Michael Caryl CMN 104 Professor Horning 25 April 2016 Topic: Aaron Swartz and public access to JStor. Purpose: To inform. Specific Purpose Statement: To inform the audience about how Aaron Swartz was silenced when trying to make access to private databases public. Thesis: Knowledge is protected, and the way we share it is limited, I will explore this with you through the eyes of one individual, Aaron Swartz. The Lengths of Protecting Knowledge I. Introduction A. You’re a college student and a Secret Service agent appears at your door. What good reason would you think he’d have to arrest you? B. Knowledge is protected, and the way we share it is limited, I will explore this with you through the eyes of one individual, Aaron Swartz. C. We …show more content…
are college students; many of us have probably used academic sources and databases to research for our informative speech topics, which we are presenting this month. D. As a college student, I am interesting in examining the points of practice in regards to academic integrity on the university side and on the national level. E. Today, I will be walking you through how academic databases are protected by law as well as an uncovered truth while questioning this protection. So, now we hear the more technical term “databases,” let me tell you that we refer to this as research, and what an example of what a site might be like II. Body A. Academic databases are a wealth of knowledge and their access & sharing of information is limited by licensing and law. 1. Sub point that supports main point 1 a. Copyright and licensed content. b. Freedom of information act. 2. Sub point that supports main point 1 a. Membership. (Annual Summary, Jstor) b. Barriers to entry. (Annual Summary, Jstor) c. Only 6% of journal articles are freely accessible on Jstor. (Brown). As we have heard, there are many factors that go into regulating, accessing academic journal material. B. Aaron Swartz attempted to download large sums or academic papers and articles of the scientific nature funded by public universities and taxpayer money. 1. JStor held a private observation of him downloading the material. a. There was a camera feeding footage of him downloading. b. Jstor surrendered the devices he used. 2. The US government pressed 13 charges against Swartz. a. Including $1M in fines. b. 35 years in prison c. (On the intent to share) (Lindsay) Now we know, what actually happens when the forces of academic databases can be challenged to the fullest extent.
III. Conclusion A. Not always can abusing academic databases limit one to punishment with only the university, it can reach farther to the US government and law. B. While accessing databases to write papers and conduct research, barriers to accessing this knowledge are protected, and are so to the fullest extent. C. All in all, the protection of knowledge is very real as we have seen. Think about the lengths that are considered next time you are cranking out that last minute paper. Works Cited Aaron Swartz, internet freedom activist, dies aged 26", BBC News. Retrieved April 25, ……….2016. Annual Summary, Jstor. http://about.jstor.org/sites/default/files/misc/JSTOR-Annual- ……….Summary_2012_v6.pdf Retrieved April 25, 2016. ………. Brown, Laura (September 7, 2011). "JSTOR–free access to early journal content and ……….serving 'unaffiliated' users", JSTOR. Retrieved April 25, 2016. Lindsay, Jay (July 19, 2011). "Feds: Harvard fellow hacked millions of papers". ……….Associated Press. Retrieved Retrieved April 25, 2016. Schwartz, John (July 19, 2011). "Open-Access Advocate Is Arrested for Huge ……….Download". New York Times. Retrieved April 25,
2016.
McCraw, David, and Stephen Gikow. “The End to a Unspoken Bargain? National Security and Leaks in a Post-Pentagon Papers World.” Harvard Civil Rights-Civil Liberties Law Review 48.2 (2013): 473-509. Academic OneFile. Web. 5 Dec. 2013.
Keck, Zachary. "Yes, Edward Snowden Is a Traitor." The Diplomat. N.p., 21 Dec. 2013. Web. 21 Feb. 2014
"The Triumph of Technique – The Logic of the NSA." LibrarianShipwreck. WordPress.com, 22 June 2013. Web. 08 Feb. 2014.
In May of 2013 Edward Snowden who was then working at a National Security Agency office in Oahu, Hawaii began copying top secret documents that belonged to the American government as he believed the documentation contained unethical and immoral content that he believed the American people and the world in general needed to know about. (Snowden, 2014) The documentation that he collated contained information regarding projects such as Prism, which is a top secret NSA surveillance program that has the ability to access the data servers of some of America's large...
The Truth About The Central Park Five “Of the 316 known cases in which innocent people have been exonerated by past conviction DNA testing, nearly 30% are attributable to false confessions” (Kukucka). This was the case for five young men living in the city of New York. At the time, these five men were just teenagers from the ages of 14 to 16, four of them were African American and the other one was Latino. These teenagers became know as “The Central Park Five”. This nickname came about after being wrongly accused and convicted of a violent rape that occurred in Central Park.
The Web. The Web. 22 Jan. 2014. • "Profile: Edward Snowden. "
Edward Snowden, the former National Security Agency (N.S.A) subcontractor turned whistle-blower is nothing short of a hero. His controversial decision to release information detailing the highly illegal ‘data mining’ practices of the N.S.A have caused shockwaves throughout the world and have raised important questions concerning how much the government actually monitors its people without their consent or knowledge. Comparable to Mark Felt in the Watergate scandals, Daniel Ellsberg with the Pentagon Papers, Edward Snowden joins the rank of infamous whistleblowers who gave up their jobs, livelihood, and forever will live under scrutiny of the public all in the service to the American people. Edward Snowden released information detailing the extent of the N.S.A breaches of American privacy and in doing so, became ostracized by the media and barred from freely reentering America, his home country.
As technology continues to grow and expand, the questions brought up by Krauss and Mann will only continue to fuel debate. The newest public space being investigated through art is the Internet. Privacy comes into question more and more often with the advent of Facebook, Youtube and Chat Roulette. Artist like the Lonely Girl 15 and “Merton the Chat Roulette Piano Guy” continue to explore this new public space.
STEPHEN BRAUN, A. F. (2014, May 9). Secret to Prism program: Even bigger data seizure. The big story, p. 1.
According to the Universal Declaration of Human Rights, “Everyone, without any discrimination, has the right to equal pay for equal work,… In addition “No one may be compelled to belong to an association”. El Chapo forced people to work for him and help him transfer drugs across the borders without paying the helpers. After the work was finished, he killed those people. He also compelled people to join his criminal work by telling that he would be pay them a lot of money but instead he killed them.
... potentially criminal. Similar to the collection of consumer data, the information gathered by the government is also subject to abuse by people who are granted access privilege. For example, in 2007, a federal agent was charged with using a government database to track the travel pattern of his ex-girlfriend (Lee).
Ibelieve, because of Mr. Swartz increasing popularity, the FBI decided to “make an example” of a relatively simple case of data breech and force the full extent of the law and prosecute him federally to deter people following his footsteps. Mr. Swartz story made me think about the motives behind the hackers’ actions. In this case, the motivation can be seen as for the greater good. However, whatever the motive is, hacking is stilla crime punishable by law. The movie concentrated on Mr. Swartz’s point of view; however, it failed to address the opposing point of view—the
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with int...