Monday, May 4, 2009

Course Reflections

Content: I honestly took this course because I enjoyed Dr. Chandler’s teaching style when I had her last semester for Creative Non-Fiction. This course was very different from the previous course I had with her, but it was very educational because it focused on the different types of media that we use today. Our society is growing more and more technologically advanced by the day and this course was very helpful in assisting us with learning more about the different technologies and how they relate to literacy.

Activities: I really liked how open this class was. Most of us all had the same experiences with technology and the activities we did in class and the ones we did at home, really helped with understanding the course objectives.

Assignments: I think we had a relatively decent amount of work to complete. I don’t think I would have asked for more or less – what we had to do was sufficient with the time frame we were given. Also, I think the readings were great with helping to understand the course - and technology/literacy.

Liked: Out of all the assignments, I liked the presentations with the different groups because each group covered a different topic and the presentations were all very interesting. I also enjoyed learning how to build a web site because I feel that as a future teacher, this will be something that I will find useful in the future. I also liked blogging. After last semester, I decided I really enjoyed blogging and kept with it.

Dislikes: I did not like the Wikipedia assignment much – just for the fact that I am still confused by the entire process. Even though a few of my classmates explained chatting with the “supervisors” of the posts, I still am not very clear about it. However, I am happy to say that my post is still up!

More: I liked that we had workshop time in class and I think that it was very useful and helpful to us all – particularly with the web site building.

Less: I think Kean needs to do something with the computers because some of us really had a hard time with them this semester – especially with FrontPage. I think if the computers were workable, there would be no problem for this class.

**Overall I really enjoyed this course. It was very interesting and I developed new skills that I feel will be very helpful for me in the future.

Monday, April 6, 2009

Blog #18 - Attending Patterns

1. The forms of media I often use are the computer, my cellular phone, and the television. The way I interact with them all has been extremely different throughout the years. I always enjoyed watching television but I notice that as I get older, I watch less of it. I also rely heavily on the computer - for school and work tasks, and my cell phone more and more - especially because technology keeps adavancing.

2. TV - between 30 mins -2 hours a day 1
Cell phone - atleast 1 hour per day (broken up into incriments - not a straight 60 mins). 2
Computer - if working, usually 5 hours (I am a secretary), if home, maybe 1-2 hours depending on homework load 4

1+2+4= 7/3 = 2.3

3. do math or other calculation-based homework - I have no math classes but I do use math daily when it comes to my finances and for this I usually use a calculator 4
read assignments - if online readings, I use the computer 5
compose a paper (answers may be different for drafting, revising + editing) - computer 5
study for an exam - sometimes the computer for DLing study guides and other materials 5
conduct research / find references - the computer 2

4+5+5+5+2= 21/5 = 4.2

4. drive - electronic devices in your car such as radio, speedometer, gas gages.. 4
eat a meal by yourself - cell phone 2
eat with your family/friends - none 1
household chores (cooking, cleaning, household repairs, work on your car) - vacuum 3

4+2+1+3= 10/4 = 2.5

5. In my free time I like to spend time with my family and friends, I shop, watch television, use the computer, go to the beach, read, go to the gym, spend time with my boyfriend, take a nap, take a bubble bath, read both books and magazines, take my dog for a walk,

How I relax -I try to either keep to myself or surround myself with loved ones like my family, friends, or boyfriend - all depending on what kind of mood I am in. I also try not to think about anything too stressful or overwhelming.

6. A) I did my numbers on a scale of 1- hyper attention 5- deep attention (flip flopped the scale given) and I notice that when it's something personal or for me, it's hyper and when it's school or work related, it's direct.

B) The drive and eating category was the most diverse. I think this is because driving is such a serious matter whereas eating is more lax.

C) The most consistent was the more serious matters that revolve around school and work. I think this is so because these are very important.

7. This excersise basically confirmed what I originally thought and that was that I am more direct with more important subjects and more lax with personal/hobbies.

Sunday, April 5, 2009

Blog #17 - Revised Draft for Web Essay

Identity theft has been a growing problem in the United States. Each year there are more and more cases of identity theft and the issues seems to have no end in sight. Identity theft is a crime in the eyes of the government and it is where someone obtains someone else's personal information, such as social security and credit card numbers, and uses it to either steal money, make purchases, or gain other "benefits."

There are various categories of identity theft. One category is financial ID theft. This is broken down into two parts: victim established account access and perpetrator established accounts. Victim established accounts are when the thief pretends to be the existing account holder in order to obtain his or her funds. Perpetrator Established Accounts are when the thief opens a new account with stolen information. The second category is identity cloning and concealment which is when a perpetrator impersonates someone through the use of stolen information and uses the new identity to conceal themselves from authorities. Criminal identity theft is when a thief obtains personal information in order to create an ID card and when the person identifies him or her self to the authorities, they use their "new" name, concealing their true identity. Synthetic identity theft is the hardest form of theft to trace because here, a thief will commonly combine a real social security number with a name and birth date, creating a new persona. And finally medical identity theft occurs when someone uses a someone elses name and sometimes other parts of their identity, like insurance information, without their consent to receive medical services.

There are various ways that an identity thief can obtain personal information and steal an identity. ID thieves are often very witty and think of various ways to obtain this information like going through people's garbage and mail, pick pocketing, eavesdropping, mailing change of address forms to a new residence, and impersonating someone else. Thanks to technology, these thieves have a new medium that gives a variety of new and creative ways to retrieve this information. By using computers, thieves are able to research databases to find out addresses, and telephone numbers.

One of the most popular ways that enables thieves to commit such and awful crime like ID theft is online shopping. Online shopping has been one of the most useful technological advancements of our time. Through online shopping, people are able to purchase anything from cars to groceries all by the click of a mouse. However, it is not as safe as handing cash over to a cashier at your local supermarket. In order to purchase items online, one must give a name, shipping/billing address, phone number, email address, and a form of payment. Typically, the way in which people pay for things online is by entering in a credit/debit card number and or bank account/routing number. Once this information is inputted into the computer, it becomes stored in a data base. If the site you have just purchased from is not a secure website, which is a site that uses encryption and authentication standards to protect the confidentiality of web transactions, then your personal information will be available to anyone who chooses to look for it. The most common season for identity theft crimes committed through the use of online shopping is, you guessed it, Christmas. During the holiday season, online retailers offer aggressive pricing in a tough economy that attracts consumers to by their products on the Internet. The Friday and Monday after Thanksgiving are among the top days of ID theft online due to the overwhelming amounts of online shoppers within these two days.

Statistics show that even though online identity theft case numbers are rising, low-tech methods for stealing personal information are still the most popular. Stolen wallets and physical documents accounted for 43% of all identity theft, while online methods accounted for only 11%. However, there are over 10 million identity theft victims in the US each year with an identity stolen every 4 seconds. In ID cases, 71% of the fraud happens within a week of stealing a victim’s personal data. Victims also spend an average of 600 hours recovering from this crime with an average recovery cost of $8,000.

Ways to secure your online shopping experience:
-Make sure you are doing business with a legitimate company
-Make sure you are using a secure website: indicated by “//https:” in the beginning of the address, and a locked padlock icon on the web browser
-Keep photocopies of the order
-Read the fine lines
-Note the return and or exchange policy
-Read the Web Site’s Privacy and Security Policies
-Disclose only necessary information needed to complete your order
-Track your order through government/postal service sites
-Be Cautious with “Electronic Signatures”
-Do not use debit cards for on-line shopping
- Use a credit card that you designate for online shopping only which makes it easier to recognize fraudulent purchases
-Never send a check to pay for a purchase
-Obtain a confirmation number
-Read the shipping rules to find out who pays for shipping
-Confirm that they do not share your information with other companies
-Keep a photocopy of your order, the mailing address and phone number of the company, and the confirmation of your order
-Keep your computer protection programs, such as firewall, anti-virus, and anti-spy ware software updated

How can you tell if you are a victim of identity theft?
- Look for changes in bank accounts
-If you fail to receive bills or other mail, this may be a signal of an address change by the identity thief
-You receive credit cards, statements, and billings for which you did not apply
-You are denied credit for no apparent reason
-You receive calls or letters from debt collectors or businesses about merchandise or services you did not buy

Saturday, April 4, 2009

Blog #16 - Sloppy Outline for Web Site

Here is an extremely sloppy draft/outline for the web site assignment - I am still tweaking everything and coming up with new ideas:

Main page: Basic Info..
-Information regarding what will be available on the site and what information will be discussed

Second page/node: What is Identity Theft?
-Information about what identity theft is
-Different types of identity theft: financial, identity cloning and concealment, criminal, sythetic, and medical
-common ways people committ identity fraud/theft

Third Node: ID Theft Related to Online Shopping
-Information about how online shopping has lead to rising numbers of increasing cases of ID theft
-Season at which ID theft peaks: Christmas time
-Why does online shopping make ID theft easier and more accessible?
How technology contributes to ID theft:
-http://www.nytimes.com/2006/05/30/us/30identity.html?_r=1
-http://archives.cnn.com/2000/TECH/computing/08/16/id.theft.offline.idg/

Fourth Node: Statistics
-http://www.identitytheftsecurity.com/stats.shtml
-http://www.privacyrights.org/ar/idtheftsurveys.htm
-http://www.spendonlife.com/guide/2009-identity-theft-statistics

Fifth Node: Ways to Prevent ID Theft While Shopping Online
-http://identitytheft911.org/articles/article.ext?sp=10731
-http://www.privacyrights.org/fs/fs23-shopping.htm

Reference page of all sites used to be added at the end.

Blog #15 - Wikipedia Updates

Luckily, my Wikipedia post is still up. I did it on the NJ Core Curriculum Content Standards because when I went searching for them, I was amazed that there was no post regarding them... especially since they are the foundation for education in NJ.

My link is:
http://en.wikipedia.org/wiki/New_Jersey_Core_Curriculum_Content_Standards

And my user name is: JMC3080

All in all my experience with Wikipedia has not been a bad one - my post is still up. However, I do still find it a bit difficult and I don't think I will use it too often in the future. But you never know!

Blog #14 - Thoughts & Ideas for the Structure of Hypertext Essay

Since I have gotten off to an extremely rocky start and have changed topics several times, I think I finally have settled on the idea of how the technological advancement of online shopping has caused the numbers of cases of identity theft to rise.

Organizing information:
I would like to have chuncks of the site for each section. One of the sections I would like to have is a statistic section of the number of identity theft cases that shows how the numbers have risen as a result of identity theft and specific seasons when identity theft peaks. I would also like to have a section related to why it is so easy for people to get a hold of personal information and steal identities because of technological advancements. I would also like to have a section related to how to prevent identity theft when using the internet as a place to shop and make purchases.

Structure Ideas:
The site structures I am considering are linear, nodes, and spoked.

Monday, March 30, 2009

Blog #13 - Research Plan

I have had the toughest time coming up with a topic for this website. I have revised my topic serveral times and am about to do it again - I am going to do the site on online shopping and how it contributes to the rise in identity theft. This ties into my original concept of identity theft but also gives me room to discuss a topic I thoroughly enjoy - shopping! I think this could be really interesting and fun to research. Dr. Chandler if this is ok, please let me know :)

Purpose: Upon researching this topic, I am hoping to find information about how the rise in online shopping also contributes to the rise in identity theft. I am also hoping to find different ways of how to prevent identity theft.

Users: The technological and computer savy members of society who frequently use the computer for shopping purposes and those who have been victims of identity theft.

Research Question: How has the technological advancement of online shopping contributed to the rising number of cases of identity teft.

Layout: I'm still coming up with layout decisions but I would like to include pieces that inform the readers of what identity theft is, statistics, how to prevent identity theft, and how online shopping has caused case numbers to rise.

Helpful links:
-en.wikipedia.org/wiki/Identity_theft-www.business.mcmaster.ca/IDTDefinition/defining/idfraudTCF.htm
-www.identitytheft.org/
-www.usdoj.gov/criminal/fraud/websites/idtheft.html
-http://www.privacyrights.org/fs/fs23-shopping.htm
-http://www.idtheftcenter.org/artman2/publish/m_press/Safe_On-Line_Shopping_Tips.shtml
-http://www.internetretailing.net/news/data-theft-concerns-beginning-to-hit-internet-shopping-volumes