Rise in Identity Fraud -extra credit-

                                                                                                                                                                                                                                                                                                                             When you think”identity fraud” you probably think of a skimmed ATM card, or unsecured online credit card transaction- you probably do not think “smart phone”.

Nearly 12 million Americans were victims of identity theft in 2011, an increase of 13 percent over 2010, according to a report released on Wednesday by the research firm Javelin Strategy & Research.

The rise in the use of smartphones and social media by incautious consumers fueled the increase in identity fraud, and 2011 was a year of several big data breaches too. The fact that smartphones store mass amount of personal information definitely put them on the radar of would-be identity thieves.

Although people are able to protect thier personal information by using password,the survey found, in fact, that 62% of users don’t use a password to lock their screen, leaving it open for potential mischief makers to access your personal information, everything from twitter pages to password sensitive, personal emails.I think that it is about consumer’s responsibility.

There are several way of protecting your smart phones from identity fraud.

  • Pay attention to security-breach notifications. “Consumers see a lot of these notifications, and unfortunately it’s become a little bit of white noise,” Schwartz said. “Most notifications come with some sort of educational note that consumers should use.”
  • Keep a close watch on your credit cards and bank accounts.
  • Don’t give out your Social Security number unless you absolutely must, such as to your employer or insurer. If you have health insurance, for example, you shouldn’t have to give the doctor’s office your Social Security number because it’s already tied to your insurance.
  • Keep your antivirus software up-to-date on all electronic devices, including your smartphon   Use strong passwords, a mix of letters, numbers and symbols, and use different passwords for each account. Yes, it’s inconvenient, but getting your identity stolen is more agonizing. According to credit-reporting firm TransUnion, it takes victims about 30 hours and $500, on average, to resolve identity fraud.
  • Be careful what you tell your “friends” on social-media sites; scammers may be reading, too. “Assume that anything you post in public areas is fair game,” ID Analytics’s Winston said.
  • Don’t store personal information on mobile devices.
  • Leave your unneeded credit cards, Social Security card, birth certificate and passport at home.

Image: Smartphone da Samsung no Leilão Online da semana! by  sucelloleiloes – cclicensed via Flickr

What is Malware? -extra credit activity-

Have you ever heard the word which is called Malware? Actually, I did not what it is before I learned about it in F.A.L.O section, so I’m gonna explain about it.

What is Malware?

 Malware (a contraction of “malicious software”) refers to software developed for the purpose of doing harm.

Malware can be classified based on how they get executed, how they spread, and/or what they do. The classification is not perfect, however, in the sense that the groups often overlap and the difference is often not obvious, giving rise to frequent flame wars.

The first form of malware to evolve was the computer virus. Viruses work and spread (within the infected system) by attaching themselves to other pieces of software (or in the case of macro viruses, documents), such that during the execution of the program the viral code is executed. Viruses spread across computers when the software or document they attached themselves to is transferred from one computer to the other.

Computer worms are similar to viruses but are stand-alone software and thus do not require other pieces of software to attach themselves to. They do modify their host operating system, however, at least to the extent that they are started as part of the boot process. To spread, worms either exploit some vulnerability of the target system or use some kind of social engineering to trick users into executing them.

How to remove Malware

How to manually remove the spyware differs depending on what malware you have been infected with. Usually you can run a scan with whatever anti-malware program you have. Be careful with which malware program you get though, a lot of them won’t always catch or remove the malware. Once you have identified the infection, you can manually go into your computer to get rid of all the malware throughout the computer by deleting the infected .exes, cleaning up the registry, removing the infected files from the startup and whatever else your scan results show.

How to protect your computer from Malware

 How can we help to prevent this from infecting our own computers? There are several ways of pretecting your computer from computer virus.

  • Use a good AntiVirus program. There are several free versions that work well, like AVG. Microsoft Security Essentials which is also free has had good reviews.
  • Keep your OS and AV updated. Millions of rogue software and security holes in the operating system are being discovered. To help protect them the OS and antivirus manufacturer release updates for their products frequently. Make sure that you install those important updates. An out of date antivirus program does not help in detecting new infections.
  • Install an AntiSpyware app to scan your system periodically. MalwareBytes Anti-Malware Free Version and/or SuperAntispyware Free Edition are good choices. You can run these manually every week or whenever you think you may be infected. This is used along side of an anitvirus program because no A/V program can detect all Malware.

image: computer virus by talksrealfast cclicensed via flickr

The Kony 2012 and why you should stop supporting “Invisible Children” – extra credit activity-

                                                        If you are on facebook or twitter, you have surely seen by now a lot of your friends becoming so called “activists” after watching a YouTube video about “Kony 2012″ and the Invisible Children organization.

What is Kony 2012?     

Kony 2012 is a short film created by Invisible Children, Inc.and released on March 5, 2012. The film’s purpose is to promote the charity’s “Stop Kony” movement to make indicted Ugandan war criminal and International Criminal Court fugitive Joseph Kony globally known in order to have him arrested by December 2012, the time when the campaign expires.

The film has spread dramatically. As of 30 March 2012, the film had over 86 million views on video-sharing website YouTube and over 16.6 million views on Vimeo with other viewing emanating from a central “Kony 2012” website operated by Invisible Children. The intense exposure of the video caused the “Kony 2012” website to crash shortly after it began gaining widespread popularity.

Who is Joseph Kony?

Kony is one of the world’s worst war criminals and the campaign is intended to make him famous — not to celebrate him — but to raise support for his arrest and to set a precedent for international justice.  Kony is the leader of the Lord’s Resistance Army (LRA), which he founded in 1987, and he calls himself a prophet who claims to speak the word of God, prompting his followers to obey his every command and justify horrific acts such as the abductions and murder of children.

Why we should stop supporting Invisible Children

Invisible Children has been condemned time and time again. As a registered not-for-profit, its finances are public. Last year, the organization spent $8,676,614. Only 32% went to direct services , with much of the rest going to staff salaries, travel and transport, and film production. This is far from ideal for an issue which arguably needs action and aid, not awareness, and Charity Navigator rates their accountability 2/4 stars because they lack an external audit committee. But it goes way deeper than that. The group is in favour of direct military intervention, and their money supports the Ugandan government’s army and various other military forces. Still, the bulk of Invisible Children’s spending isn’t on supporting African militias, but on awareness and filmmaking. Which can be great, except that Foreign Affairs has claimed that Invisible Children (among others) “manipulates facts for strategic purposes, exaggerating the scale of LRA abductions and murders and emphasizing the LRA’s use of innocent children as soldiers, and portraying Kony — a brutal man, to be sure — as uniquely awful, a Kurtz-like embodiment of evil.” He’s certainly evil, but exaggeration and manipulation to capture the public eye is unproductive, unprofessional and dishonest.

image: Kony 2012 by BradBethellPhotography cclicensed via Flickr

Why you should not use Creative Common License If you care about views and money- extra credit activity-

Proabably most of people may have seen Creative Common License when they visited someone’s blog or websites.

Some people think that using that license could help protect your work from being copied by other people. If you want to earn money by writing blog post, you should not use  Creative Common License. Using Creative Common License may cause more copying!

What is creative common license?

A Creative Commons license allows creators to place conditions on their copyrights. Traditionally, copyrights restrict the rights of others from modifying or distributing copywritten works. Creative Commons licenses offer flexibility by allowing the creator (copyright holder) the ability to choose what limitations they want in place with respect to specific copywritten works.

Why creative common license can hurt you

Many people think that the presence of a Creative Commons license always means free to copy and use for any purpose. They throw their work open to the world to use around anywhere and everywhere without restriction. For example, if you uploaded your family picture on your blog with creative common license, other people who want to use the picture will be able to use it for any purpose.  I think that it is dangerous because they can use it in bad ways. Also, if you created wonderful computer program and showed it online with creative common license, using creative common license means that you can not earn money.

If you use creative common licensee for the purpose of sharing something which you made, it would be useful; however, if you care about money, you should not use it.

image: creative common by AJC1 cclicense via Flickr

Cyber Bullying – extra credit-

Have you ever heard the word which is called “Cyber Bulling”? The number of cyber bullying has been increasing because technology has developed dramatically, and people are able to access to the Internet easily.

 

What’s cyber bulling?

“Cyberbullying” is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyber-harassment or cyberstalking. Adult cyber-harassment or cyberstalking is never called cyberbullying.

What’s difference between offline behavior and online behavior?

Cyberbullying varies dramatically from offline bullying in many ways. For starters, the torment is no longer limited to face-to-face interactions in a controlled environment. It now carries over from the schoolyard, to the home, and the entire online community. Also, as mentioned above, bullies can come in all shapes and sizes, with either known or unknown identities. No longer is it about the one big bully picking on the smaller kid in the schoolyard. Anyone with an Internet connection of any kind can bully almost anyone else. Further, not only is cyber bullying more difficult to prevent, it can spread very quickly and leave a permanent online trail that can have devastating long-term consequences for both the bullied and the bully.

What should you do to deal with cyber bullying?

The first step is to stop responding to the cyber bully. Do not reply to emails, posts, IM’s or text messages. This is what the bully wants. They want you to engage with them. They want to manipulate you into responding. If you respond in any way that is emotional or lets them know that they are getting to you and are able to make you upset it only encourages the cyber bully. Bullies often suffer from low self-esteem and they want to feel better about themselves. Instead of doing something positive or succeeding at something or making a new friend a bully has learned to make themselves feel better by controlling, abusing and tearing down others. This gives them a sense of control and power they don’t have in their lives. Most bullies are actually quite weak and the same is true of cyber bullies. If you respond in a way that lets the bully know that you are angry, upset or afraid they will only be happy because they have managed to control your emotional state. Even if you do feel like that don’t give the cyber bully the satisfaction and encouragement by letting them know. It is especially important to not respond emotionally because this could make you send a reply that you might regret later. Messages sent on the internet are almost impossible to take back. If you lash back in anger you could find yourself the one who is being accused of being a cyber bully and the tables could be turned against you.

The most important thing is that parents need to be involved in their children’s online activities. Awareness is the key. Parents should keep open communication with thier children so they will feel comfortable enough to tell thier parents. They need to know that cyber bullying is not their fault.

image: cyb-bullying-hd by J_O_I_Dcclicensed via Flickr

 

Reflections on A Personal Cyberinfrastructure

After I read the article which is called A Personal Cyberinfrastructure by Gardner Campbell in my CIS0835 class, I found the video which is called “No Digital Facelifts: Thinking the Unthinkable About Open Educational Experiences” on YouTube.

I’ll reflect on Gardner Campbell’s idea by reacting some points.

What is Digital Facelift?

I interpret a digital facelift as adopting a new approach that has the potential to be innovative while one fails to take advantage of these new opportunities because such individuals are so entrenched in their old ways.

For example, some public school in America is failing in using new technology. there are several reasons why this is happning. One of reasons is that despite millions and millions of dollars spent on new learning technology, school had not achieved real improvements in teacher productivity or student achievement. I am very concerned with a limited number of teachers who are not entrenched in thier old ways.

What is LwICT?

Gardner Campbell shared three important recursive steps that educators and students can take to avoid having a digital facelift. These practices are steps that we as teachers normally carry out but they can be amplified using technology or our by infusion through our provincial Literacy with Information and Communication Technology (LwICT) continuum. There are 3 steps:

1)Narrating– Having both teachers and students “think out loud” as they tell the story of a particular subject area. For some this process might be similar to blogging.

2)Curating – How do you arrange your “progress portfolio” so that you can find resources and references quickly? True, students may choose to keep all their assignments in a traditional notebook. However, more and more students and teachers will begin using software applications to scan text and store data online for organizing and later retrieval.

3)Sharing – Constructive feedback from peers, together with a wider global audience, can motivate students in ways not possible in the traditional one dimensional student-teacher interaction. When students and teachers share their portfolios and resources online, everyone benefits through “leveraged learning”. Gardner quotes a colleague who states that “meaning happens when two people connect”.

What is good point of Personal Cyberinfrastructure?

Gardner Campbell’s proposal is that  first year university students should purchase their own domain name and start creating their life’s portfolio online.

The benefit of creating and reflecting through blogs in one’s own domain is that it creates a digital footprint which can be a powerful learning tool. One only has to look back at the various bench marks entries to witness the learning and connections that have been made as a student progresses through school. Writing and reflecting are a powerful way of synthesizing lessons and lecture information. Furthermore, online research together with RSS feed information can be blended into one’s online notes to add quality and perspective. University students who do this faithfully and share such resources through a PLN or study groups can create a formidable resource for completing assignments and studying for exams.

In conclusion, I think that teachers should learn more about the new technology before they introduce it to thier students. Also, they should welcome the opportunity to learn from, and with, thier students.

Season of Cherry Blossom!

I just took this picture near my neighborhood. It is so beautiful, so I just wanted to share this picture with many people!

From the late March through April and even into May, it is the season of “Sakura” (Cherry blossoms) in Japan. The cherry blossoms are in full bloom only for a few days. When the cherry blossoms are at their height, people view them in the mountains or in the parks. (hanami) Some people get together under the cherry blossoms in the park and enjoy not only viewing the blossoms but also eating and drinking.

I really want to go to hanami with my friends after final exams! 🙂

DS106: Comments For Kids

Tags

,

The Assignment

In the Writing Assignments, I found the assignment which is called Comments For Kids by Bill Genereux. This is the first time to do writing assignment. The assignemnt read: Visit the Student Blogging Challenge website. Click on the Participants menu to find a list of kid bloggers who are participating in the challenge. There are blogger children from many different countries all around the world. Find 3-5 young bloggers, visit their blogs, and offer them your encouragement. For ideas on what to say, see How to compose a quality comment, courtesy of Linda Yollis’ 3rd grade class in California. When you are finished, write a post on your own blog describing your experience. Who knows? You might give much needed encouragement and support at just the right time. You might even make a new friend!

The Process

First, I went to the website which is called Student Blogging Challenge. Then I saw the list of the participants and selected 3 young bloggers: Olivia,P, Kylie,B and Zoe,G. Then I visited thier blog and left some comments. The process is quite simple.

The Story

I did not know about Student Blloging Challenge before I did this assignment, so I’m ganna explain about  Student Blloging Challenge. The Student Blogging Challenge runs twice yearly.  A new Challenge starts March and September, each year. It is made up of a series of 10 weekly tasks all designed to improve blogging and commenting skills while connecting students with a global audience. The Challenge is open to both class blogs and to individual student bloggers from all over the world and of all ages. Miss Wyatt began blogging in January 2008.  She began with her own personal blog and developed a class blog in March.  By the end of April, most of her students had their own blogs and the class blog was getting less use. In September that same year, Sue Waters (editor of “The Edublogger”) and Miss W. ran a very successful international student blogging competition.  They had classes from 9 countries taking part involving about 500 students. It was so successful, that they ran another beginning March 2009.  This was a challenge though, not a competition. This time 15 countries were involved and a total of over 1000 students ranging from grade 2 classes through to students in senior school. When I know the concept of Student Blloging Challenge, it seems interesting because students would be able to express thier opinion through thier blog post and learn how to use computer-based technology. The reason why I chose these 3 young blogger is that they have almost same hobbies such as cooking, singing and playing sports.  One of the young bogger who I chose Olivia(8 years old) wrote a blog post about Michelle Obama. Also, she has been writing well about her daily life. When I was 8 years old, I did not know how to write blog. Kylie,B (8 years old) introduced her her art work that she did on computer without help. Zoe (8 years old) also has been wonderfully writing about her daily life. I was surprised that she knows how to use gadgets on her blog. These 3 young blogger try to communicate other bloggers and improve thier skill of bogging and commenting on others blog. I feel that this program is very helpful for children to acquire the skill of computer.

Fan Fiction Picture

Tags

,

The Assignment

This assignment is called Fan Fiction Picture byduncandonuts56. The assignment read: Take the name or title of your favorite band, song, movie, or tv show and display it in the form of photography. You can take as many pictures as you want, but have your photos capture the band, song, movie, or tv show you pick. Be creative and have fun!

The Process

For this assignment, I used Photoshop cs3. First, I went to Flickr to get images which I need for this assignment. I chose two images. Then I went to Photoshop sc3 and cut out the word from second image. After that, I pasted the image on the first image.

The Story

I decided to create this image because I was inspired by the song which is called Fearless by Taylor Swift. She is my one of favorite singer. This song is the first song of her album which is called Fearless  released on November 11, 2008. She mentioned  “FEARLESS is not the absence of fear. It’s not being completely unafraid. FEARLESS is having fears. FEARLESS is having doubts. Lots of them. To me, FEARLESS is living in spite of those things that scare you to death. FEARLESS is getting back up and fighting for what you want over and over again… even though every time you’ve tried before, you’ve lost. It’s FEARLESS to have faith that someday things will change.” I can relate to what she mentioned, so that’s why I chose this song. The reason that I chose the image which I used is that he seems “FEARLESS”.

images: Fearless by man’s pic cclicinsed via Flickr

              Fearless by Olivija Cepaite cclicensed via Flickr

DFPQ1

Assignment: Choose the sentence from the first five paragraphs of Gardner Campbell’s Personal Cyberinfrastructure essay that most appeals to you. Briefly describe how and why that sentence appeals to you (one or two paragraphs should suffice – unless you need more).

I read the article which is called A Personal Cyberinfrastructure by Gardner Cambell, so I’ m gonna write about my thought on it.

The sentence which I chose is “The ‘degital facelift’ helped higher education deny both the needs and the opportunities emerging with the new medium.”

I completely agree with his idea that degital improvement bring students into the environment with fear that they will be embarassed by thier lack of skill or challenged by thier unfamiliar innovations, because I felt the same. It is true that technology have improved dramatically. Students are able to get alot of information without going to library when they write an essay, and keep in touch with alot of people who live all over the world. Some social netwoking sites such as facebook and twitter are easy to use for people who do not have technical knowlege. However, it is hard to do well in class for students who do not understand frameworks such as HTML, FTP, and CSS. The facluty should teach their students the meaning of technical terms and give tutorials on how to use the formats. Also, Students do not keep up with the speed of the improvements of technmology. I personally think that early education in critical thinking is crucial to the future of our digital world. students need to focus on physical activity and learning through creative, hands-on tasks because computer skills and programs are so easy to pick up on, that the students don’t need to worry about them right now.