There are many different ways to interpret the title of the topic Evaluating and Controlling Technology. These keywords provide some guidance. However, the topic can be seen as an opportunity to discuss broad security concerns.
— from a review of A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology previously used as the textbook for CIS2 Computers and the Internet in Society
“how to evaluate and control technology … Baase writes of the inherent conflict between a democracy and open Internet, while dealing with the plethora of incorrect, foolish and biased information. She makes note of some totalitarian regimes that prohibit anti-government use of social media. She illustrates cases where these countries (China and Syria are just two of them) that create bogus dissident sites, find out which people are sympathetic to the cause, and then arrests these people.”
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology is a good textbook. As with any print material on this subject, new information (and opinions) have come along since the latest update. Some of the older well-researched information is still valid. Some is outdated and misleading. Switching to online sources keeps the information current, putting additional responsibility to students to evaluate and analyze sources in the context of the course discussions.