Digitalshadow.com

Digitalshadow.com is an alternate reality game. It is used to show you just how vulnerable your information is and how if you post your personal information it can be easily accessed. I logged into Facebook to use this and it displayed all of my personal information such as my age, who I am, who I care about, my potential stalkers, liabilities, obsessions, and scapegoats. It posted how they know what makes me tick and when i’m most vulnerable which was Monday nights because of my constant connectivity. It attempted to generate my password and posted photos of me that I was tagged in by my friends. I definitely believe that there might be a more powerful / better functioning example that is coded by professional data miners. If a website can show me this by the click of a button and display all of that information, there is no doubt in my mind that a professional would be able to dig even deeper. This goes to show how just because you set your profile to “private”, your information is definitely not private. This definitely opened my eyes and makes me think about deleting all of my social media profiles. As stated on the Digitalshadow.com website, “Your data casts a digital shadow that grows with every online interaction and can be tracked, monitored, and used against you. Every photo, every email, every purchase. Everything you’ve ever done in the digital world can follow you into the real world. Your actions leave you exposed.”

Sousveillance

When you post pictures and photos online, you are making it easier for someone to research you or someone you know. Once you post a picture online it is there for everyone to see. Usually it would be linked to your social media account where there would be more pictures and information about yourself. The better the picture is or the better you look in a picture could attract more people to your profile. Depending on who checks out your information could be dangerous. If you add a group picture of you and your friends and you tag them, their profile will also be able to be accessed. If someone is going for a job interview and I tag a picture of you partying, I could potentially be hurting your career. Once they have your names and pictures, they could do all sort searches  to find more about you. Once you put up a picture it could also be found other places than your page. One day I decided to google search myself and saw that there were pictures of me on Google images even though my profile was private. People could start a fake page and pretend they are you or even post it on an inappropriate site. It is very important to keep your social media profiles private and with little information revealing as possible.

With wearable technology such as Google glass, I believe there will be an increase in the crowdsourcing of surveillance. Google glass allows you to take pictures and record video without other knowing. Someone could be walking behind you in the street and watching/recording your every move. They then have the power to upload it or do what they please with it. Yes the same goes with an iPhone or any other camera but the Google glass is way more discreet. Plus many people do not even know what Google Glass is or does. I understand the government and others want to increase the amount of surveillance to catch criminals and terrorists but for innocent people I believe it is a total invasion of privacy. Nothing is private anymore. 

Globalization

Globalization is the process of worldwide integration through the interchange of world views, products, ideas, and other aspects of culture. Thomas L. Friedman analyzes globalization as the convergence of the personal computer and the human, focusing on the rise of software. Some of the benefits seen in Friedman’s book are informing and outsourcing. Informing is described by Friedman as the largest “flattener,” by the idea that all of the worlds knowledge is available to anyone and everyone. “The ability for individuals to use web-based search engines to find almost any kind of information they want is a total equalizer.” (KeyText: Seven Forces that Flatten the World. (n.d.). KeyText: Seven Forces that Flatten the World. Retrieved April 25, 2014, from https://clg.portalxm.com/library/keytext.cfm?keytext_id=35The other benefit, outsourcing, which allows manufacturing to be handled in the most efficient way. “Companies can not only outsource to other companies on the other side of the globe, but because of differences in time zone, are not limited to an eight hour work day.” (KeyText: Seven Forces that Flatten the World. (n.d.). KeyText: Seven Forces that Flatten the World. Retrieved April 25, 2014, from https://clg.portalxm.com/library/keytext.cfm?keytext_id=35Friedman makes both of these benefits arguably needed for the power of globalization.

Though there are many benefits, there are equally as many problems. Uploading and “The Steroids” are both poisonous aspects of globalization according to Friedman. He considers the phenomenon of uploading to be the most disruptive force of all. “According to Friedman, almost anyone (for instance, a teenager with a video phone, a computer and internet connection in his basement) can create content that may be read by billions of people world wide.” (Thomas Friedman Says: The World Is Flat. (n.d.). HubPages. Retrieved April 25, 2014, from http://doinasaur.hubpages.com/hub/Thomas-Friedman-Says-The-World-Is-FlatThis allows even false information to be seen worldwide. Along with this theme of false information, “The Steroids” problem of globalization increases the speed and capacity of other flatteners, which can also increase faulty communication. Information, images and other media can be manipulated therefore causing many problems in the globalization world.

 

Private Information

I believe organizations should have the responsibility to report any digital security failures to the public. “It was said that the NSA knew about a “Heartbleed Bug” for at least two years and regularly used the flaw to gather critical information. The NSA left consumers exposed to one of the worst bugs to ever hit the internet, which effects two thirds of websites.”(What and When Did NSA Know About Heartbleed Bug?: Video. (n.d.). Bloomberg.com. Retrieved , from http://www.bloomberg.com/video/what-and-when-did-nsa-know-about-heartbleed-bug-CcNm~m5ZSzC9GWx4na6L2Q.html) I understand that the NSA wants to uncover information to stop criminals and terrorists, but this is a total invasion of privacy on people who did nothing wrong. For two years people were unaware that their private information was being accessed, when they should have been notified right away.

I, as a consumer, believe that I 100 percent have the right to know if my private information has been accessed. If consumers are not notified of this, information could be leaked or shared that could potentially ruin their career or reputation. If we are aware there has been a breach, we could take precaution and delete the information or try to get to the bottom of it. There is no way that people should not be alerted if private information has been accessed. However, if it was truly private information that you wanted absolutely no one to see, you should not put it on the internet in the first place. According to Mashable, if you use any of the following, it is on the “Heartbleed Hit List” and you should change your password right away : Facebook, Instagram, Pinterest, Tumblr, Gmail, Yahoo Mail, Etsy, Netflix, and Youtube. (The Heartbleed Hit List: The Passwords You Need to Change Right Now. (n.d.). Mashable. Retrieved , from http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/)

I am definitely less likely to shop online now that I know how potentially vulnerable my information is and that companies may not always share when my information has been compromised. For me to change my opinion, I would need to be assured that none of my information would ever be accessed. It is private for a reason. I should not have to halt the convenience of shopping online because I am worried that my address and credit card information could be released. However, if for any reason my information had to be accessed, I wish to be alerted right away.

Illegal Downloading

“Illegal downloading… regards to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer.” (Quick Guide to Illegal Downloading. (n.d.). Illegal Downloading. Retrieved April 10, 2014, from http://entertainment.laws.com/illegal-downloading entertainment.laws.com/illegal-downloading) That being said, illegal downloading is certainly not a victimless crime. When this act occurs, the owner of the copyrighted material receives no compensation for their work. How would you feel if you came up with something so great and got no credit or reward from it? For example, a plethora of people download music for free off of sites such as Lime Wire and Frost Wire. By doing this, you aren’t supporting your favorite artist who took the time and effort to come out with the song, If the artists profit continues to go on a downwards spiral, he/she will be less motivated to create new work. “Just because the download happens quickly and with ease doesn’t mean there isn’t a victim.” (Illegal Downloading Victimless Crime. (n.d.). by Leigh Goessl. Retrieved April 8, 2014, from http://www.insidetechnology360.com/index.php/illegal-downloading-victimless-crime-20385/ insidetechnology360.com) Its a shame these people work hard at what they do and get nothing in return.

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf
Illegal Downloading, which includes network file-sharing – as well as a variety of additional means unlawful, unauthorized transmission of digital, copyrighted media and intellectual property exist with regard to the unlawful possession of intellectual property belonging to another individual or entity through the use of a computer. – See more at: http://entertainment.laws.com/illegal-downloading#sthash.aRVYlGLu.dpuf

 

Illegal downloading is equivalent to stealing because it includes taking property from someone else, without their permission. The only difference is, the crime is happening over the internet instead of actually slipping something into your pocket. It just happens to be harder to get caught over the web than in person. In my opinion the biggest reason people illegally download music is because they say they don’t have enough money to buy all the songs they want. However, with any other purchase in life, if we don’t have the money for it, we cant purchase it until we receive some income. What makes this situation so different?  I believe not many people see this as a form of stealing because so many individuals in fact do this, that it’s almost a norm now. Just because everyone is doing this doesn’t make it right; and sure doesn’t make it legal.

MOOC

A MOOC is an open online class which is available to anyone. “Administrators from dozens of top universities and colleges are scrambling to get on the MOOC train. No wonder; a third of them they think that MOOCs will eventually replace residential campuses.” (Marcus, J. (2013, September 12). Mooks keep getting bigger. but do they work?. Retrieved from http://hechingerreport.org/content/moocs-keep-getting-bigger-but-do-they-work_12960/) “Amid all this rush, no one really knows yet how much people learn in a MOOC. What research does exist shows that the success rate of online education, in general, is poor. And one high-profile experiment with MOOC-style teaching in particular has ended in disappointment.” (Marcus, 2013) A lot of the time students need face to face interactions from a professor or demonstrations. Hands on learning is proven to enhance knowledge better than individually teaching yourself. However, I found CodeAcademy extremely helpful and will continue to use it. Online courses like that is helpful to me because you control the pace. Many times the professor teaches fast and you miss information or don’t understand a topic.

“Sebastian Thurn, founder of Udacity the MOOC provider that started MOOC mania two years ago states that MOOCs are not an effective modality for teaching undergraduate students after all.” (Sebastian thrun: Moocs not effective for undergraduate education after all…. (2013, November 18). Retrieved from http://onlinelearninginsights.wordpress.com/2013/11/18/sebastian-thrun-moocs-not-effective-for-undergraduate-education-after-all/) During the time he founded Udacity, he believed that MOOC’s would turn into universities and change the 21st century. He believed that he found a “magic formula” for education. Now, after much research and testing, the results were not as good as he hoped. He recently stated,  “I’d aspired to give people a profound education–to teach them something substantial, but the data was at odds with this idea.” (“Sebastian thrun: Moocs,” 2013)