Wednesday, April 20, 2011

Post # 10: Identity Theft

Recently I have been receiving several credit card applications in the mail and I wondered why it is that credit card companies are targeting college students and how this relates to identity theft. An article from CBS News titled College Students Prime Target For ID Theft, talks about how students ages 18-24 are being targeted now more than ever with credit card applications. The article claims that this is due to the naivety of college students and their unfamiliarity with credit cards. How this related to identity theft is the fact that many students, who receive these applications, just throw them away without shredding or destroying them. When this happens, anyone off the street can just walk by, pick it up, and fill it out in your name.   This is a scary thought because college students are not likely to check on their financial records on a daily basis and may not even know someone has stolen their identity until it is too late.

Ways in which to prevent this from happening are simple. First, shred and destroy anything that comes from a credit card company or anything with sensitive information on it. Parents can also help their college student be responsible with their finances and prevention of identity theft. Besides investing in a shredder, parents should talk to their kids about being financially aware. Along with this comes pulling credit checks. This should be done often in order to ensure that no one has stolen your identity. This article really helped me to realize that stealing someone’s identity is easy if you are not taking the proper precautions to protect yourself. I am glad that I read this article because hopefully now I can stop anything before it happens. 

Post # 9: Counter Argument

After reading many articles related to cyber-bulling, I came across one that talked about if schools should be allowed to punish cyber-bullies. The title is Schools Can't Punish Your Cyberbully. Nikhil Swaminathan, the writer of the article, talks solely about how schools should not be responsible for what is done away from campus.  Throughout his article he refers to a situation in Beverly Hills where one 8th grade girl posted a video calling another girl a “slut” and “spoiled.” A state judge ruled that the school’s punishment of the bully was violating her 1st amendment right to free speech. Swaminathan argues that this ruling is fair and that parents should be the only ones to punish their own kids. He claims that this issues it one that would be better handled at home, rather than at school or in the courts.

Although the 1st amendment violation is valid, I believe that kids that are cyber-bullied should be punished at school as well. School is where socialization occurs and where kids spend a large portion of their day. If the person who is bullying them is walking around school, they would be terrified and embarrassed to be seen anywhere. Every child has the right to feel safe and protected at their school and this should be no different. The bully should learn that there are consequences for their actions. Parents may not realize the severity of these cyber bulling situations and therefore I believe it is the duty of the school to step in at that point. If not, the bully could go unpunished and the one who is being bullied would feel even more unprotected from their wrath. 


Post # 8:




This is a video that I came across while roaming the internet for articles on cyber-bulling and stalking in college. Although we tend to think of cyber-bulling only happening to kids, it actually happens to a large number of college students as well. The story told in this video is about a college freshman at Florida State University who was rushing the Kappa Delta sorority.  She received a facebook chat from a girl claiming to be an older sorority sister, just wanting to know about mundane details of her life. As the conversations became more frequent, the “sorority sister” began asking Ashley uncomfortable questions. The person on the other end would ask Ashley what color underwear she was wearing, and if she would take them off and put them in her mouth and take a picture. Luckily Ashley did not fall for the trick, as several others had; only realizing later that this person was not actually a member in her sorority.

I think this story speaks to college freshman and their need to be needed. Especially at larger universities many freshmen go, not knowing anybody. Any way they can get involved makes them feel wanted and as if they have a place where they belong. The “sorority sister” took advantage of this situation and prayed on unknowing and innocent freshman girls. In the end, this story shows that is it not just young kids that can be deceived and hurt by the internet. College kids may think that they are too smart for it, but at times it is obvious they are not. This video provides a warning for college kids to know who they are talking to on the internet, and not to get so caught up in cyber space that you forget about reality.  

Post # 7: Visual Rhetoric

The picture that I found is of a young girl on her computer reading something sent to her. The statement on the screen reads "I can ruin ur life. No 1 likes you! Loser!” The girl who is reading it had her hands over her face as if she is crying. This is an example of cyber-bulling and it is terrible to see. The fact that is a child crying because of the nasty statement appeals to the viewer’s emotion. I don’t know of anyone who enjoys seeing children hurt and this is obviously a painful experience. This photo pushes the viewer to feel bad for the girl and want to help prevent the situation from happening to other children in the future

The computer screen and background are slightly out of focus in this photograph. I believe this is due to the fact that the center of attention is supposed to be the child and the heartbreak she is dealing with. Although the words are what made her feel this way, the main idea of the picture is to realize how these words affect people. I think a lot of times people, especially kids, become more aggressive and abusive in cyber space due to the face that it is not face to face interaction. They cannot see how their words are directly affecting someone else and therefore it makes it easier to say and do malicious things.

The words on the screen, even though not the center of attention, are still extremely important to the picture. Rude and hateful comments are what cyber bullying is all about. Just one statement could alter someone’s life. These words appeal again to the viewer’s emotion. The use of abbreviations and internet slang help the viewer to realize that in fact it is most likely a child talking on the other end. No one wants to think that their child, or any child, is capable of saying those things to another person. 

Post # 6: Cyber Stalking

On the topic of safety, I wanted to touch on cyber stalking. Although I have never had a personal experience with this issue, it is a subject that has been becoming more and more frequent as the year pass. Cyber stalking is defined by Wikipedia as “the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, and damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.” After reading this and a few articles to familiarize myself with the topic I realized that this is much more serious than many people give it credit for.

Cyber stalking is not just looking at someone’s facebook profile or reading their blog. It’s following and harassing someone else in every aspect of their cyber life.
I know I have been guilty of “facebook stalking” people I meet or even old friends. However harmlessly glancing at someone’s photos or status updates is completely different than knowing their every move. I think that this term is used so loosely today that everyone forgets the true and dangerous side to real cyber stalking. Stalking is a continuous process, not a onetime occurrence. The stalker watches their victim everyday through the scope of virtual media and it is scary to think about the things that they may see.

From stealing someone’s passwords to sending anonymous email to circulating rumors about the victim to manipulating pictures are all ways for cyber stalkers to harass other people. Although there is some legislation out there to protect people from this type of danger, it still remains difficult to prove. Since the topic is so new the federal courts are still trying to decide how to handle it and what the laws should require.  

Wednesday, March 2, 2011

Blogs About The I Love You Virus

In the interest of viruses, and while researching them for my last post, I came across a story called the I Love You virus. Two blogs, one called the I Love You Blog and the other by George Hulme, both comment on the 10th anniversary of the virus and everything that has changed since it infected so many people. As a little background, the I Love You virus “is a computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line” (Wikipedia).
                The first article, the I Love You Blog, relates mainly to its audience through emotion and pathos. It states that “we grow up hearing that there's not enough love to go around, we don't deserve love, and we're not good enough” (TheILoveYouBlog). It continues as the authors expresses how the effects that happened 10 years ago would still present themselves due to the fact that people are still just as deprived of love as we used to be. Even though the sources and effects of viruses are more widely known, this article claims that those advances are ambiguous.
                The second article, written by George Hulme for Information Week, comes across as much more scientific and appealing to ethos and logos. The author portrays himself as credible by using figures and back up evidence, not just commentary to convey his story. He remarks mostly on why the I Love You virus was so notable and how we have progressed since the attack, especially when he asserts how we have “managed to better secure the operating and E-mail [systems]” (InformationWeek). Even though it is a blog, therefore containing some bias, overall this author represents himself as less swayed by emotion, and more apt to telling the story. 

Viruses Infecting Your Computer

So originally for this post I was going to talk about cyber stalking as a transition from cyber bullying. However, while I was searching for articles about that topic my computer was infected by a virus. It said it was a Windows Efficiency Manager and it was trying to fight viruses, however it was quite the opposite. Therefore, I have decided to have to post pertain to security against viruses and what is really out there to protect your computer from these harmful bugs.
Ever since the increased use of the internet, viruses are more easily able to infect your computer. They can come from websites, emails, and pirated software. Fifteen out of every thousand PCs are hit by a virus each month, which is scary. There are several different types of viruses that can end up on your computer, including Trojan horses and worms. Trojan horse viruses look like computer programs, such as games or anti-virus, but actually infect your computer every time it runs. The worst part about this type is that some have the power to erase your hard drive. Worms on the other hand are “small pieces of software that uses computer networks and security holes to replicate itself” (HowStuffWorks). This differs from Trojan horse viruses because worms can replicate and Trojan horses cannot.   
The easiest way to avoid contracting a virus is by not opening unknown emails or attachments. It is best to just delete the email when you see it. You cannot be infected unless the file is actually opened or unzipped. Another way to avoid is by not purchasing bootleg or pirated software. This ranges from movies to file sharing music.  Although it seems difficult to resist, considering the rising prices, it is definitely safer to purchase it the right way. The easiest way to protect your computer and your files however, is simply downloading an anti-virus or anti-spyware software. There are plenty of them out there and they are proven to work. Although some cost more money than others, it is worth it in order to avoid the ultimate cost you could pay in the end.
Securing your computer from viruses is extremely important. Many people don’t back up their files, and therefore everything could be gone in an instant. I know that from now on I will definitely take these precautions and download anti-spyware software in order to protect myself from having this same situation happen to me in the future.


Tuesday, March 1, 2011

Blog Post #3 (Scholarly Article)

     The scholarly article that I chose to write about is one from the Australian Journal of Guidance & Counseling. It was written by a woman named Christine Suniti Bhat who attended Ohio University. The article is titled Cyber Bullying: Overview and Strategies for School Counselors, Guidance Officers, and All School Personnel and was written in 2008. This is a scholarly article because it is written by an expert in the field who is affiliated with a college. Along with this, the article itself contains several other sources of information. I found this article by searching on the library’s database for an article that pertained to cyber bullying. 
     I found this particular article interesting because it went into depth about several stories of cyber bullying as well as why this is a concern for schools around the world. It defines cyber bullying as “the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others” (Belsey, n.d., p. 8). It goes on to report several statistics about computer users in many countries as well as why counselors find this topic important. The article focuses on how technology takes bullying to the next level and how it actually differs from face to face bullying. It states the signs of people who are being bullied and how and when to step in. After that, it is divided up into outlets for cyber bullies such as instant messaging, cell phones, and social networking sites. Each contains its own unique strengths and weaknesses that bullies take advantage of. 
     The last seven pages are dedicated solely to how counselors can assist children who they think are being bullied or who are bullying. Often counselors and teacher are unsure of how to deal with these situations and so this article contains advice for working with these issues. Overall, I believe this article is very informative and provides a wonderful insight to the world of cyber-bullying.


Belsey, B. (n.d.).
June 11, 2007, from http://www.cyberbullying.ca/pdf/Cyberbullying_Article_by_Bill_
Belsey.pdf

Article
Cyber bullying: An emerging threat to the ‘always on’ generation. Retrieved

Effects of Cyber Bullying

While searching for a certain topic to write about, I came across a video from the Early Show on CBS. In the video are two different women who have been hurt by cyber bulling; one being bullied herself while the other had a daughter who was bullied over the internet. Throughout the interview each of the women talks about how this issue is nothing minor. It affects all people, especially children, and it is difficult to detect. Tina Meier, whose daughter committed suicide as a result of being bullied, encourages parents to have an open communication with their kids and not to let things go unnoticed.
After watching the broadcast I began to wonder what other preventative measure parents could be taking in order to stop such disasters from occurring in the future. Although I do not believe it is the sole responsibility of the parent to monitor their child's every move, the parent should still be aware of what their child is doing on the internet. Knowing what social media sites they are on and educating them on the dangers of cyber-bulling is a good first step. However, knowing the signs and symptoms of cyber-bulling in a child are key entities that every parent should know. Being an active parent means stepping in when something does not look right. By having knowledge about cyber-bullying, parents are more likely to prevent disasters before it is too late.
Overall, what Tina Meier suggested about having an open relationship with your child is extremely important. Parents should know when to step in and when to trust their kids, just as kids should be able to trust their parents and be able to reach out to them when they feel like they have no one. The other girl in the interview attempted to kill herself and was actually hospitalized for some time in order to cope with cyber-bullying. She states how she never reached out to anyone. She felt as if she couldn’t and that no one was there to help her. This situation is dangerous and proves that parents need to communicate with their children and listen to what they have to say, because at some point it may be dire.

http://www.cbsnews.com/video/watch/?id=6146188n

Monday, January 31, 2011

Entry #1: Introductions

Howdy! I have decided to have identity, privacy and safety as my topic of inquiry. With the rapid expansion and use of technology, especially the internet, by youth and young children I believe that privacy and safety are huge issues in today's society. Children and even teens are sometimes too naive to realize the dangers lurking on the internet. Recent laws and regulations have begun to bring attention to the problem but are they really helping? How can we truly protect children from the dangers that are out there in cyber space? Since this is still an evolving issue it's hard to find a solution. Cyber bullying and cyber stalking are serious, however they are seriously hard to prove and even harder to convict someone of their wrongdoing. The consequences of cyber bulling are terrible and extra precautions need to be taken in order to protect our society’s youngest members from being harmed over the internet.

Other topics that I would like to cover over the course of this semester are cyber crime, identity theft, as well as the consequences and effects of cyber bullying and cyber stalking. I am interested in how the development of MySpace and facebook aided in the ease of finding and exploiting youth and teens and also the safety features of those social networking sites. Internet and social networking sites can only do so much to protect their users. What are parents doing to protect their kids and what laws are out there for the protection or minors on the internet? And even though there are certain laws pertaining to these issues, how are they being enforced? Are they being enforced at all? I am excited to uncover some of these important and persistent issues throughout the semester and to see what is being done for the protection of everyone on the internet.