tag:blogger.com,1999:blog-3702512123219868502024-03-07T20:31:27.374-08:00The Spiral EffectMeridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-370251212321986850.post-26012457556357809672009-11-24T08:46:00.000-08:002009-11-24T08:50:13.808-08:00Podcast 2Here is the link to my Copyright in the Digital Era Podcast.<div><br /></div><div><a href="http://meridethpack.podbean.com/">http://meridethpack.podbean.com/</a></div>Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0tag:blogger.com,1999:blog-370251212321986850.post-28557476353664502892009-11-18T21:56:00.000-08:002009-11-18T21:59:00.601-08:00Online Privacy<!--StartFragment--> <p class="MsoNormal" style="text-indent:.5in">When a celebrity or someone in the media spotlight are admitted into the hospital one of the first deviant acts the paparazzi do is to search for the medical reports, which are usually easy to access online.<span style="mso-spacerun: yes"> </span>In a place where one should feel safe, they have to worry about paparazzi searching for any kind of information alluding to why they are in the hospital.<span style="mso-spacerun: yes"> </span>Another situation where records are easy access to the public is when one is arrested. These types of situations put people at a high risk for invasion of their own privacy. </p><p class="MsoNormal" style="text-indent:.5in">People argue all the time that the paparazzi or normal spectators are invading their privacy, but in all actuality up to a certain extent they aren’t.<span style="mso-spacerun: yes"> </span>Once a line is crossed that is when privacy invasion occurs. Privacy invasion occurs almost daily when normal citizens go online.<span style="mso-spacerun: yes"> </span>This usually happens when one tries to by an item online using their credit card. A similar situation is when one’s bank account is hacked into because the security question and password were easy for a hacker to guess.</p> <p class="MsoNormal"><span style="mso-tab-count:1"> </span>The question we ask is how do we protect ourselves from our own information leaking out onto the Internet?<span style="mso-spacerun: yes"> </span>Many identities have been stolen from people trusting the sites that they give their credit card numbers to.<span style="mso-spacerun: yes"> </span>Others trust their online banks to make sure no one can hack into their bank account and steal their money. There have been many researchers’ to test the methods of how people go about stealing these identities.<span style="mso-spacerun: yes"> </span>One of these researchers’ is a Rutgers computer scientist named Danfeng Yao.<span style="mso-spacerun: yes"> </span>She and her students came up with a new tactic to help strengthen online privacy and make it more secure. </p> <p class="MsoNormal" style="text-indent:.5in">When most people login to their emails or bank accounts they are asked to enter in their password and answer a few short security questions. These questions usually pertain to something that can be easily remembered but also easily guessed by a hacker. In an article called <i><a href="http://www.sciencedaily.com/releases/2009/11/091109121203.htm">Computer Scientists Work To Strengthen Online Security</a></i>, Yao talks about her new form of questions to be asked when signing onto an account online.<span style="mso-spacerun: yes"> </span>She states, “<span style="mso-bidi-font-size:13.0pt;mso-bidi-font-family: Arial">We call them activity-based personal questions, sites could ask you, 'When was the last time you sent an e-mail?' Or, 'What did you do yesterday at noon?’”<span style="mso-spacerun: yes"> Studies from this research have shown that the harder the questions are the less likely the potential intruders will be able to answer them right. Yao said, "We want the question to be dynamic, the questions you get today will be different from the ones you would get tomorrow." </span></span></p><p class="MsoNormal" style="text-indent:.5in"><span style="mso-bidi-font-size:13.0pt;mso-bidi-font-family: Arial"><span style="mso-spacerun: yes">With Yao’s tactic in place, the hope is that the hundreds of online privacy attacks a day will be narrowed down and the number of people’s identities that are stolen a day will be lessened. My view is that everyone should do their part in making it harder for hacker’s to steal their identities. They should make their passwords and security questions something that they will only know and understand. Once that happens, I am sure we will see once again that people can have privacy online.</span></span></p> <!--EndFragment-->Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0tag:blogger.com,1999:blog-370251212321986850.post-88538449696813865042009-11-12T08:31:00.000-08:002009-11-12T08:35:00.574-08:00Conflict in the Digital Age<!--StartFragment--> <p class="MsoNormal"><span class="Apple-tab-span" style="white-space:pre"> </span>When most of the U.S. thinks of conflict in the cyber world they probably think about people sending hate e-mails to each other or putting advertisements out on the web that reflect the other’s business or company in a bad light.<span style="mso-spacerun: yes"> </span>What the average citizen doesn’t know is that our government is attacked on a daily basis by other countries and by terrorists inside our own country with cyber warfare.<span style="mso-spacerun: yes"> </span>The U.S. government has been building a team over the years of people that are extremely knowledgeable in the area of cyberspace and cyber warfare.<span style="mso-spacerun: yes"> </span></p> <p class="MsoNormal"><span style="mso-tab-count:1"> </span>The Pentagon is looking to put forth a new strategic military plan so that the armed forces will be prepared to begin offensive and defensive computer warfare in cyberspace. In an article titled <i><a href="http://www.nytimes.com/2009/05/29/us/politics/29cyber.html">Pentagon Plans New Arm to Wage Cyberspace Wars</a></i> David Sanger wrote, “<span style="mso-bidi-font-size:15.0pt;mso-bidi-font-family:Georgia">Mr. Obama, officials said, will announce the creation of a White House office that will coordinate a multibillion-dollar effort to restrict access to government computers and protect systems that run the stock exchanges, clear global banking transactions and manage the air traffic control system.”<span style="mso-spacerun: yes"> </span>The hopes with the new White House office, is that it will become more aware of the thousands of cyber attacks against the United States.<o:p></o:p></span></p> <p class="MsoNormal"><span style="mso-bidi-font-size:15.0pt;mso-bidi-font-family: Georgia"><span style="mso-tab-count:1"> </span>It is yet undecided whether the National Security Agency or the new military command will team up together or only one of them will be assigned to the duty of offensive cyber operations. <span style="mso-spacerun: yes"> </span>Sanger wrote,</span><span style="font-size:15.0pt; font-family:Georgia;mso-bidi-font-family:Georgia"> "</span><span style="mso-bidi-font-size:15.0pt;mso-bidi-font-family:Georgia">It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts.”<span style="mso-spacerun: yes"> </span>In 1998, to prevent the U.S. and Nato planes from being attacked the U.S. hacked into the Serbian Air traffic control and deterred the Serbian planes from attacking our own.<o:p></o:p></span></p> <p class="MsoNormal"><span style="mso-bidi-font-size:15.0pt;mso-bidi-font-family: Georgia"><span style="mso-tab-count:1"> </span>One half of the cyber attacks originate from inside the U.S. It has been said that cyber war games are available to various age ranges and when playing them it is like being in a real battlefield situation. So who is to say that when some of those kids get older and more intelligent, some might get really upset with the government and take their knowledge of cyber warfare and try to use it on the U.S. government. Other attacks on the cyber world of our government are from foreign countries trying to terrorize our government. If the new White House office helps prevent these attacks from happening I am all for it.<span style="mso-spacerun: yes"> </span>We need to keep our government safe from these attacks so that the citizens of the United States can be safe.</span></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><br /></p> <!--EndFragment-->Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0tag:blogger.com,1999:blog-370251212321986850.post-48290846841981037642009-10-26T23:05:00.000-07:002009-10-26T23:07:24.746-07:00The Digital Divide<!--StartFragment--> <p class="MsoNormal" style="text-indent:.5in">The Digital Divide is affecting many people within the United States in various ways.<span style="mso-spacerun: yes"> </span>The Digital Divide is America’s population that has access to technology and the population of people who do not have access to technology. Some are affected by the knowledge of technology and the ability to own such technology.<span style="mso-spacerun: yes"> </span>Others have stepped in to a whole new type of digital divide that is between those with high-speed Internet access and those with low-speed Internet access.<span style="mso-spacerun: yes"> </span></p> <p class="MsoNormal" style="text-indent:.5in">There are many types of non-profit organizations that are working to bridge the digital divide.<span style="mso-spacerun: yes"> </span>One of these organizations is called Charity in the Community (CITC). It is based out of Chicago and was started seven years ago by Henry Razor.<span style="mso-spacerun: yes"> </span>Razor said in the article by Sandra Guy of the Chicago Sun-Times that, “<span style="mso-bidi-font-family:Arial">Broadband access is a quality-of-life issue. We see people who stand in line or walk long distances to the library just to fill out a job application or do school work. If people -- and I'm talking in large part responsible people -- cannot afford access, it might as well be available in China."</span></p> <p class="MsoNormal" style="text-indent:.5in">With this organization a program was started that teaches local residents in the Chicago area the in’s and out’s of the Internet and the Windows operating system in a four month span.<span style="mso-spacerun: yes"> </span>The people that have completed this program have gone on to get jobs that satisfy computer experience requirements. <span style="mso-spacerun: yes"> </span></p> <p class="MsoNormal" style="text-indent:.5in">In the article by Guy called <i><a href="http://www.suntimes.com/technology/guy/1791033,CST-FIN-ECOL26.article">Programs open Web access, bridge digital divide</a></i><span style="mso-bidi-font-size:18.0pt;mso-ascii-font-family:Cambria;mso-ascii-theme-font: minor-latin;mso-hansi-font-family:Cambria;mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Arial;mso-bidi-font-weight:bold"> stated</span>, “<span style="mso-bidi-font-family:Arial">Two studies released last month reveal the need for such programs due to the continued magnitude of the digital divide: A report from the University of Illinois at Chicago revealed nearly 40 percent of Chicagoans have little or no access to the Internet, primarily in low-income and non-native-English-speaking neighborhoods.”</span><span style="mso-spacerun: yes"> </span>That’s why the CITC program is particularly important to the low income and minority households that might not be able to afford such technologies.<span style="mso-spacerun: yes"> </span></p> <p class="MsoNormal" style="text-indent:.5in">Another person dedicated to bridging the digital divide is Andrew J. Vass, who started Technology for Humanity.<span style="mso-spacerun: yes"> </span>This program brought the access of technology to minority and underprivileged communities, people with disabilities, and other people in need of technology. <span style="mso-spacerun: yes"> </span>Guy stated in her article, “<span style="mso-bidi-font-family:Arial">The term "access" means providing a variety of support such as mentors, trainers, internships, computer maintenance and other support networks.”<span style="mso-spacerun: yes"> </span><o:p></o:p></span></p> <p class="MsoNormal" style="text-indent:.5in"><span style="mso-bidi-font-family: Arial">With this type of support and help from others that have experience in new types of technology more people will be able to begin to learn types of technology and have at least one computer system in their household so that the gap of the digital divide will be lessened. </span></p><p class="MsoNormal" style="text-indent:.5in"><br /></p><p class="MsoNormal" style="text-align: center;text-indent: 0.5in; "></p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica"><img src="webkit-fake-url://596A9B1A-D3C6-4008-B513-BA87EAFF066C/digital-divide.jpg" alt="digital-divide.jpg" /></p><p></p> <!--EndFragment-->Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0tag:blogger.com,1999:blog-370251212321986850.post-58873922823351482332009-10-20T10:23:00.000-07:002009-10-20T10:24:04.325-07:00Podcast 1Link to my Net neutrality podcast.<div><a href="http://meridethpack.podbean.com/">http://meridethpack.podbean.com/</a></div>Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0tag:blogger.com,1999:blog-370251212321986850.post-58238616241291509632009-09-21T21:10:00.000-07:002009-09-21T21:16:24.801-07:00Facebook-It's Not Just For Students Anymore<!--StartFragment--> <p class="MsoNormal" style="text-indent:.5in">The online world today offers something for everyone.<span style="mso-spacerun: yes"> </span>Because the internet is a public domain, it is available for use by all people regardless of age.<span style="mso-spacerun: yes"> </span>Today, there are many older and professional people using the internet for personal growth and satisfaction.<span style="mso-spacerun: yes"> </span>From online banking and bill paying to personal relationships and networking, mature people are utilizing online technology to enhance their lives.</p> <p class="MsoNormal" style="text-indent:.5in">In our society individuals use outlets such as Facebook, Twitter, and My Space to create an identity that defines who they are. <span style="mso-spacerun: yes"> </span>Author Charles Cheung talks in the book <u>Web Studies</u> about Identity Construction and Self-Presentation On Personal Homepages.<span style="mso-spacerun: yes"> </span>In this he list that a person has three identities. These are reflexive, ascribed, and the virtual identity.<span style="mso-spacerun: yes"> </span>Most people that are on Facebook are showing their reflexive identities to friends and acquaintances. <span style="mso-spacerun: yes"> </span>A person’s reflexive identity will show how he or she perceives himself or herself at any given time in their life.<span style="mso-spacerun: yes"> </span>This identity will change as their roll in life changes.<span style="mso-spacerun: yes"> </span>For example, students will use Facebook to communicate with friends, meet new people, or share pictures.<span style="mso-spacerun: yes"> </span>A busy mother might chat with friends on an online network to plan events for children, create a carpool schedule, or make plans with other mothers.<span style="mso-spacerun: yes"> </span>A busy father might go online to keep up with his families’ activities while he is traveling.</p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal" style="text-indent:.5in">Just as the college student, the busy Mother, and the business professional use the Internet for socialization and to stay organized, mature adults use avenues such as Facebook or other online sites to stay in touch with people and events in the world today.<span style="mso-spacerun: yes"> </span>Some use Twitter to voice opinions and learn what others have to say on a variety of topics.<span style="mso-spacerun: yes"> </span>Networking sites like Facebook offer an opportunity to locate and renew friendships, share memories and pictures, plan events, and even meet new friends. In her article titled <b><i><u><a href="http://www.foxnews.com/opinion/2009/09/04/uwire-facebook-parents/">Help! My Mom’s on Facebook and Cooler than me!</a></u></i></b>, Leslie Ventura said “These web sites have woven themselves into the fabric of human nature.”</p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal" style="text-indent:.5in">Many young people are not happy that their parents and Grandparents are now active on these networking sites.<span style="mso-spacerun: yes"> </span>We must face the facts. <span style="mso-spacerun: yes"> </span>In her article, Ms.Ventura said, “You can run from it or you can embrace it.<span style="mso-spacerun: yes"> </span>Either way, the technology we once thought was ours alone is now available to all ages.”<span style="mso-spacerun: yes"> </span>Mature adults continue to use more technology in their everyday lives. The ability to learn, to voice opinions, plan financially, and to keep in touch with friends and family is important to people of all ages, from young to mature adult!<span style="mso-spacerun: yes"> </span>We must learn to cohabitate in our public domain!</p> <!--EndFragment-->Meridethhttp://www.blogger.com/profile/11338233636760838026noreply@blogger.com0