May 29, 2008
May 28, 2008
May 22, 2008
week 12
Lecture
This weeks lecture was about protecting yourself and your PC on the World-wide Web. We learnt what the problems with the Internet are these are as follows:
Intellectual Property, Copyright, Plagiarism, Security, Privacy, Freedom of Speech
we then learnt how to protect ourselves from the dangers of the Internet.
Tutorial
This weeks tutorial was all about copyright and security we had to do several tasks that were about these topics.
The first task we had to do was go to the website http://www.copyright.org.au/ then choose five information sheets that were relevant to the undergraduate course we are studying. The five i chose to study are
- Access to copyright material in Australia & the US
In this information sheet it discusses the relationship between aus and us allowing access to copyright material the information i gained from this sheet was that australian and us do not have to grant access to their copyright material, but perpision can be granted in certain situations, and that both countries have sanctions in place to prevent the circumvention of technological protection
measures. There is also no general exemption for private copying in either Australia or the US. Australia and the US have provisions that allow certain uses of copyright material for libarys and eductional institutions without permission.
- Assigning & licensing rights
In this information sheet it gives a brief overview of the ways in which copyright may be transferred from person to person and the ways in which a copyright owner may give permission to another person to use his or her work. The information i gained from this information sheet is that copyright owners can chose to assign or license their rights in copyright material. Also that Assignments and exclusive licences of copyright must be in writing and signed by the copyright owner beforethey are legally effective.
- Databases, compilations, tables & forms
In this information sheet it discuss the legal implications for wanting to use items such as tables of information; indexes and forms; collections of information such as directories; anthologies of short stories, essays or poetry; and databases. This information sheet covers the topics of how copyright does not protect facts or information but does however, protect “compilations” of information such as catalogues, databases, dictionaries,directories and tables.
- Film & copyright
In this information sheet it gives a brief overview of films and materials in films in relation to copyright laws. the information i have learnt from this information sheet is that Films contain a number of separate copyrights, including copyright in the screenplay or narration and in the
visual images and material incorporated into the soundtrack, such as music and recordings. you also have to have legal advice on contracts that deal with distribution and licensing of films before starting a movie for copyright to be valid.
- Internet: copying & downloading material
This information sheet is useful for people who want to copy or download material from the internet also legal comments on copyright issues for email's. This information sheet tell us that many internet sites allow you to download material from there website but that does not mean you can use this downloded information for any use you also do not want to assume assume that everything on the internet or in an email has the permission of the copyright owner.
The second task we were asked to complete was to access the APRA website with the url of (http://www.apra.com.au/music-users/online_mobile/online_mobile.asp) and then explain what i need to know about music and the web.
what every one should know about music and the web is that Copyright is the way a artist makes money from there work. so there are laws that give the artist the right to impose when and where there music can be used also how much money thay can demand for the right to use ther music.
A song may have more than one copyright. The lyrics will be protected as a literary work and the music as a musical work. A recording of the song will also be separately protected as a sound recording. Copyright protection is automatic, both in Australia and overseas so if you become an artist you do not have to apply for your work to be copyright protected so as soon as you write down your lyrics or music (chord progression), or tape it onto a CD or tape, it will be protected by copyright. Copyright owners also have the right to:
reproduce the work, publish the work, perform the work in public place, communicate the work to the public, make an adaptation of the work, rent a recording of the music.
copyright in music and lyrics last until the the artist is dead and then you have to wait 70 years.
When thecopyright in a work expires, it can be used for public use and anyone can use it without having to obtain permission or pay a fee.
Material on the Internet is not copyright free it is protected in just the same way as other materials. A song stored, for example, in an mp3 on a web site is protected in the same way as a recording on a CD. If you want to copy that CD, play it in public or communicate it to the public (by broadcast or via the Internet for example), you need permission from the copyright. Also you will also need permission if you want to download the mp3 file onto your own computer, make a copy for a friend or put it on another site.
a list of things that will help me to protect my privacy and security
- never open unknown attachments
- avoid dodgy-looking websiteshave an online email account instead of Outlook Express
- install anti-virus software & update it regularly
- have a active firewall
- disable Windows Scripting Host & ActiveX
- Install Antivirus software and update it reguraly
- Be aware of Spyware
- never give out personal information about yourself over the internet or phone
- Do not reply to SPAM mail
- Use Peer 2 Peer (P2P) software with caution
- Always scan documents (with Antivirus software) BEFORE you open them for the first time.
- Set your computer, Internet browser, e-mail accounts etc, to the highest possible security level
- Install a pop-up blocker to stop programs from unknown sources
- don't click unknown links and don't install file sharing software such as lime wire, that allows other computers to access your files.
- Do not show any personal ID
- Use encryption to avoid privacy threats
- Using a different password for every thing.
readings
Reading 1 Summary: ‘EFF's Top 12 Ways to Protect Your Online Privacy’
This article takes a very detailed look at the ways that people can protect their online privacy. Interestingly enough all of the tips that are listed are very easy and simple things that almost anyone can do. they consist of
- Do not reveal personal information inadvertently
- Turn on cookie notices in your Web browser, and/or use cookie management software.
- Keep a "clean" e-mail address.
- Don't reveal personal details to strangers or just-met "friends".
- Realize you may be monitored at work, avoid sending highly personal e-mail to mailing
- Beware sites that offer some sort of reward or prize in exchange for your contact
- Do not reply to spammers, for any reason.
- Be conscious of Web security
- Be conscious of home computer security.
- Examine privacy policies and seals.
- Remember that YOU decide what information about yourself to reveal, when, why.
- Use encryption.
Reading 2 Summary: ‘Ethics in Computing - Social Justice Issues: Electronic Monitoring’
This particular website covers several news articles and stories in relation to online social and ethical issues. It has done this by splitting the matter into four separate sections and taking news stories from several different reputable sources and linking them through their website. I found this to be a very good source of ethics related links, but it was quite poorly organised and had some broken links and images.
Reading 3 Summary: ‘Brown & Michaels - Overview of Intellectual Property’
This website demonstrated the basic kinds of intellectual property protection of copyright, trademarks and patents it was use full in helping me understand 'Intellectual Property'.
Posted by jascinda at 8:41 PM 0 comments
week 11
Lecture
In this weeks lecture we learnt about conceptualising the gap between cognitive-space & cyber-space. we also learnt the difference between Data, Information & Knowledge the definitions, Characteristics, Importance, relationships between them and examples of each.
Data's main characteristics are that it is factual, non-judgmental, non-inferential and transient. The data should be a collection of valid, unbiased data. It must also be quantitative to classified as data. An example of Sampled data is price, shares, exchange rates and Measured Data is weather, census data
Information main characteristics are that it is formative, relational, dimensional, permanent and the information has meaning. The information must inform, be relational and the data must relate. An example of Historical Information is almanacs, tables of census data and Records are Budgets, minutes of meetings.
Tutorial
In this weeks tutorial we were asked to Brows the webpag http://www.success.co.il/is/dik.html and then use the Internet to find some dictionaries to look up the terms data, information, knowledge and wisdom. I chose to use the site http://dictionary.reference.com/
The definitions of these are :
Data = a body of facts
Information = knowledge communicated or received concerning a particular fact or circumstance
knowledge= acquaintance with facts, truths, or principles, as from study or investigation; general erudition
wisdom= knowledge of what is true or right coupled with just judgment as to action; sagacity, discernment, or insight.This is a screen shot of a graphical representation of data, information, knowledge and wisdom.
The relationship between data, information and knowledge can assist in my university studys because it allows you to understand the topic at a higher level. Just looking at facts and information won’t help you. The reason you are at university is to gain knowledge on your subjects. It’s not just enough to have facts as anyone can get them but it’s important to really know what you’re talking about for future reference.
The next thing we were asked to list 5 organisations that collect information from their clients or the public.
- Government organisations; they collect your information so they can keep updated on your situation whether her you have left school started school etc
- Financial organisations collect information so they can asses whether you are financially stable.
- Educational organisations collect information so they can appropriately monitor your educational levels est.
- Communication organisations collect information so that thay can appropriately be able to communicate with you.
- Taxation departments collect data to be informed on your financial and personal situation to be able to collect tax you.
Readings
Reading 1 Summary: http://www.systems-thinking.org/dikw/dikw.htm
The first reading is about Ackoff, R. L. theory of "From Data to Wisdom" how
Data, Information, Knowledge, indicates relate to the past; they deal with what has been or what is known and that wisdom, "deals with the future because it incorporates vision and design. With wisdom, people can create the future rather than just grasp the present and past. But achieving wisdom isn't easy; people must move successively through the other categories". It then goes on tell tell you about each term.
Reading 2 Summary: http://camellia.shc.edu/literacy/index.html
This web page offered tutorials and quizzes on how to complete assignments. It also offered tips on how to research topics and what do then do with the data. I found this website really interesting as it helped you understand how data can be turned into information and then knowledge.
Posted by jascinda at 8:41 PM 0 comments
May 9, 2008
week 10
Lecture
In this weeks lecture we learnt about Using Technology for Accessing & Organising Information. we were introduced to the concept of atom-based and bit-based formats this included the pros's and con of each format these are:
atom-based
Is using Books, papers, reports, etc. The pros's of using this format are it is a hard copy we can see the actual work in our hand so it is easy to protect because it is hard to copy and change the work it is also easy to access or conceal if necessary. The cons of using this format are they can be difficult to edit, distribute and reproduce. The format can also be cumbersome to use.
bit-based
Is using Digital reproductions, electronic content. The con's of using this format are that it is easier to copy and or steal the work so there is no privacy. It is also easy to fake authenticity with this format also they usually contain adverts and spam.
We also learn how to retrieve information and organise it by file extensions, folders/directories, create meta data, search function (OS), search engines.
Tutorial
In this weeks tutorial we were asked to complete a tutorial on on using bookmarks and favourites on the Internet at the this website; http://www.inette.com/aibtinette/favoritesI.html This is a screen capture of the web age of we had to do the tutorial on.
We were then asked to use the information in the tutorial to set up a favourites list that has 3 folders in it, each with at least two websites marked as favourites
step 1
first i went to the home page i wanted to add to favourites
step 2
I then clicked on the favorites icon on the web page bar and select add to favourites button shown in picture by the red box enclosing it.

if you select the add to favourites button an add to favourites file will come up if you select add on this your web page will be added to your favourites list

This is a screen capture of web page being added to the favourits list.
step4
you can then make a file to organise the websites you have chosen to add to the favourites list.

This is a screen capture of my three websites i want in favourits in there own file.
We were then asked to read Negroponte's "Being Digital" archive online which is at the website: http://archives.obs-us.com/obs/english/books/nn/bdcont.htm
I believe that his ideas are still relevant. This is because although we are beginning to rely on bit-based form information, we still use atom-based information such as books, newspapers and magazines even though it is easy to access the bit-based information it is not as reliable there for people still use it. This is because depending on what we need each for, we gain more benefit from using both bit-based information or atom-based information.
Readings
Reading 1 Summary: ‘Grazing the Net’
The web article "Grazing the Net" discusses Internet use for schools how we are provided with limitless amounts of information. It then goes on to talk about the negatives of using the Internet at school. These include accuracy, reliability, authenticity, of the web pages we are learning and resourcing from. It also informs the readers of the many benefits that students will gain thought the use of research using the Internet; such as speed, efficiency and more encouragement towards students doing work and assignment with less hesitation.
Posted by jascinda at 8:02 AM 0 comments
May 2, 2008
week 9
This weeks lecture was about Applications, protocols & benefits of Information Communication Technology. I learnt the role ICT has in communication, between individuals, between individuals and organisations, between a business and an external organisation and that this communication takes place by chain networks, circle networks, wheel network and all-channel network.
I also learnt the difference between Synchronous and Asynchronous the main differences are in synchronous every person taking part in the communication have to be involved at the same time, with asynchronous the communication does not have to be done instantaneous.
Examples of Information communication technology are the 3G Mobile telephone network, ipods, mp3, lap-tops, email and MSN messaging.
In university communication can be used as a great sources of information, a communication tools to suit many purposes, in Variety of contexts.
Tutorial
In today's tutorial class the first task i was assigned was to go to the Google site - http://www.google.com/
print screen of Google website
We then had to click on the groups tab within the site

This is a screen capture of the group tab you have to select
We then entered a search term on any topic in the group search bar mine was "love"

The group i investigated that correlated to my search tearm was
"All You Need is Love"
The group was about the song "All You Need is Love" it was for people to express there opinions on the song the word I searched for came up highlighted thought the groups website.

This is a screen capture of the site I investigated
The next task we had to complete was to go to a pod casting website and enter a search term.The term I entered was nirvana in the website http://podcasts.yahoo.com/.

This is a screen capture of the podcast i chose to view. The next site i visited was the ecu website home page for podcast http://www.ecu.edu.au/library/services/podcasts.html
This is a screen capture of the ecu podcast home page.
The Benefits of using podcast are the educational benefits it can be used to Utilise for example for recording lectures and tutorials, language and literacy education;
research, tours and commentary, recording interviews, speeches, diaries, music appreciation, news and current affairs, and assessment.
Readings
Reading (URL) - Guide to using Email summary
Article: 14 Email Do's and Don'ts - Ways to make your messages more efficient and effective: http://www.techsoup.org/learningcenter/internet/page6175.cfm
- Assess whether email is the best way for you to communicate what you want to say.
- Be direct and to the point.
- If asking a question Fraze your question as a question.
- make sure you set a deadline for when you want your response.
- Provide a suitable context to outline the message
- Use grammar and punctuation
- Use only one topic in your messages so as to to confuse reader.Provide a summary when you forward an ‘FYI’ email, explain to the recipient why you are forwarding this to them, and what information in it is related to them
- If a messing is abrupt don't assume the person is angry with you.
- don't use email messaging to be a bully it can be used as evidence of harassment.
- Ask for clarification, if unsure of the sender’s original intentions.
- Use your email software's tools to help organise your messages
- It is not necessary to respond to every message straight away
Article: Essential Email Etiquette - Avoid common pitfalls when composing your messages: http://www.techsoup.org/learningcenter/internet/page4815.cfm
- use an Appropriate Subject
- Address email Recipients Properly
- use an Appropriate Tone
- Avoid Irony and Sarcasm because it does not work in messages.
- Edit Your Message
Reading (URL) - The Problem with SPAM
This reading was about the subject of spam emails The problems associated with spam emails and the bad and good solutions there are to solve the problems of spam emails.
Posted by jascinda at 8:01 AM 0 comments