In this week’s lecture we talked about social and ethical issues about the web. There are many problems on web, such things as; copyright, plagiarism, privacy, security, etc. These problems have always existed, but now that the internet use is rising, this problem has been growing and should be stopped. At ECU they take plagiarism and cheating very seriously, and a high form of plagiarism (doing it on purpose) can lead to a student being kicked out on their course and also kicked out of university overall.
There are many problems to do with privacy, and there have been many cases of people putting out their personal details over the web, which leads to identity theft or other serious things.
There are many ways to secure your details and prevent identity theft or other serious things. You can do things such as;
- Install Install a Firewall
- Install Antivirus software
- !Beware of Attachments!
- Be aware (and Beware) of Spyware
- DO NOT give personal information about yourself
- Do not reply to SPAM mail
- Set online programs to maximum security settings
- Use Peer 2 Peer (P2P) software with caution
- Update your Antivirus software at least weekly
- Always scan documents (with Antivirus software)
- BEFORE you open them for the first time.
- Turn the Preview in your e-mail client OFF
Tutorial (Work Shop Twelve)
Our first task this week was to visit the Australian copyright council website on www.copyright.org.au and choose five information sheets that would be relevant to me as an undergraduate. Here is the list of information sheets I chose;
- Photographers
- Websites: creating and publishing in the internet
- Databases, compilations, tables and forms
- Graphic designers
- Internet: copying and downloading
The second task today was to visit the APRA website on http://www.apra.com.au/music-users/online_mobile/online_mobile.asp, after reviewing the website, our task was to explain what we need to know about music and the web. This is what I wrote.
Many people who download music over the getting music for free should pay attention on the people who actually wrote the song and how they are getting cheated. By downloading music without paying, mean the songwriter does not actually get paid. Now imagine this happening every day, by many people. How much is this songwriter getting cheated for his or her money that she rightfully deserves. Any use of copyright music requires the appropriate clearances to be obtained. Whenever music is downloaded or streamed over the internet, there are a number of rights which are exploited. These include: The reproduction of a musical work; and the communication to the public of a musical work (APRA, 2008).
The third task was to write a plan on how to protect myself from attacks on my privacy and security.
- Firstly, I should check if my internet is firewalled
- Secondly, I should check whether I have an antivirus installed, if so, my computer should be checked at least once a week.
- I should always check attachments for viruses before opening them.
- I will never give out my personal information (name, number, etc.)
- Lastly, I will turn off the preview section of my emails
This week's lecture and tutorial was very informative, and will come in handy next time I receive an email that looks very unreliable and unfamiliar.
In the tutorial Gary also wanted us to include two videos in this week's blog, after putting the video in this blog, he wanted us to one of them, when come across, play automatically. My videos will be found below.
Videos from youtube.com
I found this video on the home page of youtube.com, it is a random video, which is pretty funny.
I also found this on youtube.com and found it very funny, I hope you enjoy it.
Readings
Reading One: ‘EFF's Top 12 Ways to Protect Your Online Privacy’
The first reading was about how to keep yourself and you computer safe, it gives such tips as, don't give out presonal information, do not replay to SPAM, etc. basically what I underlined in the from the lecture and tutorial summary.
Reading Two: ‘Ethics in Computing - Social Justice Issues: Electronic Monitoring’
The second reading is similar and gives tips on how to keep your computer away from viruses etc, it gives example of cases where things have gone wrong where emplyees download photographs that may contain harmful viruses.
Reading Three: ‘Brown & Michaels - Overview of Intellectual Property’
The third reading is about how to protect your intellectual property. For example, you come up with something original, how do you protect it from being stolen? It lists numerous ways to keep your own ideas from being plagiarised. You should do such things as copyrighting, trademarking etc.