Sunday, March 30, 2014

Creating Multimedia Productions

This week in our technology class I learned that copyright laws require people to give credit to the owner of an image, website, information, book, etc,... These productions are called multimedia productions. Copy-right laws permit people to not allow others to steal their ideas and thoughts as well as productions for others to use and claim as there own. Furthermore, Copyright information includes the information or date the photo was created and the owners name. Copyright laws for movies can be extended for many years after the movie was made--even past the owners death. For instance, Star Wars was made in 1977 but has copy right laws that protect it for about 95 years after the movie was made (until 2072). Creators of materials like art, books, pictures, etc,... are granted the power to manage and sell their products. Permission is required for people to use copyrighted information. However, creative commons allow people to use their work as long as attribution and non-commercial measures are taken. The owner of the product secures some rights of the material; however, her product can be seen by anyone at any time. In order to use information that is copyrighted you can contact the owner and ask for permission and if they accept your request than you receive a license fee. This is part of the fair use system. Both people benefit from this system--you get the information/picture you wanted and the owner is better able to navigate the kind of career they wanted from their production.
Here is a video I partook in about the consequences of plagiarism and that if information is copyrighted and you steal it, then you can suffer serious repercussions:https://www.youtube.com/watch?v=QAWD_mZV6mc
Other videos that I got information from:http://www.commoncraft.com/video/copyright-and-creative-commons
http://www.youtube.com/watch?v=tk862BbjWx4&feature=youtu.be&scrlybrkr=48103120
Just cause other people commit the act of piracy, doesn't mean you should:https://www.youtube.com/watch?v=kTuOjKh_DDM

Sunday, March 16, 2014

Credible Sources

Nowadays, the internet has tried to sell us just about everything it says. After studying this week's topic, credible sources, I have come to obtain the knowledge of discerning whether or not a source is credible. There are three major ways of differentiating the realness to the falseness of a cite (however, you can also break it down to five currency, relevance, accuracy, authority, and purpose). First, you want to make sure that the information isn't biased. For example, if you have a website that is trying to sell you a topic and all they mention is how good the topic is, they are imparting partial and biased information to its readers. The danger of using a cite that isn't credible is that, you may be getting "blinded information" or information that isn't true and is narrow minded. When authors write in a biased form, they are writing based on opinions rather than on facts. Another step, should be that web users check the author's biography. By seeing how experienced the author of the article or website is on the subject, it can give you a glimpse into how accurate the information he/she wrote about is. An author who is inexperienced and makes a lot of typing and grammatical errors, may have lead you to a shaky and unreliable source. For instance, if you come a cross an author who graduated from a college, has held professional jobs in the field you are researching, and seems to know what they are talking about, then I would establish that cite as credible and reliable. Lastly, in discerning the realness of a source you want to see how recent the cite has been updated. If the source was updated 10 years ago it may not have such valid information on it, as a source that has been updated recently that day. Newly found information is changing at rapid paces everyday. Therefore, if you are going to do an assignment on a certain subject for an important class of yours, you are going to want to verify that all your information is up to date. In other words, having a source that is updated frequently means that the information derived from it will be more likely in being reliable. After all, everybody want's the best grade on their assignments so in order to receive the best grades, they need to have the best quality of information.
Wikipedia, may perhaps be the world's biggest controversial source--Can I trust it or can I not? The truth of Wikipedia is that most of the sources it derives the information from are credible; however, because of the many unprofessional people that transmit the information on to the website, the information becomes warped and contorted, no longer making it reliable. However, strides have been made by Wikipedia's authors and founders to ensure the reliability of its information. More experienced and intellectual college students are being licensed to edit Wikipedia; hence, making it a more reliable source. In the end, Wikipedia is a great source to use when you want quick and easily attainable information, but the quality of that information may not be totally reliable for important projects. The most important thing is to really analyze the information presented on the source.
http://www.youtube.com/watch?v=EyMT08mD7Ds
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page346376

Sunday, March 9, 2014

Viruses, Identity Theft, and Strong Passwords

Just as humans can get sick, so can computers! When humans sneeze, the germs are transmitted by air; however, with computers, they contract viruses through computer programs.  Created by online criminals, viruses spread quickly and are designed to multiply. Once they are on a computer, viruses can erase files, send emails without the owners verification, or transport private information to criminals, like passwords and security numbers. There are three types of viruses: viruses, worms, or Trojans. First, viruses are transmitted as an attachment sent in an email or shared USB drive. As soon as the files with the viruses are opened, the mistake has been made, and the virus begins to multiply. Furthermore, they begin to search for other documents to attach to, and be transmitted to even more computers. In order to combat viruses, uploading and installing your computer with anti-virus software, which prevents the downloading of viruses and deletes them when they are found. Second, worms are even more dangerous because they spread to computers without the user doing anything. Worms are programmed to spread to computers that are connected in a network and spread immediately. The worms find "back doors" or "trick" the computer into letting them in and once they do it to one, they find similar "back doors" to other computers. By keeping computer software up to date at work and at home, you will prevent havoc and close "back doors". Last, Trojans are disguised as computer software or advertisements; however, hidden inside are viruses that can cause tremendous problems. They can open new "back doors" and send criminals private information like passwords and security numbers. Trojans can be avoided by only downloading software from credible cites. Finally, keeping your computer up to date, and getting anti-virus software will keep viruses out of computer. Only click on links and downloadable attachments and files that you know are safe.
Identity theft proves to be a big dilemma in our modern world. People who are hacked and receive illegal access of stranger's accounts. These criminals steal people's identity. With our modern day technology, retrieving people's passwords is not that complicated, especially since most people have a common password that they use for most of their accounts. Finding someone's password is quite simple, as long as that person know your personal information. To avoid being a victim of identity theft: watch out for skimmers, change your usernames and passwords frequently, don't respond to texts, emails, phone calls, etc... with personal information, monitor online account balances and transactions commonly, and obtain identity theft protection through insurance.
In conclusion, having strong passwords is one of the greatest precautions a person can take in order to decrease their chances of being impersonated. Knowing information about you can make finding passwords much easier for the criminal. In creating a strong password don't use easy to guess information like birthdays, pet names, or phone numbers. Moreover, your password should not include information about you. Taking the acronyms of a memorable phrase or expression is an easy way to start. By adding numbers, special characters, and capitalized letters the password gets even stronger. Never put your password in easily located areas or tell people your password via phone or by email. Remember to change your password often, and not have the same password for all your accounts. Finally, protect your computer from viruses using modern software, and have strong passwords so that you won't be susceptible to identity theft.
http://en.wikipedia.org/wiki/Computer_viruses