Lecture
In today's lecture we discussed the social and ethical issues that arise when we use the Internet. the first part of the lecture discussed the issues dealing with copyright, plagiarism and intellectual property. The lecture discusses why there are problems when using the Internet these include;
Intellectual Property
Copyright
Plagiarism
Security etc
There are a lot of smart people using the Internet alot,here is also no control on what is put on the net. The second part of the lecture discussed privacy, security and freedom of speech and problems facing people concerning each. Another area talked about was how to protect yourself from potentially harmful influences these included installing a firewall, antivirus software and being weary of what information you release the lecture ended with a quiz.
Tutorial
Task1) www.copyright.org.au.
1) Anyone that wishes to use material that is under copyright cannot unless they seek and receive permission from the author or artist of suggested material.
2) Copyright does not protect an idea, information, concepts or styles of a person that is supposingly unique.
3) Also protects artistics works, dramatic works, musical works, films, sound recordings, broadcasts.
4)Most things on the net are copyrighted - this does not make them free. as students, we think the material on the net is free to use, but it is actually under copyright and you are breaking the law if you try to do this.
5) Copyright protects Textual material - for example journals, books, websites, articles.
Task2)
This site asks questions music downloaders and users may need or want to know. There is a information from who holds the copyright to music to what can the authorities do if one is caught with illegal music.
This website would be really useful because it contains information with a lot of depth and has a broad coverage of the topic, covering each and every aspect.
Task3)
Look at the below mentioned sites and write down in your logs what you can do to protect your personal information from being attacked by viruses, hackers and Trojans.?
http://netsecurity.about.com/
http://computer.howstuffworks.com/virus6.htm
Above website I looked at it and it briefly explains how to look after your computer from different viruses. A computer virus is a computer program that can copy itself and infect a computer without agreement or knowledge of the user.
Trojan is mainly a malicious program accompanied by spy ware which you get through email attachment, a messenger program or from an Internet download. Trojans at times take off as a free program you would like. Once you accept the Trojan into your computer, it will perform a basic installation of itself.
Computers can be protected from viruses by making sure to install antivirus software.
To protect your computer from Trojans, you should never download or install any program from any person or web site you don't trust. You should also have your working system running updated with antivirus software and firewall so that you can have less chance of getting this Trojan into your system. You can use a tool like Ad-Aware to scan your system for known spy ware if you think you may have something.
To protect yourself from hackers.
1. Change the system ID- use a better password
2. Stop identifier broadcaster, don't shut to the world you have wireless-it’s an invite for hackers.
3. Install Antivirus software
4. Restrict unnecessary traffic
5. Change the default administrator password.
Readings
Reading1) 12 ways to protect your online privacy
This site is about how to protect your on-line privacy. it suggests 12 points which are
1) Do not expose personal information .
2) Turn on cookie notices in your Web browser, or use cookie management software.
3) Keep a spotless e-mail address.
4) Don't expose personal details to strangers or friends.
5) Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
6) Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep open files on your home computer
7) Do not reply to spammer's for any cause.
8) Be aware of Web security.
9) Be aware of home computer security.
10) Look at privacy policies and stop.
11) Remember that you decide what information about yourself to expose when, why,and to whom.
12) Use Peer 2 Peer (P2P) software with caution
Reading2)Electronic monitoring
It encloses information on types of check, privacy and legal issues, optional policies and privacy resources. Under each heading there are several links so that the reader can explore and find more in depth information. The aim of this website is to help everyday internet users gain knowledge about privacy and monitoring issues regarding the internet.
Reading 3) Inelectual property
This webpage contains information on what the most appropriate system are to protect ones intellectual property and what should be protected. There is information about trademarks and copyrights as well as the protection of computer software and domain names.
Thursday, May 22, 2008
Week 12 Social And Ethical Issues 23 May 2008
Posted by Miss Q at 4:21 AM 0 comments
Week Eleven: Building Knowledge 16 May 2008
Lecture
The lecture this week was about data, information and knowledge. the characteristics of data is that it is a factual, non-judgemental, has no meaning and value. the characteristics of information is that it is a rational, has meaning but uncertain value. while knowledge has the characteristic of being very valuable, subjective, experiential and can be judged.
The importance of a data is that it must be un-biased, quantitative and representative. the importance of information must be inform and rational. must have a meaning and can be understandable. while knowledge must be clear, must have a logical conclusion and must be justified from Data and Information.
Tutorial
Data - Data or also known as Datum is information that is in the form of individual facts, statistics or items. A complex definition of data is phyiscal pieces of text on paper, bits and bytes which are stored in eletronic memory (e.g. computer HD(Hard Drive/Tower)) or facts and figures that are in the human brain.Information - is knowledge that is gained from experience, books, article, statistics, research or study.
Information - in gained through the knowledge of study.
Knowledge - is gained through means of study e.g. books, websites, journal articles, education or personal experience. For example you learn how to ride a bike through the knowledge of experience.
Wisdom - is the knowledge of what is true and right. In eduacational contexts wisdom is gained through researching data, collating information and gaining knowledge.
By Qalib
By Qalib
References
Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/data
Webopedia.com. (2008). Retrieved 19 May, 2008, from http://www.webopedia.com/TERM/d/data.html
Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/information
Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/knowledge
Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/wisdom
In university is it important that you can understand and realize the link between data, information, knowledge and wisdom. The between data, information, knowledge and wisdom is that by researching you gain data, when you collect that data and combine it with your understanding it becomes information. When the data is collected it symbolise information you gain new knowledge and improve it greatly then that it was before. As all three (data, information and knowledge) are understood and completed you become wise as the wisdom of what's right and true and becomes obvious.
Organizations that collect information from their clients or public:
Financial Insitutions (Banks...)
Governments (Centrelink, Census...)
Taxation departments
Educational insitutions (Universities...)
Communications (Telsta...)
The main reason why all these organizations and many others collect information about their clients and general public is because they use this information maybe to keep their systems updated, find out or calculate tax repayments, enrolment for courses/degrees etc. Advertisements (telstra calling your home). Therefore organizations collect information for many reasons.
Readings
The readings for this week were basically two websites that explain the difference between each word. How each meaning represents a different aspects of university life and in general as well. For example when you research you end up with data, you collect that data so that there is meaning from it, when you can understand the concept of the information you gain new knowledge. When you fulfill these three steps you gain wisdom in the specific area you were researching in.
Posted by Miss Q at 4:20 AM 0 comments
Wednesday, May 21, 2008
Week Ten - Information Management 9 May 2008
Lecture
The lecture topic today was about the different types of information management formats such as the atom and bit based structures.It also discusses the changed from atom based formats of information, which are physical piece of information such as books, article, results etc. To bit based formats of information, which are digital forms of information such as online books, encyclopedia's, web journals, articles etc, in today's goods and services organisations.Today's society that are bit based formats are things such as tellers to internet banking, mail to email, radio to mp3's and cds/dvds. Other examples are digital television to interactive television such as foxtel IQ, shopping to ebay and online shopping. Even though we have moved into the technological phase in society there is still a high risk in using them.
Tutorial
We were to set up a favourite list of 3 folders
I created 3 folders within my favourites. These were:
- Tutorial Webpages
- Assignment Webpages
- Reading Webpages
By Qalib
We were to visit a website on Negroponte and read Negroponte Famous "Being Digital"
The last thing that was asked in todays tutorial workshop was to consider if negroponte was still relevent if it was published 13 yers ago and why?
Yes, i do agree with the ideas If i was to consider this website was published 13 years ago, I would say that Negroponte's ideas are very accurate in perhaps predicting the future of technology and what we willor are using. He also mentions the high amount of sources we use other than the internet. We do very much have our wide sources of books, newspapers and magazines and still use them today in a large quantity. He is supposing that 'bits' are more efficient then 'atoms' and that the bits of today's society will be used greatly. The CDs, videocassettes, and CD-ROMs he mentions, are in physical form and he explains that it is a great problem to move them around place to place, unlike information over the internet (bits). Therefore, looking at some of the other factors also he has included, the pros of bits outway that of atoms.
Atom-Based Data
Pros
-hard copy.....we can see and hold it
-know where it is
-can hide it
-easily protected
-difficult to change
-hard to copy
Cons
-Bulky (eg. Text books)
-expensive
-not easily distributed
Bit-Based data
Pros
-very flexible
-cheap
-easily edited
-easily published
Cons
-easily copied and pasted
-can easily be altered by others
-SPAM
Readings
The website "Grazing the Net Raising a Generation of free Range Students" talks about the new age, where students in our society are now offer with limitless amounts of information. It also informs the readers of the many benefits that students will gain throught the use of research using the internet; such as speed, efficiency and more encouragement towards students doing work and assignment with less indecision.
Posted by Miss Q at 7:04 AM 0 comments
Week Nine - Communications 2nd May 2008
Lecture
The communication of today can take place between individuals, in groups or within businesses. The more recent forms of communicaton exist as emails and as online internet sources. Chat rooms, instant messaging and social sites such as Myspace and Facebook are common among the young generation today. Discussion, forums and bulletin boards are also very popular, as well as podcasts. Email etiquette is a major issue because of this new technology we now have. Abbreviations and slang has taken over the English language in a very negative manner. Changing this is vital because the poor mannerisms are increasing and a loss of a job can even occur from using this language. On the other hand, the benefts of using ICT include the fact that electronic newsletters and journals can be accessed, as well as discussion boards and newsgroups. These create a social network between friends and the chance for meeting people is widely available. Overall, ICT creates a really good provider for information and comes in a range of contexts for everyone and anyone to use.
Tutorial
my task this week is to record my finding by going to http://www.google.com/ and under the group tab section, searching a topic of interest to me.
i typed the word "life".
groups discussing this topic included
1] religious
2] abortion
3] death penalty
4] life magazine
i tagged on one of the discussions groups which was under religion.
the title of this discussion was "life after death"
the discussion was on the question if there's life after death?
the group discussed the question from different religious point of view.
Muslims and christian believed their will be a day of judgement, while Buddhist and Scientology believe their aren't going to be a day of judgement.
By Qalib
the second task this week at tutorial was to go www.podcast.osx.ecu.edu.au/index.html and listen some podcast and right down
"what are the potential benefits using podcast for students at university'?
1) it is a useful resource that the student can listen to over and over again until they get the point.
2) students have the opportunity to listen again to lectures if they miss it.
3) you don't need to read all lecture notes
4) you just listen and take notes .......therefore time is not wasted on looking for important points through the process of reading twenty pages.
5) it is a smarter way of learning.
ECU Library Podcasts. Explainations about what they are and how they work. They are audio files that that can either be played on an MP3 or downloaded. Podcasts can be useful for listening to some of your favourite live music, radio hosts or famous people. It can also be useful for University students because they can look up interviews that were shown on television that they can easily download onto their i-pod or computer. This can be a valuable source of information gaining knowledge for an assignment or topic of interest.
Readings
-Guide to using Email
To make sure you know exactly what you are going to write in an email is very important. This is especially if you are writing to a teacher, lecturer or a future employer because how and what you write in an email reflects back to you. Be brief in what you write but still include relevent or detailed information that the reciever will need to know. Getting to the point and asking the right people and questions is correct. Grammer and punctuation are also one of the most significant factors with writing an email, poorly written emails result in a poor reflection on yourself. A title for your email has got to be relevent to what you write about in your email, also adressing the recipient with their name and or Sir/Madam is correct. Using smiley faces and abbreviations is lowering the formality of the email. Make sure that your tone is professional and that the font and colour is chosen carefully. Last, summarise and edit your email before sending it off.
-The problem with Spam
Spam is a form of advertising has the potentional to destroy any persons email messaging. Problems with spam is that there is no limit on what is being sent so major bulk emails can flog your mailbox every day. This mail also may cost the recipient a sum of money without them actually knowing. It also costs them a lot of time and not controlling the way in which their account inbox is being used. If the spam is tried to be deleted, it most often fails because it just ignores the problem of unlimited mail.
Posted by Miss Q at 6:59 AM 0 comments
Wednesday, April 30, 2008
Week 8 - Presentation Strategies 4 April 2008
Lecture:
Today was Anzac day so basically i did this at home i went throught the lecture notes and the things i have found useful for a great presentation strategies would be introduction the types of presentation would be self contained presentation,web-page, CD-ROM and Video. To speak or not to speak would be the nex thing audience will remember 10% of what they see, 25% of what they see and hear, 40% of what they see, hear and write down 60% of what they experience interactively.
This lecture helps you to:
Structure your presentation correctly
Prepare for the presentation
Use audio/visual tools to enhance your presentation
Include strategies for audience involvement
Tutorial:
We were to visit the website that was asked and to make a "Top Five" list of strategies to help us deliver a top-notch presentation and also to look over the lectures notes
5 strategies to creating a well presented presentation:
1. Relating to the audience - Identify with the audience by figuring out what they read and what their general interests are (think about age and what knowledge they have already).
2. Practise - Learn and know your material that you are about to present. If you know it, you will enjoy presenting and therefore so will your audience.
3. Pace the talk and be organised - Do not speak fast, calm down and have a well organised presentation that doesn't need to be rushed through.
4. Visual Aids - This will help the audience in staying alert and not becoming too bored in watching you. It also provides information in a differant form that guides the viewer into seeing it in another perspective.
5. Flow of Ideas - Identify the topic/argument you are going to be discussing and keep to it. Let your ideas flow and work one after another so differant concepts do not arise and confuse the viewer.
Posted by Miss Q at 6:28 PM 0 comments
Sunday, April 20, 2008
Week 7 Using Endnote- 11 April
Lecture:
The lecture discussed about Citations, References and Bibliographies, citing or quoting references is when you refer in your text to material written or produced by others.
We were to know how end note works; Endnote is a flat-file database. The reason we use a endnote is to Keeps track of a growing number of references and Handles a variety of types of references.
Tutorial:
In tutorial we were to look at the workshop activity and were to do the activity on how to endnote. We followed the steps and did an endnote on a website. The lecture has summarised what endnote was but as soon as we did the activity in class i now know how to do the easy way to endnote.
Reference 5 different types of electronic format
Web page -
Technical specifications (iPhone). [n.d.] Retrieved November, 2007, from Apple: http://www.apple.com/iphone/specs.html
Article only in an Internet Journal-
Fredrickson, B. L. (2000, March 7). Cultivating positive emotions to optimise health and well-being. Prevention & Treatment, 3, Article 0001a. Retrieved November 20, 2000, from http://journals.apa.org/prevention/volume3/pre0030001a.html
eBook-
Wilkinson, R., & Marmot, M. (Eds.). (2003). Social determinants of health: The solid facts (2nd ed.). Retrieved December 2, 2007, from http://www.euro.who.int/document/e81384.pdf
Email-
Office of Research and Development. (1995). ARC large grant guidelines. Email December 2, 1995, from t.lampard@cowan.edu.au/Get ARCLG95
Readings
The first reading about Endnote was helpful. we were showed around the website and how to use certain things if we needed help with endnote.
The second Endnote reading is very detailed and helpful. The reading is more like a website, with extra links to find information for help and support.
The second Endnote reading had a lot of links to different information sites so that people who work with Endnote a lot can upgrade their information and skills.
Because the lecture only focused on one program, there weren't many readings. These are the main points i attained throughout the readings.
Posted by Miss Q at 6:24 AM 0 comments
Thursday, April 10, 2008
Week Six - Evaluation & Authentication -4th April 2008
Lecturer:
Dr Helen Cripps went through the context of wordl wide web
• Open protocols
• Open architecture
The context of the world –wide web, who publishes on the WWW that relates to autorship, authority and authenticity why publish on the WWW that relates to bias, accuracy and trustworthiness what is published on the WWW.
We went through if the Websites is trustworthy,what are you measuring? example the content, visual feel, navigation and ease-of-use.
When evaluating IQ on the WWW anyone can publish anything on the WebIt's often hard to determine a web page's authorship Even if a page is signed, qualifications aren't usually given sponsorship isn't usually indicated .
Tutorial:
in tut we had to look at a website
http://www.ithaca.edu/library/training/think.html
in my own words i was asked to briefly describe these stategies;
The question i asked myself was "why do i need the net" and would i be able to use reference books that are specific to the topic,than wasting hours to find the appropriate material. The second thing is don't believe every thing that you found on the web. any person can publish what ever they can. therefore its best to try to validate the authors argument by looking for links or references. The third thing is to have some knowledge about the author. what lead him to have this opinion. Lasty its good to try to ask your self the purpose of the site,why was this site created? knowing the answer to that question will give you some ideas about the content of the site.Its good to View the details given on the website, how well are they written.
The second part of the activity there is two website and i choosed to look at The good , The bad, and the ugly http://lib.nmsu.edu/instruction/eval.html.
This site explains how to evaluate a web-site. the discussion made by the author is based on the Authority, Rationality, Accuracy, Objectivity, Currency and its Coverage.
Thirdly we were to complete a website Evaluation Assignment on the Reliving the Sixties. i choosed american culture history, it talks about how to help the user gain a broad understanding and appreciation for the culture and history of the 1960s.
And lastly is to evaluate two sites using headings as follows.
Accuracy
Information provided here is highly accurate.
the reference list provided is well linked..and highly accurate in my opinion.
Authorship.
It was written by the Divisions of HIV/AIDS Prevention. National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention.
purpose.
The purpose is to give the user's information on the effect of AIDS on different ages, sex groups and issues involved with people that got AIDS such as Ethics, racial and economics.
Details & design
The details provided are many on different issues involving AIDS. It was designed very well. Extensive details are provided on this site.
Over-all worth.
The web-site is highly effective as it provides many information and is highly accurate.
(http://lib.nmsu.edu/instruction/eval.html)
Readings: URL
http://www.library.cornell.edu/olinuris/ref/webcrit.html .
This site is a guide for teaching under-graduate on how to evaluate information found on a web-site. The author covers five points which are
Accuracy. If your page lists the author and institution that published the page and provides a way of contacting him/her and . . .
Authority. If your page lists the author credentials and its domain is preferred (.edu, .gov, .org, or .net).
Objectivity. If your page provides accurate information with limited advertising and it is objective in presenting the information..
Currency. If your page is current and updated regularly (as stated on the page) and the links (if any) are also up-to-date.
Coverage. If you can view the information properly--not limited to fees, browser technology, or software requirement
Posted by Miss Q at 3:52 AM 0 comments