Home

There are many different ways to interpret the title of the topic Evaluating and Controlling Technology. These keywords provide some guidance. However, the topic can be seen as an opportunity to discuss broad security concerns.

— from a review of A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology previously used as the textbook for CIS2 Computers and the Internet in Society

“how to evaluate and control technology … Baase writes of the inherent conflict between a democracy and open Internet, while dealing with the plethora of incorrect, foolish and biased information. She makes note of some totalitarian regimes that prohibit anti-government use of social media. She illustrates cases where these countries (China and Syria are just two of them) that create bogus dissident sites, find out which people are sympathetic to the cause, and then arrests these people.”

https://www.rsaconference.com/blogs/a-gift-of-fire-social-legal-and-ethical-issues-for-computing-technology

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology  is a good textbook. As with any print material on this subject, new information (and opinions) have come along since the latest update. Some of the older well-researched information is still valid. Some is outdated and misleading. Switching to online sources keeps the information current, putting additional responsibility to students to evaluate and analyze sources in the context of the course discussions.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s