Lecture:
This weeks lecture was about the social and ethical issues when using ICT. The first part deals with the issues of copyright, plagiarism and intellectual property while the second deals with privacy, security and freedom of speech. The lecture today was very interesting and useful to me because I seem to have quite a lot of problems with viruses on my computer.
Tutorial:
In the tutorial today we were given a chance to go over our bloggs and edit them. The Workshop today was mainly about protecting yourself from viruses as well as Copyright.
Workshop:
1.Five Information Sheets that will help me as an undergraduate student - I plan on studying a Bachelor of Education and majoring in English or Journalism.
Journalism:
When dealing with journalists copyright protect press articles, reports, scripts and interviews. Copyright does not protect information, ideas, styles or techniques. Copyright does not protect such things as titles, slogans and phrases. Freenlance journalists rights in relation to their work depends on their agreement with their publisher. Journalists have moral rights in relation to their work.
Education Institutions:
Education Institutions such as Schools and Universities seem to copyright many things. For example they copy music, for example using it either in a play or in an assembly. Teachers need to be aware of how much they can copy and what they can copy without acknowledging the copyright ownership.
Editors:
This information sheet discusses copyright which is most relevant to people who edit textual material. The reason I felt that this may be relevant to me as an undergraduate student is because as I may be studying Journalism, editing is most relevant to me. The information sheet gives an outline to editors as to what copyright is and how it can be avoided. This would be relevant to me as a Journalist.
Internet: Copying and downloading:
This information sheet is quite broad and generalised, therefore would be relevant to the general public which is of course myself as well. The information sheet has information about how downloading things such as music or films is an exploitation of copyright. There are tips on how it can be avoided as well as frequently asked questions.
Research or Study:
As we you know, we all use the Internet for pertinent types of reasons but particularly for research and study. A student will not infringe copyright if they use the Internet for purposes such as research and study and only if their use is fair. This information sheet would be relevant to me in my chosen undergraduate course because it will give me an idea of how much of the data I am allowed to use on the Internet.
2. What I need to know about music and web:
As a student it is important for me to know and understand copyright and plagiarism. In particular about music and the web because as teenagers we do enjoy our music. It is important to know and understand that everytime a person downloads music off the Internet, the artist or song writer is not being paid. Also that if an artists music is to be used on a website to add interest to readers, then they should be acknowledged.Whenever music is downloaded off the Internet, there are a number of rights that are exploited, such as the reproduction of a musical work; and the communication to the public of a musical work. These points are very concerning but I do admit, like many million others, I myself do download music off the Internet.
3. A plan to protect yourself from atacks on your privacy and security:
Protecting your personal information using a password
From www.howstuffworks.com
> You should never use personal information as a part of your password
>Mix different character types
>Change your passwords every 30-60 days
How to protect your computer from viruses!
From www.netsecurity.about.com
>Buy a virus protective software
>You should never double click on an email attachment that you are weary of
>Put security level on HIGH
Common Viruses and how you can be protected
From www.pcmag.com
Boot sector virus & file infectors
HOW? Booting from an infected floppy disk into your machine, this would unleash a boot sector virus.
AVOID. Run a commercial antivirus program
Macro virus
HOW? A file infector that hides inside such documents as Word and Excel.
AVOID. Set whatever security features the application has to high, or disable macros altogether.
Trojan Horses
HOW? Masquerades as something it's not, to persuade a use to let it into the system.
AVOID. You must take care to avoid running a program that can work it's will on their machines. Scrutinizing all email attachments and download programs from trusted sources only.
Readings:
EFF's Top 12 Ways to Protect Your Online Privacy
http://www.eff.org/Privacy/eff_privacy_top_12.html
This is a good and valuable reading as the website gives an outlines on how to protect your online privacy. Stanton McCandlish has given 12 ways to protect your online privacy and thoroughly explained each step. The explanations are very detailed and the reading is quite long but the information is reliable.
Ethics in Computing - Social Justic Issues: Electronic Monitoring
http://ethics.csc.ncsu.edu/social/workplace/monitoring/
Articles are given in this reading with links to legal issues and privacy issues. The reading basically just gives links to articles about certain issues and how they relate to electronic monitoring.
Brown & Michaels - Overview of Intellectual Property
http://www.bpmlegal.com/overview.html
Brown and Michaels PC have given an overview on how how to protect your intellectual property in this reading. The reading explains what you can protect and how to protect different kinds of intellectual property. This includes patents, trademarks, copyrights and trade secrets.
Monday, May 19, 2008
Monday, May 12, 2008
Week 11 - Building Knowledge
Lecture:
The lecture today covered Data, Information and Knowledge and how each one connects to the other. The lecture slides contained information about Strategies for Assigment Work. The lecture slides covered the definitions and characteristics of Data, Information and Knowledge. There was also a Pop Quiz which covered some of the topics which we have covered in previous weeks and the purpose of the Pop Quiz was to help us with the exam.
Tutorial:
The Tutorial today was about Building Knowledge. The workshop was straightforward and simple. The tutorial workshop helped me build a great understanding of Data, Information, Knowledge and Wisdom and how each one relates to the other. The Workshop was very straightforward and simple to follow.
Workshop:
1a:
My own definitions of these terms:-
- Data - Data is a factual piece of information which can be collected from a variety of sources.
- Information - Information is facts which are given or told.
- Knowledge - Knowledge can be information or data which is learnt through study or even just generally.
- Wisdom - Wisdom is having knowledge and distinguishing factual from fictional.
2. This is my alternative way of representing the terms Data, Information, Knowledge and Wisdom.
3. The understanding of the relationship between data, information and knowledge can assist my university study, because each one relates to one another. Finding data leads to finding information and finding information leads to knowledge. Information is collected by the student and by reading the information it is automatically learned. Knowledge is gained through data and information and wisdom is deveoped through researching data, collecting information and having knowledge. These aspects each relate to eachother and it is important that a University student understands them and can use each aspect in their study.
4. Organisations that collect information from their clients or the public:
Edith Cowan University - The university collects information from the students, who are the Universities clients. The type of information which they collect is the students progress throughout the course. The purpose of collecting this information is that if the student ever needs their grades or progress through out the course in the future, then they will be available to the student or client.
Telstra - Telstra collects information from their clients who are the consumers. For example, Telstra collects personal information from their clients such as home telephone numbers and adresses so they are able to contact their clients. They also collect information from the public through telemarketing and surveys.
Centrelink - Centrelink collects information from their clients to make sure that each person has a job, or if not to make sure they are being provided with the money that is necessary.
Western Power- Western Power collects information from their clients such as their postal adress and telephone number as well as the amount of power being consumed by the client. The purpose of collecting this information from their clients is to make sure a bill is sent to the client for their electricity consumption.
MySpace - MySpace is an international site that offers email, a forum, communities, videos and weblog space, which collects information from their clients such as email, name, username etc., which allows a user to create their MySpace. The creator of Myspace, who goes by the name of Tom also accepts emails from the consumers of myspace enquiring about how to improve the website.
Week Eleven: Reading (URL) - Data, Information, Knowledge, and Wisdom
The information in the first article gives definition of the terms in a much more detailed matter in comparison to the second. The second website which is an Information Literacy Tutorial does contain quizzes, for the reader to know how much they understand of the website provided. Both of these articles give information on the terms Data, Information, Knowledge and Wisdom, but the first website contains much more detail and is much clearer and easy to follow and understand.
The lecture today covered Data, Information and Knowledge and how each one connects to the other. The lecture slides contained information about Strategies for Assigment Work. The lecture slides covered the definitions and characteristics of Data, Information and Knowledge. There was also a Pop Quiz which covered some of the topics which we have covered in previous weeks and the purpose of the Pop Quiz was to help us with the exam.
Tutorial:
The Tutorial today was about Building Knowledge. The workshop was straightforward and simple. The tutorial workshop helped me build a great understanding of Data, Information, Knowledge and Wisdom and how each one relates to the other. The Workshop was very straightforward and simple to follow.
Workshop:
1a:
My own definitions of these terms:-
- Data - Data is a factual piece of information which can be collected from a variety of sources.
- Information - Information is facts which are given or told.
- Knowledge - Knowledge can be information or data which is learnt through study or even just generally.
- Wisdom - Wisdom is having knowledge and distinguishing factual from fictional.
2. This is my alternative way of representing the terms Data, Information, Knowledge and Wisdom.
3. The understanding of the relationship between data, information and knowledge can assist my university study, because each one relates to one another. Finding data leads to finding information and finding information leads to knowledge. Information is collected by the student and by reading the information it is automatically learned. Knowledge is gained through data and information and wisdom is deveoped through researching data, collecting information and having knowledge. These aspects each relate to eachother and it is important that a University student understands them and can use each aspect in their study.
4. Organisations that collect information from their clients or the public:
Edith Cowan University - The university collects information from the students, who are the Universities clients. The type of information which they collect is the students progress throughout the course. The purpose of collecting this information is that if the student ever needs their grades or progress through out the course in the future, then they will be available to the student or client.
Telstra - Telstra collects information from their clients who are the consumers. For example, Telstra collects personal information from their clients such as home telephone numbers and adresses so they are able to contact their clients. They also collect information from the public through telemarketing and surveys.
Centrelink - Centrelink collects information from their clients to make sure that each person has a job, or if not to make sure they are being provided with the money that is necessary.
Western Power- Western Power collects information from their clients such as their postal adress and telephone number as well as the amount of power being consumed by the client. The purpose of collecting this information from their clients is to make sure a bill is sent to the client for their electricity consumption.
MySpace - MySpace is an international site that offers email, a forum, communities, videos and weblog space, which collects information from their clients such as email, name, username etc., which allows a user to create their MySpace. The creator of Myspace, who goes by the name of Tom also accepts emails from the consumers of myspace enquiring about how to improve the website.
Week Eleven: Reading (URL) - Data, Information, Knowledge, and Wisdom
The information in the first article gives definition of the terms in a much more detailed matter in comparison to the second. The second website which is an Information Literacy Tutorial does contain quizzes, for the reader to know how much they understand of the website provided. Both of these articles give information on the terms Data, Information, Knowledge and Wisdom, but the first website contains much more detail and is much clearer and easy to follow and understand.
Week 10- Managing Information
Lecture:
In the Lecture today we watched a video on knowledge information on the web. The tutorial slides contained information about atom based information and bit based information. There were also quite a few diagrams of different ways that you can manage your information. The lecture today was very interesting.
Tutorial
In today's tutorial I worked through the workshop very rapidly and managed to finish it. I found the tutorial very interesting because I didn't know how to set up my favourites list in the web browser. I learnt a lot from today's tutorial.
Workshop:
Task 1:
This is a print screen of a favourites list that I have set up, containing three folders, each with two websites marked as favourites.
Task 4: Nicholas Negroponte - Being Digital
There are of course pros and cons when it comes to using "atoms" and "bits". Each one equally contains pros and cons. Even though our economy is becoming more digital most of our information is delivered to us in the forms of atoms.As technology changes bit based information is becoming more popular as it is becoming faster and easier than using atom based. Large businesses prefer using bits rather than atoms because bits are easily transferred where as atoms are not. An great example of this is sending a package like a CD-Rom or other physical materials via a cargo company such as FedEx. This is atom based and very easy to use but on the downside there can be delays in the shipment because of transport problems. Using the bit based format it is easier to send the information through the Internet and email. This information will be received automatically without problems. Some major companies still rely on the atom based format to continue their work such as making sweaters and take away food. It would take a long time to fully convert this core business into a bit based format business.Between the two different formats there are many pros and cons, and each are used with these advantages and disadvantages.
Week Ten: Reading 1 (URL) - Grazing the Net
The essay explores the theory of raising young people to think, explore and make meaning for themselves. The essay explores ideas of Students as Infotectives, Issues of Reliability and Adequacy, Creating the Wired Classroom and the Wired School, Preparing Students for Internet Competencies and Raising a Generation of Free Range Students. Each heading relates to the topic of raising young people to think, explore and make meaning for themselves of the information that is on the Internet.
Week Ten Reading 2/Video - BBC Program Clicks - On knowledge managment and the Web
The Video questions the idea of the reliability of the Internet. Specific websites and Wikipedias are inspected. The video demonstrates how managing information on the Internet can question the idea of the sources we think are reliable, but in fact are not.Click talked to the creator of Wikipedia, Jimmy Wales, and investigated whether any of the information available on the web is actually worth consuming.The video suprised me quite a lot because in conclusion most of the information on the Internet does appear unreliable because there is no regulations as to what is allowed to be posted.
In the Lecture today we watched a video on knowledge information on the web. The tutorial slides contained information about atom based information and bit based information. There were also quite a few diagrams of different ways that you can manage your information. The lecture today was very interesting.
Tutorial
In today's tutorial I worked through the workshop very rapidly and managed to finish it. I found the tutorial very interesting because I didn't know how to set up my favourites list in the web browser. I learnt a lot from today's tutorial.
Workshop:
Task 1:
This is a print screen of a favourites list that I have set up, containing three folders, each with two websites marked as favourites.
Task 4: Nicholas Negroponte - Being Digital
There are of course pros and cons when it comes to using "atoms" and "bits". Each one equally contains pros and cons. Even though our economy is becoming more digital most of our information is delivered to us in the forms of atoms.As technology changes bit based information is becoming more popular as it is becoming faster and easier than using atom based. Large businesses prefer using bits rather than atoms because bits are easily transferred where as atoms are not. An great example of this is sending a package like a CD-Rom or other physical materials via a cargo company such as FedEx. This is atom based and very easy to use but on the downside there can be delays in the shipment because of transport problems. Using the bit based format it is easier to send the information through the Internet and email. This information will be received automatically without problems. Some major companies still rely on the atom based format to continue their work such as making sweaters and take away food. It would take a long time to fully convert this core business into a bit based format business.Between the two different formats there are many pros and cons, and each are used with these advantages and disadvantages.
Week Ten: Reading 1 (URL) - Grazing the Net
The essay explores the theory of raising young people to think, explore and make meaning for themselves. The essay explores ideas of Students as Infotectives, Issues of Reliability and Adequacy, Creating the Wired Classroom and the Wired School, Preparing Students for Internet Competencies and Raising a Generation of Free Range Students. Each heading relates to the topic of raising young people to think, explore and make meaning for themselves of the information that is on the Internet.
Week Ten Reading 2/Video - BBC Program Clicks - On knowledge managment and the Web
The Video questions the idea of the reliability of the Internet. Specific websites and Wikipedias are inspected. The video demonstrates how managing information on the Internet can question the idea of the sources we think are reliable, but in fact are not.Click talked to the creator of Wikipedia, Jimmy Wales, and investigated whether any of the information available on the web is actually worth consuming.The video suprised me quite a lot because in conclusion most of the information on the Internet does appear unreliable because there is no regulations as to what is allowed to be posted.
Subscribe to:
Posts (Atom)