Friday, August 21, 2009

Topic 2

Topic 2
Exercise 2.1
I have been a member of Facebook for a while and I found it most useful whilst travelling to keep friends informed of my adventures with posts and pictures. But now that I’m working, theres not much to inform people about so I don’t really use it much. I’d rather telephone people if I have to speak to them. Facebook can be annoying when people you don’t want to speak to, find you!
I have joined the ITC510 group on Facebook.
B Social Cognition
http://philpapers.org/rec/STEFAT
Visual Cognition
http://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5176925
Social Cognition is the thought processes during the interaction of people whereas Visual Cognition is the study of the perception of images. I think Facebook involves both these types of cognition, you can interact directly with people by leaving messages on the wall or asking them to join groups or indirectly by looking at the latest photos.
Exercise 2.2/2.3
http://www.abc.net.au/4corners/special_eds/20070319/default_standard.htm
I watched the 4 corners episode on Second Life and it was really informative. I didn’t realise how popular and how lucrative the site was. You could create a second life, design your looks, house, partner, live a new identity. Second Life could get addictive as you make friends and increase wealth and you can actually forget that it is all a virtual world. It was fun pretending to be someone in the virtual world but I am happy with my “First Life” and prefer to be honest for sites like Facebook.
Being a citizen in Second Life could be tough, just as it is in the real world there were some unhappy characters in the site so my stay was short.

characters in the site so my stay was short.

http://www.smh.com.au/digital-life/digital-life-news/students-learning-to-be-virtually-anyone-20090904-fbgq.html

This is an informative article where Second life was trialled at a school with year 9 students to improve social barriers for migrants.


Exercise 2.4
Dick Hardt talk was entertaining. He developed a program Identity 20 that allows users to use their identity simply and securely for use on line. This would be convenient for the user when setting up new online accounts because it would avoid having to repeat typing in personal data when it could be accessed from one place.
Phishing
http://www.scamwatch.gov.au/content/index.phtml/tag/RequestsForYourAccountInformation
are emails that look like they are genuinely from a financial institution that requests bank account and password details.


Pharming
http://www.symantec.com/norton/cybercrime/pharming.jsp
is similar to phishing but instead of the having to click on an email, the user is redirected to a bogus website where private information can be stolen.
Identity Theft
http://webopedia.internet.com/DidYouKnow/Internet/2006/identity_theft.asp
The illegal access to personal information such as credit cards, addresses and drivers licence to commit fraud for financial gain.
Privacy Invasion
http://www.privacyrights.org/fs/fs18-cyb.htm
The illegal acquisition of private information from people using the internet through viruses and malicious software. Marketers and web bugs monitor sites that the user frequents to promote products. Spyware can track passwords and financial numbers.

No comments:

Post a Comment