User:Vtaylor/Computers and Society/CIS2 Summer 2018/Group 3
Contributors
- for each person, next to your name, provide a link to your personal lists on your own WikiEducator user page
Project Groups discussion - Group 3
- Marvin Buruca Canales https://wikieducator.org/User:MarvinBuruca
- Alexandro Carrasco https://wikieducator.org/User:Crrsclx
- Tony Isidro
- Jenny Liu
- David Owens https://wikieducator.org/User:Dwocjo
- Luis Prieto
- Saurabhjit Singh http://wikieducator.org/User:Saurabhjit_Singh?1
- Ryan Thompson https://wikieducator.org/User:Ryanthompson85
- Jeonghyeon Yu https://wikieducator.org/User:JHyu
Contents
- 1 Group 3 "Best" resources
- 1.1 1. Introductions
- 1.2 2. Privacy and Freedom of Speech
- 1.3 3. Intellectual Property
- 1.4 4. Crime
- 1.5 5. Employment, Education and Entertainment
- 1.6 6. Midterm - Grand Challenges
- 1.7 7. Evaluating and Controlling Technology
- 1.8 8. Risks, Failures and Responsibilities
- 1.9 9. Anytime, Anywhere
- 1.10 10. Technology Advances, Social Trends
Group 3 "Best" resources
1. Introductions
Where are technologies now? Computer science benefits society by solving problems, improving solutions, and protecting people, ect. It has been positively impacting every area of society for real, nonetheless, I still have some concerns regarding something that technology has brought to the world. Since it cause some health problems. Additionally, Being overly connected with the internet can cause psychological issues such as distraction, narcissism, expectation of instant gratification, and even depression. Beside use of technology can also have negative repercussions on physical healthy causing vision problems, hearing loss, and neck strain. My question is how are we going to solve these problems? How we can use technology properly. I strongly believe that we must be wondering how we can use technology and how we can protect us from problems that might be caused by technology? http://www.pewinternet.org/2017/06/06/the-internet-of-things-connectivity-binge-what-are-the-implications/
This online article informs me that there are wide concern about cyber attacks, outages and privacy violations, nonetheless the Internet will continue linking people to valuable resources, services and opportunities. "Best" (Jeonghyeon Yu)
2. Privacy and Freedom of Speech
https://fieldguide.gizmodo.com/heres-all-the-data-collected-from-you-as-you-browse-the-1820779304 This article talks about data collection. It mentions how people are watching you and who is watching you and what can be done about it. When you open a browser you leave personal information of yourself. Sites you go to can track where you go online and what you do online. It can find out your location what device you are currently using. When you go to a site your IP address is recorded. This may result in same sites giving you the same advertisements. Some sites have cookies which are actually files used to identify you. Cookies can take data from you. There are ways you can try to prevent information leaks. This article gives you suggestion on how to stay safe. (Saurabhjit Singh)
https://www.rdmag.com/news/2015/10/computer-security-and-privacy-benefits-and-risks-internet-things
A person needs to feel safe in a location. Information shared with visiting sites, how the information is being used and who it is being shared with is Privacy. This information should not be used to track me or cause me unnecessary spam emails, phone calls and text messages. This article gives information on not only personal information attacks, but car hackers who could remotely control the brakes, door locks and other function of your car. There is info on a tool called ShareMeNot which could detect and block online advertising and embedded content that used to track you without your permission.
This article was chosen because it give information on personal information attacks and a tool which could detect and block online advertising and embedded content that is used to track you.( David Owens)
3. Intellectual Property
Technology is what makes this world work. It has had an impact on earth. Art at first was just paintings on canvas as we all know. Over time technology has improved and now we have digital art. There are cameras, which can take black and white photos and videos. As time has passed there are now cameras that can take pictures and record videos with color. There are digital editing softwares such as photoshop. Anyone with the proper equipment and knowledge can be a good computer artist. Even though people still paint on a canvas these days technology has been replacing it. Technology makes photos, which is in high quality. They have become more advanced that even smartphones, tablets and laptops have small high quality built in cameras, which can take pictures with different filters and record videos using different filters. These are known as digital pictures due to using technology than hand drawn pictures. (Saurabhjit Singh)
https://smallbusiness.findlaw.com/intellectual-property/what-is-copyright.html
The copyright article talks about what is copyright, copyright owner’s right, copyright protection, registering your copyright, copyright protection. The definition given is "a person's exclusive right to reproduce, publish, or sell his or her original work of authorship (as a literary, musical, dramatic, artistic, or architectural work)." One such example is an author’s ideas and work made by him/her so copyright is used to protect that work. This prevents other people from copying the creations. The USA copyright law protects the work so people don’t steal them. I selected this article because it discusses copyright thoroughly. (Saurabhjit Singh)
The piracy article talks about Internet piracy, which is illegal, download of music, movies, games and more. This contains copyright material. It results in companies profit loss due to people getting their stuff for free online. Piracy involves risk of receiving viruses entering your computer and other devices that you could download music and other stuff to other devices. One example is the website Pirate Bay which has a very large amount of copyright material for anyone to take. Even after multiple attempts to take it down it can’t be removed from the internet. I selected this article because it goes in detail of what is Internet piracy. (Saurabhjit Singh)
https://www.quora.com/How-does-technology-affect-art The Impact of Digital Technology on Art and Artists
This website was chosen because it reminds us how technology has altered the way we visualize arts. Even though the internet is a way artist can now reach a larger audience it has somewhat taken away the use of paint and canvas.(David Owens)
4. Crime
Being hacked is a very serious problem these days. People can lose everything they have in their accounts. There are ways to try to log back into your account. First before an account is hacked change passwords regularly. Don’t have the same password for multiple accounts. Make the password complicated by having a mix of capital and lowercase letters and have number and symbols. On a regular basis scan your computer for spyware and malware. Sometimes they can get in your computer from being online and click on something you shouldn’t click on. If your email is hacked you would need to call the company to re login if recovery email and phone number doesn’t work. (Saurabhjit Singh)
http://catless.ncl.ac.uk/Risks/22/02#subj16%20
Computer Forensics
This is goes in detail of what is forensics and what they do. Once they have clues they can find out who are the intruders. They gather evidence at a crime scene and can figure out who the actual criminal is. They have to do DNA tests sometimes to find the culprit. (Saurabhjit Singh)
https://www.preyproject.com/en/blog/my-computer-was-hacked-3-things-you-should-do-immediately
There are three things that should be done immediately if your computer is hacked 1. Change your passwords-- Make it at least 12 characters. Change password to every service you have access that holds important information. 2. Quarantine your PC- disconnect from your Network 3. Spread the Word--try not to infect others
Be Ready Protect your Devices and turn off computer when not in use. Save files on portable HDDs.
This site was chosen because it explains and list actions that should be performed immediately after you have determine: "My computer has been hacked." (David Owens)
5. Employment, Education and Entertainment
http://daringtolivefully.com/creativity-tools
Creativity Tools: 24 Free Online Creative Thinking Tools
This website gives 24 creative thinking tools and gives description of them. It also has links to the creativity tools so you can get a better understanding. The websites from the links of the creative tools look relevant. These does show me how to be creative. (Saurabhjit Singh)
https://www.fastcompany.com/3036796/3-first-steps-for-collaborating-on-creative-projects
3 First Steps For Collaboration On Creative Projects
This website talks about collaboration on creative projects. The first step is Leave Egos At The Door. The second step is Make A Ridicule-Less Promise. The third step and final is Once Around The Table. When it comes to working with others you all need to agree on what you are doing. Everyone has to do their part. Listen to everyone’s ideas. (Saurabhjit Singh)
https://www.thebalancecareers.com/promote-creative-thinking-1918766
10 Tips to Promote Your Creative Thinking. This website gives tips on how to promote your own creativity and innovation. These tips can come in handy later. It also talks about what Bill Gates(founder of Microsoft) did to get his creative ideas. He did listen to his employees ideas and took time to read all of them. (Saurabhjit Singh)
6. Midterm - Grand Challenges
https://www.csmonitor.com/World/Making-a-difference/Change-Agent/2012/0905/Six-solutions-to-lifting-the-world-s-farm-workers-out-of-poverty https://foreignpolicy.com/2018/01/08/chinas-war-on-poverty-could-hurt-the-poor-most/ https://www.trtworld.com/opinion/why-can-t-india-s-agricultural-sector-keep-up-with-the-rest-of-its-economy--16294 https://hbr.org/2015/08/to-really-help-the-global-poor-create-technology-theyll-pay-for
More than one billion people are employed are given agricultural jobs. People who have agricultural jobs are one of the most marginalized, exploited, and oppressed groups in the world. It is mainly the poor people who are farmers who become poverty. There are people who are trying to lift farmers out of poverty.
In China President Xi Jinping made a pledge that he would lift 70 million people from poverty by the year 2020. President Xi Jinping’s pledge “…is an extension of the government’s effort, starting in 2012, to move 100 million rural residents into the cities by 2020.” People shouldn’t be in poverty condition. In India governments are unable to reduce poverty to India’s population of farmers. In the 1960’s the government in Green revolution, which was an attempt they made to increase agricultural productivity. They used yielding seeds and chemicals. These are just 2 examples on what people are trying to do to stop poverty.
Technology can lift people out of poverty. Vehicles that use technology to work will reduce number of possible accidents since there is little road and full of grass and food. Technology can solve social needs that can be in a profitable way. Technology can do labor work such as tractors working on the fields. Lawn mower cuts grass for us (Saurabhjit Singh)
There are lot of NGOs working for people in desperate need and are different types of NGOs out there. •BINGO: business-friendly international NGO (example: Red Cross) •ENGO: environmental NGO (Greenpeace and World Wildlife Fund) •GONGO: government-organized non-governmental organization (International Union for Conservation of Nature) •INGO: international NGO (Oxfam) •QUANGO: quasi-autonomous NGO (International Organization for Standardization [ISO]) I will be talking about INGO. Especially US and UK-based international non-governmental organizations (INGOs). What they do: The Contribution of an Asset-based Approach. They set up International NGOs and Poverty Reduction Strategies. The object of their work is to provide information of poverty reduction strategy. "Best" (Jeonghyeon Yu)
7. Evaluating and Controlling Technology
https://frsecure.com/blog/what-authentication-means-in-information-security/
The definition the website gives is “is the process of determining whether someone (or something) is, in fact, who (or what) it is declared to be. ” In order to log in to an account you need to go through authentication process. It covers the significance and different ways to authenticate. It also talks about two step authentication about how it is used and its meaning, which it states “Two-factor authentication is a really good thing. Two factor combines two different methods of authentication (i.e. a password and a token) to provide greater security when proving your identity.” (Saurabhjit Singh)
https://www.techsafety.org/technology-safety-quick-tips/
This website talks about technology safety. It talk about spyware, computer and phone monitoring software. It goes in detail on how people are using your computer and phone to watch and track what you are doing everyday. It mentions how people get access to your personal information. It does give safety strategies to protect your information. (Saurabhjit Singh)
8. Risks, Failures and Responsibilities
https://www.techsafety.org/technology-safety-quick-tips/
This website talks about technology safety. It talk about spyware, computer and phone monitoring software. It goes in detail on how people are using your computer and phone to watch and track what you are doing everyday. It mentions how people get access to your personal information. It does give safety strategies to protect your information. (Saurabhjit Singh)
https://www.hipaajournal.com/category/healthcare-data-security/
Jessica Davis writes in her article “OpenEMR patches security bugs that put millions of patient records at risk” published on Healthcare IT News on August 18, 2018 that an open source software used by medical institution for the management of patient’s medical records presents severe vulnerabilities. The distributor of the software conducted an analysis of the code and identified the vulnerabilities. The article points out that “If [these flaws were] found by a hacker, they could access patient records, compromised databases and sensitive system data, and elevate privileges, upload files and more.”, that gives a picture of the potential damage that unauthorized entities might do on he system. Worth mentioning that the company has distributed software patches to eliminate the vulnerabilities in the code. (Marvin Buruca)
9. Anytime, Anywhere
https://www.pcworld.com/article/192803/geolo.html
This website is talking about how geolocation works, the apps involved and privacy. It talks about the function of apps and locations shown on the apps. Smartphones these days have GPS chip installed inside, which has the ability to use satellite data figure out your exact location. It tells you how people invade your privacy by using the geolocation apps. (Saurabhjit Singh)
https://www.technologyreview.com/s/533406/what-are-moocs-good-for/
The advantages was that this interactive technology was to deliver top teaching from institutions like Harvard, Stanford, and MIT free via Internet to thousands/millions around the world. This was supposed to be a way to scale up higher education. This was a way to cut the cost of education for those who could not afford the Ivy League style universities. The disadvantage is over 90% do not finish their courses. Most people that sign up are not serious about getting an education. There is not enough incentive to complete the courses.
This article was chosen because it answers the question, " What was the intention and purpose for MOOCs'?; and it gives us the current results and status of the effort.(David Owens)
10. Technology Advances, Social Trends
https://www.thetech.org/tech-awards-presented-applied-materials/laureate-impact-award
2016 Laureate Impact Award: PATH
Path is the one, which has a really significant impact for the greatest number of people. It is stated that PATH is “…an international nonprofit health organization, was honored by The Tech Awards in 2003, 2007 and 2009. The global nonprofit improves the lives of more than 150 million people a year through initiatives that touch some of the world’s most vulnerable populations through vaccines, women and children’s health and nutrition.” Path is helping people in many countries. In Africa a vaccine was made, which cured 235 million Africans from meningitis. (Saurabhjit Singh)
https://www.rewire.org/our-future/wearable-computers-change-world-better/
How Wearable Computers Can Change the WORLD FOR THE BETTER Google Glass is a computer attached to your face and integrated with your vision. This would tie computing into your words, movements and thoughts. Bringing technology closer to the body gets it out of the way. This would add to our efficiency by taking task out of our hands into our sight.
Google Glass can be used for social good because it can help people who are hard of hearing by using Starner's app called Captioning on Glass. The persons wears the glasses. The other person speaks into a smartphone that has the app installed which connects him wirelessly to the glasses. The smartphone will transcribe what is said into words which will appear on the google Glass screen for the person who is hard of hearing.
This site was chosen because it shows how technology will be used in the future to help those that have special needs. Google glass is one of these technologies.(David Owens)