Which of the following inventions were created for military applications? - Answers ENIAC and ARPANET
A notable feature of the Digital Millenium Copyright Act (DMCA) was that - Answers It created a "safe
haven" for internet service providers, so they are not automatically responsible when users post
copyrighted things, and it made it illegal to circumvent DRM
PRISM is an example of a government data collection program. - Answers True, the PRISM program
utilizes extensive data mining efforts to collect information and analyze that data for patterns of
terrorist or other potential criminal activity.
The right to freedom of speech as protected by the 1st Amendment to the Constitution is an absolute
right with no limitations. - Answers False, there are limitations on the amendment for the public good.
These include child pornography, libel, obscenity, and harmful to minors material
The Supreme Court has held that the Internet can be regulated like other broadcast mediums, such as
television and radio - Answers False, the supreme court has ruled that the internet is not a broadcast
medium, and cannot be regulated for decency like tv or radio
The United States constitution does not include a right to own intellectual property - Answers True, the
constitution gives the congress power to create intellectual property law, but there is no right that they
create such laws. They may do so, if they think it is in the public interest—that is, if it promotes
"progress in science and arts"
There is no general right to privacy explicitly mentioned in the Bill of Rights, but the Supreme Court has
ruled that there is a constitutional right to privacy. - Answers True [The 3rd, 4th, and 5th Amendments
do include specific kinds of privacy rights, but the Supreme Court has ruled that we have a more general
right to privacy that can be inferred from these specific rights.]
Which of the following are factors used to determine whether a person's use of a work (e.g., music, film,
book, software code) is fair use? - Answers Nature of the work (fact or fiction), Purpose of the use
(educational or commercial), Amount and substantiality of work used (short clip, whole film), Impact of
your use on the market for the work
Which of the following are problems that have arisen due to new Networked Communication
technologies? - Answers Cyberbullying, internet addiction, Spam
Privacy - Answers The claim of individual, groups, or institutions to determine for themselves when,
how, and to what extent information about them is communicated to others.
Three elements of Solove's Taxonomy of Privacy? - Answers 1.) Collection (grocery stores and loyalty
cards) 2.) Processing (Amazon using data mining to figure out what sort of music you prefer) 3.)
Dissemination (Facebook sharing your profile with advertisers)
, What is meant by an opt-in privacy policy? - Answers An opt-in policy means that the company will not
collect or disseminate information on or to you, unless you agree. When Facebook makes a default
setting private, but allows you to make it public, that is an "opt-in" scenario.
What are the three values of privacy described in the lecture and what theories are the derived from? -
Answers Three values of privacy described in the lecture are: safety or protection from harm
(utiliatarianism), autonomy (kant), intimacy (virtue theory)
Which of the following reject subjective relativism? - Answers It makes the actions of Hitler and Mother
Teresa equal, It blurs the lines between what you want vs. what you should do
John Rawls - Answers Says that we should put the least well of individuals first, difference principle.
Cultural Relativism - Answers What is "right" and "wrong" depends on society's moral guidelines.
Kantianism - Answers People's actions should be guided by moral laws that are universal. This is derived
through a reasoning process, "What is good without qualification" Follows a moral rule because it is in
accord with the categorical imperative
Rule Utilitarianism - Answers An ethical theory that holds we ought to adopt those morals, which if
everyone followed, everyone would be happy. Universal adoption= greatest happiness
Categorical Imperative - Answers From Kant, wants to act only from moral rules that you can at the
same time make universal
2nd Formulation - Answers From Kant, act so you treat both yourself and others as ends in themselves
and never only as a means to an end
Social Contract Theory - Answers Rules that are mutually beneficial to society, set of rules governing
how people should treat one another , Hobbes
Jeffery Reiman's view on internet addition - Answers Addicts behavior makes sense if the addict has no
hope for a better future, society bears responsibility for putting people in hopeless situations
Four types of intellectual property - Answers 1.) Trade secret (not regulated, valid as long as one keeps it
safe) 2.) Trademark (as long as company uses and protects it) 3.) Patent (20 years, patent office) 4.)
Copyright (life of author plus 70 years, 120 years for corporations)
Problems with IP include - Answers Patent trolls, copyright creeps. Both are inconsistent with the
rationale for IP which is to create an incentive for creation and use
Transformative uses - Answers Fair use, Nathan for You, include parody and satire
Digital Rights Managment - Answers Actions owners of intellectual property in digital form take to
protect their rights by changing technology. These may include encryption, digital watermarking, CD's
not being able to be copyrighted