Skip to main contentdfsdf

Andrew Heinz's List: Digital Law

  • Digital Law: Keeping all of your information private.

    Technology has allowed us to become more relaxed with giving out our information online. Here are a few sources that can show us how to keep our information safe and private.

  • Nov 09, 13

    This article refers to practical ways you can protect your computer from theft, damage, or any type of harm that could potentially destroy your computer

    • Estate planning for digital assets can be useful in preventing online identity theft. According to the Federal Trade Commission, up to 9 million people per year are victims of such thefts. When an individual is unable to continue to monitor her online accounts because of incapacity or death, criminals have an enhanced opportunity to hack these accounts, open new credit cards, apply for jobs, and even procure state identification cards. There are methods for protecting a deceased's identity, but they all involve having access to the deceased's online accounts. See Aleksandra Todorova, Dead Ringers: Grave Robbers Turn to ID Theft, Wall st. J., Aug. 4, 2009.
    • IDENTITY THEFT IS A BOOMING business, and not just for the criminals. We frequently hear news of companies and universities losing digital information for large numbers of consumers. In April, for example, the University of Texas at Austin warned that a hacker had breached a system at the UT business school, downloading personal data — in many cases including Social Security numbers — on 197,000 students, alumni, and employees. And the state of Ohio recalled CDs containing information on 7.7 million voters from more than 20 political campaign offices after it discovered that the discs included the voters' Social Security numbers, the key to consumers' financial accounts.
  • Copyright Laws: Are they really helping?

    Copyright laws are suppose to help protect from digital theft. These are some sources that discovered a few flaws in our copyright laws.

    • First, there are internal inconsistencies in the complex provisions to be enacted under secondary legislation. In particular, the problem of relying on Internet Protocol (IP) addresses to identify alleged infringers has proved problematic. Secondly, the proposed measures are disproportionate in terms of the offence and severity of the punishment involving a warning-system leading to possible disconnection from the Internet for copyright infringement. Thirdly, the Act is unlikely to succeed in its central purpose to control unauthorised digital copying because of its technological specificity in a fast moving environment, and a lack of consumer acceptance. Finally, by comparing the treatment of these issues under legislation in other countries, in particular New Zealand, alternative copyright enforcement models are explored.
    • LAW LACKS TEETH

      Of course, if enforcement should come down to something like arresting ordinary citizens, there may be a problem. "It's one thing if it's a Mob front pirating Hollywood movies," Richieri says. "It's quite another if it's a matter of the copyright police coming to your house and hauling away your 15-year-old [child]. That's not going to happen."

      Richieri suggests instead that we may see an educational and public awareness campaign on the part of the copyright industry to educate people about the principles and value of the law. He also speculates that you may see action taken to force universities and other places where a great deal of infringement activity goes on -- to monitor the use of their systems. In addition, he thinks that Internet service providers may be sued on a sort of contributory infringement argument: that they know that their lines are being used to commit illegal infringement.

    • Julie Cohen's new book. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice, ' marks a major effort to craft a jurisprudence of information law that goes beyond law and economics. Cohen, a celebrated scholar of intellectual property and privacy, brings her formidable talents to the fore in this book to ask scholars in both fields to pay more attention to culture. Cohen argues that the dominant approach to copyright and privacy fails to understand the role of information in people's actual lives. We have become too enamored with abstract claims of human behavior that turn out to be incomplete upon closer examination, she tells us. Mining a broad vein of contemporary theory ranging from science and technology studies to cultural studies, Cohen seeks to inform policy on intellectual property and privacy with an understanding of what she calls the networked self, the individual embedded in a complex structure of social and technological circumstances.
  • Piracy: Downloading music illegally seems to be accepted in today's Society.

    In this day in age, people seem to be just fine with downloading music illegally. Knowingly breaking the law everyday.

    • Despite highly publicized efforts by the music industry to curb music piracy, millions of Americans continued to illegally download and share music. This study obtained college student responses to scenarios that measured perceptions of three types of music theft: shoplifting a CD, illegally downloading, and illegally downloading plus file sharing. The students also reported their own recent downloading behavior, completed a demographics questionnaire, and responded to a series of statements that assessed their attitudes regarding factors associated with legal compliance in other domains. The data indicated that students viewed downloading and file sharing very differently than they viewed shoplifting in terms of endorsement of reasons to comply with laws prohibiting those behaviors. Further, concerns regarding punishment (i.e. deterrence), morality beliefs, and generalized obligation to obey the rule of law had the strongest relationships to self-reported downloading behavior. Respect for the music industry had the weakest relationship to legal compliance with both responses to the scenarios and students' self-report of their own downloading behavior.
    • The cautionary tale of Joel Tenenbaum continues. Weeks after he was ordered to pay $675,000 to record labels for illegally downloading and sharing music, those labels are saying that Mr. Tenenbaum, 25, a graduate student at Boston University, is continuing to encourage music piracy by linking to a file-sharing service on a Web site created by his legal team, The Boston Globe reported. A Twitter feed for the site, joelfightsback.com, posted a link to the Swedish file-sharing service the Pirate Bay. That site, whose founders were convicted in April by a Swedish court of aiding in copyright violations, posted ''The $675,000 Mixtape,'' a playlist that linked to the songs that Mr. Tenenbaum admitted to downloading illegally and featured a photograph of him with his arms crossed. The Recording Industry Association of America has filed for an injunction that would order Mr. Tenenbaum to destroy his illegal files and stop promoting piracy. Mr. Tenenbaum said that he had nothing to do with the song list on the Pirate Bay and that he planned to appeal his verdict and fine.
    • Not long ago, a Justice Department official marveled at the fact that while most parents would be horrified if they walked into their child's room and found 100 stolen music CDs, very few have a problem with the idea that their kids may have hundreds of illegally downloaded songs on their computer hard drives.

      This attitude that illegally distributing and downloading copyrighted music through peer-to-peer networks such as Kazaa or Grokster is somehow different (and definitely less troubling) than shoplifting CDs from a store accounts in large part for the epidemic of online-music thievery. This rampant theft is undermining the livelihoods of artists and songwriters, not to mention the very future of music itself.

      The argument is made that the best way to change this attitude is to cajole people into doing the right thing, specifically, to offer fans more and better legitimate ways of getting music online. In fact, the music industry has been doing just this, and very aggressively. In addition to the recently announced Apple Store, Time magazine has noted that there "are already a couple of dozen legal, pay-to-play downloading services, including Pressplay, Listen.com's Rhapsody and Music Net," which are not only on the right side of the law but are also "more reliable than Kazaa and its ilk."

  • Plagiarism: Technology can help us reduce this crime.

    With plagiarism being an ongoing problem in all aspects of education, technology can help us prevent the reoccurring offense.

    • In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the remainder of each class were not informed that the software would be used. The researcher predicted that students who were explicitly warned about the use of the software would plagiarize less than students who were not, but the warning had no effect. In a second study, students wrote two papers in a series. Their knowledge about plagiarism-detection software was inversely correlated with plagiarism rates on the first paper, but no correlation was found between knowledge and plagiarism on the second paper. Instead, participants were discovered to draw repeatedly from the same sources of plagiarized material across papers.
    • Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection system to deter digital plagiarism. Findings suggest that when students were aware that their work would be run through a detection system, they were less inclined to plagiarize. These findings suggest that, regardless of class standing, gender, and college major, recognition by the instructor of the nature and extent of the plagiarism problem and acceptance of responsibility for deterring it are pivotal in reducing the problem.
    • Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students' rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect student privacy rights when implementing such systems. Student work is personal information, not the property of the educator or institution. The student has the right to be fully informed about how plagiarism detection works, and the fact that their work will be permanently archived as a result. Furthermore, plagiarism detection should not be used if the permanent archiving of a student's work may expose him or her to future harm
  • Ethics in the Digital World: The ability to maintain moral ethics in digital aspects.

    Here are a few sources that help support ways we can keep good ethics in the digital realm.

    • We argue that five key issues are at stake in the new media - identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, we explore the ways in which youth are redefining these five concepts as they engage with the new digital media. For each issue, we describe and compare offline and online understandings and then explore the particular ethical promises and perils that surface online. We define good play as online conduct that is meaningful and engaging to the participant and is responsible to others in the community and society in which it is carried out. We argue that the new digital media, with all their participatory potentials, are a playground in which five factors contribute to the likelihood of good play - the technologies of the new digital media; related technical and new media literacies; person-centered factors, such as cognitive and moral development, beliefs, and values; peer cultures, both online and offline; and ethical supports, including the presence or absence of adult mentors and educational curricula.
    • Through systematic case analyses of much-discussed social media cases, both negative aspects and best practices of social media use are revealed. Ethical theory is applied to these cases as a means of analysis to reveal the moral principles associated with each case. Four cases are analyzed, ranging from bad to arguably innovative. Based upon comparing the moral principles upheld or violated, descriptive ethics are used to infer normative ethical guidelines to govern the use of social media. Fifteen ethical guidelines derived from the cases and normative moral theory are offered as a way to begin a discussion that leads to a deeper understanding of ethics in the burgeoning realm of digital engagement.
    • Fortunately, there are ways that online education can do just that, as we have learned while team-teaching an ethics course that blends traditional classroom activities with an unusual online component.

      This is the second year we will teach "Sustainability Ethics" at our respective colleges, Arizona State University and the Rochester Institute of Technology. In the course, students play interactive games that we developed to explore theoretic problems relating to important issues in sustainability. While they participate in the usual learning activities like reading, discussion, and writing assignments, they experience ethical issues personally through the games, in which they have an opportunity to advance their own grades at the expense of classmates' grades.

      To complicate matters, each game randomly positions students at different levels of privilege, so it is more difficult for some students to earn grade points than others. Finally, we link our two classes (using EthicsCore, an information-technology platform supported by the National Science Foundation) so that decisions made by one class affect grades earned by the other, 2,300 miles away. Students deliberate across universities exclusively online, in discussion rooms and chat windows.

1 - 20 of 20
20 items/page
List Comments (0)