ASSESSMENT PIECE:

New Communications Technology Assignment- Academic Essay. Casey Atkins

Does the extensive use of social media have a positive or negative impact on the health of young people?

WANT TO KNOW THE ANSWER…?

Follow this link to view my personal work and completed university assignment.

New Communications Technology Assignment- Academic Essay. Casey Atkins

New Communications Technology Assignment- Academic Essay. Casey Atkins

New Communications Technology Assignment- Academic Essay. Casey Atkins

New Communications Technology Assignment- Academic Essay. Casey Atkins

New Communications Technology Assignment- Academic Essay. Casey Atkins

New Communications Technology Assignment- Academic Essay. Casey Atkins

Political Choices

 


What do your musical choices say about your political choices? Are they related?

Personally, I think that my musical choices are influenced by and influence the environment around me (specifically my social scene). As I am younger (18 years old) I have do not have a lot of experience with such things a politics, and having to make a choice for our nation as such. Honestly I think that if our musical choices said something about political choices for the younger generation, then we would be in an extremely confusing situation.

 

What are the characteristics of a “white hat” hacker? 


A “White Hat” hacker could be considered a cyber hero to companies with technological flaws in their databases or basic website set up. In comparison, they may be regarded in a negative light to those the business calls “Black Hat” hackers, which are essentially the opposite of the white hats. White hats successfully identify a ‘loophole’ within a network, informing the owners of this weakness ASAP. They do this in order to avoid black hats taking advantage of the systems weakness for their own malicious needs. “The term comes from old Western movies, where heroes often wore white hats and the “bad guys” wore black hats.” (Margaret Rouse, TechTarget)

 

Is Wikileaks a force for good in the world? 


In regards to informing the general public of important information that we are denied, I believe Wikileaks has potential. Although in saying that, it is their initial purpose for releasing important documents that labels the site as malicious. “…However the purpose of Wikileaks’ mass publication of hundreds of thousands of other classified diplomatic communications is avowedly to strangle the flow of US government internal communications and cripple the ability of the US to conduct international diplomacy and statecraft” (Professor Michael Fraser, Communications Law Centre UTS) This can be classified as a political attack on one country, which cannot be deemed as a “force for good in the world”, especially when the country ‘attacked’ was such an influential nation.

 

What are/were the Australian Government’s plans to censor the Internet (the so-called “Clean Feed”)? 
   

 “Clean feed in Australia is a proposed mandatory ISP level content filtration system. It was proposed by the Kim Beazley led Australian Labor Party opposition in a 2006 press release, with the intention of protecting children who were vulnerable due to claimed parental computer illiteracy. It was announced on 31 December 2007 as a policy to be implemented by the Rudd ALP government, and initial tests in Tasmania produced a report in 2008. Public opposition and criticism quickly emerged, led by the EFA and gaining irregular mainstream media attention, with a majority of Australians reportedly “strongly against” its implementation.” (John Liebhardt)*.

The expense of such a ‘program’ and the inaccuracy of ensuring its policies would be adhered to caused the “Clean Feed” plans to be cancelled right after the Australian elections of 2010.

 

*Liebhardt, John (11 December 2008). “Australia rallies to “Stop the Clean Feed””. Global Voices Online. Retrieved 2008-12-11.

 

 

What place does censorship have in a democracy?
   

In terms of the pure definition of democracy, censorship does not have a place within those parameters. It is also the policy of the government and moral obligation of a country to ensure the protection and safety of their citizens. That is why censorship is put in place. In comparison to countries such as China where censorship is applied to almost all aspects of the Internet, the Australian laws regarding censorship are fairly lax.

 

When will the NBN get to your place? What are the benefits?

I researched my address in regards to the NBN rollout dates and all I found was the notice that: ”The NBN rollout has not started in your area yet”. Broadband is supposed to be more efficient and available to everyone with access to Internet. Whether they are in the heart of the city, or in the middle of a rural town- you are promised a connection to broadband quality Internet at a cheaper and much faster rate.

 

Look up the Queensland or Australian Hansard to find the last time your local member spoke in parliament.

 The last time Karen Andrews spoke in parliament was on the 27th August 2014.

Screen Shot 2014-09-04 at 9.02.19 PM 

Contacting Barack Obama

I created a twitter account in order to get into contact with Barack Obama. It is absolutely astounding how easy it is to contact figures of such high authority and status. It does not necessarily mean that they will reply, but they made read your direct posts to them. Here are my tweets about “freedom of internet usage and its importance”:

Due to the 126 character limit I had to send multiple messages to get my point across.
Due to the 126 character limit I had to send multiple messages to get my point across.

 

 

 

 

 

 

 

 

 

Barack Obama has recently been tweeting/discussing matters regarding the up and coming election. He is boosting his political party, and ensuring his followers on twitter do not become ‘cynical’ because of the competition. He is strategically mentioning positive and recent achievements of his political party. 

Screen Shot 2014-09-04 at 7.45.16 PM

Response to PROFESSIONAL BLOGGER: ‘Alan Davies’

I searched for popular and valid news websites with useful articles, and professional bloggers, for quite some time. I settled for the website 'Crikey'. I selected an article written by Alan Davies. Davies is a transport and urban development consultant and is also a professional blogger for 'The Urbanist' (In collaboration with 'Crikey'). I responded to an article regarding transportation for those who live in more rural regions of Australia- and the cost and ramifications of varying transport (from public to private).
I searched for popular and valid news websites with useful articles, and professional bloggers, for quite some time. I settled for the website ‘Crikey’. I selected an article written by Alan Davies. Davies is a transport and urban development consultant and is also a professional blogger for ‘The Urbanist’ (In collaboration with ‘Crikey’). I responded to an article regarding transportation for those who live in more rural regions of Australia- and the cost and ramifications of varying transport (from public to private).

Screen Shot 2014-09-04 at 6.45.10 PM Screen Shot 2014-09-04 at 6.45.01 PM Screen Shot 2014-09-04 at 6.44.26 PM

Week Four Weblog:

WEBLOG TIMELINE OF MOBILE PHONES 

http://www.tiki-toki.com/timeline/entry/323721/Technological-History-of-the-Mobile-Phone/

CYBERSPACE:

Cyberspace is a figure present within the minds of Internet users. It is not a physical being; it is a rather difficult term to define. The concept of Cyberspace borders the line between reality and imagination. There are “public structures produced by living minds interacting with each other and the real world” (Karl Popper, 1972). It is believed that the concept of Cyberspace belongs in this category. Cyberspace, as previously stated is difficult to define correctly although it may be considered “A conceptual space where words, relationships, data, wealth and power are manifested by people using Computer Mediated Communication technologies” (Lecture 3, Week 3). Many argue that Cyberspace is another form of reality, this argument stems from those who make a living from cyberspace, and find themselves submerged a reality separate from the physicality of our current lives. The problem with our society is that many people find it difficult to decipher reality from their cyber reality, with most of the younger generations being raised bombarded by new communications and advanced technological devices connected to the Internet. Personally, I did not recognise the amount of time I spent scrolling through the world of cyberspace till I sat in on these lectures and began reading the recommended texts. Almost everyday we are constantly barraged with the pressure to be online, whether that is on our laptops, phones or even at university. It can be difficult and I understand how some people can get lost in this ‘alternate reality’ where you can be whoever you want to be. Shows such as MTV’S ‘Catfish’ which delves into the world of cyberspace fakes and romances really opened my eyes to the extremities of Internet addiction, the safety precautions we must take, and the seriousness of cyberspace. Griffith University is a cybernetic system, as we are given to option to complete 90% of our learning online- including the submission of assignments, video recordings of lectures and email alerts. All in all the ‘reality’ of cyberspace is that in this day in age it is a concept difficult to escape. The only way to control the way cyberspace regulates your life is to regulate how much control you have over your use.

Week 3 Weblog:

Week Three Lecture & Tutorial: 

This week we discussed the ramifications and also the positives of advancing technology. Discussion was based around the idea that technology (such as the likes of mobile phones) could harbour important information and dispense of this publicly. It became a human vs. robot debate. We as humans can reap many benefits from encouraging such technological advances into our lives. Although in saying this we must proceed with caution and the utmost diligence for such developments. Security protocols regarding personal information are procedure for a reason, to protect the user. Although many companies tend to harbour this information without your knowledge or ‘proper’ consent. Your accounts online can be used to not only define who you might be socially, but can be used to track your every movement; a scary but realistic thought in sight of the 21st technological development’s. Another discussion stemmed from the ‘personalisation of the web’. Google has been experimenting with such tactics, although they were going seemingly unnoticed. Due to the collection of personal data (recent Google searches, regularly visited links, logs of time activity) advertisements personalised for you specifically are strategically placed within the confines of Google and associated websites. This personalisation is very specific and can persuade many users in purchasing or investing in advertised products. For example, Strauss and Frost (1999) 1 point out that the Internet enables a new kind of personalisation that is built into the structure of the Internet use experience. For examples, when consumers create a customize “my yahoo” page, they not only get personal news, weather and television listings, but also give the site owner insight into the personal preferences that might lead to more targeted selling messages. Many are concerned that this collection of personal information is not only deceiving, but also a violation of ones privacy. In regards to commercialisation destroying the web, we as a society are already bombarded with severe commercialisation through exposure to television programs, magazines, billboards etc. Employing the use of the World Wide Web in regards to commercialism is causing such exposure to ‘follow us home’. There is no real escape to such ploys of the media.

 

1 Strauss, J., & Frost, R. (1999). Marketing on the Internet: Principles of online marketing. Upper Saddle River, NJ: Prentice Hall.

 

Which of Stephen Stockwell’s books are in the Griffith library? Give full citations.

Stockwell, Stephen. Rhetoric and Democracy: Deliberative Opportunities in Current Electoral Processes. N.p.: n.p., 2010. Print.

Stockwell, Stephen, and Paul Scott. All Media Guide to Fair and Cross-cultural Reporting: For Journalists, Program Makers and Media Students. Nathan, Qld: Australian Key Centre for Cultural and Media Policy, 2000. Print.

 

 Cite three academic books that might provide useful material for an essay about Jean Luc Godard’s Alphaville. On which campuses do they reside?

Brody, Richard. Everything Is Cinema: The Working Life of Jean-Luc Godard. New York: Metropolitan /Henry Holt, 2008. Print.

This book resides at the College of Art (Southbank) and Nathan Campus.

Godard, Jean-Luc, and Peter Whitehead. Alphaville: A Film. London: Lorrimer, 2000. Print.

This book resides at the College of Art (Southbank) and Nathan Campus.

Meehan, Paul. Tech-noir: The Fusion of Science Fiction and Film Noir. Jefferson, NC: McFarland, 2008. Print.

This book resides at the College of Art (Southbank).

 

What is a book that will assist you to find out about possible research methods to explore social media? Full citation.

 Hallam, Jed. The Social Media Manifesto. London: Palgrave Macmillan, 2013. Print.

Moe, Wendy. Social Media Intelligence. Cambridge: Cambridge UP, 2014. Print.

 

What is the latest medical thinking about internet addiction? What database did you use? Full citation.

“The key to Internet addiction was a craving for the anonymity it offers, Dr Young said. That anonymity was a constant theme with addicts, because it provided them with an escape from personal problems, such as anxiety or relationship troubles. However, that was also its most dangerous factor: encouraging deviant behaviour, such as the development of sexually aggressive online “personalities”, or the downloading of illegal images, such as child pornography.” (Rumbelow, Helen 1999)

Rumbelow, Helen. “Internet Addiction Is Real Mental Illness.” The Times [London (UK)] 30 Sept. 1999, 5L ed.: 1-8. Print.

This was found in the ProQuest Newsstand Database,

Week 2: Personal experiences with Communication Technology

I have been using the new communication technologies such as texting, Facebook and various applications within my smart phone since I was 11 years old. At first it was just to communicate with my circle of friends at school but then it expanded to communication with my family as I grew older and became more independent. Honestly, it is a great way to inform your parents of your whereabouts (when you remember to) but can also limit ‘REAL LIFE’ social contact with your loved ones. Privacy is an issue when using new technologies because I prefer to keep my personal information to myself and to those whom I know in real life. Although Facebook claims to have efficient and protected privacy policies in place. Berteau (2007, para 15) states that “… before Facebook can determine whether the user is logged in, some data may be transferred from the participating site to Facebook. In those cases, Facebook does not associate the information with any individual user account, and deletes the data as well”. In saying that I do communicate with a few people who I have never met in person before, sometimes I think this form of communication (when controlled) is a positive experience and can aid ones social skills (conversational). I think the Internet and how it collects information regarding its users is a scary concept, although in saying that, the companies may collect such information to ensure the safety of their own product, business and overall success. Overall I think that using these communication technologies has improved my social skills but has hindered relationships with those I am closest too, due to the amount of time that is consumed by these applications and websites.

Referencing List:

Stefan Berteau November 30, 2007. “Update: A Statement From Facebook”CA Security Advisor Research Blog. Retrieved December 8, 2010 <http://en.wikipedia.org/wiki/Criticism_of_Facebook#Privacy_concerns&gt;