Michael Caryl CMN 104 Professor Horning 25 April 2016 Topic: Aaron Swartz and public access to JStor. Purpose: To inform. Specific Purpose Statement: To inform the audience about how Aaron Swartz was silenced when trying to make access to private databases public. Thesis: Knowledge is protected, and the way we share it is limited, I will explore this with you through the eyes of one individual, Aaron Swartz. The Lengths of Protecting Knowledge I. Introduction A. You’re a college student and a Secret Service agent appears at your door. What good reason would you think he’d have to arrest you? B. Knowledge is protected, and the way we share it is limited, I will explore this with you through the eyes of one individual, Aaron Swartz. C. We …show more content…
III. Conclusion A. Not always can abusing academic databases limit one to punishment with only the university, it can reach farther to the US government and law. B. While accessing databases to write papers and conduct research, barriers to accessing this knowledge are protected, and are so to the fullest extent. C. All in all, the protection of knowledge is very real as we have seen. Think about the lengths that are considered next time you are cranking out that last minute paper. Works Cited Aaron Swartz, internet freedom activist, dies aged 26", BBC News. Retrieved April 25, ……….2016. Annual Summary, Jstor. http://about.jstor.org/sites/default/files/misc/JSTOR-Annual- ……….Summary_2012_v6.pdf Retrieved April 25, 2016. ………. Brown, Laura (September 7, 2011). "JSTOR–free access to early journal content and ……….serving 'unaffiliated' users", JSTOR. Retrieved April 25, 2016. Lindsay, Jay (July 19, 2011). "Feds: Harvard fellow hacked millions of papers". ……….Associated Press. Retrieved Retrieved April 25, 2016. Schwartz, John (July 19, 2011). "Open-Access Advocate Is Arrested for Huge ……….Download". New York Times. Retrieved April 25,
McCraw, David, and Stephen Gikow. “The End to a Unspoken Bargain? National Security and Leaks in a Post-Pentagon Papers World.” Harvard Civil Rights-Civil Liberties Law Review 48.2 (2013): 473-509. Academic OneFile. Web. 5 Dec. 2013.
"The Triumph of Technique – The Logic of the NSA." LibrarianShipwreck. WordPress.com, 22 June 2013. Web. 08 Feb. 2014.
Keck, Zachary. "Yes, Edward Snowden Is a Traitor." The Diplomat. N.p., 21 Dec. 2013. Web. 21 Feb. 2014
The America Government is not carrying out immoral, illegal or unethical acts by collecting data on its citizens. However, history has shown that such collections of data without correct supervision can easily be used in an unethical manner.
The Truth About The Central Park Five “Of the 316 known cases in which innocent people have been exonerated by past conviction DNA testing, nearly 30% are attributable to false confessions” (Kukucka). This was the case for five young men living in the city of New York. At the time, these five men were just teenagers from the ages of 14 to 16, four of them were African American and the other one was Latino. These teenagers became know as “The Central Park Five”. This nickname came about after being wrongly accused and convicted of a violent rape that occurred in Central Park.
...e administration plans to introduce legislation that would alter the N.S.A’s privacy breaches and end its illegal data collections. Citing an identical argument, that the government cannot indicate terrorist attacks that have been stopped by the intelligence gathering programs, a review group of the Administration “called for major changes to the program; the latter also concluded that the bulk collection is illegal.”3
According to the Universal Declaration of Human Rights, “Everyone, without any discrimination, has the right to equal pay for equal work,… In addition “No one may be compelled to belong to an association”. El Chapo forced people to work for him and help him transfer drugs across the borders without paying the helpers. After the work was finished, he killed those people. He also compelled people to join his criminal work by telling that he would be pay them a lot of money but instead he killed them.
STEPHEN BRAUN, A. F. (2014, May 9). Secret to Prism program: Even bigger data seizure. The big story, p. 1.
Ibelieve, because of Mr. Swartz increasing popularity, the FBI decided to “make an example” of a relatively simple case of data breech and force the full extent of the law and prosecute him federally to deter people following his footsteps. Mr. Swartz story made me think about the motives behind the hackers’ actions. In this case, the motivation can be seen as for the greater good. However, whatever the motive is, hacking is stilla crime punishable by law. The movie concentrated on Mr. Swartz’s point of view; however, it failed to address the opposing point of view—the
... potentially criminal. Similar to the collection of consumer data, the information gathered by the government is also subject to abuse by people who are granted access privilege. For example, in 2007, a federal agent was charged with using a government database to track the travel pattern of his ex-girlfriend (Lee).
The Web. The Web. 22 Jan. 2014. • "Profile: Edward Snowden. "
As technology continues to grow and expand, the questions brought up by Krauss and Mann will only continue to fuel debate. The newest public space being investigated through art is the Internet. Privacy comes into question more and more often with the advent of Facebook, Youtube and Chat Roulette. Artist like the Lonely Girl 15 and “Merton the Chat Roulette Piano Guy” continue to explore this new public space.
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with int...