Wednesday, May 30, 2007

My New Communication Technology Adventure in Summary

So when I first started this course I thought that it would be much like my other courses, a little mundane, and involving a lot of work. But I soon learned that this class was different and better than I had first thought it to be.

My other classes, which include Effective writing, Cultural Perspectives and Marketing do teach me things, but i sometimes find it hard to use these recently learnt skills in my everyday life. since I am on the computer and the Internet, I have learnt many new things in this class, which will hopefully help me to do be a better employer when I attain professional employment.

Such as how to use Web blogs, how to search more effectively on search engines (and not to only use one type of search engine ie Google, or Wikipedia), how to find more reliable sources, how to perform basic Photoshop functions, the Macro function on Microsoft Excel, Mail Mergers, interactions with 3D environments, and a few other helpful new skills.

I think that in the future I will be able to use these skills in what I hope to do with myself, which is work for (or run) an automotive enthusiast's magazine.

Now...the matter of Feedback on the course Lectures and Tutorials. I liked the different concepts that were brought up during the lectures, such as the gaming theory, which really opened my eyes regarding the theory and concepts behind gaming ( Ludology and Narratology) , as I never thought too much about games, other than if I was enjoying them or not.

I also liked the talk in one of the lectures about anonymity online, and online security and privacy. I had never before thought about how I was being monitored. This interested me not just for my own purposes, but also for the possibility furthering of online global democracy (where some countries are censored and restricted from certain information, IE true historical information, ideologies regarding democracy, etc,)

The movies included in the Lectures were also interesting and revealing. Movies such as Alphaville, EXistenZ and the others, are not exactly my 'type' of movies. But after watching them, and being a little confused, i was able to find the main meanings of the movies, and their concepts, and now understand how a somewhat minimalist movie can say a great deal about a certain topic or philosophy ( La Jetee was quite bohemian, yet still had a good message)

The one thing i would change if i could would be the amount of theories thrown at us in one lecture, and change this so that the tutorials and tutorial tasks reflected more on these theories, as it is quite difficult for me to retain these newly learnt theories (even though they do interest me) and a topical activity would help me to remember these.

This is not saying that I did not find the Tutorials helpful and interesting, I did, it is just that I find it hard to remember things i have just learnt without revising them.

But in Closing, I would have to say that I loved this class, and it has made me want to take more media-related classes. Thankyou Adam, for an awesome class, and Thankyou steve for the interesting lectures.
Regards, -Matthew Dart

Tuesday, May 29, 2007

Week 10: Using Microsoft Word

This week, I used Microsoft word for something that i had done many times before, to write a cover letter for a resume, but with a twist. never before had I used the Mail Merge function, and I now understand it's functionality and potential.

This activity was relatively simple to complete, and I did not have any problems with it. This was relatively straight forward process, the most difficult, but still achievable part, was the Mail Merge.

I can see that this function of Mail Merge can help you if you are in a business, or if you are sending off a resume to a few companies.

Week 11: Excel Activity

For this activity I had to construct a list including Clients (Peter, Julia, James), Hours, Rates, Benefit, Cost, and Total. I then had to enter these into a series of cells, and then enter a series of formulas, make a graph, and then use macro to record the functions regarding gain, loss and gainsandlosses. I then recorded these layers into macro and was able to view easily which clients would provide the most gain, and which would infact cause a loss in profit.

This use of excel would surely benefit a business owner (wether small or large business). I did not have any idea these functions were available on excel, and if i ever needed them in the future, or know anyone who did, i would certainly use this or recomend this program to them.

I didnt encounter many problems, but the only real problem was when trying to enter a formula that seemed to not work, wether I typed it out, cut and pasted it, I have no solution. I ended up having to enter in the answers without the use of the formula.

This was a good activity in my opinion. It exposed me to things that were previously unknown to me, and I like it when this happens, as I know that I am learning. It was a little confusing at first when I had to try the Macro activity, but it all turned out well, after I recieved help from Adam.

Thursday, May 10, 2007

Online Essay: Privacy on the Internet

Privacy on the Internet-Matthew Dart

At present, the greater majority of the Western population has access to a computer and the Internet (Miniwatts Marketing Group, 2007). It is almost synonymous that if a person has access to the Internet, then they will surely have access to an email account. Wether this account is run through the chosen Internet provider or a separate provider is entirely the choice of the user. Although the Internet seems to provide an abundance of choice, the major connotation of choice, freedom, is often under threat from companies that take to constant monitoring and regulating of all parts of the web.

One of the most prevalent online companies at present is Google. Initially only associated with web searching browsing, it has developed and grown into a huge conglomerate company. Now comprising of many programs, including Google image, YouTube, Picasa Picture Viewer, Blogger, Google Earth, Google Talk, Google Toolbar, Google Translate, Google video and G-mail (Google, 2007a). This ensures that Google has a large market share in online activities, and has gained almost unwavering trust amongst users, offering a solution to any needs that most users might have.

One question has to be asked of the online giant, “Is this trust unfounded?” Is one of the biggest problems on the Internet, the invasion of privacy, being perpetrated by one of the largest companies on the Internet?

Google was founded in California in the late nineties, by two Stanford University PhD Students, Sergey Brin and Larry Page. Initially the site was an investigation and development into the improvement of search engine functionality, and soon branched off into many different companies, numerous have been mentioned above (Google, 2007b). But by far the most controversial addition to its line up is Gmail.

When introduced in 2004, Google Email (Gmail) offered users a free email account with over 2850 megabytes of storage (and growing) (Google 2007c). Compared to Yahoo’s $59.99 offering, Gmail is free and offers one hundred times more storage than Yahoo (The Register, 2004) and was at the time clearly the more cost effective option.

After its introduction in 2004, an act was passed in California that clashed with some of the intrinsic operating features of G-mail. This act, California’s Online Privacy Protection Act (2004) was concerning the privacy of users of Internet facilities and programs and the regulation of informing users of identity information collection on said program. When and if items such as first and last names, Address (both Postal and Email), phone number and social security social security (ibid, 2004) are collected, this act makes it mandatory for the website to create a link to their privacy policy on its homepage alerting users to the fact that these pieces of information have been collected, and also displaying the companies privacy policy. It was these conflicts with the new act that necessitated a change in Google’s main privacy policy the same day that the new act was passed. When evasive actions such as these are taken, it is obvious that although adjustments were made to legally comply with the new act passed, the Google knew they were on the verge of breaching regulations, and this only further weakens Google’s negative actions and image related to the subject of Privacy.

The Oxford Dictionary defines privacy as a state in which one is not observed or disturbed by others. Gmail privacy is somewhat lacking, as when an email is sent, keywords or key phrases are picked up by Google’s system and through their program and its operators AdWords and ADSense (Google, 2007d), and an individual advertising portfolio is created for each user. While this may not seem to be too invasive of the users’ privacy, it does allow a great deal of potential for abuse of the system. The main ‘loop-hole’ delivering Google and their systems from more attacks is the statement made by a Google Representative, which was:

Google scans the text of Gmail messages in order to filter spam and detect viruses, just as all major webmail services do. Google also uses this scanning technology to deliver targeted text ads and other related information. This is completely automated and involves no humans. (Google 2007e)
Here, Google makes the true statement that it is not actually humans who are viewing the content of people’s emails, it is a machine, and that it only uses this scanning technology for security from viruses and spam, and to target specific users through AdWord, to tailor advertising to these users. It is the last part of the phrase: This is completely automated and involves no humans, that states that there is no room for abuse, as a machine will only do what it is programmed to do, a machine can not be malicious. This statement, made in a Public Press release, stated that:
… a computer system, with its greater storage, memory, and associative
ability than a human’s, could be just as invasive as a human listening to
the communications, if not more so.
(Privacy Rights Clearing House, Cited in Article Chopra and White)

Combine this theory with the fact that the programmers, the people who created these programs, are undoubtedly human, and as such there is a chance of abuse and corruption to occur, especially when these programmers are supported and payed by Google.

Due to the vast amount of Internet monitoring and recording of activity and behaviour, know as ‘Traffic Analysis’ (Berthold, Federrath, KÖhntop, 2000), it is getting more and more difficult to retain any concept of anonymity on the Internet. There are however, some companies on the web that believe in and support the fight for civil liberties, privacy and anonymity online. One such company is Tor. Concerned with the construction of a distributed, anonymous Network (Tor 2007a) the IP address of its users is distributed around a number of different computers and users, effectively re-routing the IP address of its many users so that an unclear path is constructed for Traffic Analysis or Eavesdroppers:

Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. ( ibid 2007)

In countries where censorship is a big issue, for areas including Cuba, North Korea and some of the Middle Eastern countries (CPJ 2006), the anonymity offered by Tor gives the internet users of these censored regions the access to previously non-accessible web sites, possibly containing negative views of their country, or websites featuring pro-democratic and liberal messages.

Privacy over the Internet is becoming more and more limited. But what Internet privacy is available should not be taken for granted, because when this matter of privacy and security is handed over to others, it is often used or misused for their benefit, and not with the secular users privacy in mind. This necessitates a pro active stance regarding security to be taken, through the use of programs such as Tor, to help not only the users personal privacy from Traffic analysis, but to further support the spread of freedom, civil liberties and human rights to those under a cloud of censorship.




References:

- (1) – Google Programs, (2007a). More Google products [Last date accessed 3/5/07] :http://www.google.com.au/intl/en/options/

- (2) - Google Company Milestones, (2007b). Google Corporate Information: Google Milestones [Last date accessed 3/5/07]
http://www.google.com.au/intl/en/corporate/history.html

- (3) - Miniwatts Marketing Group, (2007) World Internet Usage Statistics News and Population Stats [Last date accessed 3/5/07]
http://www.internetworldstats.com/index.html

- (4) - CA Business and Professions Code 22575-22579, 2004, California's Online Privacy Protection Act Goes into Effect July 1, 2004, [Last date accessed 10/5/07]
http://www.privacyrights.org/ar/CAPrivProtAct.htm

- (5)- Definition of Privacy, Oxford Dictionary Online, Oxford University Press, 2007, AskOxford: Privacy, [Last date accessed 10/5/07]
http://www.askoxford.com/concise_oed/privacy?view=uk

- (6)- Information regarding Gmail, A Google approach to email, (2007c), Welcome to Gmail [Last date accessed 10/5/07] https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%3Fhl%3Den%26utm_source%3Den-et-more%26utm_medium%3Det%26utm_campaign%3Den%26ui%3Dhtml%26zy%3Dl&amp;amp;ltmpl=default<mplcache=2&hl=en

- (7)- Information regarding Gmail’s privacy flaws, Andrew Orlowski, 2004, Google mail is evil-privacy advocates [Last date accessed 10/5/07] http://www.theregister.co.uk/2004/04/03/google_mail_is_evil_privacy/

- (8)- Information on advertising methods, keywords, (2007d) Google Corporate Information: Business Overview [Last Date Accessed 3/5/07] http://www.google.com.au/intl/en/corporate/business.html


- (9)- Questions and Answers regarding Gmail Privacy, (2007e) About Gmail [Last date accessed 10/5/07]
http://mail.google.com/mail/help/about_privacy.html


- (10)- Journal Article: Samir Chopra and Laurence White, 2007, Privacy and Artificial Agents, or, Is Google Reading My Email? pg3/6 . Article found through Google Scholar Search engine. [Last date accessed 10/5/07]

- (11)- Journal Article: Oliver Berthold, Hannes Federrath, Marit KÖhntopp, Project "Anonymity and Unobservability in the Internet", 2000, Pg 9/10. Article found through Google Scholar Search engine. [Last date accessed 10/5/07]


-(12)- Overview of Tor, 2007, Tor: Overview [Last date accessed 10/5/07]
http://tor.eff.org/overview.html.en

- (13)- Committee to Protect Journalists, 10 Most Censored Countries, 2006, North Korea Tops CPJ List of ’10 Most Censored Countries’ [Last date accessed 10/5/07] http://www.cpj.org/censored/index.html

Wednesday, April 25, 2007

Week 8, 3D worlds and socialising on the internet

There are many ways in which 3D worlds on the Internet and more traditional forms of socialising on the Internet are similar, but also many ways in which they are different.

I use MSN messenger, and feel that it is one of the best ways to maintain my friendships with people that I already know. It helps (a lot!) if i have met the person previous to the conversation that may ensue, as we know what each other looks like, and some background knowledge.

Three dimensional worlds however, are something relatively new to me. I have played a lot of the Rockstar Grand Theft Auto Series on PlayStation 2, but I have never used any of these interactive communal-type programs before, and this week I used active worlds.

I feel that it was in some ways a good medium for people to meet, as the people who use the program would be of similar mindset to the others in that they are wanting to take part in the activity of virtual interaction. It is in these places such as active worlds that a user can communicate, but may not actually be truly representative of their real self. In their virtual life, they are able to live in their ideal setting, and can change their life drastically when they chose to do so(something that they possibly cannot do in their real life).

It is in these 3D worlds that this ideal society, almost a utopia is created. That allows for the user to determine their actions, and socialise free from any restraints (physical or otherwise) that may have elsewhere been the limiting factor in their social interaction in real, Physical life.

Wednesday, April 4, 2007

Week 6 Photoshop Manipulations








This week I had to play around with Images, this is my first time at this , here goes:





Friends: these are my mates at my eighteenth Birthday Party, i then put them in a beautiful Sunset Setting on a beach, instead of in my garage where the party was held.












Communication:


This Picture is Representing Communication (sometimes Strained) Between Males and Females. sometimes, Communication brakes down over the years, but initially it seems quite strong(in this case).



















Newsworthy:


I thought it was strange coincidence that there seems to be so much news about drought, yet also an increasing amount of natural disasters such as tsunami.



















Australian

i thought that for this section i would incorporate some of the larakin aspects of australian culture: Beer, and fighting in public. then used the kangaroo and the harbour bridge to display them in an australian form.








Popular










This image of members of the Maroons Steve Price and Petero Civoniceva. here i have tried to make it look like they were standing on each others shoulders.













Games




This is the Resident Evil Game cover for PS2. I have Chosen to put a baby face onto the main character, as when you see a baby, the last thing you think of is Evil.





Celebrity






This is a picture of Britney Spears and K-Fed, i have changed the image to give her K-Fed's Beard.

Thats it for this Task. catch you later,-Matt


Wednesday, March 28, 2007

Week 5:Photos

For this weeks task, I have chosen to grab some of my photos off my Myspace Sight, and also from image search engines, as I do not have a digital camera at my disposal.



Friends:







This photo I feel is a good representation of Friendship. This particular photo was taken on my Eighteenth Birthday Party, these are some of my Friends.-


From left to right: Zac, Scott, Rob, Nathan, Luke, Liam, Myself and Melita.



Technology:




This Photo is of the back Roll Cage assembly and chassis stiffening on Nobuteru Taniguchi's Drift Racing Toyota Aristo. This Roll Cage is not only for safety purposes, it also ties the whole car together, allowing it to act 'as one' through the bends, minimizing chassis flex. I think that this is a good representation of Technology, as the assembly of the cage has been highly researched ( Type of metal used) and calculated (strength) and has been made to exacting specifications.


Image was taken from: http://www.superstreetonline.com/featuredvehicles/130_0508_toyota_aristo_drifting_car/photo_07.html

News:



Although this is incredibly sad, the first thing that comes into my mind when I think of News is Televisions sometimes brutal slaughtering of Current Stories. In particular Today Tonight's Naomi Robson's face pops into my head.


This Image was Taken from:


http://www.ebroadcast.com.au/enews/Networks_swarm_to_Crocodile_territory_060906.html

Summer:


This picture is what I think of when I think of summer. A beach with people sunbathing, people swimming and just relaxing in general. This particular beach is Cable Beach in Broome.


This Image was taken from:

http://www.australianbedandbreakfast.com.au/west-australia-bandb/gallery/images/cable-beach-broome.jpg



Unconventional:


This is Slipknot. They look quite unconventional. they dress in elaborate costumes for every concert they perform, and didn't have a public persona as such until recently. This is also quite abnormal, as most people who are that famous and successful would be eager to get the fame and exposure that comes with the fortune.

This image was taken from:

http://www.dbmagazine.com.au/349/iv-Slipknot.jpg




Uni Life:




This picture is what I immediately think of when I think of university life-being stressed out and still having a lot of work to do!

This image was taken from :

http://www.bohcooper.com/images/Studying-Boh.jpg