Monday, April 25, 2011

Week #14: The Future of the Internet


Hello! To conclude this series of blog entries, I would like to discuss about the future of the Internet. Let’s take a look at the following video!

According to the video and what was shared in class, it seems as if the next big thing for the Internet is semantic technology. This means that computers, mobile devices and any other gadget that has Internet connection will be able to understand the meaning of the messages transmitted across. This development is a quantum leap from the current infrastructure that is only able to read computer programs in binary code.
Another possible development of the Internet would be its ubiquitous accessibility – 24/7, anywhere in the world. This means that the future of the Internet is one in which the Internet is completely integrated into our lives and permeates every part of it. Household items like our bathroom mirrors will also be embedded with Internet accessibility, making it much more convenient for us to view our business meetings, school schedules, doctor’s appointments and other important things on our calendar.
So… What are the implications of this? Well, such development of the Internet will increase the efficiency of economic processes and take the rigour away from everyday life. People can discuss business ventures anywhere, anytime, and can also complete business transactions swiftly. With the increased convenience that the ubiquity of the Internet entails, our lives will be made so much easier: we can shop for groceries online and just pick up the compiled package of goods from the store, chat with friends and family members anywhere, and also be notified immediately when our favourite celebrities are reported about on the news.
With the future of the Internet being so dynamic and influential, it is hard for us as Internet users not to be excited for the prospective changes. One drawback of this ubiquity of the Internet, however, will of course be that of our loss of privacy. Well, we can’t have one without the other, so it’s up to us whether we want to embrace this new horizon that the Internet is bringing us to! (:

Sunday, April 10, 2011

Week #6: Google Calendar


Have you ever heard of or used Google Calendar? Personally, I didn’t even know that it existed till I searched for Google Tools via Google. Today, we’ll learn about how Google Calendar actually works.
Firstly, to obtain your very own Google Calendar, you have to have your own Google account. This can be signed up for free. To begin, click on the “Calendar” button located at the top left-hand corner of your Gmail Inbox page.

Upon doing so, you will be asked to verify your email address, country and time zone. After you have confirmed your selection, you will be brought to the following page – Google Calendar itself.

Now you can begin scheduling events and creating invitations. Let’s say I have a counseling workshop on Tuesday, 7pm to 10pm at NUS Kent Vale. I would go to the 12/4 column and click on the cell that corresponds to 7pm. Next, I will drag the cursor down to 10pm.




Following that, I will type my appointment details into the space given and then click ‘Create Event’. My appointment will then be reflected on the calendar.





Applying the same procedure for my next appointment, lifegroup at Bras Basah at 7pm on Wednesday, the page will turn out as follows:

For ease of scheduling and planning purposes, I can even add another calendar and share it with specific people or make it public. This can be done by clicking on the ‘Add’ button at the left-hand side of the page, and that action brings me to:

I can even add a friend’s calendar to share folders with one another. In doing so, I will be able to compare schedules with them and thus plan meet-ups etc more effectively. A single user can actually open up multiple calendars and view all the scheduled events in a single window. To prevent confusion, each calendar’s events are displayed in a different colour.

Indeed, Google Calendar is a useful tool that helps us organize our life and facilitates interaction and gatherings with others. However, like all tools, it is only useful to the extent that it is used. Why not try it out today? (:

Week #13: Internet Addiction


The topics we have covered in this course so far have been about the uses and misuses of the Internet and how the Internet is a dynamic mode for communication. For this post, however, I would like to focus on the repercussions that overuse of the Internet entails: Internet addiction.
Internet addiction, otherwise known as computer addiction, online addiction, or Internet addiction disorder (IAD), can be defined as “excessive computer use that interferes with daily life”. It covers a variety of problems, including cybersex addiction, net compulsions and information overload.
For more information regarding the various problems that Internet addiction brings, refer to: http://helpguide.org/mental/internet_cybersex_addiction.htm.
Firstly, let’s determine the causes of Internet addiction. In a fast-paced society like that of Singapore, the Internet has gained a foothold on many people’s lives due to its convenience, accessibility, user-friendliness and its myriad of functions. Social media such as Facebook and Twitter have also allowed the Internet to pervade our lives. Smartphones like the iPhone, Blackberry and Android phones are enabling us to have 24/7 Internet connection. We Singaporeans are overly dependent on the Internet as our source of information, entertainment, socialization and (sometimes) narcissism, among many others. In Singapore, as well as all over the world, many people turn to the Internet as a form of release from unpleasant feelings such as stress, loneliness, depression, and anxiety. It helps us solve our boredom and escape our problems when we roam online aimlessly or keep our minds occupied with online games, news and social media. Persistent use of such methods as outlets for our frustration and other negative emotions will result in us becoming overly-dependent on and addicted to the Internet.
So how do we cure Internet addiction? Personally, I think that the problem does not lie with the Internet itself, but with the methods that people employ to solve their negative emotions and to take their minds off their difficulties. However, though the Internet does provide temporary relief and enjoyment, it does not eradicate the root issues, nor does it give us permanent release. Therefore, in order to cure Internet addiction, we need to apply the principle of replacement: that is, we need to use other healthier, more effective and long-term solutions to help us overcome our negative emotions and difficulties.
Internet addiction is just like all other addictions. Thus, I believe that the first step that people in Alcoholics Anonymous (http://www.alcoholicsanonymoussingapore.org/the_twelve_steps) take towards curing their addiction applies to Internet addicts as well. First and foremost, Internet addicts need to admit that they are powerless over Internet addiction, that their lives have become unmanageable. By realizing that they are vulnerable and susceptible towards Internet addiction, these people will be more able to deal with it. After all, the worst approach in solving a problem is thinking that you don’t have a problem.
Next, people need to take active steps towards kicking their habit by applying the principle of replacement. People can and should attempt to cure their addictions by using something else to solve their boredom and difficulties. One of the ways is to find a greater purpose and cause to live for. After all, living for the temporary comfort and release the Internet brings is quite depressing. Thus, by committing themselves to and spending their time for these greater causes, Internet addicts will find joy and fulfillment that the Internet cannot give. As such, the negative emotions they experience will be resolved permanently.
I’m no expert in curing of any addictions, but I know that living for a greater purpose does take our eyes off our temporal troubles and negative emotions and leads us to joy and fulfillment. Sounds like a pretty effective method to curb our addictions (not just Internet addiction), doesn’t it? (:

Saturday, April 9, 2011

Week #8: Apple's Multimedia Marketing Strategy


Today, I would like to explore Apple’s multimedia marketing strategy through its website at www.apple.com.
The first thing that I saw when I arrived at the Apple website was its advertisement for iPad 2. Apart from the creative usage of captions and an appealing photo of the product, Apple also incorporated two feature videos which website visitors can view. These videos are a form of entertainment and education for the prospective iPad buyers.
Let’s take a look at the iPad 2 video:

http://www.apple.com/ipad/#video
Upon clicking on the above link, you will also see other featured videos for the new product, such as TV ads and Steve Jobs’ unveiling of iPad 2.
The next page I visited was the one for iPhone. Like the iPad page, the iPhone page allows visitors to explore the different features of the iPhone by clicking on the different links available, such as that of FaceTime, Retina Display and Multitasking. The page also offers options for people to shop online with details about shipping and in-store pickups (http://store.apple.com/us/browse/home/shop_iphone/family/iphone), visit an Apple Store from around the world (http://www.apple.com/retail/storelist/), talk to a specialist for purchasing advice and to download an application for easy purchase of Apple products (http://itunes.apple.com/us/app/id375380948?mt=8).
For its online marketing strategy, Apple makes use of vibrant, visually-appealing photos to spark the interest of potential buyers and visitors to its website.



It also incorporates feature videos in which Apple describes and promotes their products. These two avenues utilize actions and graphics to appeal to buyers, especially those with auditory and visual learning styles. The website is also high in interactivity: users are able to interact with the website by purchasing products online and also giving feedback. Another feature, the guided tour, brings viewers through the different functions and applications of the iPad and teaches them how to use those applications. The iPad Guided Tours can be found at http://www.apple.com/ipad/guided-tours/.
With the usage of many forms of multimedia on its website, it is no wonder that Apple is very successful in marketing its products. (:

Friday, April 8, 2011

Week #7: Cybercrime in Singapore

Before we begin, let’s take a look at this Norton Internet Security Anti-Cybercrime video that was made to scare inexperienced internet users and spread the fear for "Cyber Criminals".

The advent of the Internet launched an entirely new platform for the committing of crimes. Crimes committed via the Internet, also known as cybercrimes, are on the rise due to the growing usage of computers and the Internet worldwide. In accordance with what we covered in class, I would like to do a brief report on cybercrime in Singapore.
A recent study released in 2010 showed that 70% of Internet users in Singapore fall victim to cyber crimes such as computer viruses, online credit card fraud and identity theft. A shocking 71% of them do not expect cyber criminals to be brought to justice. Yet, despite all these statistics, many Singaporeans still do not take active steps to solve cyber crimes due to the time taken and the costs incurred in doing so (average 24 days and $1660).
Instead of finding means and ways to solve cyber-crime, why not nip the problem in the bud and take preventive measures against cyber crime? After all, prevention is indeed better than cure. In the case of Singapore, the government has implemented the Computer Misuse Act to combat cyber crimes. This Act was passed in 1993 and has been amended 5 times as of 2010, and “prohibits the obtaining of unauthorized access to computer material, modifying the contents of a computer, obtaining or intercepting any computer service or function, interfering with or obstructing the lawful use of a computer, impeding or preventing access to or impairing the usefulness or effectiveness of any computer program or data, or disclosing a password, access code, or other means of gaining access to a program or data”.
The onus is on Singaporeans to prevent (or reduce the possibility of) cyber crime. Some ways we can prevent ourselves from falling prey to cyber criminals is by becoming more aware of the ways criminals try to trick people (in the case of fraud, scams and identity theft) and install anti-virus software and firewalls to hinder unwanted entry. Consumer education with regards to defense against cyber crime is and always will be the most important and crucial step in curtailing the efforts of cyber criminals.
To know more about Singapore’s Computer Misuse Act (how it combats cyber crime, penalties etc), refer to the following 2 websites:

Week #3: The Killing of the Private Life

How private is the information we post on social networking sites like Facebook? What information is gathered in social networking sites about us? Could the things we share potentially be used against us in the future?
These are questions that we need to ask ourselves especially we actively engage in social networking. Let’s have a look at the following videos:



Despite this controversy over social networking privacy issues, Facebook has still decided (as of 2 March 2011) to change its privacy rules to allow the sharing of users’ phone numbers and home addresses with third party companies (http://www.dailymail.co.uk/sciencetech/article-1361889/Facebook-privacy-rule-change-Phone-numbers-addresses-shared-parties.html). The new rules state that external websites and third-party developers will be able to access users’ phone numbers and home addressed via the permissions menu to which users must agree. In response to a letter written by Congressmen Edward Markey and Joe Barton, who expressed concern over the new Facebook function, Facebook said that it will continue to go ahead with the new function but also make it more obvious to users that their information will be shared.

So… What should we do in response to such an intrusive function? We won’t be able to stop Facebook and other social networking sites from disseminating our personal information to third party companies (unless we stop using these sites completely), but we can take precautionary measures to ensure that our personal information is not liable to misuse.

Firstly, we can take personal responsibility and familiarize ourselves with the Facebook privacy policy. This will help us understand how whatever that we post on the site will be handled, and also how we can modify our profile privacy settings for greater protection. This will also ensure that we will be wiser about the extent of personal information we post on our online profiles. The Facebook privacy policy can be found at: http://www.facebook.com/policy.php.

In addition, we can limit the amount of personal information we post on the Web. Do we really need everyone around us, even those mere acquaintances (not really ‘friends’ per se) on Facebook or Twitter, to know our full contact details, to see all our pictures, to know our whereabouts? Instead of posting everything about ourselves, let’s either restrict the number of people who are able to view our profile, or don’t post anything pertaining to our home addresses, phone numbers and the like, as these are sensitive pieces of information that can be easily mishandled.

For those who are still at a loss as to how to proceed from here, here’s a Facebook privacy user guide for you!


Wednesday, April 6, 2011

Week #2: Social Media: The Boon & Bane of Terrorism

Social media is a multi-faceted platform used for social interactions; however, it is also a volatile mechanism used for and against terrorism. For example, during the November 2008 Mumbai attacks, people caught in the violence used Twitter, providing real-time updates and eyewitness accounts of the ongoing chaos. People who were in hiding amidst the attacks also utilized social media to find out what was going on outside. Some even managed to engage the help of relatives and friends via the usage of social media to escape. For instance, Anthony Rose, a member of a film crew, was able to contact his mother, who then sent him a floor plan of the hotel they were trapped in, thus aiding in their escape.
However, these people weren’t the only ones using social media. Organizers of the terror attacks were monitoring Twitter using their smartphones and Blackberries. Google Maps and Voiceover Internet Protocol (VoIP) were also employed to help the attackers navigate through Mumbai and communicate with the base headquarters. Because of this extensive usage of social media, terrorists were able to stage a well-planned assault on the city and also determine the exact hiding places of their targets (foreigners), making it easy for the terrorists to launch a surprise ambush. This resulted in the Indian government requesting that all live Twitter updates cease immediately in order to prevent further repercussions.
Who ever thought that the ills of social media were limited to just invasions of privacy and improper posting/handling of content?
Well, I think the biggest takeaway from the information gathered above is this: with a powerful tool like social media at our disposal, we users need to utilize it well and maximize its benefits to society. With great power comes great responsibility. :D


References:
Social Media & Terrorism in Mumbai
Feds reading Tweets