Wednesday, August 6, 2008

Conceptual Research & Reflection Project

Concept 17:The impact of text-based real-time chat

Communicating in real-time with text enables a form of 'authoring of the self' that is similar to the processes of face-to-face speech but which is much more amenable to authorial control, experimentation and reflection. Further, text-based communication carries with it the possibility for multiple, differing conversations occurring simultaneously, relying on the ability of the human brain to deal with text much better than speech.

Text-based real-time chat is to communicate with a person or persons in a non-verbal way.The use of text-based real-time(Synchronous) chat is fast becoming one of the most popular forms of communication around the world.
"More than 1 billion people in 2005."(computer industry almanac inc)

Text-based real-time chat has become one of the most popular forms of communication because it allows a person to communicate with multiple people all at the same time. As more people are using these programs,more security procedures must be put into place to protect the people using the technology.

In the 1960s the first text-based conference program which consisted of a small class room of terminals was created and used. In the early 70s it would be used in many different mainframes that would eventually support one thousand uses at any one time.With the creation of this new form of communication came advantages and disadvantages.Not only has online communication become easier to access but for the people who don't have the ability to communicate(the deaf)it has become a very useful tool.Online communication via discussion forums and synchronous text can offer an increased sense of community and cohesion for students in online education. Online education environments and the communication that supports them encourage and support inquiries team projects and problem solving skills.

With all the advantages of text-based real-time chat come disadvantages which have been reported in the media.People have the ability to talk to people all over the world but sometimes you may not know the person your talking with. People have found ways to misuse text-based real-time chat and because of these people security and monitoring has been put in place to stop these from accuring.As the technology gets more advanced so do the people who misuse these programs.

"Close to 12 billion instant messages are being sent everyday worldwide,according to IDC. comscore media metrix reports that there are more than 300 million people across the globe--and more than 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool."(Gene J.koprowski)

Annotations

Computer industry Almanac in January 2006
http://www.c-i-a.com/pr0305.htm

The computer industry Almanac is basically a website that shows the statistics of how many computers are in use in the world today.

Technewsworld in October 2005
www.technewsworld.com/story/47270.html

Technewsworld is a website that's is set up just like a newspaper and has all the latest news on all things technology ranging from computer parts and accessories to news about major computer companies, it has articles on the future of computers,gaming,nanotechnology,biometrics plus mobile phones and GPS. and all sorts of other useful information for any computer lover.

BIBLOGRAPHY
Computer Industry Almanac inc January 2006, Retrieved 29 July 2008
Http://www.c-i-a.com/pr0305.htm

Technewsworld October 2005, Retrieved 30 July 2008
http://www.technewsworld.com/story/47270.html

Net 11 the internet:Communications module 5 Concepts 2008/Curtin university
http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home



Concept 7: Netiquette

Good communication practice on the Internet is not something one 'learns', but something one 'practices' so as to teach others, less familiar than yourself, how it is done.

Netiquette on the Internet is basically being good and polite during the conversations you have online. Netiquette is a common kertusy, treating people how they should be treated. Having good netiquette will ensure you have alot of fun with the Internet and you Will also endure other people do as well.


Perhaps the most shocking thing is how many people on the Internet change the way they are and behave differently than they would normally behavior in a face to face encounter.
Maybe this is because on the Internet you can be anyone, which can result in bad netiquette.


"Rule #1

Respect everyone online. Do not spread rumors or send hateful or harmful messages. Don't use inappropriate and offensive language.

Rule #2

Think before you type; make sure what you write cannot be misinterpreted. Use emoticons or abbreviations to convey humor, teasing, or other emotions while online.

Rule #3

Avoid spamming. Unwanted junk mail, chain letters, and jokes can be annoying and time consuming.

Rule #4

Use the KISS principle - Keep It Simple Silly. Be short and to the point in both e-mails and in chat rooms.

Rule #5

Don't type in all CAPITAL letters. This is considered shouting by the online community.

Rule #6

Don't be pest and annoy people while online. People may have work to do and can't continue to communicate with you at that particular time."

Mike ryter ( 2000 )



To make people aware of good netiquette its is always a good idea to set on example by practicing good netiquette yourself and hopefully others will follow your lead.

"Sharing your knowledge is fun. It's a long-time net tradition. And it makes the world a better place." Virgina Shea ( 1994 )



The overall concept of netiquette and applying it on a daily basis on the Internet should be that all those advanced Internet users out there need to create an example for the less experience to allow for a safe and friendly online environment for all to use.Providing safe and useful information the Internet is a sensible way of encouraging good netiquette on the Internet.

I guess in today's society the Internet and all of its wonders has become the norm for most people and as long as the people out there stick to netiquette and be careful of dangerous predators or criminal behavior we should all have a happy and enjoyable time using the Internet.


Just remember good netiquette = the best experience possible on the Internet.

Annotations
Netiquette-Safety in the Internet April 2000
Http://192.107.108.56/portfolios/r/ryter_m/safety/netique.html
Mike ryter set up this website dedicated to Internet and its safety for
Ramapo College's
Masters' Program
in Educational Technology so that parents,students and educators know about Internet safety. its has good information about netiquette and safety surfing the Internet and is very informative.

Netiquette-the core rules of netiquette May 1994
Http://www.albion.com/netiquette/rule6.html
Virginia shea is the writer of a book called netiquette and has been a student of human nature all her life. She attended Princeton University and has worked in Silicon Valley since the mid-1980s. She now lives in Sunnyvale, California, with her husband and their four cats. She can be found prowling on the USENET newsgroup rec.pets.cats, on America Online and at the Internet address ms.netiquette@albion.com.

BIBLOGRAPHY
Mike ryter safety on the Internet April 2000,Retrieved 31 July 2008
Http://192.107.108.56/portfolios/r/ryter_m/safety/netique.html

Virginia shea the core rules of the Internet may 1994,Retrieved 1 august 2008
Http://www.albion.com/netiquette/rule6.html

Net 11 the internet:Communications module 5 Concepts 2008/Curtin university
http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home




Concept 26: privacy and security

The Internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the Internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media.

The Internet is a vast and wounderious thing and is not, in alot of ways, a very private place. People who are using the internet in tidays society needs to be aware and take the necessary steps to protecting not olny there personal settings but the computer itself.People need to protect from all sorts of things ranging from spam and unwanted emails to virus and trojans to finacial theft and other illegal things. The need is to recongnize the risks and to take steps to prevent any information getting on to the internet and to prevent invasion of your computer itself.


One if the biggest problems on the internet today is finacial fraud and theft, a person should never give finacial details over the internet unless ensured they are using an encryped program.An encryption program scrambles private information to prevent unauthorized accessed.Two ways to see if it secure is

ONE:in the bottom right hand corner of your screen you would see an icon like a key or lock

Two: your url should start with https//. The 's' indicates a secured or encrypted status.

"
Shield Yourself From Swindles--Scams Involving Checks, ATMs, and the 'Net"( Kellie Halder , CUNA staff 2006)

Probably the most other widely used security problem is the virus. These can be annoying and also quite costly to alto of people. Viruses are used for alot of different reasons such as corrupting data, slowing down networks and collecting personal information. The problem with viruses is they can be anywhere from a website you have visited to a program the you have downloaded and they can even be attached to emails that are sent to you which is called spam. There are many different types of viruses out there.

ONE: TROJANS OR TROJAN HORSES
they are programs that pretend to be software and when downloaded causes harm to your computer by corrupting data

TWO:WORMS
worms are annoying viruses that can spread between computers. As it spreads it creates alot of traffic , slowing down the internet or causing computers to crash.

THREE:SPAM
spam is computer junk. spam can include free drugs, get rich quick schemes and anything that may seem strange or out of the ordinary.

The most effective way to deal with this is using virus protection software. Anti-virus software is designed to keep all the viruses out, but you must be aware to keep it up to date because new viruses are made on a regular bases and because of this you want to have the best protection possible.One of the best programs i have found in protecting my own computer is AVG free 8.0.

"
Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months." (clifford Stoll )

Top ten lists of measures to ensure your safety:
  1. Use a strong anti-virus package and make sure that you keep it updated so that all viruses can be caught and killed before they infect your computer.
  2. Use e-mail filtering to try and prevent the amount of spam you receive.
  3. Only run software from trusted sources.
  4. Scan your computer regularly using Internet security software.
  5. Never trust e-mails that appear to come from your bank asking for your bank details - your bank will never request that you to fill these in via e-mail.
  6. Do not follow links in e-mails purporting to come from financial organizations.
  7. When sending important data via e-mail make sure that you encrypt the e-mail and/or the message before sending it so if it is intercepted your data is still secure. You can encrypt your data using free software such as: Steganos Freecrypt.
  8. Install a firewall so that the traffic going to and from the Internet is filtered and any unsolicited connection requests are blocked.
  9. Password protect your bookmarks and clear your browsing history to ensure that your online activity is kept private.
  10. Use shredder software to ensure that all your sensitive data is totally overwritten and no trace is left on your computer.(Aston fallen)

Annotations
sysprog.net/Clifford stoll
http://www.sysprog.net/quotsec.html

Clifford Stoll
is a U.S. astronmer,computer expert,and author.He recieved his Ph.D from university of arizona in 1980.Stoll has written three books as well as technology articles in the non-specialist press.The most famous of these was Silicon Snake Oil which was written in 1995 and Stoll raised questions about the influence of the Internet on future society and whether it would be beneficial. Along the way, he makes various predictions, calling e-commerce unviable due to a lack of personal contact.

Kellie Haldernt>,CUNA staff 2006
http://www.affinitywestfcu.org/financial_safety.htm

The Credit Union National Association (CUNA) is the premier national trade association serving credit unions. Ninety percent of America’s credit unions are affiliated with CUNA.and kellie halder works for them.

BIBLOGRAPHY
West works credit union/kellie halder 2006,retrieved 6 august 2008
http://www.affinitywestfcu.org/financial_safety.htm


Viruses and spam what you need to know 2001,2003,2004,retrieved 6 august 2008
Http://www.sophos.com/sophos/docs/eng/comviru/viru_ben.pdf


Internet security quotations/
Clifford Stoll Retrieved 6 august 2008
http://www.sysprog.net/quotsec.html

Computer times may 2007/Retrieved 6 august 2008
Http://computertimes.com/mayo7article10stepsforinternetsafert.htm

Net 11 the internet:Communications module 5 Concepts 2008/Curtin university
http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home



Concept 23: Human-Computer interfaces


The Internet lessens the recognition of difference between humans and computers because, at a distance, it is often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or a machine.


The world is moving at about a million mile an hour and every year technology gets better and better, Its not my aim to surprise or shock you but the simplest way i can summarize is to say that there are now in the world machines that can think,that can learn and create. Moreover, their ability to do these things is going to increase rapidly until in a visable future the range of problems they can handle with be coextensive with the range to which the human mind has been applied.

I think humans in todays society have come to depend on technology for a variety of different things such as bussiness,space travel,entertainment machines and medical perpases.

"Scientist announced a device that can be placed in a pacemaker and will call your doctor whenever you are having heart trouble. When told about it, Dick Cheney said, "I can't afford those kind of phone bills."
(Conan Obrien )

An example of technology helping to improve the qaulity of life is the pace maker.
Thousands of people world wide have come to depend on this technology to sustain life which begs the question how long until we have made machines to smart?.

It makes me think about a scene in the Matrix Reloaded when neo is talking to councillar harmann.

"Councillar harmann: Down here, sometimes i think about all thise people still plugged into the matrix and when i look at these machines i...i cant help thinking that in a way we are plugged into them."


"Neo: but we control these machines,they dont control us."


There are already the begginings of AI out there,such as the Guardian UGV Robot which is a security robot that is fully autonomus and relys on GPS to move around freely. Also i saw on the news the other night a robot in london that responds to touch,sound etc and has a heartbeat. Many things we use today are human to machine contact,we accept that machines are doing everyday things.

"The real danger is not that computers will begin to think like men, but that men will begin to think like computers." (Sydney J.Harris)

In the instance of online video games people are playing with such advanced AI that you dont really know the differance at times there are"bots" everywhere.
MSN and alot of other chat programs and chatrooms use bots to monita chat rooms for bad language and rude and abusive behavier. Bots are even used theses days to cheat at online cosino games where the bot acts like a human by betting and winning money,in this regard some technology is bad. But i guess in the grand sceame of things technology is only as bad as its makers or the way in which it is used.

"The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency."(bill gates)

Annotations
Conan O'brien/American late night television
http://thinkexist.com/quotation/scientist-announced-a-device-that-can-be-placed/349678.html

Conan Christopher O'Brien born april 18 1962 is a emmy award winning irish-american television host and comedian best known as host of NBCs late night with Conan O'brien.

Bill gates/Microsoft
http://www.saidwhat.co.uk/topicquote/technology

William Henry Gates III born october 28 1955 an american bussiness magnete and is the third richest person in the world and founder of microsoft a comapany he created with paul allen.During his career at Microsoft, Gates held the positions of CEO and Chief software arcitect, and remains the largest individual shareholder with more than 9 percent of the common stock. He has also authored or co-authored several books.

BIBLOGRAPHY
Conan O'brien/American late night television/Retrieved 7 august 2008
http://thinkexist.com/quotation/scientist-announced-a-device-that-can-be-placed/349678.html

The matrix reloaded/wakoski brothers 2003/retrieved 7 august 2008
Http://www.imdb.com/title/tt0234215/quotes

Quotation garden 2007/retrieved 6 august 2008
Http://www.quotegarden.com/technology.html

Said what? Quotations 2007/Retrieved 7 august 2008
http://www.saidwhat.co.uk/topicquote/technology

Net 11 the internet:Communications module 5 Concepts 2008/Curtin university
http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home



















No comments: