Thursday, May 31, 2007

...and so it ends - Week 13: Post Exam & Course Review

"All good things come to an end" - I don’t know who said that but it’s used so much and it’s now quite appropriate.

We had the exam this morning. It was 100 multiple choice questions in 70 mins of which I found to be a lot harder than it sounded. I thought there was a heavy component on communications and media philosophers of whom I didn’t know a great deal about e.g. McLeauan and Aristotle etc and also my worst fear, there was a string of questions based on Allphaville and Primer of which I never saw so those areas I think I struggled. I found that the exam questions were one of two things; either extremely easy or extremely hard, there was no middle ground. Oh well I think I did well enough to pass and my 80% in the essay and HOPEFULLY A GOOD MARK FOR THE BLOG ::nudge nudge:: (sorry capitals=bad netiquette, see Jules I did learn something)

I thoroughly enjoyed this course, most probably because it involved all aspects of which I have a keen interest in i.e. journalism, mass media, new technologies, different aspects of the internet etc. I had no idea it was such an interesting field to study and that there is so much theory based on peoples trends and behaviour in regards to new and evolving technology i.e. cyberpunk, cyber theory and even games theory – who would have thought their was so much involved in video games! The course really opened my eyes to how much the world is changing, how had it is to keep up with it and that we as humans may have our theories and understanding of communications technology, it wont stop the technology taking over us and that it is only a matter of time until we are in fact the end users.

The idea of creating a web blog and using it as a means of recording course activities is a fantastic idea because the people that take the course have an obvious interest in computers and being predominately computer based in both theory and practice makes the subjects a lot more hands on. Also the fact that it is online and interactive means it can be a lot more personal and those with some creative flair like myself can really go to town with interesting pictures, layouts, colours, video etc and create something that their really proud of.

The one minor suggestion I have to improve the course is to make the lecture notes into power point presentation. With the current method you have to read through large slabs of information where the text is quite small. This makes it difficult to identify key points whereas a slide show could show important points, make the text bigger and would look more appealing overall.

In conclusion New Communication Technology was a great course and fantastic stepping stone into Journalism. I plan to do Communications Practice and News and Politics next semester and hope they prove to be as beneficial as this course. Many thanks to Steve and especially Jules for providing help for weekly tasks and making learning fun.

Cheers
MattyC
signing off

Week 12 - Microsoft Excell and Pre-Exam

This semester is coming to a close and the last tutirial task involves using Microsoft Excell to create a buisness spreadsheet. I didnt have any worries with the first part ie entering the data, using formulas and making graphs but the 2nd stage involved doing macros which is a recording of each command and action you perform to complete a task. The majority of people struggled with this. I found that the instructions on L@GU were not very clear. I eventually deceided tio use the Help feature of the program and found this website http://spreadsheets.about.com/ which helped me in completing the task. Of all the Microsoft Office programs, Excell is the one that I have the least experience with and have not had the need to use on an academic basis. I found the tute challenging, fusterating but very helpful.


The exam is 2 weeks away so I hope that the next lecture and/or tute is based on revision. The exam is all multiple choice which makes me breathe a little easier but I hope there are a couple of lectures i missed during semester including some of the film screenings so I will have to brush up on those a bit.

Sunday, May 20, 2007

Week 11 - The wonders of Microsoft Word...ppfft

This week we had to complete a series of fake job letters and use Word to use different methods of editing the letter. I have to admit some tools such as mail merge and tracking changes I have never used before but I still found them (espeically mail merge) to be a waste of time because it would have been quicker just to manually type in the information required. After making many changes and differernt saves of the same product this is my letter of which I adapted a particular theme. lol

Darth Mattamus
Sith Lord Council
Sector 5
Planet Corasant
Jedi Galaxy 4215

James Peterson 200 Job Lane Southport Gold Coast QLD 4218 Australia

Dear James Peterson,
I am writing to apply for a position within your fantastic company, MediaHouse,
I have recently completed a Journalism and Communications degree at Griffith University and believe that I have the suitable skills and experience to be a valuable asset to Jedi Hunters Assoc. During this degree I have completed subjects in:

· New Communications Technologies
· CyberStudies
· Digital Production
· News and Politics
· Culture, Media and Society
· Creative Writing.

I am also a master of the Jedi Arts and excel in light sabre combat
Please find attached a copy of my resume.
Should you need any further information or a demonstration of my skills with the dark side of the force, please do not hesitate to contact me.

May the force be with you,
Darth Mattamus

Thursday, May 10, 2007

assessment essay

Is there truly privacy in the digital world?

Digital privacy is a major security issue in modern times. Privacy is arguably one of the most important areas in which society and technology will affect each other in the coming years (Connolly, 2000, p.49.) Digital technology is becoming an increasingly vital part of everyday life for a number of people on different levels; from everyday functions like phone calls, text/instant messaging, internet research, games, browsing and sending emails to major financial business use and multi billion dollars company’s method of operations. Digital privacy can be split into to categories; information privacy and communication privacy (Langford, 2000, p.71). Information privacy mainly involves user’s details and personal information: name, age, address, bank account details, and transactions whereas communication privacy deals with a individual’s level and methods of communication such as; web usage and navigation, tracking, emails, phone calls etc. These elements combine together when discussing the issues surrounding privacy in the digital world.

Privacy is something we take for granted on a day to day basis. We close the door on the world around us when we arrive ‘home’ and in the environment we are safe from the prying eyes of neighbours and strangers. But we can no longer have that certainty when we are in cyber space, via email or a web browser, or a mobile phone. (Hirst and Harrison 2007, p. 283). Through an increase in modern communication technology and changing trends of the way people live the internet has become one of the most important and common methods of communication and business. Examples of this can be seen in the growing success of online banking and shopping apposed to travelling to branches and outlet stores but perhaps the most dominate example would have to be the modern methods of contact and communication e.g. mobile phones, pocket/palm PC’s, emails, instant messages, online chat etc. These communication tools all rely on the wireless medium of cyberspace, which makes the privacy of the information extremely vulnerable. Government legislation is aimed at protecting the information but the contraction of privacy vs. freedom of information often clashes and provides a ‘grey area.’ (Garfinkel, 2002, p. 666) For example there is legislation in the United States to provide a level of privacy protection to bank customers that actually allows banks to share the information they collect with other credit providers and insurance companies, or an associated business entity, as long as it is done for the purpose of carrying on business (Hirst and Harrison 2007, p. 285). This presents the question, how can there truly be privacy in the digital world if people don’t have control over their own information?

One of the most influential threats to privacy and a major factor as to why I believe there is no privacy in the digital world is computer crime. Computer crime includes; hacking, using viruses, trojans, worms etc in order in infiltrate another system or network. The most commonly used and threading type of computer crime in regards to privacy is identity theft and fraud. This is process that involves individuals or groups stealing information (usually personal details i.e. date of birth, bank account/credit card details, passwords etc) and using it to falsely verify that they are somebody else, usually in order to steal money or further information.
Identity theft can be accomplished a variety of ways the most common are; deceptive phone calls and emails pretending to be a legitimate company asking to “confirm your details” in order to obtain personal details and the use of ‘keylogging’ – a software program that captures the user’s keystrokes to discover confidential information such as login names, passwords and answers to security questions that people use to get access to online bank accounts, corporate systems and websites (BBC news, 17/3/05 http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/4358287.stm). The dynamic and continually flowing nature of the internet makes it easy for people to use computer crimes to steal private information and come and go as they please. The ease of which they can obtain this information illustrates the fact that there is no privacy in the online world.

Marketing and advertising is another reason as to why there is no privacy in the digital world. Companies obtain details such as phone numbers, email addresses, postal addresses from market research and send promotion information via these communication methods whether the receiver wants them or not. E.g. spam emails, promotional text messages, junk mail, telemarketing etc. This is a direct invasion of privacy in that companies have obtained personal details such as name, address, phone number, email address etc without the permission of receiver and they has no control over the information being sent to them and unless they contact the company to “opt-out” have to put up with it. A simular theory applies online with the use of a ‘clickstream pattern’. Everything you do on the internet is tracked and recorded. A clicksteam pattern is the digital trail left behind when surfing the web. It is tracked via cookies and other methods that allow search engines to deliver targeted advertising to your browser by attempting to match what you were looking for (Hirst and Harrison 2007, p. 285). Cookies play an important role in web tracking and recording. They are small files that hold information on the times and dates you have visited web sites. Other information can also be saved to your hard disk in these text files, including information about online purchases, validation information about you for members-only web sites, and more (2007 Kroll Ontrack Inc, http://www.ontrack.com/glossary/).
These features create controversial issues with online privacy because although the user has control over how they use and navigate through the internet if someone else has legal or illegal access to your computer they are able access all your personal information, including bank details. The following article perfectly illustrates societies concern with privacy in the digital world:
In recent news Google has introduced a new service which critics say allows the company to more easily collect data on its users' web surfing habits. The new feature, called ‘Web History’, allows users to look back in time at the websites they have browsed and search them for specific lines of text. However, the feature has got privacy advocates up in arms because it confirms what they have feared for some time now - that Google is capable of storing profiles of its users' web browsing history that can be easily and directly linked to the individual. Australian Privacy Foundation chair Roger Clarke said of the new feature: "Every URL that you ever go to at any time is being sifted through at Google and thrown into their archives to help them build a profile about you forever." (Moses, Sydney Morning Herald, April 23 – 2007, http://www.smh.com.au/news/web/search-service-tracks-your-online-habits/2007/04/23/1177180549441.html)

The digital world is one of the most commonly used mediums of communication and one that is growing and changing rapidly. Information moves freely through the system and because it is subject to computer crime and technical malfunctions the privacy of the information in the world is very much under threat. So who has control of the information flow, who owns the internet? If Google and other large marketing and advertising companies have the ability to obtain your personal information through web tracking and click stream patterns and if people have the ability to hack computers and digitally steal identities how can you argue there is truly privacy in the digital world?





Reference List


Connelly, P.J. 2000. Privacy as global policy. Infoworld, 11 September, pp.49-50


Langford, Duncan 200. Internet Ethics. Published in 2000 by Macmillan Press LTD, p.71


Hirst, Martin and Harrison, John 2007. Communication and New Media: From Broadcast to Narrowcast. Published 2007 by Oxford University Press. pp. 283-285


Garfinkel, Simon 2002. Web Security, Privacy & Commerce. 2nd edition. Published 2002 by O’Rielly & Association. P. 666


BBC news website. The spies watching while you type. Viewed 9/5/07, written 17/3/05 http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/4358287.stm


Ontrack Data Recovery website. Glossery of Terms. Viewed 9/6/07
http://www.ontrack.com/glossary/



Moses, Asher. Search service tracks your online habits. Sydney Morning Herald, published April 23 – 2007, viewed 5/507, http://www.smh.com.au/news/web/search-service-tracks-your-online-habits/2007/04/23/1177180549441.html)

Sunday, April 22, 2007

Week 8 and 9 Tasks - Interent Field Trip & Preparation for essay

This week is a catch up or what I like to call BLUDGE WEEK lol no not really.
Weeks 8 task was to look up some interesting and interactive websites. I found a couple that I consider to be unique and somewhat obscure:

http://www.habbo.com/
this webpage is an online interactive game where the user can play as a character and move around in a 2D world to undertake various tasks, chat and interact with other online people playing the game

http://www.superbad.com/
hummm words cant really explain, check it out

Week 9 is based on preparation for the essay thats due next week 10. It sounds stupid but Im finding it difficult to come up with an informative and interesting topic when there is no specific essay question and we can write about anything and everything. I think im going to go with a topic based on internet privacy and its moral and ethical issues that influence activities on the interent. This would be a good topic because im sure i could gather a lot of online and written materials. This is important because my downfall in the last essay i wrote (in another subject) was my use of references. Also the topic relates to everyone that uses the net, everyday users through to large scale finance and business use.

Sunday, April 15, 2007

Week 6 - More Photoshop

Last week we learnt some basics of photoshop. We also had to find unedited photos that represent the following subject matter... (some of the photos I took myself with my Olympus FE-210, 7mega pixel digital camera, the others I found on the net. Their URL's are referenced)

FRIENDS: my friends and I...slightly intoxicated lol at the pub having a good time. Friends and being at the pub go hand in hand



HIGH TECH: A scene from Terminator 3 of the machines at war. A fictional movie but it does raise the question, how long is it until true judgement day, will man kind go too far? http://www.movieprop.com/tvandmovie/terminator/t3endoskeletons1.jpg


NEWS: haha the Naked News, what will they think off next. Mass media targeting the specific demographic of males. Its interesting, if most broardcasts took that format would the programs be more popular, would people really care about the news?



SUMMER: mmm Krystal Forscutt...hot! I think this is what a lot of blokes think of when summer comes to mind, beach and babes. Am I right Jules?http://profile.myspace.com/index.cfm?fuseaction=user.viewprofile&friendid=89007271&MyToken=2cb6acb8-2ac5-4bb5-8a89-0e092a143537


UNCONVENTIONAL: I dont know, this was the 1st thing that came to my head.




UNIVERSITY LIFE: The Balancing Act - I took this photo because I think it answers the sterotypical question of what is uni like? Balancing Social life/drinking vs actually doing some work haha



This is the photo I made through Photoshop>>>
Bush and Bin Ladan, finally agree on something


I found a photo of The Halo 2 Xbox launch, featuring the main character (master chief) presenting the 1st copy of the game to one person. From this I came up with the idea of using President Bush at a soldier/commando figure, representing his NEED for war and Bin Ladin unifying with him as they hold what was the game but now editied to be a symbol of "rape the world" an i idea that both parties clearly partake in. How appropiate it is, im not sure but all in all I think its a pretty clever idea.

Cheers

Week 5 - Introduction to Photoshop

The purpose of today is to learn about photoshop and how you can manipulate and combine images together to make an interesting subject matter. I find this technique is very popular with satire and parody, especially involving current movies and high political profiles. Some examples can be seen below:
























I came up with a photo of me and my buddy Borat....."NICCEE!!"



more photos to come...