User:Tseyoinwai0111

= CIS2 Individual Project =

Computers and Society Websites
[https://nces.ed.gov/surveys/frss/publications/2000090/ (Links&#x20;to&#x20;an&#x20;external&#x20;site.)Links&#x20;to&#x20;an&#x20;external&#x20;site. https://nces.ed.gov/surveys/frss/publications/2000090/] The survey shows that 39% of the public school teachers used the internet and advanced technology for the instructional materials, access model lesson plans and communicate with the coworkers, while less than 10% use them. The article also shows that schools with limited budget and resources are reluctant to the internet or the technology, at the same time, it also remind me of my school in the past, using smartboards which teachers could write on a board and the progress was saved with the projections from the projector. Although not all technology is useful and efficient depending on the teacher, it still help the students to learn better.

Technology has more benefit to education rather then not using it, for instance, 3d or more complicated models and graphs could be presented easily during the classes, and it also reduce the chance of teacher exposing from the dust of the chalks and chemicals. However, the benefits of the technology could not be easily accessed by everyone.

Computer Greek History
The first cell phone that was brought to test in 1978. The event might like any other simple inventions or accomplishment, but when it is compared to the phone that I was holding now, it amazed me. The first phone was invented by Martin Cooper who was an engineer in Motorola, it literally looked like a brick. Thanks to the hard work of all the engineers and staffs, a brick-liked cell phone was made into a touch screen, and also of the continuous testing after this first cell phone, we got to enjoy what we had now. What we had now is not only just the hard work but also by the data which is left from the past testing and this first cell phone in 1978.

2. Privacy and Freedom of Speech
Citizens have the freedom of speech to speak up their mind to go against any idea that they don’t agree on, but it doesn’t mean that this gives people the right to invade other people’s privacy. Everyone has their right of privacy according to the amendments, however, the constitution could not be applied effectively and solve all issues of privacy such as homosexual marriages and sexual life. The most prevalent issue related to both privacy and freedom of speech is the invasion of personal private life.

Encryption
https://www.tni.org/es/node/8265 This article relates encryption to communication interception and surveillance. In a government level, surveillance is needed in communication to ensure and monitor that the country is not under threat. As mentioned, the best example is Echeleon which is developed during the war against Germany and also another example in Europe was that a case was cracked by obtaining evidence of crimes from the communication interception but this action of the investigation unit was later brought into question. Internet seems to be a virtual world with no regulations, and we might want to enforce some in order be secure in protecting our privacy, but whenever it involves government activities,  we are always obligated to submit our data, our privacy is interrogated and our communication is intercepted.

Privacy and Personal Information -best
https://www.bloomberg.com/view/articles/2018-05-09/web-privacy-is-important-for-gmail-not-facebook This article mentioned the issue of selling our information on the social media without us noticing, an interesting research was carried out to show how we value our information. The participant were given a slice of pizza for their information in exchange, first attempt were tried without offering a slice of pizza, people were reluctant. However, when the participants were asked for a second time with a slice of pizza, many of them just turn in their information. It shows how much we care for our information before posting it onto the net, we didn’t consider the risks that we will be receiving before doing it and didn’t consider if the information that we were posting was private or not. Therefore, this article emphasize that if there is a need to go over the issue of  privacy when we are not responsible and considering our risks

3. Intellectual Property
The ideas of the product after published and claimed the copyright are protected from plagiarism.

Fair Use
https://fairuse.stanford.edu/overview/fair-use/four-factors/

This website provide a rich information about fair use with examples and court cases. Copyright materials may be used for expressing our own ideas, however, there’s a limit in order to protect the ideas of the original creator. These are not laws but these are the results from the court after dealing with the issue cases by cases. There are four factors that determines if we are just fairly using or violating the law, we could fairly use them if the used material is transformed and give the audience a new insight such as a parody. Materials that are factual have more limit then fiction, the market and the content is also put into consideration. Last but not the least, it is said that it still violates the law if the copyright material is used for bad intention or offensive, meaning that a parody might become an infringement.

Creative Commons
https://www.wur.nl/en/article/What-are-Creative-Commons-licenses.htm There are creative commons license available to claim before people use a copyright material, it is detailed enough to explain the intention of the users so that users know what they could do with the material and also with the agreement from the original creators to switch their copyrights into “some rights reserve”. This both the users and creators could get benefits from the ideas. The users might earn by borrowing the idea, it could create fame for the creators products, and it could even help promotion.

Art and Computers - best
https://www.newmediarights.org/business_models/artist/who_hurt_copyright_infringement

It is interesting that the response of the question who’s hurt by the copyright infringement could be “everyone” and “no one”. Some artists argue that it’s unfair to get access to their artworks illegally, especially in music industry, it was said that only 35% of population actually paid for the record and the rest downloaded the music from the net. Although copyright is amended for protecting one’s idea, but many of the artists believed that a culture could be evolved even quickly if the ideas could be more accessible to artists. Also, there are some cases that a company emphasize so much on copyright that it discourages customers to buy it because the price was too high, while there are some people believe that copyright infringement give customers a chance to try the product and this might even encourage them to buy the product. For example, when someone admires and appreciates an artist’s songs, he would want to buy the product to show respect and to own the track.

4. Crime
There are various different types of crime that involving hacking to steal confidential information or to purchase products using the balance in the account. Other types includes worms, viruses and malicious adware that is already with files when we download them. Although there are a lot of software to tackle the problems, there’s still a limit because we don’t know if we are being hacked at that moment, all we can do is to prevent it.

Risks
https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/

This website remind us of the potential harms that we might be receiving in the near future, it also takes examples from the past to help us understand more that which ways do the hackers usually target. For instance, aside from the ransomware that we received such as Wannacry, they usually targets computes that contains a huge data breach that is full of our personal information. Other than that, the hackers could weaponized the AI which is our digital assistant and also hijacking computere to mine crytocurrencies.

Best

https://www.calyptix.com/top-threats/5-security-controls-stop-85-cyber-attacks/

Cloud is also the place we upload our information to for storage and other purpose. Depending on the firms, cloud can also become a target for hackers because without protection and encryption, it is easy and attracts hacker because it is a huge data breach which at the same time, not many people are aware of. The website did provide us to understand the potential threats but didn’t provide us any ways for protection. In addition to this, I came across with this website below while researching that could provide possible solutions to these threats.''' '''

5. Employment, Education and Entertainment
Technology connects us more as it advances in all aspects such as employment, education and entertainment. We could look for job opportunities through the net, our learning environment are more associated with assistive learning and virtual learning devices, our accessiblity to the updated news and entertainment becomes higher.

Employment
https://www.employment-studies.co.uk/news/apprenticeship-systems-international-comparison

This link provide us with more updated and detailed information on apprenticeship not only within the borders but is also compared to other countries such as Canada and Britain. Most of the apprenticeship still remained in the area of traditional craft while the opportunity is limited in other areas such as nursing, construction and the hotel industry. The area of apprenticeship is mostly dominated by males and younger generation but there is a recent change that the area of apprenticeship is expanding to females which also includes the international workers. Some countries are working in order for people to apply for apprentice as early as possible after graduating high school. Most of the countries are trying to align the work of apprentices to either the national or international qualifications.

Education - best
https://www.diversityinsteam.com/2018/04/stem-k-8-engineering/

This website informs the readers the need of having k-8 engineering with concrete examples. It started with an experienced engineer saying that no everyone could get a grip of engineering for the first time in real life and learning the workplace is almost the common case for people who are fresh to this engineering field, it means that there’s a possibility that knowledge of engineering could be enhanced at an early by introducing engineering to school curriculum. For instance, students At Dr. Albert Einstein Academy meet their challenges when they are asked to design a door that easier to open by the teacher and also in some schools, children are attempted to design and build something with the resources that is within their reach, such as a clay boat.

Entertainment
https://youtu.be/4NGe4dzlukc

This video uses concrete examples from several different video games to explain the reason why the setting of video games nowadays are needed to be improved for disability people who are hard to hear. The first thing that the speaker mentioned was the subtitles, there were no rules in subtitle that they could come in different size and color. Common mistakes in subtitles are fancy font style, small font size and inappropriate font color, it’s hard even for the ones who got no disability. The font was too small and subtitles were shown all at once, adding that another fault in the game that less developers notice was that the color of the subtitle could easily be blend into the background. Another common mistake was about the sound, sometime the sound were too mixed and loud, the sound of the background and effect will cover the sound of dialog or voices of the character that makes the player confused of what is going to happen next. In order to solve the sound problem, the developers usually add special effects or guidance in the game to help the players when the sounds are not functioning well.

6. Mid-term Grand Challenge: Saving Coral Reefs


The topic that I chose for the Grand Challenge was saving the coral reefs.

Coral reefs contains high marine biodiversity and is beneficial for humans too, as it can minimize that damage caused by natural disasters such as hurricanes and storm surges. Protecting them could reduce the chance of loss of species and thus maintaining the food chain.

Methods and Examples to Save Coral Reefs
https://www.thenational.ae/uae/environment/the-deep-impact-on-the-gulf-s-coral-reefs-1.392298

Dubai is one of the most advanced city in Saudi Arabia, their method to maintain the coral reef system is to create an artificial coral reef system. It is said that this project is in progress, and the result shows that it could attract organisms to inhabit there, it also shows that when different boulders and breakwaters are set, it will attract different kinds of species. For a high energy environment like breakwaters, it attracts rare kinds of corals and fish instead of

common ones which means that by controlling the artificial coral reefs we can also by chance solve the issue of over-fishing.

https://www.smithsonianmag.com/innovation/can-underwater-resorts-actually-help-coral-reef-ecosystems-180958190/

There’s a company in Los Angeles is planning to build artificial coral reefs for the environment and also for tourist attraction. It has known that the artificial reefs are working an

d there are also divers that are attracted to visit underwater installation with sculptures, as the Neptune Burial site in Miami receive good reviews. Their aim is to recover the coral reefs that was gone near the hotel resort, while at the same time, earn from the project through attracting tourist.

https://tech.co/technology-save-coral-reefs-2016-11

This articles explained that there are now three possible ways of technology saving the coral reef. First of all, we can stimulate the growth of coral by using an electrical biorock, this will create natural mineral and coral fragments will then be transplanted. Second, a method and a device called bathymetry to monitor and map the coral reef constantly for any changes. Third, 3D printed coral reefs could be used to mimic the original coral with the same composition and planted in order for an ecosystem to develop.

7. Evaluating and Controlling Technology
There are many examples of evaluating and controlling technology around the world, like the censorship system in social media and filtering of sensitive or inappropriate materials through the firewall.

Machine Inteilligence
https://numenta.com/blog/2016/01/11/machine-intelligence-machine-learning-deep-learning-artificial-intelligence/

This article evaluates deeply into what machine intelligence unlike the link above, it tells us the difference between machine intelligence, machine learning, deep learning and artificial intelligence. These types of technology might seems similar to each other in general but in fact, they are different because different approach is used to obtain certain type of intelligence. It also contains a table that tells the difference of Classic AI, simple neural network and biological neural network. Furthermore, the topic is accompanied by some practical example to distinguish these three approach to the artificial intelligence, and it also explains the definition of machine learning which is referring to a machine that learns and works by biological neural network approach.

Internet of Things - best
https://www.helpnetsecurity.com/2018/07/24/protecting-iiot/

This article is saying that security infrastructure of IoT is vulnerable and many of the security and operational data are usually collected via network log collectors. There’s a table showing the different methods for control, configuration and data collection. Among all the methods, wired networks, Wi-Fi networks and cellular networks are commonly used. I use cellular network very often but when we are travelling outside the country or to a rural place, a portable Wi-Fi comes in handy. However, as mentioned in the article, commonly used methods such as Wi-Fi can be vulnerable and it is also risky to connect to public Wi-Fi.

8. Risks, Failure and Responsibilities
Laws in reality are passed based on the past events, when it comes to the virtual world where a place without a certain measurement of time, who is going to implement law and who will be the target?

Risks and Failure
http://www.dcma.mil/News/Article-View/Article/1452302/cybersecurity-grading-scale-lists-violations-severity/

This article describes and explains the grading scale of cyber security violations with examples. There are low, moderate and high level of violation. For the high level violation, it consist of giving away classified information and using unapproved software, adding that the violation will be more serious if the users have any intention or action of trying to hide the these behavior using private network such as the Onion Router and also bypassing the DCMA firewall. The moderate level of violation described is similar to that of high level, while the classified information of low levels that is involved in a cybersecurity violation will be social security number, banking and credit card information.

Responsibilities - best
https://www.cyberdb.co/world-economic-forum-warns-about-the-rise-of-cyber-dependency/

The technology that we depends on is artificial intelligence and interconnectivity, the thing that the article warned us the most is that our dependency on technology will our security more vulnerable as the data breach is increasing slowly. Modern people focuses on quality rather than the security to give us the best experience, so this article mentioned the cyber threats that affect political aspects. The weak security and high accessibility of internet challenges the genuiness of the information provided.

[https://www.upwork.com/hiring/development/ethical-hacking/ (Links&#x20;to&#x20;an&#x20;external&#x20;site.)Links&#x20;to&#x20;an&#x20;external&#x20;site. https://www.upwork.com/hiring/development/ethical-hacking/]

The topic of the article was “Why You Should Hack Your Own Network”, it gives the tactics of how a hacker hack a device. The reason why the author use this topic is because there’s always a risk and uncertainty of trusting a software which we don’t even know if it could truly protect our devices completely. In this article, it emphasizes the common vulnerabilities, and we need white hackers for vulnerability testing. For extra information, many companies nowadays hired white hackers in addition to protect their data.

9. Anytime, Anywhere
The goal of the technology today is to achieve the accessibility regardless of anywhere and anytime. I might not say that technologies nowadays has already met the goal because there are still certain group of people in the world who can’t get access like people with disability, but we are making progress to have technology to be accessible and available to everyone anytime and anywhere.

Technology
https://www.thehindubusinessline.com/specials/technophile/how-safe-is-your-favourite-ewallet/article9402284.ece

This website includes all the features that an eWallet should have to make our accounts secure, it includes some brands as examples to let us know if the eWallet we are using currently is secure or not. Most of eWallet will require users to have anti-virus or a malware scanner installed, all the transaction and the application will only run one at a time, there are no other application present to make sure that no personal information is exposed. Furthermore, the application will have multi-layer encryption and some of them are able to reverse the transaction or alert the users against fraud.

Technology associated with Politics and Elections - best
https://www.theatlantic.com/technology/archive/2016/08/how-electronic-voting-could-undermine-the-election/497885/

This article informs us about the security and the risk of having electronic voting, and it is reported that there are voting databases of two states were being under attacked by foreign hackers. These two states are most likely Arizona and Illinois, and one of them had their voter-registration information hacked. I think the digital method of voting is more secure since it’s only the security that is needed to be improved. As long as the system got a strong security that can avoid the hackers to alter the program the day before voting, the voting for the voters would be fair unless the program was altered under the control of the officials.

https://www.huffingtonpost.com/daniel-burrus/whats-protecting-your-ewa_b_1789512.html

This website that provides not only political conflicts or updates but also relate issues to the current politics, and provide the readers with the political outlook of the matter. It is easy to access and there are various old news that are still available for the readers to research for information, this website post political news regardless of the borders, meaning it also provides political news that get the highest attention in different countries.

It informed us about the security of the eWallet that kept it protected from any theft. The good things that it mentioned was about the biometrics that our eWallet will be using, Apple spent millions of dollars just to buy the technology from AuthenTec for its own eWallet. The users are provided with information of how this work and the level of security of encryption with biometrics like fingerprints, showing that even if we lost the phone our account is secure unlike when we lost some important personal information linked to a bank account. The only thing that is missing is the comparison of AuthenTec with other competing companies with biometrics, as the leading technology company chose it over the other, the users would like to know what makes it stands out regarding of the security and technology.

10. Technology Advances, Social Trends
Figures are a type of the data that we collect. With a proper analysis and display using chart, trends and possibility of the future could be observed. There are various factors that affect these figures are the demand of the new technologies and its potential market, this will most probably shape our new norms and our purchasing habits.

Quantitative Facts - best
https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/global-mobile-consumer-survey-us-edition.html

These numbers will change according to what new devices or feature on the devices are presented in the market. This is a US edition of global mobile consumer trends which showed of how people are using their phones in the United States. For instance, how many percentage of people using their phones after waking up or before sleeping within an hour. It was stated the use of mobile device and ownership were increasing, but it was leveling off. In the video, even though the use and ownership of mobiles are leveling off, more than 80% of users still use their device extensively and there were only less than 50% of users attempted to limit their use of phones. It shows that how an emergence of smartphones changes our lifestyles and these devices are still updating.

Technology in the Future
https://www.youtube.com/watch?v=4_-WILrj474

This video gives information about the future students and the technology that will be offered to all the students to aid them learning. In the near future, people hoped that students can have a technology or an application that could help them keep track of their learning and progress, this will track their progress of studying the materials and the achievement that they earned from understanding the topics. Each subject will consist of stats and this application will also have a record of the certifications and degree, and learning will not be bounded by the classroom as there will be virtual and augmented experience. It was also said that this method will eliminate the competitive environment and enable students to focus more on what they learn and achieve, instead of focusing on the career requirements in their future. The “student” in this video was defined by a person that was eager and have the ability to learn which means that it also includes the disable people and would provide assistive technology for them to learn. In other words, it wants create opportunity to promote equity, diversity and inclusion.