Welcome to my BLOG
My Reflections on CP373
CP373 is a special computer science course. We do not l…
Why pornography should be regulated
List A &nbs…
Who is Responsible if a Robot Buys Illegal Drugs?
In 2019, inventors created a web robot by the name Rand…
Insights on Professional Computing Ethics
Question 1 Computing, specifically software engineering…
Response to Orwin’s Article
Orwin’s article stresses the importance of students bei…
The Right to Read between Fantasy and Reality
The story entitled “The right to read” is set…
Video Game Ethical Analysis: GTA
Grand Theft Auto is a video game series developed by Ro…
Video Games Rating System
The transition to the digital space has impacted people…
The Right to Be Forgotten
With the rise of the digital space, the issue of person…
Encryption Backdoors
FBI want to access a shooter’s iPhone, so they ask appl…
Snowden: Hero or Traitor
Citizenfour is good documentary. It shows many true-lif…
Should Anonymous Comments be Allowed
There are two schools of media. One support anonymous c…
Social Digital Privacy: Myths or Facts
The article has discussed twelve myths about Social Med…
Review of Those Who Walk Away from Omelas
“The one who walk away from Omelas” is a st…
My reflections on Values and Conflict Activities
I take the activities about “Values and Conflict&q…
Welcome to my Blog
Hi, everybody. I am Zhiwen Jiang. My major is Arts. I j…
Follow My Blog
Receive email about new post