Saturday, August 29, 2009

TOPIC 3 AUGMENTED REALITY, GAMING AND MOBILE COMPUTING Exercise 3.2


Exercise 3.2: Mobile computing research


What education value is there from online mobile games and mobile social networks?

http://wiki.media-culture.org.au/index.php/Mobile_Phones_-_Education states the following mobile games help educate young adults with their literacy and numeracy skills. Educational games come under the category of multiplayer games and provide a link to online communities. According to Bluetooth and security

http://wiki.media-culture.org.au/index.php/Bluetooth-_Security

Bluetooth technology became into existence in 2000, it replaces cables with low power radio waves to connect electronic devices. Bluetooth also uses frequency hopping to ensure a strong link and uses peer-to-peer network. Uses can use either point-to-point or point-to-multipoint.

Bluetooth devices are inexpensive and use an unlicensed radio frequency, unlike infrared devices they don't need line of sight to work. Games designed to communicate with each other through bluetooth are restricted to both useers being within a limited distance to get connected, up to seven devices can be connected. Using a bluetooth phone is like having a walkie-talkie.


Imagine this across the room sits your partner roommate or family member. You turn on your phone find a game and play a game together. Why bother to do this? It's cheaper. Most mobile providers charge for internet service, but a direct phone-to-phone connection is FREE. Here's how it works according to http://windowshelp.microsoft.com/Windows/en-US/help/6aed3a37-e40e-40fa-9917-1fdfb18703c41033.mspx one player's phone is designated the "host" to play all you have to do isconnect to the host device with your device. Many games automatically "sniff" for the wireless signals to eligile players and connect automatically.


There are several threats to bluetooth devices, such as retrieving sensitive data eg phone books messages and images without alerting the user. An attacker can accesss the internet; WAP and GPRS gateways. You Tube is full of this information and how to hack bluetooth devices :(



TOPIC 3 AUGMENTED REALITY, GAMING AND MOBILE COMPUTING Exercise 3.1







Exercise 3.1
The Battle for Wesnoth


Well I downloaded the game and practiced with the tutorial, didn't help still not sure how to play and really I don't have the time to devote to this type of thing. Reminds me of the episode from South Park when Cartman and friends can't stop playing Warcraft, they only have three hours sleep a night and don't stop for decent food. They become fat and pimply (see this part of the episode at ) http://www.southparkstudios.com/clips/104291


The following images are screen captures from http://www.southparkstudios.com/clips/155273

I will have another go with my green pod and report back via my POD label.

TOPIC 2 VIRTUAL ENVIRONMENTS AND COGNITION exercise 2.4

Exercise 2.4 online Identity and your state of presence

Dick Hardt! what an interesting presentation he put forth. It was funny and enjoyable to watch. Dick commented on how we have many persona's (usernames and passwords) which in itself can lead to us loosing our identity. That there is too much information moving around about you without that information being checked as to whether you want that information to go to a paricular third party. I feel that he was trying to tell me that if we all take his advice and use his security system we will be safe.








Phishing according to Wikipedia, the free encyclopedia, "is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication."
Users are tricked into entering their details into a website that looks and feels like the real site they wanted to visit. Phishing was first used in 1996.

Below is an example of an ebay phishing example set to people it looks legitimate. This information was retrieved (30th August 2009) from http://www.privacyrights.org/ar/phishing.htm#examples.org/ar/phishing.htm#example
Subject:
eBay Account Verification
Date:
Fri, 20 Jun 2003 07:38:39 -0700
From:
"eBay"
Reply-To:
accounts@ebay.com
To:

Dear eBay member, As part of our continuing commitment to protect your account and to reduce the instance of fraud on our website, we are undertaking a period review of our member accounts. You are requested to visit our site by following the link given below http://81.180.59.10/index.htm Please fill in the required information. This is required for us to continue to offer you a safe and risk free environment to send and receive money online, and maintain the eBay Experience. Thank you Accounts Management As outlined in our User Agreement, eBay will periodically send you information about site changes and enhancements. Visit our Privacy Policy and User Agreement if you have any questions.
Copyright © 1995-2003 eBay Inc. All Rights Reserved. Designated trademarks and brands are the property of their respective owners. Use of this Web site constitutes acceptance of the eBay User Agreement and Privacy Policy .

Pharming



Pharming is according to wikipedia, the free encyclopedia, an attack "aimed to redirect a websites traffic to another, bogus website". It aims to capture usernames and passwords. In the example opposite main window has the correct address but the smaller window does not. The customer may feel confident with this site as two windows opened, also notice there is no https:// on the new window that has opened. This example comes from:

The site suggests you ignore the opened window and type in the address in a new window of your own making.

Privacy invasion
Privacy invasion is the lawful surveillance of a persons dwelling. James Otis in 1761 stated that "A Man's House is his Castle" and gave an impassioned speech about upholding the right of privacy when he refused to enforce the new policy which allowed customs collectors to search a merchant's establishment.
With this there has been a number of successful cases against privacy invasion;
  1. http://www.itnews.com.au/News/107675,google-sued-for-street-view-privacy-invasion.aspx A Pennsylvania couple are suing Google for posting pictures of their hoe on Google Street View...

  2. http://www.zdnet.com.au/news/security/soa/Email-snooping-seen-as-privacy-invasion/0,130061744,120218854,00.htm Email snooping seen as privacy invasion.
The above image came from: http://www.cartoonstock.com/newscartoons/cartoonists/mbc/lowres/mbcn574l.jpg

Identity Theft
Identity theft is a type of fraud which involves stealing money or gaining other benefits by pretending to be someone you aren't. Your identity can be stolen by people accessing information about you through rubbish you have disposed of (dumpster diving) or by lossing your purse or wallet. What a mine of readily available information those items have. Also through the use of emails, as seen in this example below.


Following are examples of scams collected by the Identity Theft Resource Center. These are copies of the actual text as received via email on some of our own “lure” email addresses.
ITRC was given permission by the Red Cross to publish details of this scam.

New Scam Targeting Military Spouses
National Headquarters2025 E Street, N.W.Washington, DC 20006http://www.redcross.org/Contact: Devorah GoldburgPhone: (202) 303-4461goldburgd@usa.redcross.org Washington, Tuesday, May 29, 2007 — The American Red Cross has learned about a new scam targeting military families. This scam takes the form of false information to military families as described below:
The caller (young-sounding, American accent) calls a military spouse and identifies herself as a representative from the Red Cross. The caller states that the spouse's husband (not identified by name) was hurt while on duty in Iraq and was med-evacuated to a hospital in Germany. The caller stated they couldn't start treatment until paperwork was accomplished, and that in order to start the paperwork they needed the spouse to verify her husband's social security number and date of birth. In this case, the spouse was quick to catch on and she did not provide any information to the caller.

In 2007 8.4 million Americans reported identity theft
http://www.bankofstanly.com/bos/p/security/identity-theft-examples.html



















TOPIC 2 VIRTUAL ENVIRONMENTS AND COGNITION Exercise 2.3

EXERCISE 2.3 Create and record your online persona

Yes I do seem to be projecting the same type of avatar for all of my recent online activities. When offered the Personality at Second Life I chose who I thought looked a little like me in what they were wearing. My first choice was a male, Oops not suitable the second choice was a female but I'm not happy with her because of her clothes choice, It is not really me.


Any way I have named her, Lobby Erin (got given the surname no choice really had to choose from a given list) As this image is OK for now I'm going to use it and may even put it onto this Blog for fun just to show that I'm would use the same avatar across all of my social networks. I'm not going to have a sexy and a serious image just one who can represent me without being an actual photograph. I know you can turn the avatars into your self using a real photo so they have your features, you can in SIMS but that is not for me.
Tbola is not happy with the selection of avatars available. He states on Ask MetaFilter, "I'm hopelessly annoyed by Facebook and the self aggrandizing pictures people tend to use as their face to the world. So, I'd love to find a picture - that clearly isn't of me - that sums up the spirit of desperately trying to make oneself look cool/sexy/whatever."

TOPIC 2 VIRTUAL ENVIRONMENTS AND COGNITION Exercise 2.2



Exercise 2.2: Virtual worlds and "citizenship"


Well here I am looking totally confused and lost, in Second Life. Choosing who you are to be is almost taken from you by Second Life. You can choose a first name but you have to choose from a list of name for your surname. Not sure why this is perhaps it is something to do with the ability to chat! don't know.


As I'm using prepaid Internet I decided to downloaded the game using fast broadband connection at school ( wasn't blocked) I have sufficient memory and system requirements to play the game.

I don't like the game I also don't like SIMS. I don't seem to have the understanding of the controls etc and what it is I'm supposed to get from the game. I asked my daughter to play the game for me and she loved it. She is so natural with SIMS, Instant Messenger Services and online chats, she appears to automatically know what to do, I still can't use all of the features on my mobile phone and have to ask her how to access them. I think it would be fun chatting with others of like interests, but this is not for me.

I did notice that Second Life can be used to enable new models of learning an article on this can be viewed at http://secondlifegrid.net/sllfe/education-use-virtual-world



Wow! I spoke to a character called Carrisa. To talk you type then press enter cool!!! Wow again I had my first fling experience I pressed fly then page up thought I was going to hit the ceiling! then I hit page down and landed a bit heavily, didn't feel a thing ;) lots of cool sea gulls around here.

I wonder what happens if you are not online? Can you still play I will have to see about this.

TOPIC 2 VIRTUAL ENVIRONMENTS AND COGNITION Exercise 2.1

Exercise 2.1: Virtual environments and your cognition
Joined Facebook and discovered the ITC510/ICT213 group. There are 24 members as at the 30th August. The global group of Charles Sturt University appear to contain 746 members as of the above date.
a) Am I happy with the ethics? Not really, I went into their policy and found that Facebook may use your profile without identifying you to other 3rd parties as a part of using your information to personalise advertisements and promotions. Facebook may also get information about you from blogs, newspapers and instant messenger services:( . What I am happy about is the under 13years are not permitted access to Facebook, but how is this monitored? Anyone can fake ID! No wonder Facebook is a banned DET site to all users, staff and students alike. The control you have over what you include in your profile eg pictures, interests and groups. I only became a member for this course and was surprised to find a person who I have not seen for 12 plus years asking to be a friend! She suggested that she was my niece and yes she was:)
b) What do I think the difference between social cognition and visual cognition is? Social cognition is relating to others, this can be on many levels it is the interaction that usually occurs daily in our lives. From talking to a shop assistant, work colleague, partner, neighbour or friend. Visual cognition is recognising others by their body characteristics, it is relating on a physical level where social cognition does not have to be physical and can occur using the Internet to relate to others. This is where Facebook, SecondLife and other similar sites are used to communicate with others without actually meeting the person.

Etherpad Log

Wednesday 19th August first meeting of the green pod on Etherpad. Luckily for use we have a great team player who contacts us (4 members) and sets up meeting times etc. Wow! what an experience. Got onto the site and didn't know where to type. Tried the little window and my team members said they could see me and suggested I type in the larger of the two windows. It is weird typing down your ideas when someone else gets an idea and starts typing on top of you luckily the system sorts it all out. Having a colour to your self is a good idea I was initially wondering how they knew it was me until I noticed I was typing in a colour that was listed near my name (a real Homer Simpson moment here). What happened to the time 45 minutes later and we where corresponding like we had always used this method of communication.

Wednesday 26th August second meeting to have a go at the Wesnoth game. I won't be playing as I have not had the opportunity to download the game to my machine. I need access to fast broadband to load the game before I can use my limited capabilities at home. Watching the responses between the two players suggests it is a real learning experience. Can't wait to have a go.

Wednesday 2nd September got an invitation to a new Green Pod responded to it but I prefer to work with the original group. Not sure where this one is going. Was online tonight at 8.oopm just incase someone could help with the LC_MOO exercise but no one was there:(


TOPIC 1 SOCIAL NETWORKING, WORKGROUPS Exercise 3

Exercise 3: An heuristic experience What a hoohar to find this site:( Without the help of my fellow students and the postings at CSU ICT510 I would never have found the site to use. Here is a copy of the email sent to me on how I felt about my visit to Facebook.

Subject: facebook: Computer System Usability QuestionnaireSender: http://mail.google.com/mail/h/fmqc2xjhp1lc/?v=b&cs=wh&to=lskorjenko@gmail.comFrom: http://mail.google.com/mail/h/fmqc2xjhp1lc/?v=b&cs=wh&to=lskorjenko@gmail.com (CSUQ)system=facebookdate=2009-08-29 19:11:43comment=http://mail.google.com/mail/h/fmqc2xjhp1lc/?v=b&cs=wh&to=lskorjenko@gmail.comq1=2q2=3q3=3q4=1q5=4q6=2q7=4q8=2q9=1q10=2q11=1q12=1q13=6q14=5q15=5q16=6q17=3q18=5q19=2negative1=too hard to locate required informationnegative2=no on line helppositive1=suggest spelling alternativespositive2=uses breadcrumbs

Sunday, August 23, 2009

TOPIC 1 SOCIAL NETWORKING, WORKGROUPS Exercise 2

Exercise 2: Social Networking Taxonomy
What is folksonomy? To the Internet to find this out and at http://en.wikipedia.org/wiki/Folsonomy "it is a system of classification.....creating and managing tags to annotate and categorize content" I think that is what I'm supposed to do on these blog exercises I'm labelling but am I tagging? I don't know!

FOAF "The Friend of a Friend project is creating a Web of machine-readable pages describing people, links between them and the things they create and do:" according to http://www.foaf-project.org/ This allows the user to choose the sites and tools they prefer to use without fear of being unreachable by their online friends who choose different sites and tools.

TOPIC 1 SOCIAL NETWORKING, WORKGROUPS Exercise 1

Exercise 1. Social networking and online communities what do I know? Nothing really. I have read a bit about this topic, seen it on TV, but I personally don't use the computer and Internet to correspond to others unless it is for uni or work and then it is only e-mailing. I don't have the Internet at home and use prepaid for uni, I don't want to use the Internet for anything but preparation for school lessons and background material. Sounds pretty archaic.
Will a study into online communities and social networks change my professional practice? Only as far as using the facilities in a connected classroom. Most social sites are banned by the DET to students in K6 and there use is not encouraged.
I have include a piece of correspondence from the DET ICT help desk in response to a quest to have a website unblocked, this site encourages students to become better writers.
Summary: Website Unblock RequestYour reported Incident has been resolved with the following resolution:www.tikatok.com Regarding your request that the above URL be unblocked.Sites with this categorisation (media sharing) are locked to DET school students by Senior Officer determination.
Online communities I know this involves Facebook, Second Life, Twitter maybe once again I'm not familiar with these and I only got onto Facebook as it was requested by this course to become a member. I went to a CyberSafety course recently and saw the story about the girl who has 250,000 (I think that is right) friends, she had been sick and spent a long time recuperating she admitted that she only really knew very few of these so called friend personally. While at the Cyber Safety course we watched an episode of HACK TV which says nothing is private and you can easily get into a persons site. So this is the reason I'm not particularly happy with any online activities. I know the 21st Century learning is going in these directions but.........
What do I seee as the connnection between social network platforms and the development of online communities? I suppose as more and more people find like minded people they will develop a closeness and rely on each other to supply goods and services etc.


Social networking Wow! want an easy explanation on social networking look at this on YouTube http://www.youtube.com/watch?v=6a_KF7TYKVc it is simple and can be licensed for use in the work place, it really helped my understanding :)
Additional surfing on the Internet found this site http://www.whatissocialnetworking.com/
It states that a social network is a group of likeminded people who have come together over the Internet. They use the Internet as there are millions of individuals looking for others with like thoughts, ideas and hobbies. Diversity is one of the benefits as you can meet others from different countries to share your experiences with. You are no longer bound by your countries borders. Examples of social networks are MySpace, Yahoo!, Facebook etc.


Online communities before I looked into this I thouoght I may not have done any collaborative online projects. I was wrong I have taken my students on a virtual field trip to the museum and am using the connected classroom with the students in 5/6 in a online astronomy project with 20 other schools. I have also been involved in travel buddies. So I think an online community is linked by the Internet and are not necessarily friends, they just use the Internet or email for keeping in touch! It appears you use web tools, for example Twitter to keep in touch. So to inform the uninformed here is a You Tube site to help with this. http://www.youtube.com/watch?v=ddO9idmax0o
So now I think they are your friend also so I still don't know the difference between Social networking and Online communities. I don't think I will get involved in this unless I have too....

Saturday, August 15, 2009

It's all about me :)

Hi fellow travellers in ITC510. My name is Lois and I am a teacher in a small rural school of 80 students in Lismore on the Far North Coast of NSW. I teach computing skills to the students from Years One to Six, I also teach science or HSIE to students in Years Five and Six and I'm the support teacher for learning difficulties. After schools on Mondays I organise the Active After Schools Community sporting program for 16 students. Currently the teacher of K/1 is on long service leave so I'm taking her class as well as doing my own duties with STLD and the 5/6 science lessons. My experience is on a windows platform and have no experience with online communities. In fact I'm feeling very overwhelmed by the whole idea of going on line and putting information out there. I watched a program on HackTV where they said nothing is private and once you put it on the web it is not really safe to hackers if they have the skill ;(.
My online learning record (OLR) will be structured along the line as suggested by Ken, where all of my work for this course will be available for comments by my colleagues.