Friday, April 23, 2010

Extra Extra

While visiting the site syfy.com/caprican I read up on the most current news, sports, entertainment, and such. This site does in fact mimic an online newspaper. While reading the articles they describe what appears to be real life events, people, and companies. While reading the first article I'd encountered about recycling "graystone" computers I was questioning myself if this was real, but then I thought no...there's no graystone computer dealers, but the article is well written and convincing. The pictures which are posted with the articles seem to be actual photos of people and events. Overall, this site is written as if these different communities are present in real life. The readers seems to know what the heck is going on in these "communities" due to their comments left at the end of the articles. If I didn't know what the syfy channel was I would have assumed this was an online virtual community/gaming site. I liked the entertainment section where the users are discussing back and forth the mystery of the "The dead walker" which is a girl no one is able to kill off in New Cap City. Hmmm, maybe this is a game!

Thursday, April 22, 2010

4/20 & 4/22 Presentations

Mark M.~ Topic: Online enabled environment awareness and how cyberspace and online communities are two major tools that help the environment today. You have a good example with the iphone app icosnoop. I think this would be a suitable topic to describe where we are currently with technology, and how these sorts off apps help to raise more awareness because more people carry mobile technology where ever they go.

Sarah F.~ Argument: People portray themselves differently depending on which type of social network they interact in. Chatroulette vs. Facebook is a great example of how people may act differently when presented with a random/anonymous encounter(chatroulette)rather than interacting with an audience of 200+ people(facebook). The two are completely different social spaces and chatroulette provides more freedom to its users due to privacy.

Cassie L.~ Topic: Social network sites and the classroom. I liked your example of areallydifferentplace.com that a teacher created for her students to interact through blogging. I thought it might be interesting to research if there has been studies that prove your theory that blogging helps children develop better writing/typing skills.

Dena L.~ Topic: Social networking and limited privacy. You talked about how privacy regulation is hard to acquire on a global scale and many issues are occurring because there's hardly any laws to protect users. What really interested me the most was the cyberbullying, and why our youth is not protected. Maybe you can focus on why this is becoming a problem, and what will continue to happen if we don't take steps to do something about this issue now.

Michelle A.~ Topic: Interfaces help to create seamless transition from real to virtual and soon they will appear blended. You had some excellent examples of how computers are becoming more and more humanized and I liked your example of business's interacting in secondlife and how people are comfortable in a 3-D environment because it is a repeat of what we see in real life. Last semester I met for a conference in secondlife on the WSU campus in Pullman! I can see this becoming more and more popular in the future.

Brittany B.~ Topic: Mobile location based marketing/advertising. I liked your subject of location based games/Apps and how people are less concerned with privacy. I also like how added in the con of this with your example of the site pleaserobme.com, where people are against Apps like this because your location is always known and you become vulnerable to criminals.

Mark B.~ Topic: World of War Craft and how changes to the game force users to rely on other web sources to learn the game. I think you provided good examples of the need for social interaction in gaming in order to grow and learn from each other. Removing challenges reduces the need and ability to learn which has always been needed in gaming.

Kristopher M.~ Topic: Even if everyone gets online there will still be a divide. I liked the subject of fragmented identities and how people will still be out casted based on their technological tool. Made me think of cheap vs. trendy cellphones and depending on what you have still determines your wealth/status within a community. I liked your example of access to different information based on your location, such as the monitoring of Internet in China and the limited amount of information they are able to view.

Thursday, April 15, 2010

4/15 Presentations

Katie S.~ Topic is a proposal to bridge knowledge and access divide in low income schools. I think you hit all the major points in your proposal. You were very professional in providing a step by step strategy of informing the entire community first, then utilizing tools available such as the tech classes available online for teachers. Before and after charts are a way to provide proof to your findings, as well.

Beau Y.~ Topic is...technology feeds off of the gaming community. Your examples were great in that you compared the military video with traditional joystick and monitor gaming. They are both using the same type of tools, but ones for work and ones for play. I liked your point that the same developers for games probably developed the program to operate the Da vinci machines for doctors(creepy by the way).

James C.~ Topic is...gaming and how it influences a new type of learning in the brain. This is the topic I took away from the presentation. I like your example of mental maps, and how its starts out being 2-D but once you learn the game your mind creates a 3-D map. Your on to something with this example.

Hans W.~ Topic is..social bridging: bridging the chasm. I like your idea and what I took away from it is...virtual communities help teach people whom may have limited knowledge and/or access to the Internet, some of the fundamental tools that are needed to operate, communicate, and gather information on the web.

Spencer T.~ Topic is..do games generate better soldiers? I liked your example of how games appear so realistic that they entice people to join the military, and how games represent a false image of actual combat. Games can't replicate the RL war experience because like you said the use of all your senses and adrenaline is not present. Good topic.

Sunday, April 11, 2010

4/8 Presentations

Lorena S.~ Topic is censorship in China. I like how you identified the 3 types of censorship in China: governmental, private, and self-censorship, and how self-censorship is the highest practiced, because people do not want to get in trouble by the government. With 40,000 Internet police monitoring the Internet(excellent example)I would watch what I say and do too.

Sheila N.~ Topic is traditional gender roles in "meatspace" and how they carry over into social networking. I liked your example of Club Penguin and how it is suppose to be a genderless site but people are finding ways to enforce gender norms in this space by the words in which they communicate with each other. This site is a great example of how people feel the need to establish a gender identity in a genderless space.

Maurice S.~ Topic is cellphones and how they are changing how agriculture is done in rural America. First I want to say it all clicked when I got home and caught the news and the weather man described an App that gives you up-to-date weather forecasts and alerts that can be sent to your phone. This is a great tool for farmers "anywhere" to get accurate and up-to-date weather info.

Corrinda L.~ Topic is education through gaming. You are accurate in your point that we need to match learning with technology, and that children can in fact learn in a fun way. Good example of a site fungame.com and your discussion of memory games.

Kat C.~ Topic is Internet and is it changing politics? The Obama campaign is a great example of how the Internet is changing politics. I came across an article about this and it talks about how the Internet reaches far more people and delivers far more info than traditional campaigns, which costs billions of dollars for commercials and travel costs. Using info on how Obama's campaign manager utilized the Internet to campaign is a great example of how the Internet is changing politics.

Thursday, April 1, 2010

Privacy vs Security

Holcomb, Bakerlaar, and Zizzamia's essay The Internet in the Aftermath of the World Trade Center Attack addresses the issue of security vs. privacy, and how the use of the web for information and communication can be beneficial in many ways, but it also can be used as a tool for hackers, scammers, and terrorists.

This essay talks about the tragedy of 9/11 and how the Internet was finally able to do what it was invented to do in the 1960's, which was to communicate fast and effectively to government officials across the country, during a national emergency. During 9/11 people were able to communicate via Internet and cellphones to inquire about a missing loved one, or victims were able to let loved ones know they were alive, and sadly some to say one last good-bye. This reminds me of the recent Haiti disaster and how the parents of a college student was on a trip to Haiti with her class. The student was able to notify them by e-mail, and though her parents did not speak to her they were comforted to know she was alive, rather than waiting by the phone or to be notified.

Following 9/11 new websites specifically for donations sprung up everywhere. Sites such as Red Cross raised the funds needed for the 9/11 relief within 2 months. The same occurred with the recent Haiti crisis. We now have ways to donate money by simply texting the number for "Help Haiti". On the other hand, hackers and scammers are using these disasters to try to make a buck, by putting up false donation sites, as well as, text scams to lure victims in.

The issue of privacy vs. security is a tricky topic because we all want access to information. If we are not careful we can be taken advantage of or our information provided over the web can be used against us. In an age where we carry mobile devices that can reveal our location, which can be very helpful for navigation. This same technology unfortunately can be easy used in the future by terrorists to correlate another attack. It's becoming increasingly harder and harder to protect our individual privacy, as well as, our national security.

Far Right

While watching T.V. a few days ago I saw a news report about the arrests of members from a militia group in Michigan. This militia group, also known as a right-wing extremist group, or anti-government group, caused concern because of suspicious military training videos and posts on their website hutaree.com. Allegedly, this group which call themselves CCR (colonial Cristian republic) was planning to attach and kill police officers, and set off bombs at their funerals in order to kill more police.

According to latimes.com (Los Angeles Times)the FBI has been monitoring this groups website for sometime, as the militia hardly kept their online activities a secret. The Southern Poverty Law Center, a non-profit from Alabama that tracks extremists online explains that the major cause for the recent explosion of new extremist groups and activism across the nation, is due to economic downturn and the election of the first black president.

There is a lot more information online about this topic than what I saw on the 30 second news flash on T.V. I was able to find out the name of the website via Internet and explore it myself. I personally think the cause for concern was the post on their site, which read "Training April 24 contact headquarters immediately" that concerned officials. Needless to say, the recent explosion of new extremist groups may be due to the economy and/or Obama, but these groups are able to flourish faster than previous times, because of new media technology, which allows their efforts and beliefs to reach more people.

Friday, March 26, 2010

After reading Julie's comment I decided to write my paper on the topic of privacy and social networks, in particular privacy and Facebook and how they are screwing up.

First I will address the history of Facebook and their initial views on privacy settings. Second I will address the climb in the popularity of the site and how it has the highest membership of all social networks. Thirdly I will discuss Facebook privacy and how often privacy setting are utilized by users, as well, as statistics on users knowledge about privacy settings. Fourthly, I will discuss how the founder of Facebook is now completely changing his views about privacy, now that Facebook is the number one social network. Fifthly, I will discuss the new changes on Facebook, in regards to privacy settings and how users information is becoming public on search engines, as well as, how third parties are collecting information from friends lists and also Apps. Lastly, I will discuss how Facebook's idea of a privacy free society, is far from realistic and give examples of why users need to protect their privacy for such reasons as future employment and reputation.

The sources I will be using so far are...www.fredstutzman.com/papers/ICWSM2010R_Stutzman.pdf, www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php, www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewarticle/2775/2432#p2, www.jiad.org/article130, and www.facebook.com.