Brennan Day’s Portfolio
Brennan Day
20119 Echo Falls Drive
Katy, Texas, 77450
(281) 818-6550
brennanday1@yahoo.com
Education
Sam Houston State University, Huntsville, Texas
Bachelor of Science in Computing Science
Expected Graduation - May 2018
GPA: 3.2
Honor Roll Fall 2016 and Spring 2017
Member: Association for Computing Machinery, Budget Committee
Member: League for Gamers, Vice-President
Led numerous groups for computer science classes
Professional Skills
Experience in Ada, C/C++, C#, Java, SQL, Python
Employment History
Alamo Drafthouse(Mason Park), Katy, Texas
Runner/Server May 2015 - January 2018
Served as Runner/Server
Taco Grill, Katy, Texas
Cashier August 2013 - May 2014
Worked as Cashier
Dog Walker, Katy, Texas
2011-2014
Worked alongside Taco Grill
Hobbies & Interests
Video games
Film/Television
Jogging
Reading
Section 1: Ethics
Ethics Definition
Ethics are a certain set of beliefs that that Judge what is right behavior and wrong behavior.1 What is good and bad can be based on Virtues and Vices. Virtues are habits that are generally viewed to be acceptable and is often encouraged by peers. Vices are the opposite, they are habits that viewed
Theory of Ethics
The best way to promote an ethical working environment is to adhere to Corporate Social Responsibility guidelines. They will make that a company working well publicly and working without the danger of legal troubles. The Corporate Social Responsibility has five Guidelines
Operate with Goodwill of the Community-It is best to work to have the trust of the community. This will make it so that companies will have more satisfied customers and have the trust of their consumers. Having the goodwill of the community will also allow companies to make some mistakes which are inevitable. If companies have the community’s goodwill, then they will not be instantly rejected by their consumers when mistakes happen.
Companies Operate Consistently- It is good for companies to operate in a consistent manor because it is both professional peers and customers will understand how the companies work. For example, when customers know a company will always offer a refund for a faulty product they will still buy from that company because they know that that company takes care of their mistakes.
Foster Good Business Practices- Having good business practices are desirable for companies to have. When a company doesn’t take advantage of their consumers and does not involve themselves with in shady dealings, the company will have more customers that would rather deal with them rather than another company that is known to rip-off their customers.
Protected from Legal Action- This is good for companies financially and publicly. A lawsuit can result in millions of dollars in legal damages and also reveal a company to do questionable things which will drive away consumers.
Avoid Unfavorable Publicity- Having an embarrassing exposure can be costly to companies. One consequence is that current and potential customers can be driven away. Another is that other businesses may not offer their services to the embarrassed party.
Ethics impacts in IT businesses
The importance of having ethics resulted in to making professional guidelines on how businesses should conduct themselves. The guidelines in question is the ACM Code of Ethics and Professional Conduct.2 By adhering to the ACM Code of Ethics IT companies will be guaranteed to be working at one of the best ethical manors and one of the best professional manors.
Section 2: Internet of Things
Internet of Things Description
With the internet being such a huge impact, there is a new number of problems that can come from the internet. Reynolds best says it, “The computing environment has become enormously complex. Networks, computers, operating systems, applications, Web sites, switches, routers, and gateways are interconnected and driven by hundreds of millions of lines of code.”3 All the connections are causing so much possibility of attacks that can be damaging to companies and to consumers. Another big thing internet brings is the freedom of expression. Lessig puts it best, “The right to Free Speech is no the right to speak for free. It is not the right to free access to television, or the right that people will not hate you for what you have to say”.4 A person cannot say just what they want on the internet they must jump through some hopes to say things. First, they must pay for the connection to the internet for a person to say what they want. If they can’t pay, they can’t speak. Another big thing is that people don’t get freedom of speech through private companies. If a person says something on a blog that may be very offensive the host can ban that person because, the host is a private company and person is posting on their website they can block users from using their website for any reason if it’s not discrimination. The last big thing the internet introduces social networking. People are now connected outside of person-to-person contact. People can now connect on websites such as Facebook, Tumblr, and Twitter. A person can put updates of their life online for everyone to see. This can lead to problems such as, cyberbullying, cyberstalking, and sexual predators. These can flood into peoples’ real lives so these should be considered when discussing the internet.
Impact in IT Businesses
With the creation of the internet there are now a new set of ethics that need to consider. As said earlier the ACM code of conduct discusses these very well but there are also times when companies will not adhere to them. Companies may want to cut corners in favor of getting better profits. To counter that government passed regulations that will stop IT businesses from taking advantage of their consumers. A prime example is Net Neutrality which function is to keep internet providers from throttling internet speeds to service their personal interest instead of their customers. The government and IT Businesses have been hitting back and forth for years on the internet because recently there have been efforts to repeal Net Neutrality with things such as the Internet Freedom Act.5
Section 3: Privacy
Definition of Privacy
The main relation privacy has in the internet is Information Privacy. Information privacy is the privacy of communicating with others in relation to being monitored by organizations and the privacy of data which involves limiting the data that other individuals and organizations can see from a person.6 In other words, people want privacy in regards who they speak with online, and in regard to the information that they use online such as usernames and passwords.
Privacy Protection
The internet now allows many threats one’s privacy now. One is data breaches where personal information can be discovered such a persons name, address, and social security number. Another is consumer profiling which can be getting one search history and spam their email with ads to get them to buy products. One of the largest is advanced surveillance technology. Surveillance can be a large breach of privacy. Through it where person goes can be seen, what they say could be heard, and what they buy can be recorded. It is a huge breach of privacy. There are things that stop this type of stuff though. A huge thing stopping his the Fourth Amendment Bill of Rights. It stops against unreasonable searches and seizures and the only way to search a person house is either through issued Warrant or through probable cause. Same standards can apply to the internet. Authorities cannot rummage through a person private information with out a just reason or warrant. There are also other techniques to keeping information private. One is the control theory. It is the process of controlling what information gets released. This may come on the form of noting posting personal information whenever possible. Another method is the restricted access theory. It’s similar to control theory but instead of controlling which information a person makes available, a person restricts who and what sees their personal information. An example would a person only allowing government related agencies have access to their social security number.
Privacy Impacts in IT Businesses
Many companies in the IT are working to breach people’s privacy indirectly. One is through search engines. By looking a person’s search queries, a company can get an idea into what they do or want. Based off that the company can send that person ads based on those queries that person made. Another option companies may take is to come at a person through E-mail. They can send an ad to the E-mail of a person in-order to get them to enter in some of their personal information. One of the biggest danger of IT businesses getting information on their customers is through voice mail. Customer support calls are often recorded, so if a person accidently lets a very compromising peace of information during a call that company now has it on a stored voice record.
Section 4: Intellectual Property
Definition of Intellectual Property
An Intellectual Property is,” a term used to describe works of the mind—such as art, books, films, formulas, inventions, music, and processes—that are distinct, and owned or created by a single person or group.”.7 It’s when a certain work has an owner. When a website is created the website is usually an intellectual property of the creator of the website. It means he has full control of the website he can do what he pleases with it. Another big example would be fictional characters. In the recent Avengers movies all the characters including Captain America, Thor, and Iron Man are all intellectual properties of Marvel and Disney. This means Disney and Disney alone is the only company that can create movies related to these characters.
Intellectual Property Right
To go into it further there are two specific types of intellectual properties that are important. First there is the copyright. They are used to protect the expression of ideas which can include, books, songs, movies, and computer programs. When a person makes a computer program that calculate some banking information they can file for a copyright. If it processes correctly it means that this person is now the owner of that computer program and would be allowed to sue if someone were to try and directly copy the computer program. Though a copyright does eventually expire but that should last a person’s entire life, so it should not matter to them too much. Another thing to consider is fair use which allows people to parody a copyrighted object or to criticize it. The other big type of intellectual property is patents. These are similar to copyright but instead it allows a person to reserve a specific invention or technology. If a person invented a hover car that flies they could patent it since it is a new invention. This means the patent expires or the owner licenses it out no one can create a hover unless it is based off completely different technology.
Impact of Intellectual Property in IT Businesses
The IT industry has more difficulty keeping up with people breaching copyright and patents. The internet is simply to big to catch all the perpetrators that steal copyrighted and patented works. This lead to passing the Digital Millennium Copyright Act which allowed companies have tighter hold on their intellectual properties.8 By doing this while effective this my also sometimes cause abuse, because companies can take down work that validly falls under fair use.
Section 5: Regulations and Freedom
Definition of Freedom
As earlier said people can say what they want on the internet, but there are still consequences to doing that. If an owner of a website doesn’t like what a person post they well within their rights to ban them off the website. Their website is a private domain not a public so the owner gets to make the rules. Another thing that to consider is that regulations. They stop people from having complete freedom of them wanting to do anything and everything.
Regulation vs. Freedom
Freedom of speech allows people to say what they want for the most part, but that can be regulated by hate speech which is,” speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment”.9 Usually a person say all the hate speech they want, but there is an exception. If a person also makes a threat and/or intimidates other people, they are endangering other people’s lives so they can be arrested. Another big example is yelling out fire in a building, it is not expressing an idea, it is blatantly endangering the public. There are also instances with large companies. Many companies desire the freedom to merge with any company that they want, but regulations will stop them from merging if it would result in a monopoly in the market. Companies cannot do things as freely as they want because there is regulations to stop them from doing things such as trying to take full control of the market or taking advantage of their customers.
Regulation and Freedom impacts in IT businesses
As earlier said one of the biggest regulations in IT industry is Net Neutrality which prevents internet providers from slowing down internet speeds to favor of people or companies. Once again, another big regulation is the ACM code of conduct. While it is not strictly legally binding thing companies need to do it is expected that all IT companies adhere to the guidelines to remain professionally ethical. There are also companies that self-regulate that limit some freedoms. One of the main examples is people discussing things in forums. While a person may be able say all the hate speech that they wish out in public it is a different story on online forums. The forums are private not public, so they can regulate what is said on them. Forum moderators can ban a person posting hate speech without legal repercussions because it is a private regulated forum.
References
"ACM Code of Ethics and Professional Conduct." Association for Computing Machinery. Accessed May 06, 2018. https://www.acm.org/about-acm/acm-code-of-ethics-and- professional-conduct.
Lessig, Lawrence. Code Version 2. New York, NY: Basic Books, 2006.
"Restoring Internet Freedom." Federal Register. February 22, 2018. Accessed May 07, 2018. https://www.federalregister.gov/documents/2018/02/22/2018-03464/restoring-internet- freedom.
Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010.
1 Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010,(3-4).
2 "ACM Code of Ethics and Professional Conduct." Association for Computing Machinery. Accessed May 06, 2018. https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct.
3 Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010.(74).
4 Lessig, Lawrence. Code Version 2. New York, NY: Basic Books, 2006.
5 "Restoring Internet Freedom." Federal Register. February 22, 2018. Accessed May 07, 2018. https://www.federalregister.gov/documents/2018/02/22/2018-03464/restoring-internet-freedom.
6 Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010.(117).
7 Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010.(197).
8 Lessig, Lawrence. Code Version 2. New York, NY: Basic Books, 2006.(174-175).
9 Reynolds, George Walter. Ethics in Information Technology. 3rd ed. Boston, MA: Cengage, 2010.(178).