User:Vtaylor/Computers and Society/CIS2 Fall 2013/Group E

CIS 2 - Fall 2013 ''Workspace for Final Project collaboration and publication. Includes link lists for each group member and the final group recommendations for each topic, along with descriptions as outlined in the assignment.''

1. Introduction
1.) 20 Basic Rules for Digital Citizenship This list is a great go-to list for references, especially if you are new to digital devices and the internet. It is very informative and a great guide to find and/or avoid certain places on the internet.

2.) DC Restaurant bans cell phones! Good idea?

A very interesting idea to be implements in restaurants. With our current society being so absorbed in our digital devices that it takes us away from our every day social obligations. Where is the fun in sitting down with someone at dinner, only to be talking to someone who is staring downwards at their phone?

2. Privacy and Freedom of Speech
1.) Privacy and Personal Information Our social society is becoming more digitalized at a pace faster than we realize. Our personal information is readily available for anyone who seeks it. A simple search on Google can already reveal some personal information on any individual if their information is requested.     2.) DDoS attack methods and how to prevent of mitigate them  If your private information such as your Internet Protocol Address (or I.P. Address) is known by someone who is capable of performing a Denial of Service (DDoS) attack, they have the ability to shut down your internet/network to prevent you from continuing your internet activity until the attack is stopped. A very scary topic to think about since the easiest method to prevent such attacks is to either hide your IP Address (which cannot be guaranteed) or have an internet bandwidth large enough that these attacks have no effect on the network (very pricey alternative).

3. Intellectual Property
1.) 10 Big Myths about Copyright Explained There are no clear indicators on the borders of what is copyrighted and what isn't. This list provides us a simplified view into how we can determine is actually copyrighted to keep us out of trouble in case of accidental plagarism. A nice reference list for those new to today's copyright laws.     2.) Over half of Computer Users Commit Software Piracy  Whether or not you have committed software piracy, this topic is surely surprising as the statistics were nowhere near what was naturally assumed. It seems to be quite a large problem for those who depend on the legitimate purchase of software to survive, but in the decline of our economy, I can understand the reasons for why so many computer users would choose to pirate software rather than buy them.

4. Crime
1.) Common Internet Fraud Schemes There are thousands of internet fraud scenarios occuring every day that can very easily be prevented. If we can somehow provide an easy to access and quick guide to inform internet users of these fraudulent practices, a great majority of these scams can be prevented from happening.     2.) Top Ten Internal Controls to Prevent and Detect Fraud  This is a great list of principles that anyone could have a nice read over to learn more about fraud and how to prevent themselves from becoming victims of this crime.

5. Employment, Education, and Entertainment
1.) Google as an educational tool With the near-infinite pool of information on the internet, Google brings it all together for you in a nice and simple list. If you have a question about anything, Google will more than likely have an answer. What better tool for education than something that can answer almost all of your questions?       2.) Games in Education Using games in educations can be a very interesting and effective method for any budding student of any grade. With the capability of our computers and digital devices, there are many more opportunites for student to take advantage of that was not a possibility for previous generations in education.

6. Millenium Development Goals
1.) United Nations Development Programme The U.N. has a dedicated program to help those who are in need around the world. This program includes distributing technology to developing nations and food to starving people, in an effort to better the world as a whole.      2.) Ensure Environmental Stability  Of the many Millenium Development Goals set forth by the U.N., this one certainly had its own importance. If this ever becomes possible for the entire world, we could finally put an end to using limited resources and harming our environment in the process. A very difficult goal, but possible with the right funding.

7. Evaluating and Controlling Technology
1.) Control System This website explains the origin of the control system for simpler technology from several generations ago, but holds a very significant meaning. Without such controls, we could not control the many devices that we have today.     2.) Technology Vs. Humans: Who's Controlling Whom?  With so many people using smartphones mobile devices, it has certainly changed how we behave in public and private. With our great dependance on these devices, excessive use can land us in their control. With some control and limiting our usage of our mobile devices, we may be able to rid ourselves of these dependencies.

8. Risks, Failures, and Responsibilities
1.) When code can kill or cure Medical equipments run on complicated lines of code, and are only as reliable as the programmer has programmed them to be. When these medical equipments are used to sustain or help heal a peron's body, a simple failure in code can severly damage or even cost the patient's life. It is extremely important that such devices are put through rigorous and numerous tests before they are available and administered for public usage.     2.) Medicine and Computers  With the assistance of computers, the distribution and tracking of medicine for specific patients have become much more streamlined. Not only have computers helped with improving the convenience, they have also increased the average life expectancy of humans but a good margin.

9. Anytime, Anywhere
1.) A Desk Too Far?: The Case for Remote Working Increasing internet speeds have opened door for endless opportunities, as it makes work-from-home jobs a possibility. Without the increase in internet speeds and faster computers, these jobs would still be nothing more than a dream.     2.) Virtual Lectures  TED Talks are a great example in the category of virtual lectures. We are now able to view lectures, rich in content and offers much information in the comfort of our own homes. These lectures can also be seen anywhere internet is available, such as on your mobile device or laptop using with wifi internet connection.

10. Technology Advances, Social Trends
1.) Great Technologies 2013 This list provides links to some interesting products that have come from our advances in technology. My favorite among the list is http://www.thisiswhyimbroke.com/, a website for very creative and innovative products that are readily available for purchase. As the website url suggests, you may need to pace yourself on purchases or you might end up "broke"!     2.) Manned Mission to Mars  The NASA space program certainly has made some vast advancements over the past few years. We are now preparing for a manned mission to Mars to learn more about the planet. In several year's time, NASA will select a few among many volunteers to make a one-way trip to the red planet.

1.) Introduction: Online Learning

 * Media: "20 Basic Rules for Digital Citizenship" [teachthought.com/technology/20-basic-rules-for-digital-citizenship/]

My favorite rule to take away from the list would be "Don't Shout!", as it refers to many of the internet users who like to type in all capital letters in an attempt to get their point across. It really doesn't not accomplish much other than paint a picture of how arrogant and uneducated the user may be, to have to use such methods to express their ideals.


 * Discussion: "Computer Geek's History" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

Our society is quickly becoming digitalized, especially with the help of social networking websites such as Facebook where we voluntarily input our personal information. We need to be more aware of how much our infomation is actually being made public and how easy it is for others to obtain such information by the stroke of a few keys.


 * New search: "DC restaurant bans cell phones! Good idea?" [www.budgettravel.com/blog/dc-restaurant-bans-cell-phones-good-idea,11961/]

I found this article to be very interesting as it has much truth and insight behind it. Our cell phones are a large distraction of every day life and it can have a negative impact on one's social life if they cannot control when or when not to use them, such as at dinner time in this particular restaurant.

2. Privacy and Freedom of Speech

 * Media: "Another Look at Privacy" [www.downes.ca/cgi-bin/page.cgi] 

It may not always be a bad idea to share your personal information as it can sometimes help you or even provide new opportunities to pursue, such as receiving the medical help you need from telling your doctor your health condition, or finding a new partner on an online dating site. Of course, there is also a catch, as potential employers or banks may use this information against you and deny employment or bank loans in the future.


 * Discussion: "Privacy and Personal Information" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

Our society is quickly becoming digitalized, especially with the help of social networking websites such as Facebook where we voluntarily input our personal information. We need to be more aware of how much our infomation is actually being made public and how easy it is for others to obtain such information by the stroke of a few keys.


 * New search: "DDoS attack methods and how to prevent or mitigate them" [www.techrepublic.com/blog/it-security/ddos-attack-methods-and-how-to-prevent-or-mitigate-them/]

I've never been a victim of cyber-attacks or harassment, but I do worry about one kind of cyber-attack: a DDoS, or Denial of Service. This is done by repeatedly pinging/requesting a specific internet protocol so much that it disables all other internet activites for the user behind the attacked I.P.. My fear comes from the fact that the most viable way to prevent such a thing from happening is to protect your I.P. adress, or have a bandwidth large enough to mitigate such as attack, which is something I cannot afford for a very long time.

3. Intellectual Property

 * Media: "10 Big Myths about copyright explained" [www.templetons.com/brad/copymyths.html]

There is much more to copyrighting than what we may assume. Such a the number 1 rule: "If it doesn't have a copyright notice, it's not copyrighted." This alone has proved my thoughts wrong, as all material created prviately and originally after April 1, 1989 is copyrighted and protected.


 * Discussion: "Arts and Computers" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

I believe the advancements of computer technology has not only improved and aided in the department of art, it has also helped our society as a whole. Without computers and the internet to connect us, we could not have accomplished so much within the past few decades.


 * New search: "Over half of Computer Users Commit Software Piracy" [www.webpronews.com/over-half-of-computer-users-commit-software-piracy-2012-05]

Computer software piracy is a bigger issue than what we may initally assume. We may not care so much as it is more over large corporations that are taking the hit on this issue, but there are some independant software developers that depend on the income to survive and continue developing. So it comes down to a moral decision whether or not to purchase or pirate your software.

4. Crime

 * Media: "Common Internet Fraud Schemes" [www.fbi.gov/scams-safety/fraud/internet_fraud/internet_fraud]

Many victims of internet fraud and scams are simply not informated of such malicious practices. I believe the majority of these situations can be mitigated by providing easy access to something like a fact sheet, or a short and simple video to illustrate the process of popular scam tactics.


 * Discussion: "Computers and Crime" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

Everything is public once it us uploaded to the internet. This can easily be used against you by other internet users with malicious intent. Specifically, it can be used to commit identity theft, or even gain access to private accounts online with your sensitive information.


 * New Search: "Top Ten Internal Controls to Prevent and Detect Fraud" [www.omh.ny.gov/omhweb/resources/internal_control_top_ten.html]

Attached is a list of principles that I refer to from time to time if I am unsure if I should proceed with any transaction. It may not be a specific list for internet usage, but is a great list for general knowledge of how to navigate through life more educated and informed.

5. Employment, Education, and Entertainment

 * Media: "Creating a 'Least Restrictive Environment' with Mobile Devices" [www.edutopia.org/blog/least-restrictive-environment-mobile-devices-beth-holland]

Instead of restricting the use of mobile devices in schools, this article explains how embracing mobile device usage can be a positive factor in education.


 * Discussion: "Games in Education" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

I believe games can be a very intregal cog in the education process. Back in grade school, I was invited to attend a "Gifted Children" program where a select few are given the opportunity to further their education beyond that of standard school practices. Much of our program was composed to playing board games such as chess and checkers which I would agree has definitely helped me develop intellectually than any standard education could have offered me.


 * New search: "Google as an educational tool" [www.google.com/]

Google is by far the most useful educational tool offered on the internet thus far. If you have any questions, a simple search can help you find the answer. This could not have been achieved without the advancement of internet availability and computer access for the general public.

6. Millenium Development Goals

 * Media: "United Nations Development Programme" [www.undp.org/content/undp/en/home.html]

The United Nations have instilled a program that lends a helping hand to struggling nations. This program has many goals including: fighting poverty, building democratic societies, and growing national capacity just to name a few,


 * Discussion: "Ensure Environmental Stability" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

One of the United Nation's Development Programme's goals is to find a renewable and sustainable source of energy. Many projects are already underway, such as providing solar power technology for villages who still rely on burning wood for warm and light.


 * New search: "Liberia: Vice President Boakai Stresses Environmental Sustainability" [allafrica.com/stories/201310080611.html]

Liberia's Vice President is concerned about the hastened drain of natural resources on their nation and looks to the lack of technological advancements to be a major cause to this issue, The United Nations have already made efforts by providing over $6 Million U.S. Dollars to further the project and help improve the situation in Liberia.

7. Evaluating and Controlling Technology

 * Media: "Control System" [en.wikipedia.org/wiki/Control_system]

A simple look at controlling technology, this gives us a quick glimpse at how we have been at the command behind our technological advancements.


 * Discussion: "Evaluating and Controlling Technology" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

Many of the forums posts are concerned about the misuse of technology, with the focus of the topic pointed at the ones behind the controls who are actually to blame.


 * New search: "Technology Vs. Humans: Who's Controlling Whom?" [www.huffingtonpost.com/elisha-goldstein-phd/technology-vs-humans-whos_b_812305.html]

An observation by Elisha Goldstein Ph. D. concerning the every day use of technology such as our mobile phones, have a great impact on our lives. It really comes down to the point where we have to limit our usage and reliance on technology if we don't want the shackles of technology stuck to our limbs.

8. Risks, Failures and Responsibilities

 * Media: "When code can kill or cure" [www.economist.com/node/21556098]

It is a tough call to make on who if anyone should take blame when medical equipment fails. These failures can very often be fatal or cause death to a medical patient using them. These medical devices are controlled simply by some code which hold huge responsibilities to work the first time and every time.


 * Discussion: "Medicine and Computers" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

Technological advances in the medical field have greatly increased the average life expectancy of human life. These advances, however, do come with a price of the risks run to make such progress. It is up to those who engineer these medical equipments to ensure their dependability and install fail-safes in case of many unforseen failures.


 * New search: "Medical device risk management and governance" [www.nhscareers.nhs.uk/explore-by-career/healthcare-science/careers-in-healthcare-science/careers-in-clinical-engineering-and-medical-physics/medical-device-risk-management-and-governance/]

To work with such advanced medical technology, one must learn how to navigate and control them as well as work with others to ensure their maximum potential and to reduce the risk of equipment failure.

9. Anytime, Anywhere

 * Media: "A Desk Too Far?: The Case for Remote Working" [www.ariadne.ac.uk/issue56/guy]

Remote work has been a recent possibility thanks to the increasing internet speed bandwidth and faster, better computers. Without these products, many remote work jobs would never be available.


 * Discussion: "Virtual Lectures" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

There are already many instances of this topic readily available to us today, and it I believe it is one of the best delivery of information to the general public without having the users to leave their homes.


 * New search: "How Electronic Payment Works" [money.howstuffworks.com/personal-finance/online-banking/electronic-payment.htm]

One of the greatest recent achievements of technological advances would be the option to make payments online. These online payments (also known as e-payments) eliminate the possibility of payments being lost via standard postal mail shipping.

10. Technology Advances, Social Trends

 * Media: "Engineering a New Face After Injury" [www.nsf.gov/discoveries/disc_summ.jsp]

Our current medical technology allows us to create and manipulate a human face before any surgery actually begins. Doctors are able to create a face in a three-dimensional environment for the patient that requires facial reconstruction. This allows the surgeons "alternatives before going into the operating room".


 * Discussion: "Great Technologies 2013" [catalyst.deanza.edu/moodle/mod/forum/discuss.php]

A really great list of interesting websites that portray the many products of our achievements with the help of technology and innovation.


 * New search: "Manned Mission to Mars" [en.wikipedia.org/wiki/Manned_mission_to_Mars]

Until recent advancements in technology, a manned flight to Mars would be nothing more than a story in a science-fiction novel. Today, that idea is being realized, and could not be more of a reality. There have already been a recruitment process for volunteers who are willing to make a one-way trip to Mars to complete this mission in hopes to learn more about the red planet.