Group G

From WikiEducator
Jump to: navigation, search

CIS 2 - Fall 2013

Road Works.svg Work in progress, expect frequent changes. Help and feedback is welcome. See discussion page. Road Works.svg
Workspace for Final Project collaboration and publication. Includes link lists for each group member and the final group recommendations for each topic, along with descriptions as outlined in the assignment.

Best resources - Group G

student 1

Topic 1 : Introductions

I really enjoyed the Vark Learning style quiz which was pretty right on the dot for me. In taking the quiz it also made me a little more aware to stay focused on how I learn and work best so that I get the most out of this class.

http://www.vark-learn.com/english/page.asp?p=visual

I also like the what color is your brain quiz. I think starting off with the personal assements and these quiz's was a great way to start this course. Both these quiz's were right on for me.

http://www.truecolorscareer.com/quiz.asp

I also like the web media on the 20 basic rules for how to conduct yourself online. Also I had never heard of or even thought about digital citizenship really and so this was very very helpful for me

http://www.teachthought.com/technology/20-basic-rules-for-digital-citizenship/

Topic 2: Privacy and Freedom of Speech

This audio recording of Jon Xavier, digital producer at Silicon Valley Business Journal, gives suggestions on how to make your private information more private and secure. The idea to you the private search engine start page, duck duck go was cool because their are no tracking of information you search. So the government cant go and ask them for information on users.

http://www.sciencefriday.com/segment/07/12/2013/protecting-your-online-privacy.html

The selected media which was a link to duck duck go website was awesome to have and I use it normally now. Why would we not use this private search engines and why are we empowering google everyday giving up our privacy and security when we dont have to. Its as if since we are use to google and its easy and we know it we are willing to give up our privacy and security which is ridiculous.

https://duckduckgo.com/

The video of Cybercrime expert Mikko Hypponen and the three types of cybercrime attacks we should be aware of was very informative. It was interesting that Germany required people with typewritters to register with the government. The US did not believe this and thought it violated our ammendment rights. However really today when you but a printer when you print up there are certain images etc. that track it to your printer. So we are still bring tracked and loosing our ammendment rights. No one seems to care or pay attention to it though.

http://blog.ted.com/2012/01/18/three-types-of-online-attack-mikko-hypponen-on-ted-com/

[[==student 2==

1. Introductions

http://cyberlaw.stanford.edu/about-us

The Center for Internet and Society (CIS) is a public interest technology law and policy program at Stanford Law School.

http://www.law.stanford.edu/organizations/programs-and-centers/center-for-internet-and-society

CIS Center for Internet and Society brings together scholars, academics, legislators, students, programmers, security researchers, and scientists to study the interaction of new technologies and the law. 

http://iml.jou.ufl.edu/projects/STUDENTS/Purdy/INDEX.HTM

The following article has a vast variety of website and articles that can offer tons of information of how the internet has impacted society has affected today population.

2. Privacy and Freedom of Speech

ftp://ftp.research.microsoft.com/pub/debull/A09mar/bertino.pdf

The paper discusses about the digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties

http://topics.nytimes.com/top/reference/timestopics/subjects/f/freedom_of_speech_and_expression/

This was an article writing by the New York Time some time ago talks about a topic that gets many of us attention when is brough to the table for debate (freedom of speech) online.

3. Intellectual Property

http://www.nadin.ws/archives/352

Base on the article I found I realize that not only a computer is just another tool to help the artist make art and perfectionized it but I found out that the computer is also creating a new generation of artist not just the one that make paint and write poet by also the new generation of artis that is expanding art to a new level.

http://www.wipo.int/portal/en/index.html

WIPO is a new global online market place that seeks to accelerate the innovation and diffusion of green technologies to address climate change in the world.

http://www.csoonline.com/article/204600/intellectual-property-protection-the-basics

Intellectual property (IP) can be anything from a particular manufacturing process to plans for a product launch, a trade secret like a chemical formula, or a list of the countries in which your patents are registered.

4. Crime

http://www.fbi.gov/about-us/investigate/cyber

The page i found was all based on how the FBI track and prevents Cyber Crime also it mentions ways to prevented crime on the web as well as tool to help citizens be more aware of the types of crimes involved around the country and over seas

http://www.computerweekly.com/news/2240174301/Top-10-cyber-crime-stories-of-2012

This was an article writing from computerweekley.com and it talks about Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists.

http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime

The global nature of the Internet has allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace

5. Employment, Education and Entertainment

http://www.abed.org.br/congresso2011/cd/ing/48.pdf

The text refers to the importance of practical internship in its essence and particularly when developed as distance education

http://www.westga.edu/~distance/ojdla/summer42/bower42.html

This article talks about long distance learning isa ll about and how is will be come the most if not the only way to attend school in a near future.

http://www.expresspros.com/us/trends/2013/09/

This page talks about the most common factor that employers look on a future candidate when it come to the online hiring program.

6. Millennium Development Goals

1. Innovation in sexually transmitted disease and HIV prevention: Internet and mobile phone delivery vehicles for global diffusion

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2881840/ This article talks about how the internet and mobil devices play a major role when it comes to technology helping information to be spread and deliver information about diseases

2. http://www.thelancet.com/journals/lancet/article/PIIS0140-6736(10)61997-6/fulltext

In this case the subject talks how the apps where used in Kenya to execute the spread of knowlege among each other with the help of a smart phone as a tool of visual information device.

3. Setting the stage for equity-sensitive monitoring of the maternal and child health Millennium Development Goals

http://www.scielosp.org/scielo.php?pid=S004296862006000700013&script=sci_arttext&tlng=e in this article the author talks about all base on how important it is to create and maintain some source of sensor that could help to measured and advance when it come to countries around the world where technology is limited and this is all done with the final purpose of keeping track of deceases and to help communities get informed about the subjects.

7. Evaluating and Controlling Technology

http://research.microsoft.com/pubs/162286/galaxyZoo.pdf

The article talks how the world gets to be better by convening machines with humans and how they or we can help each other in making a better tomorrow, kind of like a sci-fi movie.

http://www.fsnnetwork.org/sites/default/files/outils.en_.pdf

subject talks on how Methods, Meeting Places and Tools presents a selection of easy ways to help you have better access to the knowledge you need to do your work.

http://www.cs.sunysb.edu/~tashbook/spring2012/cse312/312-07-evaluating-tech.pdf

the subject talks about legal social and ethical issues involved on information services.

8. Risks, Failures and Responsibilities

http://www.bgsu.edu/downloads/cio/file17752.pdf

This article deals with ethics in the use of computers and emphasizes the Netiquette which are a set of rules and regulations that must be taken into account people to access the Internet or social networks.

https://ritdml.rit.edu/bitstream/handle/1850/14392/JTuArticle10-2011.pdf?sequence=1

This article is about the importance of computers and the Internet is growing in our society, now people can experience negative emotions or expected interactions with computers, as people are tending to strive every day more for a new software adjusters and hardware.it also talks about the emotions and dependencies that can cause in people using computers and that every day more people are forced to use such equipment constant mind.

http://cqpi.engr.wisc.edu/system/files/IEA.pdf

This article describes the different types of deliberate and mechanisms associated violations committed by security administrators and network information and end-users.

9. Anytime, Anywhere

http://www.edutopia.org/stw-online-learning-overview-video

It shows how K-12 students and teachers from across the country are using virtual technology to create enhancements to their learning experiences and new success in their lives.

http://www.wise-qatar.org/content/34-learning-anytime-anywhere

Is a video that shows how Blended learning is about learning anytime, anywhere, at any level. It requires a rethinking of the skills that are most important for “learning to learn” in different contexts.

10. Technology Advances, Social Trends

http://www.mckinsey.com/insights/business_technology/disruptive_technologies

Disruptive technologies: Advances that will transform life, business, and the global economy, a report from the McKinsey Global Institute, cuts through the noise and identifies 12 technologies that could drive truly massive economic transformations and disruptions in the coming years

http://www.nbcnews.com/id/9548204/

Is a video from a local news station based on an article that talks how Someday, swarms of satellites the size of a tissue box will be snapping pictures, taking environmental readings and broadcasting messages from orbit — but the entities controlling those satellites won't be governments.

http://www.gallup.com/tag/Religion%2Band%2BSocial%2BTrends.aspx

This article is about how religion and social trend are being mix and the effects that it cause. ]]Link title

Blanca Gonzales

1. Introductions

http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet This article explains a little about how the internet and the concept of being connected to each other through the use of the internet all got started.

http://www.pewtrusts.org/our_work_category.aspx?id=48 This website has some links to the Pew Charitable Trusts' involvement in the studies of how computers and the internet interact with society and how society interacts with computers and the internet.

http://wiki.answers.com/Q/Describe_the_impact_of_computers_and_internet_on_society#slide1 This is a link to many different articles about how the internet and computers have impacted society.

2. Privacy and Freedom of Speech

http://www.law.cornell.edu/constitution/fourth_amendment This is a link to Cornell University Law School's website with what the Fourth Amendment is.

http://www.law.cornell.edu/wex/first_amendment This link is to the Cornell University Law School's website with the First Amendment and Constitution.

http://www.law.nyu.edu/news/CHRGJ-Just-Security-co-sponsor-event-on-surveillance-privacy-freedom-of-expression This link is to an article that talks about how there is potential for surveillance programs and the involvement of the NSA to infringe on people's right to privacy and freedom of speech.

3.Intellectual Property

http://articles.latimes.com/2013/may/21/business/la-fi-tn-facebook-eminem-copyright-infringement-lawsuit-20130521 This is a brief article that talks about how Facebook used a song from the artist Eminem and was being sued for copyright infringement.

http://www.nolo.com/legal-encyclopedia/fair-use-rule-copyright-material-30100.html This website explains the "Fair Use" concept of someone's property and when it's acceptable.

http://www.thefreedictionary.com/sharing This is a link to the definition of sharing.

4.Crime

http://www.newscientist.com/article/dn23981-bradley-manning-and-hacker-madness-scare-tactic.html#.UmN0nxCgeHs This is a link to an article about the computer hacker Bradley Manning who leaked 700,000 government documents to WikiLeaks.

http://catless.ncl.ac.uk/Risks/26.02.html#subj8 This article shows how an Israeli soldier leaked government documents to a reporter with only "minor" policy violations which lead to a "major leak".

http://www.rogerdarlington.me.uk/crimeonthenet.html This is a link to a website that lists the various types of crime using computers and the internet.

5.Employment, Education, and Entertainment

http://jayisgames.com/archives/2012/04/achievement_unlocked_3.php This link is to some free to play games that you can access on the internet. This link goes directly to a game called Achievement Unlocked 3 where your goal is to unlock as many achievements as possible while you complete your missions.

http://wikieducator.org/Empire_State_College/SUNY_Empire_State_College_Joins_OERu_and_Establishes_Presence_on_OERu_Wiki This link takes you to a wiki page where it shows an organization that works on projects to make free open education available to people.

http://www.knewton.com/flipped-classroom/ This is a link to a website that explains the concept of a "flipped classroom" and how it works.

6.Midterm- Millennial Development Goals (Achieving Universal Primary Education)

http://www.tigweb.org/youth-media/panorama/article.html?ContentID=2122 This link takes you to a website that talks about the work that the organization Panorama does to make universal primary education a reality for people in developing countries.

http://www.col.org/resources/speeches/2009presentation/Pages/2009-06-CMRB.aspx The group, Commonwealth of Learning, is an organization that works to provide people with eLearning. eLearning is just using a computer or electronic device to educate yourself or others.

http://www.ednetinsight.com/news-alerts/voice-from-the-field/educational-technology-for-the-developing-world.html EdNET Insight shows some of the work that is being done with the use of certain technologies to help further the education of people in developing countries like Senegal, West Africa.

7.Evaluating and Controlling Technology

http://phet.colorado.edu/en/simulations/category/new This is a link to a website where there are interactive simulations for learning math and different sciences, such as physics and chemistry.

http://creativerss.wordpress.com/2013/02/03/knowledge-sharing-complete-guide-to-create-a-knowledge-sharing-culture/ This article explains what knowledge sharing is and how to appropriately handle knowledge sharing responsibilities.

http://www.huffingtonpost.com/elisha-goldstein-phd/technology-vs-humans-whos_b_812305.html This article asks the question if technology is controlling people or if technology is being controlled by people.

8.Risks, Failures, and Responsibilities

http://www.acpinternist.org/archives/2013/11/dr-google.htm This is a link to an article that talks about how a person could go about using technology to analyze their physical health and how, by doing that, they help their doctors to better treat whatever might be wrong with someone's health.

http://www.cnn.com/2008/BUSINESS/09/25/digital.ethics/ This article talks about the use of technology and how to go about using technology in an ethical manner.

http://en.wikipedia.org/wiki/Portal:Biology This page is a wiki page that was created to explain and teach what biology is.

9.Anytime, Anywhere

http://tech.fortune.cnn.com/tag/mobile-games/ This article talks about how games are replacing television and movies as media entertainment of choice.

http://www.ted.com/talks/patricia_kuhl_the_linguistic_genius_of_babies.html This is a link to an example of how you can use computers and the internet to further your education using video lectures.

http://www.washingtonmonthly.com/ This link takes you to a website that keeps you up to date with what's going on in politics.

10.Technology Advances, Social Trends

http://www.literacybridge.org/?utm_source=wordfly&utm_medium=email&utm_campaign=TechAwardsNewsletter2012ENVandED&utm_content=version_A This is a link to a website where an organization is working to bridge the gap of illiteracy in developing countries.

http://jobs.aol.com/articles/2013/03/20/technology-career-trends-opportunities/ This link is to an article that talks about a few of the trends in technology that are creating and "transforming" careers working with technology.

http://xroads.virginia.edu/~MA99/grogan/thesis/Timeline2.html This website gives a timeline of certain technologies that have reshaped the way people live starting in 1752 to modern day times. The list is limited and doesn't show all of the various types of technology from the beginning of mankind's existence, but shows how we went from discovering how to get electricity in 1752 to 1972 pedal-powered aircraft.



Student 4

Introductions
http://www.davesite.com/webstation/net-history.shtml
This timeline is split into five separate sections.


Privacy and Freedom of Speech
http://www.fiercegovernmentit.com/story/privacy-and-freedom-expression-cant-always-coexist/2012-11-13
Defining harms suffered from violations of intellectual privacy in First Amendment terms could also open the door to lawsuits against federal surveillance programs that struggle for standing when framed as a Fourth Amendment challenge, since First Amendment doctrine permits "facial challenges to all types of things," Richards said.
http://www.abine.com/blog/2013/why-the-loss-of-online-privacy-will-kill-free-speech/
This article shows author’s point of freedom of speech as a lawyer. Just because DNT could impact the advertising industry in the short-term, however, doesn’t warrant its intense broadcasting of fear, uncertainty and doubt (FUD), and at times, outright deception. Frankels’s piece was one in a string of ad exec attacks on privacy that claim that the Internet will be doomed if consumers get more of the privacy they want.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1520111

This PDF shows some drastic detail of this point. Much of Internet-related scholarship over the past ten years has focused on the enormous benefits that come from eliminating intermediaries and allowing user generated one-to-many (one person to many people) communications. Many commentators have noted the tension created between the positive benefits for free speech and the negative effects on user privacy.

Intellectual Property
http://www.wipo.int/about-ip/en/index.html

This article shows how intellectual property works for people’s life.Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
http://money.cnn.com/2013/10/17/technology/online-privacy/
This article shows different points of this point and Even the Internet-within-the-Internet called the Tor network -- the most secretive way to browse the Web -- is being monitored by the National Security Agency.
http://www.wired.com/insights/2013/10/internet-privacy-and-security-a-shared-responsibility/
The benefits of the Web have, of course, come at some cost, one of which is a loss of privacy. We are also more vulnerable to data breaches and identity fraud. But there are many things we can do to minimize the risks of both.


Crime


http://www.drj.com/drworld/content/w1_078.htm
This article gives very detailed information of computer crime. The destruction caused by a natural disaster is readily apparent after it has occurred. However, computer crime could occur for an extended period of time before discovery, causing significant damages and losses.
http://idiva.com/news-work-life/12-ways-to-protect-yourself-from-cyber-crime/21449
This article describes various techniques for preventing and detecting computer crime related disasters.The effectiveness of many internal control procedures is dependent upon the activities of responsible personnel. For this reason, a well-planned and properly functioning organization is an important factor in any system of internal control. An effective plan of organization should provide for segregation of functions and responsibilities so that no one person has incompatible duties which would permit the perpetration and concealment of material errors or irregularities.
http://www.lectlaw.com/files/cri14.htm
This article gives the examples and details of all types of internet crime.Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information


Employment, Education and Entertainment

http://www.edutopia.org/blog/how-teachers-use-technology-mary-beth-hertz
I like this video. This video introduces how teachers use technology to work for students now which I think is ralated to the topic
http://onlinelibrary.wiley.com/doi/10.1046/j.1525-1446.2000.00178.x/abstract;jsessionid=A1A6399607126FA20F5B2F7B933D7963.f02t01?deniedAccessCustomisedMessage=&userIsAuthenticated=false#b2
I search this on the internet" Although the regulations of the Americans with Disabilities Act (ADA) of 1990 were phased in by 1992, monitoring and enforcement continue to be problematic. This study of three large shopping centers in the Southwest included one mall that was opened in the mid-1990s, and two malls that were constructed prior to the law (but have undergone recent renovations)."

Midterm - Millennium Development Goals


http://www.youtube.com/watch?v=bPTGWGoGMW4
This video shows the important of achieving universal primary education. In all regions, inequalities in access to education continue to pose major barriers to fully attaining the Millennium Development Goal (MDG) 2 target of ensuring that, by 2015, children everywhere, boys and girls alike, can complete a full course of primary schooling.
This video shows the importance of fighting HIV/AIDS, malaria and other diseases.
http://www.youtube.com/watch?v=A_MF7OZ3wv8
As it told us, this progress has not yet been enough, however, to reverse the trajectory of the epidemic, because interventions for prevention and treatment often fall short in coverage: for every two people starting antiretroviral treatment, there are five new HIV infections. Prevention has not received sufficient priority.

http://www.theguardian.com/global-development/poverty-matters/2012/oct/31/millennium-development-goals-key-datasets
This website shows us the different of MDG and especially of the education. They gives some details of it.

Evaluating and Controlling Technology


http://ase.tufts.edu/devtech/courses/readings/BersLynchChau.pdf
This article show the positive of evaluating and controlling technology.
Too often youth experiences with technology are framed in negative terms (e.g., cyberbullying, sexual predation, invasion of privacy, addiction to videogames or MMOGs).

http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/nist800-30.pdf
This article shows some risk of this kind of technology
http://www.youtube.com/watch?v=mn_9YHV2RGQ
This video shows the different point.
Guest editor Katina Michael at the University of Wollongong discusses how we can live with many of the uncertainties of big data for now, with the hope that its benefits will outweigh its harms, but we shouldnít blind ourselves to the possible irreversibility of changes--whether good or bad--to society.



Risks, Failures and Responsibilities


http://www.chinahush.com/2010/10/31/360-vs-qq-you-steal-private-information-oh-yeah-your-wealthy-ceo-cheats-housing-allowance/
This is a real fight between two of China’s most successful .com companies take their long grudge towards each other to the public. One party is Tencent, whose instant messenger QQ enjoys 612.5 million active users. The other party is 360, an Internet security service provider whose “360 safeguard” came to be China’s No.1 security software within the first year after launch.Oct 11th, 360 released China’s first “privacy protection white paper” to account for its recent new software “360 privacy protector”. 4 hours later, Tencent declared in the name of “QQ product team” that 360 was discrediting QQ, and unprecedentedly push the message to its 100 million online QQ users through pop-outs. The fight leads to Tencent prosecuting 360 in form for unfair competition.
http://www.scmp.com/news/china/article/1316598/exclusive-china-lift-ban-facebook-only-within-shanghai-free-trade-zone?page=all
This is the artcile about blocking facebook in China and some people regard this as "The state controlled media that supports the government 100% then begins to feed the masses with all sorts of stories about how the government is good and only wants to help. That the dissidents, are a danger to the country because they question the wisdom of the government. "
http://www.youtube.com/watch?v=kgCNGvL0g1g
his video explain how internet safety is important to everyone now.

Anytime, Anywhere


http://mybroadband.co.za/news/business/28634-mobile-money-transfers-who-to-choose.html
This article shows how ewallet works for people and actually it is a kind of convenient way for people to manage their money instand of going to bank at all.
GOOD: easy to learn
BAD not very specific
http://www.thegatesnotes.com/

One of the world’s most impactful leaders of business and philanthropy in the shares his personal notes, observations and learnings.

Technology Advances, Social Trends


http://features.clemson.edu/creative-services/faculty/2013/jerry-tessendorf-water-simulation-software-has-major-impact-on-film-industry/
Jerry Tessendorf’s water simulation software has major impact on film industry.
Tessendorf’s work with this type of software began during his days in the defense contracting industry where he developed tools for creating a natural environment simulation specifically of the ocean.
The tools he developed became widely used in filmmaking. In fact, his software was used in films such asWaterworld, Titanic and Django Unchained.

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=5196047
Business intelligence (BI) can be defined as a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions.

http://social.jrank.org/pages/156/Computers.html
This article shows some different points of the future of computer. Computers are ubiquitous. As computers have become less expensive they have been purchased by more and more families for their homes. Because of this, many children begin to use computers at an early age. Even if computers are not available in their home, children almost certainly will begin to come into contact with computers in school.