Group Member: Samina
Independent work–no group
Group Member: Samina
Independent work–no group
A few examples of process documentation is conducted through a wide variety of blogging, including videos and music, documenting a journey for a long or short length of time. The example I chose, is one that I have been familiar with and have fully supported for a while now, it’s a non-profit organization website called The Uncultured Project (http://uncultured.com), a project created by a Notre Dam grad student who withdrew from grad school after an inspirational ceremony with speeches held by different scholars–focusing on global poverty. Among these scholars, economist Jeffrey Sachs, author of The End of Poverty was responsible for his unexpected, uncultured journey. This young man used his xbox 360 and halo savings and just WENT, to help victims in a third world country whom are fighting everyday to survive the quick sand of poverty. In the uncultured website he shares and documents his daily activities with photos of the project’s progression, struggles, difficulties, thoughts and ideas about other organizations. In his recent process documentation he discusses the struggles with his own financial expenses (since he doesn’t use donations) while intertwining them with other charity’s and competition.
There are several methods I will consider using in my research draft, including the traditional method of visiting a library, I just find this a bit more comfortable then straining my eyes in front of the computer searching for ebooks, like I mentioned before, am not a big fan of technology. I will also use the method of adding or evaluating and eliminating sources, that I will decide to use in my research paper. Strategies that has worked for me in the past are again, visiting the library and finding sources, also in some of my classes, research topics were given in relation to the course lessons, therefore any type of notes taken in the class helped in research. In my research, even though its strictly research I always provide insight on my opinion and interpretation of the topic. I probably shouldn’t be doing this, but my professors never took of points for it and actually enjoyed the paper more. Lastly, its important that I answer my research question and everything that I have written and researched concludes to a well written response to that question.
There are several new techniques that improved my research habits. The one I will continue using (learning from this class) is the search engine EBSCO, not only is the information accurate but its reliable. I also made use of the library catalog, more in this class then any of my other classes. In the past, I used the traditional way of visiting a real library and searching for hand held books *I stress not e-books. Now, after last weeks lesson, Ive come to the conclusion that scholarly books are posted on Google Books/Scholar as well as different search engines. As my research continued I actually kept a research journal consisting of links and sources I found and the keywords I used–to remember for next time I surf the web..
search : Online Privacy, Internet Privacy,Privacy Rights + Act of 1974 & Social Networking
Scholarly Source 1
Chapter 6 pg49+ Intro to online security
Chapter 14 pg 114+ Blogging
Chapter 15 pg 118+ Blogging Risks
Chapter 16 Blogging Solutions:pg.124-131
Chapter 17 pg 133-139 Risks & Rules of Social Networking and Video
EBSCOhost Search: Social Networking Privacy
Scholarly Source 2
Chapter 6 pg 89-100 “Privacy and Social Networking Sites”
(More newspaper sources in Canada than in the USA)
Newspaper Source 1
My research topic is internet privacy but I decided to work in-depth by focusing mainly on the security of popular social networking websites and search engine phenomena Google. The search exercise last Thursday allowed us to be aware on the quality of the information rather than the quantity. My first search was done through Google Scholar, I did stumble upon a scholarly article but felt it didn’t do much justice to the topic, not to mention that the information was out of date. I kept in mind that when researching technology related issues–the information is never constant since technology is rapidly changing and information is constantly being updated. As I further searched, I noticed that there was a pattern to internet privacy–specifically about the security on posting content on popular social networking websites and became aware that this was something many people are occasionally concerned about.–why not search directly in the website itself?. I went ahead and started with Google, Google has a support site dedicated only for frequently asked questions, Google marketing and advertising, in-depth information about handling your Google account and an entire section purely dedicated to user privacy. They also have video illustrations of how and what Google does to protect privacy and several privacy related videos such as “what happens to our Google searches.” I noticed that instead of searching the free internet on these particular issues, why not just go to the various social networking websites and read their privacy statement.
I did find this different from using search engines such as Bing! and Yahoo because I was directed to specific sources containing only the information I was looking for rather than going through enormous volumes of content. I plan to take this information and compare and contrast the privacy statement with the various social networking sites I decide to state in my upcoming research paper.
Privacy statement + Video
Twitter Privacy Statement
Blogger Privacy Statement
facebook privacy statement
Google Search: PDF file Internet Privacy/Online
All privacy related articles
What should or shouldnt you publish on social networking websites?
Dont just rely on Google search engine!
Posting video content.
Privacy Act of 1974
Google Scholar: Protect privacy on internet.
The topic I chose for research as most know is- internet security/privacy. I chose this topic to become more aware on precautions we should all take when surfing the net stress free. While creating the brainstorming map in class, I realized this topic is far to broad and when narrowing it down, the lines of my map kept extending. There are several conflicts with internet usage, such as viruses, hackers, anti-virus protection programs, information storage, advertisements, Google searches, Google maps, cookies, java-script, and of course the list goes on. They’re all relevant and they all should be addressed in my research but it seems writing aspect will be quite long. Internet security-in general, is an enormous amount to take in, there seems to be plenty of academic research, journals and articles on this subject and its quite difficult to decide which to use as reference. I do in fact feel that the topic chosen, is a bit to technological, and I might have to rethink this over a bit more.
Being so, the research I’ve done so far, seems to provide insightful tips on internet protetcion and did you know that there are actual laws that protects us on this issue?
In the article Managing content in a rich media world by Dan Goodin, Goodin addresses the several conflicts with managing electronically produced content such as “videos, audio clips and digital images”. He begins with the example-storage of content in the Dallas Museum of Art, which has been a conflict for 26,000 images and research that cannot be accessed through one computer-rather through several computers in different departments. Goodin- introduces us to DAM (Digital asset management) a solution for information storing under one roof (literally) instead of using outside storing facilities. Broadcaster, the Discovery channel who also owns Animal planet uses four different DAM systems to manage music, video, and images. DAM uses the metadata method (as mentioned in Badke, metadata in chapter 4-an organized way of using a search engine. The searches are specific unlike Google, where the search is based on the word being in that sentence, category or tag etc.) But with DAM it allows more accurate searches-and in some cases allows to search using voice recognition and “optical character recognition”, the results are precise. I was very surprised that museums, large real estate and pharmaceutical companies face problems with storage capacity. With museums, it seems difficult to store and find every bit of information saved, but with metadata its easier for the researchers and the public to access the exact information they need. Its something I never really gave thought too. After the reading, I actually went on the MOMA website (museum of Modern Art) to check their web engine. I searched Henri Matisse and received many categories of Matisse’s great works throughout the 1900’s in images,sketches,paintings and multimedia. It allowed me to find exactly what I needed, depending on the category.
An issue I would further want to research is, internet privacy. I want to learn whats out there and what I have to do to keep myself safe while surfing online. Recently some tech-geek created a new way to accurately find someones address through an XXS malicious code-which is able to obtain the MAC address of your router, which then can be used in Google Maps to find the coordinates of your location-all while you are sitting in you pajamas surfing the web without your notice. I want to learn what is being done to provide security and safety to online web 2.0 users. And I also want to learn more about what happens with tags and why some tagged content on one specific site are viewable on other websites even with a embed restriction-for example a video.