Friday, December 10, 2010

UWB radio transmissions


2. What might you do with access to UWB radio transmissions if you had a receiver in a car?
Ultra wide band radio transmissions use very low energy levels for short range high-bandwidth communications. I do not know much about the technology, but it might be a technological revolution if perfected. To me it sounds like the technology would be useful for sending digital information. UWB could be useful for the wireless transmission of music from a computer directly to a car. This would eliminate or decrease the use of CDs, iPod, and satellite radio in the car. It also seems like it would have the potential to access almost all the uses the Internet from the car. It would be pretty cool to write an email by just using your voice, and have that transmitted immediately while driving. The possibility of future technology seems endless and I can’t wait to see what the world will be like in ten years.

Ken Zeran


1. What might you have done differently if you were in the position of artist Ken Zeran, mentioned in this chapter?
Before I dive into my response I think it is important to recognize that Ken Zeran’s story occurred in 1995, which was long before Web 2.0 emerged. Basically, Zeran was thrown into an online story outbreak that contained falsified information. He did almost everything he could to protect his reputation by containing AOL, KRXO, and trying to personally relay his story to phone callers. He also stuck by his innocence and pursued a deformation suit against the companies. I would have done the exact same process as Zeran, given the time period; however, if this happened today then it would be important to take advantage of the valuable resource known as the Internet. Zeran could have fought back by creating an online blog, or posted his accounts on a social network. He could have accessed other media outlets to make his side of the story more public.

Thursday, December 2, 2010

DRM-protected content


What’s the value of a bit? It seems that going after folks who have traded songs or movies online is a huge expenditure of effort and money. Is DRM-protected content the way to go? If you don’t agree, propose another method for the distribution of digital multimedia so that content creators can still be compensated.
To prevent infringement many companies have turned to digital right management (DRM). DRM is digital content controlled by restrictions, limiting the use of the information. DRM-protected content, like everything else, has its advantages and disadvantages. I believe that DRM-protected content has helped prevent infringement and illegal downloading; however, I believe the restrictions leave users with little options.
According to Abelson the cost of illegally downloading a song could range from a minimum of $200 to be as high as $150,000. Personally, I did not know until after reading chapter 6 that the costs associated with a bit could be that substantial. I believe that these cost deter some people from illegally downloading songs, but in reality a lot of individuals will still take the risk of illegally downloading. The DRM-restrictions placed on media downloaded from iTunes or say from a CD prevent some users from playing the files, or transferring the data. I think DRM is a current solution to prevent users from illegal downloading and sharing media files. Though, I believe there will we new technologies that find away to get around DRM-protected material. I do not believe there will ever be a system that could not be hacked. I think DRM-protected material is a good thing for the market, since it helps reward file creators. I also, believe that it places to many restrictions on files. For example, the invention of iTunes allowed downloader’s to pick and choose what songs they want, and to customize playlist. The invention of the Napster and the recently shut down Limewire offered users to download similar files for free. The difference is iTunes downloads are protected, which prevents infringement and viruses. The bad thing is that iTunes downloads have restrictions on the files can be transferred. Overall, I think DRM-protected material has been a good thing, but I believe it may restrict how users use files that they rightfully own.

Friday, November 19, 2010

FOAF-style network

2. What professional benefits do you see by investing some time in a FOAF-style network?

Social networks allow users to connect with one another. Sites like Facebook, LinkedIn, and Twitter, can be considered FOAF-style networks. These forms of networking create many benefits in the business world. It allows many professionals to find job applicants through word-of-mouth, and personally see their qualifications. There qualification can be based on personality and professional experience. By using a FOAF-style networking in the hiring process companies can decrease ROI and recruiting cost. For example, a LinkedIn account is a form of marketing oneself through an online profile that demonstrates who you are and what you could offer an employer. In many cases these sites have more personal than professional benefits, but I believe personal connections can help land you a professional benefit. By using these networking platforms users can stay connected with various individuals on a regular bases, which increases the chance for professional benefits to occur.
 


"I Pledge" - KES

Prisoner’s Dilemma


1. Considering the Prisoner’s Dilemma in this chapter, provide your own insight on how sites such as eBay “work” for most participants of this popular online auction site. Do they really work? Or is there too much risk?

Shirky outlines the Prisoner’s Dilemma on page 189 of his book. He states that there are different outcomes, which depend upon two parities that lack the ability to communicate or trust each other. Basically these two parties might not cooperate with one another even if it is in their best interests to do so. This relationship is very similar to how sites like eBay operate.

Since there is no way to read other individual’s minds there are four possible outcomes to a Prisoner’s Dilemma. In terms of an eBay transaction the outcomes would be as follows:
The buyer and seller both complete the transaction as expected.
The buyer rips off the seller.
The seller rips off the buyer.
The buyer and seller both rip or take advantage of each other.  

Sites like eBay give users access to a lot of products or services that would other wise not be available to them; however, eBay transaction are hit or miss. eBay allows email communication between buyers and sellers. This lack of direct communication increases the chance of rip offs, and untruthful transactions.  If a user is buying, say a watch for example, on eBay they are running the risk that this watch might not be what they were expecting. The seller is also running the risk of the buyer not providing adequate payment. As an eBay user is it important to always read product descriptions and buy from top rated sellers. By doing so a buyer reduces receiving a defective product and the seller receives payment (and hopefully a higher star rating).
            In my opinion, eBay is a create resource. I believe that most users are looking for the same end result, satisfaction. eBay is a user friendly tool that offers its services with a few clicks of a button. There maybe some users out there that are looking to rip off people but by taking purchased products, and using PayPal or credit cards to place orders most people receive what they are looking for. Overall, I love eBay and do not consider it a risky resource.


"I Pledge" - KES

Thursday, November 11, 2010

Information Cascade

Look deeper into the concept of a “information cascade.” Can you cite an example of where following the actions of others was a sound idea? Where doing so ended up being a poor choice?

The phenomenon, information cascade happens when people observe the actions of other individuals and then rationally make the same choice that others have made. A good example of an information cascade would the 1989, protests in Leipzig, Germany. Protestors would conduct weekly meetings, in which the number of attendees grew rapidly. After reaching over 400,000 members the protestors marched the streets of Leipzig, until the Berlin Wall collapsed (162). The Tiananmen Square Massacre in China represents bad example of an information cascade. The protests lacked a definite cause, and leadership that resulted in Hu Yaobang and an unknown number of other deaths.

I pledge - KES

Technology Behavior

Based on the quote from this chapter, “revolution doesn’t happen when society adopts new technologies--it happens when society adopts new behaviors,” do you agree or disagree? Cite examples to support your position.

When new technologies emerge in our society we are invisible to their impact. I believe that as a whole our society desires technology and change; thus we are always looking for the newest and the best. I believe that the television, the Internet, cell phones, social networks, and other technologies are changing how we communicate as a society. Overall, it seems that our society continues to adjust to communication technology, making it harder for individuals to track exactly how technology actually impacts daily life. The reason why society doesn’t adopt new technologies is because our behaviors for that technology make the technologies’ impact happen. In the 1990s, Tim Berners-Lee discovered the Internet, which has become a major aspect of daily life. The Web is technology but society has made it modifiable, accelerate, and fit into modern society (Shirky, 158). In other words, people make technology then societal behaviors reform the technology to a better social fit. I agree with the quotation above.

I pledge - KES

Thursday, November 4, 2010

Mental Transaction Cost

2. Explain and give an example of a mental transaction cost.

When individuals debate or decide whether or not to buy a product by looking solely at the price they are performing the thought process called ‘mental transaction cost’. An example of this process would be an online company offering free shipping to your house and if you do not like the product you can return it for free. This concept allows consumers to virtual shop online with ease. It reduces the fear of ‘will I like the quality of this product?’ or ‘did I order the right size?.’ By taking shipping costs out of the equation consumers worry less about the consequences behind the purchase. Personally, I believe many individuals base their purchasing decisions on cost. Thus, this mental transaction cost places the value on a product. At times taking away consumers’ thought process can trouble companies with return sales, and more money spent on unnecessary harmful deliveries.

Free?

Why is “zero” such a hot-button word?


Zero is such a hot topic because why would one want to pay for a product or service if they can get a similar one for free? Well the main question here is, should we be thinking twice about free products?

The concept of free or no charges manipulates consumers minds changing how the might actually feel about a given product or service. The zero price tag psychologically causes a customer to forget some of the pitfalls that free product might have. Another aspect of free products is that the consumer might not take full advantage of what the product has to offer; therefore never realizing it’s true benefits. Then there is the other side of the story, does this product’s benefits out way it’s costs. Personally, I believe there is not such thing as free. Regardless of the zero price tag on an item, consumers still spend time or money presuming that ‘free’ product. Ultimately, the concept of zero ties to product sales, promotions, and discounts.

Wednesday, October 27, 2010

Scratch

After reading the article about Scratch and exploring the Scratch website, what are some observable benefits in creating a space to share student work?
             
The concept behind Scratch is brilliant, those who never imagined themselves as programmers actually have the opportunity to join an online community. A community built around people of all ages, backgrounds, and interests. An online network, where users interact and share games, animations, and simulations through various forms of media. The Scratch website launched in May 2007, mainly focusing on young adolescents giving them an opportunity to share interactive projects, learn mathematical skills and technological concepts. The site benefits young student users by allowing them to gain early access to computers, and teaches them how to embrace the world’s rapidly changing technologies.  
The website is designed with the young users in mind. Site developers wanted to create the concept of the site as ‘more meaningful’, by placing diversity and personalization as a high priority. This online community allows users to share, discuss, and evaluate projects creating a social benefit. Young users learn how to interact with each other and collaborate, allowing them to realize the importance of sharing, and collaborating.  
As a social learning tool Scratch encourages a global network to learn, grow, and build relations while emphasizing the importance of sharing. In the next five years Scratch will increase in popularity, maybe even gain access into some classrooms. Teachers who understand computer functions and the Internet will be more likely to bring online communities into the classroom. Personally, I believe it is important for children to begin learning technology as young as possible and with early exposure children can gain more technological skills. Sites like Scratch allow your students to learn the benefits of online communication earlier in life.
           
"I Pledge" - KES

Wikipedia - JMU only version?

The “power law distribution” or “long tail” phenomenon, as seen in behavior online on Wikipedia, suggests that the concept of an average user of Wikipedia is meaningless. Support your answer: how do you think a local, “JMU only” version of the Wikipedia would compare to the worldwide version? Would it be very similar? Higher quality? Less quality? Why?

I think a ‘JMU only’ version of Wikipedia would create a niche. The online community would be relatively small, not globally known. The site’s main users would be current students. The wiki would consist of courses, community activities, student organizations, businesses, and alumni information. The wiki would increase in size each year, but as new users gain access some users would stop following. There would be a limited number of users who actually update the site’s information. The overall quality of the site would be similar to what is found on Wikipedia. The users are educated, and would know what information is important to the community at large. I actually think the site’s interface could be higher quality. Overall, a JMU Wikipedia would only be useful for those attending the university, university alumni, and prospective employers.

"I Pledge" - KES

Wednesday, October 20, 2010

Our Government and Our Privacy


Some news reports have suggested that the Bush administration used the USA Patriot Act to look at the e-mails of American citizens without a warrant. What’s your position if this was indeed the case? Should citizens be willing to give up their privacy? Does it bother you to know that your online communications are very potentially semi-private instead of private?


It seems that the United States government is always finding new ‘reasonable’ reasons to gain information about its citizens. The USA Patriot Act was enacted to reduce restrictions on the government’s ability to decrypt phone calls, emails, financial data, and other records. The act technically eased requirements on gathering foreign intelligence information within the US, but left many Americans feeling like they gave up their privacy.

I do not have an exact position on this case. As an American citizen I try to trust our government to obey the laws and stick to basic ethical principles. I believe the USA Patriot Act violates the ethical principle of contributive liberty by taking away citizens’ rights to freedom. By allowing law enforcement agencies the ability to search through personal data without a warrant the Bush administration stripped all citizens of their privacy. The American society as a whole is more likely to give up their privacy rights in times of terrorism. Many citizens view this act as unethical and an invasion of privacy; however, some citizens view the situation differently, and do not mind giving up their privacy.

I am slightly bothered that my online communication is semi-private, but in the end it is my choice to post my personal information, and opinions online for public access. I do not want the government to be able to hack my Facebook account or email, but there are privacy policies and laws for many reasons. By using online communications everyone should look at it from the understanding that if you do not want something in cyberspace, then do not attempt to post it.  


“I Pledge” - KES

Wi-Fi Protected?


If your mother uses wifi at home to send you e-mail, and your home network is not protected by WEP or WPA, what reasons would you suggest to her for enabling one of these two protocols at home if the liability of reading those e-mails still exists once her message leaves your home, on it’s way to school?


I would not just inform my mother, but also anyone using a wireless router that when one sends or receives information from a device that anyone within signal range might also be able to obtain the file. This means it is very important to protect data that is being sent via wireless. At home networks should have some form of security protection, such as, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is designed to provide an equivalent level of security to a wired local area network for home and office wireless connections. It provides security by encrypting data over radio waves; however WEP is known for serious flaws. Eavesdropping is made easy with wireless networks because they send data using radio waves. In 2002, WPA security emerged as a protocol designed for wireless security in response to the weaknesses researchers discovered in WEP.

There are loopholes in both protocols that allow outside users access, such as, weak encryption keys. This does not mean that the WEP and WPA home network security systems are worthless. These two protocols decrease the liability of unwanted access, thus any protection is better than none at all. Personally, I would recommend the most up-to-date version of WPA. According to an article on TopBits about WPA the protocol offers the following protection benefits:
  • Requires an authentication server by using 802.1X.
  • Requires re-keying through RADIUS protocols.
  • Centralizes management of user credentials.
  • Implements a structured offset to discourage hacking re-occurrences. 
"I Pledge" - KES

Wiki Summary


The important points I gather from the wiki podcast:

  • What is a wiki? A wiki allows users to edit any page or to create new pages within the wiki website. In other words a wiki is an editable website.   
  • The most famous wiki is Wikipedia
  •  Why use wikis??? 
    • Wikis can be meeting agendas.  
    • Wikis can be collaborative spaces. 
    • Allow documentation.
    • Wikis can be a collection of action items. 
    • Wikis focus on the existing community. 
    • Focus on a compact group.
    • Create an internal blogging system.
  • Ward Cunningham created the first wiki; an environment where users can link together their experiences. His goal was to implement something like a HyperCard and to have a virtual place where people would talk. 
  • What’s HyperCard? Bill Atkinson created this application program for Apple. HyperCards or hypermedia systems created hyperlinks or combines pictures, texts, and graphics in an editable user interface that is kind of like a slide show
  • Media Wiki - a web server software, actually used by Wikipedia.
    • Blue links are to pages that exist. 
    • Red links have yet to be written 
  • Four Leading Wiki Services:
  • Wikis in Plain English

Thursday, October 14, 2010

Come Clean... On My Company Site?

Drug companies should report to consumers by listing potential side effects of a drug on the products’ label or have an informative packet for users. These companies should adhere to all legal requirements, but after that I believe it is up to the company to decide what they want to put on their website. As a business major, I believe companies should do what is socially responsible. If a company, such as Eli Lilly, decides to conceal possible dangerous drug side effects, then it will affect the company image.

If a company wants to be socially responsible the will report side effects on their website. This actually shows that the company cares for its consumers. Thus, I believe prescription drug companies should follow all federal laws; however, it is up to a company to decide how they report that information to potential customers. I believe that as individuals we have the right to post and access information regarding a drug’s side effects, so drug effects can be found on the Internet regardless. As consumers it is up to us to research and look into products. Websites and search engines have almost every tool someone could need to look up what they want to learn.

Friday, October 8, 2010

Proprietary and Open Soure Software

Proprietary software is legally developed, owned, and regulated by various companies that withhold the patents and copyrights used to generate the software.  Microsoft and Apple are two companies that have implemented many examples of proprietary software, such as Microsoft Windows, Adobe Photoshop, and Mac OS X. However, in recent years these proprietary software companies have started to see a decrease within enterprises, while open source software is beginning to take off. Open source software development allows users to gain public access, is regulated by fewer restrictions, has peer review programs to improve quality, and typically operates with a free price tag.
Even though open source software has a key advantage of being cheaper, proprietary software offers the ease of use. Proprietary systems typically allow users to quickly pick up on the software, therefore decreasing the learning curve. Open source systems, such as UNIX, are becoming user friendly, but still need improve their interfaces to satisfy the needs to the average computer user. Some great benefits to proprietary software are regular updates, technical support, and common interfaces. In an article posted on software.ivertech.com it states that the “Perceived advantages of proprietary software include: 1) Reliable, professional support and training available; 2) Packaged, comprehensive, modular formats; and 3) Regularly and easily updated. The downside however is that it is: 1) Costly, and 2) has closed standards that hinder further development.” Overall, open source software is expected to increase in popularity; however, I believe propriety software companies will remain a user favorite due to a more user-friendly reliable history.

“I Pledge” - KES

Sources

Saturday, October 2, 2010

Communities of practice

Communities of practice are developing rapidly on the World Wide Web. By using social tools individuals can form a community where members of that group share their common interests and beliefs, and work together as an extended support group. Some examples of online communities are Gaia Online, Flickr, and Albino Blacksheep. These communities are characterized by the kind of feedback, advice, and support offered. They are basically societies that allow individuals to share their ideas, values, traditions, or whatever applies to their social outlook.

These online communities offer communication, and socialization allowing learning to occur. Individuals can discover what they are looking for almost instantly. Personally, I see these communities as beneficial. They are just a ‘modern way’ for members to find answers, thoughts, facts, and opinions faster; however I do believe that organizations like this need to

Social Media


I think Shirky was right when he implied that social networks are becoming ‘invisible’. Just like group one stated on Monday these networks are becoming decentralized. Everything that was once located in one location can be discovered almost anywhere on the web. Our society continues to adjust to communication technology, making it harder for individuals to track exactly how much networks impact their daily lives. To me, that impact is just another form of how social networks become ‘invisible’.
Social media plays a role in my everyday life. It actually distinguishes where I shop. If I want to spend money on a book, movie, or music I research the product first. These online tools have actually made me more conscious about how I spend my money. Personally, I try to find the best product within my price range. Media tools can promote how a product differs from another and where it is cheapest. I feel this allows consumers to see if the product is actually right for them, and allow them to buy it at the cheapest price possible.

Friday, September 24, 2010

Buy or Sell???

I have sold textbooks on Amazon. I found the process very easy. I made a sellers account and posted the books I wanted to sell. Typically my products sell within a week or two. Amazon sends an email to my email account letting me that the product has been sold. The email provides me with the information needed for shipping out the product. Once the buyer receives the product Amazon automatically transfers the profits from the sale into my bank account. I have also used this site to buy textbooks and find the process just as easy. I find the service user friendly and I will continue to use it.  


"I pledge" - KES 

Answering Important Personal Questions

Google Murder...
The YouTube link above is a clip from the movie Knocked Up. The little girl is talking about how she used the search engine Google to look up the term murder. Just like her, I use Google for answering almost all my personal questions. Google always has the answer that I am looking for. It even has various tools to help me find my answer faster, such as Google instant. I also use Wikipedia in my searches to help give some background information on my questions. I typically look at various search results to make sure my question is being answered properly. I believe that Google and the Internet have helped many individuals become independent thinkers. In many cases it may still be useful to ask questions of various people, but Google has made it easier for individuals to find answers on their own almost instantaneously.

"I pledge" - KES 

Wednesday, September 15, 2010

Group Member


I am currently a student member of JMU Society for Human Resources Management (SHRM). Our student chapter is connected to the national SHRM organization, and we are dedicated to implementing worldwide innovation in the Human Resources profession. The organization is setup like a hierarchy system. We have two head directors, student executives and then regular members. Information is distributed throughout the organization beginning with the directors and executives meeting. After the meeting, information is distributed to all SHRM members via email. The information in the email can also be found at SHRM’s website (http://orgs.jmu.edu/shrm/). Typically the information provided will let all members know when, where and what will be covered in upcoming meetings.

"I Pledge" - KES

Social Networking Sites


Social networking sites are platforms that direct users into building and organizing social relationships. The point of websites such as Meetup.com, Facebook and MySpace is for users to share ideas and communicate with other users to get desired tasks accomplished. People who share similar interests typically use these sites. The sites allow different individuals to communicate their ideas, interests, activities and events. For example users may use the site to form a social event, like a fundraiser. I believe that people use these sites for various reasons.
I believe virtual networking is a great tool for spreading news faster. These websites have helped companies throughout the world reach out to consumers without increasing costs. They allow these companies to market to customers, and for customers to give feedback with a few clicks of a mouse. These websites have also allowed many individuals to get involved with the community around them, and ditch traditional forms of communication. The first chapter titled It takes a village to find a phone from our book written by Clay Shirky discusses that through the internet one can get in touch with someone in virtually any city to find what they are looking for.

"I Pledge" - KES 

Friday, September 10, 2010

Loyalty Cards


I have no issue with grocery loyalty cards; in fact I find them beneficial. I believe that most people in America are like me, willing to give up their personal identification information to receive store discounts. I personally do not mind the offers at checkout. I see the cashiers as hard workers that have a job of trying to retain customers, and discount cards are a form of marketing to the consumer. Typically a cashier will ask you if you want a discount card, and if you opt out, no further questions are asked. I have definitely not given out my email or phone number to some stores because I do not want their coupons. Though for other individuals that 20% off their entire store purchase can save hard earned money. I see giving up personal information as a trade off. The company benefits by learning what consumers want, and the consumers buy more products due to the discounts. I also believe that our personal identification information can be found almost anywhere (credit cards, email addresses). In reality our personal information is not private anymore so I see the discount as worth it. 

"I Pledge" - KES

Wednesday, September 8, 2010

Google versus China

Both Google and Yahoo have made information that was once unreachable searchable via the Internet. The companies have a mission to gather worldwide information and make it accessible to virtually everyone. Though in many countries these companies’ missions have raised concerns.

Foreign governments have challenged the policies and practices of companies like Google. The Chinese government streams and controls the Internet. In China, technology is monitored using government-controlled tools that filter what information its citizens receive. The Chinese government fears that Google is in alliance with the US government in terms of intelligence and security. This means that critics see Google as a violation to citizen’s privacy, lack of censorship and a way of gaining knowledge about other countries’ intellectual property.

I would first like to point out that China is under communist control. Thus from an American stand point we see the Chinese government as taking away its citizens’ freedom. However if you look closely at the situation it is not up to another country to decide what their citizens see. I do not have an issue with China monitoring their citizens. I firmly believe that the Chinese values are the reason behind its strict governance.

I have done research on Google vs. China for my international management class, so I know that Google has access to a search engine method that filters out data. I believe that after a heated debate the Chinese government and Google came to a reasonable consensus. China now has Google China, which contains firewall filters and block unwanted links. I believe it is in Google, and other search engine companies’ best interests to work with foreign governments to make sure that their search ramifications are suitable to citizens.

"I Pledge" - KES


References:
Blown to Bits by Abelson, Hal
http://www.net-security.org/secworld.php?id=9062

Monday, August 30, 2010

Introduction

Hey everybody! I hope you all are ready for this semester and ready to work hard!

My name is Krista Sorrell. I am a senior at James Madison majoring in Business Management, with a concentration in Human Resources and minoring in Education Media. I will be graduating in the spring of 2011 and hope to start a career at ManTech International Corporation. ManTech is a U.S. government contractor that provides innovative technologies and solutions for critical missions. I started out as an intern this past summer in services procurement, and I am currently telecommuting from Harrisonburg to the Corporate location in Fairfax, VA.  To learn more about the company please visit their website at www.mantech.com.

During this semester I hope to learn a lot through this course. I would love to know more about how the modern world defines literacy and information society. With the growth of modern technologies I hope to gain more experience in networking, how to use internet as a valuable resource, and more about media. 

I wish everyone the best of luck this semester and look forward to this course.  

"I Pledge" - KES