CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Thursday, May 22, 2008

Week 12 Social And Ethical Issues 23 May 2008

Lecture

In today's lecture we discussed the social and ethical issues that arise when we use the Internet. the first part of the lecture discussed the issues dealing with copyright, plagiarism and intellectual property. The lecture discusses why there are problems when using the Internet these include;

Intellectual Property
Copyright
Plagiarism
Security etc



There are a lot of smart people using the Internet alot,here is also no control on what is put on the net. The second part of the lecture discussed privacy, security and freedom of speech and problems facing people concerning each. Another area talked about was how to protect yourself from potentially harmful influences these included installing a firewall, antivirus software and being weary of what information you release the lecture ended with a quiz.






Tutorial


Task1) www.copyright.org.au.

1) Anyone that wishes to use material that is under copyright cannot unless they seek and receive permission from the author or artist of suggested material.
2) Copyright does not protect an idea, information, concepts or styles of a person that is supposingly unique.
3) Also protects artistics works, dramatic works, musical works, films, sound recordings, broadcasts.
4)Most things on the net are copyrighted - this does not make them free. as students, we think the material on the net is free to use, but it is actually under copyright and you are breaking the law if you try to do this.
5) Copyright protects Textual material - for example journals, books, websites, articles.

Task2)


This site asks questions music downloaders and users may need or want to know. There is a information from who holds the copyright to music to what can the authorities do if one is caught with illegal music.

This website would be really useful because it contains information with a lot of depth and has a broad coverage of the topic, covering each and every aspect.


Task3)
Look at the below mentioned sites and write down in your logs what you can do to protect your personal information from being attacked by viruses, hackers and Trojans.?

http://netsecurity.about.com/
http://computer.howstuffworks.com/virus6.htm


Above website I looked at it and it briefly explains how to look after your computer from different viruses. A computer virus is a computer program that can copy itself and infect a computer without agreement or knowledge of the user.
Trojan is mainly a malicious program accompanied by spy ware which you get through email attachment, a messenger program or from an Internet download. Trojans at times take off as a free program you would like. Once you accept the Trojan into your computer, it will perform a basic installation of itself.
Computers can be protected from viruses by making sure to install antivirus software.
To protect your computer from Trojans, you should never download or install any program from any person or web site you don't trust. You should also have your working system running updated with antivirus software and firewall so that you can have less chance of getting this Trojan into your system. You can use a tool like Ad-Aware to scan your system for known spy ware if you think you may have something.







To protect yourself from hackers.

1. Change the system ID- use a better password
2. Stop identifier broadcaster, don't shut to the world you have wireless-it’s an invite for hackers.
3. Install Antivirus software
4. Restrict unnecessary traffic
5. Change the default administrator password.





Readings

Reading1) 12 ways to protect your online privacy

This site is about how to protect your on-line privacy. it suggests 12 points which are
1) Do not expose personal information .
2) Turn on cookie notices in your Web browser, or use cookie management software.
3) Keep a spotless e-mail address.
4) Don't expose personal details to strangers or friends.
5) Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
6) Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep open files on your home computer
7) Do not reply to spammer's for any cause.
8) Be aware of Web security.
9) Be aware of home computer security.
10) Look at privacy policies and stop.
11) Remember that you decide what information about yourself to expose when, why,and to whom.
12) Use Peer 2 Peer (P2P) software with caution


Reading2)Electronic monitoring

It encloses information on types of check, privacy and legal issues, optional policies and privacy resources. Under each heading there are several links so that the reader can explore and find more in depth information. The aim of this website is to help everyday internet users gain knowledge about privacy and monitoring issues regarding the internet.



Reading 3) Inelectual property

This webpage contains information on what the most appropriate system are to protect ones intellectual property and what should be protected. There is information about trademarks and copyrights as well as the protection of computer software and domain names.

Week Eleven: Building Knowledge 16 May 2008

Lecture

The lecture this week was about data, information and knowledge. the characteristics of data is that it is a factual, non-judgemental, has no meaning and value. the characteristics of information is that it is a rational, has meaning but uncertain value. while knowledge has the characteristic of being very valuable, subjective, experiential and can be judged.



The importance of a data is that it must be un-biased, quantitative and representative. the importance of information must be inform and rational. must have a meaning and can be understandable. while knowledge must be clear, must have a logical conclusion and must be justified from Data and Information.



Tutorial

Data - Data or also known as Datum is information that is in the form of individual facts, statistics or items. A complex definition of data is phyiscal pieces of text on paper, bits and bytes which are stored in eletronic memory (e.g. computer HD(Hard Drive/Tower)) or facts and figures that are in the human brain.Information - is knowledge that is gained from experience, books, article, statistics, research or study.
Information - in gained through the knowledge of study.
Knowledge - is gained through means of study e.g. books, websites, journal articles, education or personal experience. For example you learn how to ride a bike through the knowledge of experience.
Wisdom - is the knowledge of what is true and right. In eduacational contexts wisdom is gained through researching data, collating information and gaining knowledge.

Image Hosted by ImageShack.us
By Qalib

Image Hosted by ImageShack.us
By Qalib





References

Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/data

Webopedia.com. (2008). Retrieved 19 May, 2008, from http://www.webopedia.com/TERM/d/data.html

Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/information

Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/knowledge

Dictionary.com. (2008). Retrieved 19 May, 2008, from http://dictionary.reference.com/browse/wisdom



In university is it important that you can understand and realize the link between data, information, knowledge and wisdom. The between data, information, knowledge and wisdom is that by researching you gain data, when you collect that data and combine it with your understanding it becomes information. When the data is collected it symbolise information you gain new knowledge and improve it greatly then that it was before. As all three (data, information and knowledge) are understood and completed you become wise as the wisdom of what's right and true and becomes obvious.



Organizations that collect information from their clients or public:

Financial Insitutions (Banks...)

Governments (Centrelink, Census...)

Taxation departments

Educational insitutions (Universities...)

Communications (Telsta...)

The main reason why all these organizations and many others collect information about their clients and general public is because they use this information maybe to keep their systems updated, find out or calculate tax repayments, enrolment for courses/degrees etc. Advertisements (telstra calling your home). Therefore organizations collect information for many reasons.


Readings


The readings for this week were basically two websites that explain the difference between each word. How each meaning represents a different aspects of university life and in general as well. For example when you research you end up with data, you collect that data so that there is meaning from it, when you can understand the concept of the information you gain new knowledge. When you fulfill these three steps you gain wisdom in the specific area you were researching in.

Wednesday, May 21, 2008

Week Ten - Information Management 9 May 2008

Lecture


The lecture topic today was about the different types of information management formats such as the atom and bit based structures.It also discusses the changed from atom based formats of information, which are physical piece of information such as books, article, results etc. To bit based formats of information, which are digital forms of information such as online books, encyclopedia's, web journals, articles etc, in today's goods and services organisations.Today's society that are bit based formats are things such as tellers to internet banking, mail to email, radio to mp3's and cds/dvds. Other examples are digital television to interactive television such as foxtel IQ, shopping to ebay and online shopping. Even though we have moved into the technological phase in society there is still a high risk in using them.


Tutorial

We were to set up a favourite list of 3 folders

I created 3 folders within my favourites. These were:
- Tutorial Webpages
- Assignment Webpages
- Reading Webpages

Image Hosted by ImageShack.us
By Qalib




We were to visit a website on Negroponte and read Negroponte Famous "Being Digital"

The last thing that was asked in todays tutorial workshop was to consider if negroponte was still relevent if it was published 13 yers ago and why?

Yes, i do agree with the ideas If i was to consider this website was published 13 years ago, I would say that Negroponte's ideas are very accurate in perhaps predicting the future of technology and what we willor are using. He also mentions the high amount of sources we use other than the internet. We do very much have our wide sources of books, newspapers and magazines and still use them today in a large quantity. He is supposing that 'bits' are more efficient then 'atoms' and that the bits of today's society will be used greatly. The CDs, videocassettes, and CD-ROMs he mentions, are in physical form and he explains that it is a great problem to move them around place to place, unlike information over the internet (bits). Therefore, looking at some of the other factors also he has included, the pros of bits outway that of atoms.






Atom-Based Data
Pros
-hard copy.....we can see and hold it
-know where it is
-can hide it
-easily protected
-difficult to change
-hard to copy

Cons
-Bulky (eg. Text books)
-expensive
-not easily distributed

Bit-Based data
Pros
-very flexible
-cheap
-easily edited
-easily published

Cons
-easily copied and pasted
-can easily be altered by others
-SPAM


Readings

The website "Grazing the Net Raising a Generation of free Range Students" talks about the new age, where students in our society are now offer with limitless amounts of information. It also informs the readers of the many benefits that students will gain throught the use of research using the internet; such as speed, efficiency and more encouragement towards students doing work and assignment with less indecision.

Week Nine - Communications 2nd May 2008

Lecture

The communication of today can take place between individuals, in groups or within businesses. The more recent forms of communicaton exist as emails and as online internet sources. Chat rooms, instant messaging and social sites such as Myspace and Facebook are common among the young generation today. Discussion, forums and bulletin boards are also very popular, as well as podcasts. Email etiquette is a major issue because of this new technology we now have. Abbreviations and slang has taken over the English language in a very negative manner. Changing this is vital because the poor mannerisms are increasing and a loss of a job can even occur from using this language. On the other hand, the benefts of using ICT include the fact that electronic newsletters and journals can be accessed, as well as discussion boards and newsgroups. These create a social network between friends and the chance for meeting people is widely available. Overall, ICT creates a really good provider for information and comes in a range of contexts for everyone and anyone to use.

Tutorial


my task this week is to record my finding by going to http://www.google.com/ and under the group tab section, searching a topic of interest to me.

i typed the word "life".
groups discussing this topic included
1] religious
2] abortion
3] death penalty
4] life magazine

i tagged on one of the discussions groups which was under religion.

the title of this discussion was "life after death"

the discussion was on the question if there's life after death?

the group discussed the question from different religious point of view.

Muslims and christian believed their will be a day of judgement, while Buddhist and Scientology believe their aren't going to be a day of judgement.



Image Hosted by ImageShack.us
By Qalib

the second task this week at tutorial was to go www.podcast.osx.ecu.edu.au/index.html and listen some podcast and right down
"what are the potential benefits using podcast for students at university'?
1) it is a useful resource that the student can listen to over and over again until they get the point.
2) students have the opportunity to listen again to lectures if they miss it.
3) you don't need to read all lecture notes
4) you just listen and take notes .......therefore time is not wasted on looking for important points through the process of reading twenty pages.
5) it is a smarter way of learning.


ECU Library Podcasts. Explainations about what they are and how they work. They are audio files that that can either be played on an MP3 or downloaded. Podcasts can be useful for listening to some of your favourite live music, radio hosts or famous people. It can also be useful for University students because they can look up interviews that were shown on television that they can easily download onto their i-pod or computer. This can be a valuable source of information gaining knowledge for an assignment or topic of interest.



Readings


-Guide to using Email

To make sure you know exactly what you are going to write in an email is very important. This is especially if you are writing to a teacher, lecturer or a future employer because how and what you write in an email reflects back to you. Be brief in what you write but still include relevent or detailed information that the reciever will need to know. Getting to the point and asking the right people and questions is correct. Grammer and punctuation are also one of the most significant factors with writing an email, poorly written emails result in a poor reflection on yourself. A title for your email has got to be relevent to what you write about in your email, also adressing the recipient with their name and or Sir/Madam is correct. Using smiley faces and abbreviations is lowering the formality of the email. Make sure that your tone is professional and that the font and colour is chosen carefully. Last, summarise and edit your email before sending it off.

-The problem with Spam

Spam is a form of advertising has the potentional to destroy any persons email messaging. Problems with spam is that there is no limit on what is being sent so major bulk emails can flog your mailbox every day. This mail also may cost the recipient a sum of money without them actually knowing. It also costs them a lot of time and not controlling the way in which their account inbox is being used. If the spam is tried to be deleted, it most often fails because it just ignores the problem of unlimited mail.