through the clash of _____ in free and open discourse.
Mill argued that truth is revealed through the clash of _____ in free and open discourse.
Signup and view all the answers
The 1st Amendment to the U.S. Constitution prohibits Congress from abridging the freedom of _____ .
The 1st Amendment to the U.S. Constitution prohibits Congress from abridging the freedom of _____ .
Signup and view all the answers
Jeremy Jaynes was convicted for sending millions of _____ messages before his conviction was overturned.
Jeremy Jaynes was convicted for sending millions of _____ messages before his conviction was overturned.
Signup and view all the answers
In China, the government uses sophisticated filtering systems to block Internet access during times of _____ unrest.
In China, the government uses sophisticated filtering systems to block Internet access during times of _____ unrest.
Signup and view all the answers
Self-censorship occurs when a group decides not to publish to avoid subsequent _____ .
Self-censorship occurs when a group decides not to publish to avoid subsequent _____ .
Signup and view all the answers
Kantian ethics emphasizes treating individuals as ends in themselves and never merely as a means to an _____
Kantian ethics emphasizes treating individuals as ends in themselves and never merely as a means to an _____
Signup and view all the answers
The total profit from selling 36 boxes of cookies was $_____.
The total profit from selling 36 boxes of cookies was $_____.
Signup and view all the answers
Ann's use of the company email system to solicit cookie orders could lead to lower _____ among employees.
Ann's use of the company email system to solicit cookie orders could lead to lower _____ among employees.
Signup and view all the answers
Mobile apps have become a preferred way to access the Internet on mobile devices instead of using Web _____ .
Mobile apps have become a preferred way to access the Internet on mobile devices instead of using Web _____ .
Signup and view all the answers
During the Massachusetts special election in 2010, Twitter was used to spread _____ about one of the candidates.
During the Massachusetts special election in 2010, Twitter was used to spread _____ about one of the candidates.
Signup and view all the answers
Spam is often considered _____ email that is sent without the recipient's consent.
Spam is often considered _____ email that is sent without the recipient's consent.
Signup and view all the answers
By 2009, _____% of email traffic was classified as spam.
By 2009, _____% of email traffic was classified as spam.
Signup and view all the answers
The design of the Internet allows for unfair, one-way communications that often lead to _____.
The design of the Internet allows for unfair, one-way communications that often lead to _____.
Signup and view all the answers
Law enforcement agencies are working globally to dismantle _____ command centers linked to spam activities.
Law enforcement agencies are working globally to dismantle _____ command centers linked to spam activities.
Signup and view all the answers
Ann's email about the Girl Scout cookie sale was seen as a violation by some employees because it blurred the lines between _____ and work communication.
Ann's email about the Girl Scout cookie sale was seen as a violation by some employees because it blurred the lines between _____ and work communication.
Signup and view all the answers
Without traditional newspapers, what will happen to the Fourth _____?
Without traditional newspapers, what will happen to the Fourth _____?
Signup and view all the answers
Facebook does not feed users news that contradicts their _____ of the world.
Facebook does not feed users news that contradicts their _____ of the world.
Signup and view all the answers
Censorship is often exercised by governments and religious _____ .
Censorship is often exercised by governments and religious _____ .
Signup and view all the answers
A major challenge posed by the Internet is the _____ nature of communication.
A major challenge posed by the Internet is the _____ nature of communication.
Signup and view all the answers
The Court of Star Chamber in England administered broad anti-sedition law called De Scandalis _____ .
The Court of Star Chamber in England administered broad anti-sedition law called De Scandalis _____ .
Signup and view all the answers
According to Mill, any opinion may contain a kernel of _____ .
According to Mill, any opinion may contain a kernel of _____ .
Signup and view all the answers
The U.S. Constitution’s 1st Amendment protects the freedom of _____ and of the press.
The U.S. Constitution’s 1st Amendment protects the freedom of _____ and of the press.
Signup and view all the answers
Self-censorship is most commonly observed when a group decides to avoid subsequent _____ .
Self-censorship is most commonly observed when a group decides to avoid subsequent _____ .
Signup and view all the answers
Direct censorship can involve government _____ of all media outlets.
Direct censorship can involve government _____ of all media outlets.
Signup and view all the answers
Traditional newspapers have faced challenges due to Craigslist and social media, which have reduced their _____ income.
Traditional newspapers have faced challenges due to Craigslist and social media, which have reduced their _____ income.
Signup and view all the answers
Spam is considered unsolicited, bulk _____ sent over the Internet.
Spam is considered unsolicited, bulk _____ sent over the Internet.
Signup and view all the answers
The share of spam in email traffic has declined from a peak of 85% in 2009 to around _____% now.
The share of spam in email traffic has declined from a peak of 85% in 2009 to around _____% now.
Signup and view all the answers
Law enforcement agencies are working to shut down botnet command _____ that are used for sending spam.
Law enforcement agencies are working to shut down botnet command _____ that are used for sending spam.
Signup and view all the answers
In 2003, a significant increase in spam known as the Spam _____ occurred on the Internet.
In 2003, a significant increase in spam known as the Spam _____ occurred on the Internet.
Signup and view all the answers
The misuse of email communication can blur the boundaries between _____ and work in a professional setting.
The misuse of email communication can blur the boundaries between _____ and work in a professional setting.
Signup and view all the answers
Kant's 2nd formulation of the Categorical Imperative emphasizes treating others as ends in themselves and never merely as a means to an _____.
Kant's 2nd formulation of the Categorical Imperative emphasizes treating others as ends in themselves and never merely as a means to an _____.
Signup and view all the answers
Ann’s actions were analyzed with multiple ethical theories, leading to different conclusions, although all suggested she could have taken a less _____ course.
Ann’s actions were analyzed with multiple ethical theories, leading to different conclusions, although all suggested she could have taken a less _____ course.
Signup and view all the answers
The Act Utilitarian analysis showed that the benefits to the Girl Scouts exceeded the harms, thus deeming Ann’s action as _____.
The Act Utilitarian analysis showed that the benefits to the Girl Scouts exceeded the harms, thus deeming Ann’s action as _____.
Signup and view all the answers
Ann did not act like a spammer; she did not conceal her _____ while soliciting donations through email.
Ann did not act like a spammer; she did not conceal her _____ while soliciting donations through email.
Signup and view all the answers
Mobile apps have become the primary way to access the Internet on mobile devices, replacing traditional Web _____.
Mobile apps have become the primary way to access the Internet on mobile devices, replacing traditional Web _____.
Signup and view all the answers
Facebook provides nearly half of Americans with _____.
Facebook provides nearly half of Americans with _____.
Signup and view all the answers
People are segregated into ideological 'echo _____'.
People are segregated into ideological 'echo _____'.
Signup and view all the answers
Censorship is traditionally exercised by governments and religious _____.
Censorship is traditionally exercised by governments and religious _____.
Signup and view all the answers
The _____ estate has historically informed citizens and held power accountable.
The _____ estate has historically informed citizens and held power accountable.
Signup and view all the answers
Kant opposed censorship, advocating for individuals to use their own _____.
Kant opposed censorship, advocating for individuals to use their own _____.
Signup and view all the answers
Mill argued that the truth is revealed in the clash of _____.
Mill argued that the truth is revealed in the clash of _____.
Signup and view all the answers
Direct censorship can include government _____ of all media outlets.
Direct censorship can include government _____ of all media outlets.
Signup and view all the answers
Freedom of expression must be balanced against the public _____.
Freedom of expression must be balanced against the public _____.
Signup and view all the answers
Many newspapers have suffered financially due to the rise of Craigslist and social media, leading to reduced _____ income.
Many newspapers have suffered financially due to the rise of Craigslist and social media, leading to reduced _____ income.
Signup and view all the answers
In China, the government has one of the world's most sophisticated filtering _____.
In China, the government has one of the world's most sophisticated filtering _____.
Signup and view all the answers
Study Notes
Networked Communications
- Internet and cellular networks are essential for modern life.
- Benefits include conducting business, staying connected with loved ones, and entertainment options.
- Harms consist of scams, bullying, harassment, and potential threats to democratic institutions.
Spam
- Spam is unsolicited bulk email, marked by significant profitability.
- Sending ads to one million addresses costs $10, making it over 30,000 times cheaper than traditional junk mail.
- Spam traffic rose dramatically from 9% of email in 2002 to 85% by 2009, now around 57%.
- Companies gather email addresses via websites, chat rooms, and contests, while bot herders manage large botnets for spam distribution.
- Despite spam filters, the economic impact of spam is estimated in tens of billions of dollars lost in productivity.
Socio-Technical Solutions
- New technologies can lead to new social dynamics, as seen with spam where low costs drive increased volume of messages.
- The Internet’s design encourages one-way communication, complicating spam management.
Case Study: Ann the Acme Accountant
- Ann sent an email about a Girl Scout cookie sale, leading to mixed reactions from employees.
- Analyses of her actions varied:
- Kantian: No misrepresentation, but opt-in would have been better.
- Act Utilitarian: Benefits (earnings for scouts) outweighed minor harms (time lost).
- Rule Utilitarian: Predicted company-wide solicitation would lower morale and yield more harm.
- Social Contract: No company policy against her email use; acted within rights.
- Virtue Ethics: Showed honesty but lacked fairness and respect towards coworkers.
Internet Interactions
- The World Wide Web is decentralized with every object having a unique URL.
- Increasing use of mobile devices has shifted access from browsers to mobile apps.
- The Internet is used for various activities, including purchasing, socializing, and learning.
Impact of Text Messaging
- M-PESA in Kenya illustrates how mobile tech enables savings, bill payments, and fund transfers.
- text messaging has reshaped political activism and communication, notably during events like the Arab Spring.
Political Influence of Online Media
- Social media platforms play a significant role in political activism and misinformation campaigns.
- Russian interference in U.S. elections raised concerns about the influence of social media on democracy.
Censorship
- Censorship aims to regulate harmful or offensive content, traditionally by governments.
- Direct and self-censorship both play roles, with the Internet’s vastness challenging regulation.
- Governments like China and North Korea exemplify extreme censorship practices.
Freedom of Expression
- Historical evolution led to significant protections under the First Amendment.
- These rights are not absolute and must be balanced against public good.
- Court cases illustrate tensions between censorship and freedom of speech.
Internet Ethics and Privacy
- Several ethical evaluations, including Kantian and Utilitarian, analyze actions online with respect to privacy and autonomy.
- Issues like sexting highlight ongoing conversations about appropriate content and online behavior.
Cybercrime
- Identity theft is a prevalent crime, especially online, with various methods used by thieves.
- Instances of cyberbullying and revenge porn point to the darker side of online interactions.
- Police techniques in tackling online predation raise ethical questions about method versus motive.
Internet Addiction
- There is ongoing debate about whether internet addiction qualifies as a mental disorder.
- Symptoms identified include excessive use, withdrawal, and resultant negative social consequences.
- Governments like South Korea and China have introduced regulations to manage excessive gaming in minors.### Internet Addiction and Its Consequences
- In 2005, a South Korean man died after playing video games for nearly 50 hours continuously, highlighting severe cases of gaming addiction.
Contributing Factors to Addiction
- Social Factors: Peer groups heavily influence individuals, potentially fostering addictive behaviors.
-
Situational Factors:
- Stress plays a significant role in developing dependencies.
- Lack of social support and intimacy can lead to isolation and increased addiction risk.
- Limited opportunities for productive activities can result in individuals seeking solace through addictive behaviors.
-
Individual Factors:
- Those with a propensity for excess may engage more deeply in addictive activities.
- A lack of personal achievement can drive individuals toward escapism through addiction.
- Fear of failure can also contribute to continued engagement in addictive behaviors.
Ethical Evaluation
-
Enlightenment View:
- Perspectives from Kantianism and utilitarianism assert that individuals hold the power and responsibility to govern their lives and make choices consciously.
-
Jeffrey Reiman's View:
- Suggests that the behavior of addicts can be understood in the context of hopelessness, arguing that society has a role in creating environments that foster such despair.
Impact of the Internet and Social Media
- Advances in internet and cellular technology have transformed communication, enabling unprecedented social interaction, business opportunities, and political organization.
- This vast digital landscape mirrors both the best and worst aspects of humanity, presenting new opportunities for exploitation and addiction.
- Social media has emerged as a crucial platform for news dissemination, while also potentially increasing political polarization among users.
Governmental Response
- Governments face challenges in deciding how to intervene regarding internet content control and tackling issues like internet addiction while balancing freedom of information.
Networked Communications
- Internet and cellular networks are essential for modern life.
- Benefits include conducting business, staying connected with loved ones, and entertainment options.
- Harms consist of scams, bullying, harassment, and potential threats to democratic institutions.
Spam
- Spam is unsolicited bulk email, marked by significant profitability.
- Sending ads to one million addresses costs $10, making it over 30,000 times cheaper than traditional junk mail.
- Spam traffic rose dramatically from 9% of email in 2002 to 85% by 2009, now around 57%.
- Companies gather email addresses via websites, chat rooms, and contests, while bot herders manage large botnets for spam distribution.
- Despite spam filters, the economic impact of spam is estimated in tens of billions of dollars lost in productivity.
Socio-Technical Solutions
- New technologies can lead to new social dynamics, as seen with spam where low costs drive increased volume of messages.
- The Internet’s design encourages one-way communication, complicating spam management.
Case Study: Ann the Acme Accountant
- Ann sent an email about a Girl Scout cookie sale, leading to mixed reactions from employees.
- Analyses of her actions varied:
- Kantian: No misrepresentation, but opt-in would have been better.
- Act Utilitarian: Benefits (earnings for scouts) outweighed minor harms (time lost).
- Rule Utilitarian: Predicted company-wide solicitation would lower morale and yield more harm.
- Social Contract: No company policy against her email use; acted within rights.
- Virtue Ethics: Showed honesty but lacked fairness and respect towards coworkers.
Internet Interactions
- The World Wide Web is decentralized with every object having a unique URL.
- Increasing use of mobile devices has shifted access from browsers to mobile apps.
- The Internet is used for various activities, including purchasing, socializing, and learning.
Impact of Text Messaging
- M-PESA in Kenya illustrates how mobile tech enables savings, bill payments, and fund transfers.
- text messaging has reshaped political activism and communication, notably during events like the Arab Spring.
Political Influence of Online Media
- Social media platforms play a significant role in political activism and misinformation campaigns.
- Russian interference in U.S. elections raised concerns about the influence of social media on democracy.
Censorship
- Censorship aims to regulate harmful or offensive content, traditionally by governments.
- Direct and self-censorship both play roles, with the Internet’s vastness challenging regulation.
- Governments like China and North Korea exemplify extreme censorship practices.
Freedom of Expression
- Historical evolution led to significant protections under the First Amendment.
- These rights are not absolute and must be balanced against public good.
- Court cases illustrate tensions between censorship and freedom of speech.
Internet Ethics and Privacy
- Several ethical evaluations, including Kantian and Utilitarian, analyze actions online with respect to privacy and autonomy.
- Issues like sexting highlight ongoing conversations about appropriate content and online behavior.
Cybercrime
- Identity theft is a prevalent crime, especially online, with various methods used by thieves.
- Instances of cyberbullying and revenge porn point to the darker side of online interactions.
- Police techniques in tackling online predation raise ethical questions about method versus motive.
Internet Addiction
- There is ongoing debate about whether internet addiction qualifies as a mental disorder.
- Symptoms identified include excessive use, withdrawal, and resultant negative social consequences.
- Governments like South Korea and China have introduced regulations to manage excessive gaming in minors.### Internet Addiction and Its Consequences
- In 2005, a South Korean man died after playing video games for nearly 50 hours continuously, highlighting severe cases of gaming addiction.
Contributing Factors to Addiction
- Social Factors: Peer groups heavily influence individuals, potentially fostering addictive behaviors.
-
Situational Factors:
- Stress plays a significant role in developing dependencies.
- Lack of social support and intimacy can lead to isolation and increased addiction risk.
- Limited opportunities for productive activities can result in individuals seeking solace through addictive behaviors.
-
Individual Factors:
- Those with a propensity for excess may engage more deeply in addictive activities.
- A lack of personal achievement can drive individuals toward escapism through addiction.
- Fear of failure can also contribute to continued engagement in addictive behaviors.
Ethical Evaluation
-
Enlightenment View:
- Perspectives from Kantianism and utilitarianism assert that individuals hold the power and responsibility to govern their lives and make choices consciously.
-
Jeffrey Reiman's View:
- Suggests that the behavior of addicts can be understood in the context of hopelessness, arguing that society has a role in creating environments that foster such despair.
Impact of the Internet and Social Media
- Advances in internet and cellular technology have transformed communication, enabling unprecedented social interaction, business opportunities, and political organization.
- This vast digital landscape mirrors both the best and worst aspects of humanity, presenting new opportunities for exploitation and addiction.
- Social media has emerged as a crucial platform for news dissemination, while also potentially increasing political polarization among users.
Governmental Response
- Governments face challenges in deciding how to intervene regarding internet content control and tackling issues like internet addiction while balancing freedom of information.
Networked Communications
- Internet and cellular networks are essential for modern life.
- Benefits include conducting business, staying connected with loved ones, and entertainment options.
- Harms consist of scams, bullying, harassment, and potential threats to democratic institutions.
Spam
- Spam is unsolicited bulk email, marked by significant profitability.
- Sending ads to one million addresses costs $10, making it over 30,000 times cheaper than traditional junk mail.
- Spam traffic rose dramatically from 9% of email in 2002 to 85% by 2009, now around 57%.
- Companies gather email addresses via websites, chat rooms, and contests, while bot herders manage large botnets for spam distribution.
- Despite spam filters, the economic impact of spam is estimated in tens of billions of dollars lost in productivity.
Socio-Technical Solutions
- New technologies can lead to new social dynamics, as seen with spam where low costs drive increased volume of messages.
- The Internet’s design encourages one-way communication, complicating spam management.
Case Study: Ann the Acme Accountant
- Ann sent an email about a Girl Scout cookie sale, leading to mixed reactions from employees.
- Analyses of her actions varied:
- Kantian: No misrepresentation, but opt-in would have been better.
- Act Utilitarian: Benefits (earnings for scouts) outweighed minor harms (time lost).
- Rule Utilitarian: Predicted company-wide solicitation would lower morale and yield more harm.
- Social Contract: No company policy against her email use; acted within rights.
- Virtue Ethics: Showed honesty but lacked fairness and respect towards coworkers.
Internet Interactions
- The World Wide Web is decentralized with every object having a unique URL.
- Increasing use of mobile devices has shifted access from browsers to mobile apps.
- The Internet is used for various activities, including purchasing, socializing, and learning.
Impact of Text Messaging
- M-PESA in Kenya illustrates how mobile tech enables savings, bill payments, and fund transfers.
- text messaging has reshaped political activism and communication, notably during events like the Arab Spring.
Political Influence of Online Media
- Social media platforms play a significant role in political activism and misinformation campaigns.
- Russian interference in U.S. elections raised concerns about the influence of social media on democracy.
Censorship
- Censorship aims to regulate harmful or offensive content, traditionally by governments.
- Direct and self-censorship both play roles, with the Internet’s vastness challenging regulation.
- Governments like China and North Korea exemplify extreme censorship practices.
Freedom of Expression
- Historical evolution led to significant protections under the First Amendment.
- These rights are not absolute and must be balanced against public good.
- Court cases illustrate tensions between censorship and freedom of speech.
Internet Ethics and Privacy
- Several ethical evaluations, including Kantian and Utilitarian, analyze actions online with respect to privacy and autonomy.
- Issues like sexting highlight ongoing conversations about appropriate content and online behavior.
Cybercrime
- Identity theft is a prevalent crime, especially online, with various methods used by thieves.
- Instances of cyberbullying and revenge porn point to the darker side of online interactions.
- Police techniques in tackling online predation raise ethical questions about method versus motive.
Internet Addiction
- There is ongoing debate about whether internet addiction qualifies as a mental disorder.
- Symptoms identified include excessive use, withdrawal, and resultant negative social consequences.
- Governments like South Korea and China have introduced regulations to manage excessive gaming in minors.### Internet Addiction and Its Consequences
- In 2005, a South Korean man died after playing video games for nearly 50 hours continuously, highlighting severe cases of gaming addiction.
Contributing Factors to Addiction
- Social Factors: Peer groups heavily influence individuals, potentially fostering addictive behaviors.
-
Situational Factors:
- Stress plays a significant role in developing dependencies.
- Lack of social support and intimacy can lead to isolation and increased addiction risk.
- Limited opportunities for productive activities can result in individuals seeking solace through addictive behaviors.
-
Individual Factors:
- Those with a propensity for excess may engage more deeply in addictive activities.
- A lack of personal achievement can drive individuals toward escapism through addiction.
- Fear of failure can also contribute to continued engagement in addictive behaviors.
Ethical Evaluation
-
Enlightenment View:
- Perspectives from Kantianism and utilitarianism assert that individuals hold the power and responsibility to govern their lives and make choices consciously.
-
Jeffrey Reiman's View:
- Suggests that the behavior of addicts can be understood in the context of hopelessness, arguing that society has a role in creating environments that foster such despair.
Impact of the Internet and Social Media
- Advances in internet and cellular technology have transformed communication, enabling unprecedented social interaction, business opportunities, and political organization.
- This vast digital landscape mirrors both the best and worst aspects of humanity, presenting new opportunities for exploitation and addiction.
- Social media has emerged as a crucial platform for news dissemination, while also potentially increasing political polarization among users.
Governmental Response
- Governments face challenges in deciding how to intervene regarding internet content control and tackling issues like internet addiction while balancing freedom of information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the impact of networked communications in contemporary life. Explore the benefits and harms associated with the internet and cellular networks, including social connections and potential scams. Assess the implications for business, entertainment, and society.