The Internet of Things

The internet of things is about connecting devices over the internet, letting them talk to us and applications. The rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Devices can include smart fridges, smart home and smart watches. The introduction of these devices is more about the use of personal argumentation – which means less about individual devices and more about living services that people program and connect smart devices however they feel.IoT_20141023_01.jpg

Smart heating gives the user the control to turn down and up the heating remotely or turn it off even though there isn’t anyone home. Smart homes are the most readily available for consumers, from the amazon echo or the Nest thermostat there are quite a few products on the market for users to control and make their lives feel more connected. As well as this the smart fridge which would tell you when it’s out of milk or text you when an items went out of date.

Smart watches like the apple watch and other smart watched in the market are great examples of how the market has turned our wrists into a smartphone with the availability for text messages and phone calls.

z-2

There could be some downsides to this awesome technology, though. You could seriously compromise security and privacy if these items were hacked, however, because there isn’t really that big of a market for some of these products yet you would think that hackers would ignore it. But that’s just my wishful thinking.

Think about it, a house which his fully controlled through a little device you can control. However, let’s hope that it doesn’t go down the same road as that Simpsons episode where the house goes crazy and ends up attacking the characters.

treehouse.jpg


Sources:

Advertisements

CyberWar!

Cyber warfare is known as an internet conflict which involves politically motivated attacks on information and information systems. Each side attempts to compromise and destroy the others infrastructure, disable websites and networks, disrupt of disable essential services or steal or alter classified information. Physical weaponry, in this case, has changed and become the not so important part of welfare. Cyber warfare levels the playing field between the riches and the most technologically sophisticated nations and those without the same resources.

cyberwar.jpeg

Cyber warfare is used by a whole lot of different groups such as CyberCaliphate. The group has hacked multiple websites of newspapers, TV nations and Twitter accounts in the US. CyberCaliphate has successfully hacked the US central commands Twitter account and during the times they had the account in their hands they posted threatening messages to the US soldiers. The Islamic state has also claimed to have hacked into the US’s department of defence services and posted the names and addresses of the US service people that are engaged in a war against ISIS.

Another group of people who are known for Cyberwar fare is Anonymous. The group declared war on ISIS and sprung revolutions against regimes in Egypt and other nations against them. One act which was their first was to start a cyber war and take down ISIS’s social media accounts.

a22329f645fa36cc42d315e13807ad85.jpg

In 2009 a cyber spy network going by the name of Ghostnet accessed confidential information belonging to both governmental and private organisation sin over 100 countries around the world. It was said that this network was originating from China however they denied this.

Reading up on the Cyberwar fare and the things they are capable of is quite interesting. It’s not something that you would hear about very often through the traditional news. I guess the most effective way to protect yourself against Cyberwar fare would be to secure your information and networks properly and also update your security frequently!

9k=-3.jpg


Sources:

Hacktivists

Hacktivists are people who gain unauthorised information or access to computer files or networks in order to further social or political ends. We all know there are people out there that would do anything to get a hold of our personal information, even out social media sites. We have to be careful to use a variety of different passwords and usernames in order to avoid our accounts being hacked.

images-1.jpg

If you don’t already know, Myspace has been hacked and it has been said to be the largest breaches ever on social media. Yes, your old Myspace account has been hacked and has come back to haunt you. In the days of Myspace, 1464367311324180.pngpasswords were not protected very well which means that if you are sill using the same passwords on any other site today as you did for this social network your account is at risk!

Thomas White who is a security researcher known as ‘TheCthulhu’ has published the database of 427 million passwords for more than 260 million users of the Myspace social network. So right now, the passwords have been dumped on the online public domain for anyone to access. Once this information is out there it’s going to be hard to get rid off.

So moral of the story, check your accounts and make sure that your passwords are all secure. Hackers are interested in your passwords more than your account because they cause it to access anything that you have used the same password for, so that could mean your bank account or any other important account you have. Be careful!

9k=-2.jpg

 


Sources:

Social Network Revolutions

Social media has the power to unite and link people around the world. During the #Blacklivesmatter protests in America, Twitter became the platform used to unite all people from around the world to one very big topic.  Twitter was used in order to bring pressure and light on a number of shooting that had been taking place around America to unarmed, innocent black lives.
black-lives-matter.jpg

trayvon4.jpgIn July 2013 the trial of George Zimmerman who had shot dead a 17-year old African American Trayvon Martin while he was unarmed on his way back from a convenience store was where the black lives matter hashtag was created. Using the hashtag allowed and encouraged people to speak out on twitter and other platforms about their experience and their outrage over these issues.

url-1.jpgAgain, another incident happened where 18-year old Michael Brown was shot dead by an officer in Ferguson. The officer fired 12 rounds at Brown even though he was unarmed. Again protests broke out on the day of the shooting, which started riots and a freedom ride under the black lives matter hashtag and campaign.

The movement used to unite people and inform people about the black lives matter campaign is powerful. Social media plays a very big part in these situations, where it becomes a tool that people use to find out information from as well as inform others. “Social media could serve as a source of live, raw information. It could summon people to the streets and coordinate their movements in real time

From across the world, people know about the issue and want to help the people in need in a way, and social media allows for this to happen.

2Q==-2.jpg


Sources:

Digital Coding Artworks

img_1770
Inspiration for my piece

For my second assessment using processing, I found inspiration from a past students photo that had been taken during the MEDA computational thinking and instructions workshop. My sketches use the themes of iteration through the process of creating the numerous bars that crossed through the centre of the page. By including iteration in this art piece it allows for it to become somewhat aesthetically pleasing and interesting. However, not all of the bars are created equal, as a selected few of them have been put to ‘random’ letting the system pick the thickness of the lines each time. With each repetition of the lines, the space between each one, the thickenss, size, width and colour change and vary. I believe that by doing this it makes the artwork interesting and somewhat pleasing to the audience.

 

The finished product:

 

 

My processing Code:

size(450, 600);
background(255, 255, 255);
noLoop();
}
void draw() {

// Center Line
stroke (random (150, 255), random (150, 255), random (150, 255));
// function allows for an array of different colours within the specified
// colour codes
strokeWeight(2); // Thickness of the lines
rect(220,25,0.1,550);

// First Rectangle
// ( Side to side, up and down, length, Area )
strokeWeight(1);
rect(120, 50, 200, 10);

// Second Rectangle
strokeWeight(random(20));
// Stroke weight will remain random, affecting the positioning of the squares
rect(80, 70, 300, 35);

// Third Rectangle
strokeWeight(2);
rect(60, 130, 350, 20);

// Fourth Rectangle
strokeWeight(1);
rect(15, 160, 420, 35);

//
strokeWeight(random(20));
rect(180, 230, 100, 10);

//
strokeWeight(1);
rect(120, 250,200,40);

//
strokeWeight(5);
rect(100, 300, 300, 10);

//
strokeWeight(2);
rect(120, 330, 159, 20);

//
strokeWeight(random(20));
rect(140, 390, 200, 10);

//
strokeWeight(random(20));
rect(115, 415, 200, 35);

//
strokeWeight(1);
rect(50, 460, 350, 20);

//
strokeWeight(10);
rect(130, 500, 200, 5 );

//
strokeWeight(random(20));
rect(50, 530, 350, 20);
}

Citizen Journalism

Citizen journalism is present in the everyday society through the use of the internet and mobile technologies. The basic idea of the news and how it is being presented and captured is experiencing a fundamental shift in society. Nearly 60% of people are not using Facebook as a recurring news source while magazines and newspapers struggle to keep up with the news. Many people express the idea that traditional news outlets have become slow in reporting news and in some cases have too much of an underlined agenda in their reporting.

Citizen journalism has the opportunity and the tools of modern technology and a limitless reach of the internet to create content that would probably not have been reveal without. This new system of journalism allows for independent parties to create a wide range of relevant information that can be seen as crucial to a democratic society.

citizen-journalism1.jpg

Citizen journalism can be a very powerful tool, as individuals can bring aspects of information to the forefront of a case. An example of this would be the news release of Jamaica’s constabulary communication network which indicated that a man who was shot and killed by police attacked them first. However, citizens that were witnesses to this case circulated a video of the attack that told a very different story to the one that the police were circulating. It was seen through the footage that the man had in fact been attacked and beaten by the police officers before being shot whilst lying subdued on the ground. In this case, citizen journalism was a very important aspect of evidence that revealed the truth of the encounter.

However, citizen journalism doesn’t always go as planned. During the Boston bombings, there was a search for the suspect on the website Reddit. There were unchecked facts which lead the manhunt to the wrong man who was found to be dead from suicide. The website Reddit is a valuable resource which allows users to post and aggregate content in a way that could have really helped the investigation, however, due to the wrong facts in the event found to have gone off track.

Citizen journalism is great, especially when it’s done through the right platforms and with the right information.

2Q==-1.jpg

 


Sources:

Have You Been Paying Attention?

lies-about-women-multitasking-and-performance

We all believe that we have great multitasking skills as it’s become very easy to do with access to technology. When we focus on more than two tasks at once the amount of attention and quality of the tasks can diminish. This idea becomes more apparent when talking about using multiple media platforms and different types of technology at one time. A great example of this would be a lecture or tutorial – where people are partially paying attention to the lecturer as they are presenting while surfing Facebook and other media platforms. This kind of multitasking happens frequently within university lectures and tutorials and it’s become quite easy to pick up when it happens.

Overall it can be said that only 5% of us can actually multitask effectively. If you decide to multitask it can, however, come with some negative aspect which can include:

The ability to produce more errors in your work because you aren’t giving your full attention to what you need to do. Mistakes can be made often when doing this and in some cases difficult to pick up after you’ve made them. An example of this would be when writing an assessment, you may be talking to a friend whilst looking a Facebook and also doing research. When your attention is spread so thin it can be difficult to concentrate on the most important thing which would be the assessment. Because of this, you may have grammar issues which lead to you sending in a document which hasn’t been read over properly.

Stress levels can increase as you multitask because you could be overloading your brain with too much information and things to do. This can, in turn, affect your health and even lead to procrastination. A great example of this would be when you leave your assessments to the last-minute but you also have other things you have committed to like work so you won’t be able to work on the assessment for long. This leads to stress and also procrastination as you put things off because thinking about them causes too much stress.

To test these theories out and the process of multitasking I’ve decided to draw out a little experiment on my nine-year-old sister. Now, she doesn’t own a phone or anything but she’s constantly on the computer playing games as well as watching TV and talking to us. You could say that she’s learnt early how to multitask. So within an hour I recorded a number of times she switched between talking to us (and keeping a conversation), watching TV and also playing games on the computer.

So within that hour her main focus was, of course, the computer as it was her main media platform. She looked up to watch the TV at least 20 times and some of them were just a quick glimpse to see what was happening, others were a few good minutes watching. When it came to talking to us it didn’t last very long, she was frequently talking to use until she was distracted by the computer of the TV again. After a while, she didn’t respond to any questions because I think she caught on what I was doing and started ignoring me. I did ask her at the end of my little experiment what the TV show (cartoon) was about and she gave me a vague recount of what was happening, however, she couldn’t give me specific answers when I asked them.

After the experiment was over I told her what I was doing and asked if I could write about it and she gave me her permission. So to refer back to the consequences I wrote about multitasking I have to say that both ‘producing more errors’ and ‘becoming stressed’ where both evident factors. At the start of the experiment, my sister started to make more mistakes when I was talking to her. I would ask her a question and she would respond however sometimes it didn’t come out wrong or she misinterpreted the question. As well as this when she was talking she kept making noises to the computer, which I take as her making mistakes in the game she was playing. This then, in turn, lead to her becoming stressed because she was failing the game and getting frustrated at me because I wouldn’t stop talking to her. As well as this she had very little specific information about the TV show that was on because of the focus being primarily on the computer.

Overall my sister was definitely preoccupied with the different media mediums, and in turn, this did shorten her attention span. Conducting this little experiment has shown that multitasking can be difficult but it also can be done but there are consequences of doing so.


Sources:

Apple and Android – Does it Really Matter?

The classic iPhone vs. Android debate, the two dominant operating systems for mobile devices today. The two are basically the same at the lowest level of operating: they allow for the user to call, text, access the internet and use applications. However, there is a very clear difference between the two operating systems which I will get into.

iOS.pngThe Apple iPhones IOS operating system is a more closed or a ‘walled garden’ where users can only access applications and other software which have been accepted by Apple themselves. In doing this the IOS system only holds applications which have been reviewed by apple which can be a bit of a process. This limits the user’s control over the platform and also the types of applications that they can have on their phone.

url.jpgOn the other hand, Android is more of an open ecosystem which allows for more user flexibility. The phones software can be easily manipulated and customised by the user, which also allows the user to create and download applications when they desire. The user is able to manipulate the phone to what they want.

 

Now, I have to fess up here. I do own an iPhone and love the way that the apple ecosystem works. I like the idea of having a controlled platform as I really don’t have the need to customise my device or the software in it. The apple system just seems easier to me and it’s the system I grew up using so its like second nature. I must admit, though, I was seriously thinking of changing to an Android, only because I wanted to test out the whole system. I never got around to it though because it was a bit of a commitment plus I was worried how it would go with connecting to my MacBook and such.

SqAvXzj.gif

Its great to see people branching out into the Android ecosystem, I mean go for it! Even people who absolutely love the simplicity of the Apple products, good for you! But I honestly don’t understand why this has to be such a bit debate or thing. People will choose the system that they feel comfortable with which is totally okay. My parents, for example, wouldn’t be able to operate an Android because they are so used to a simple operating system and that’s all good. My point of this post is to highlight that yes, both these two operating systems do come with positives and negatives and it’s totally okay to pick whatever you feel is good for you because in the end it really doesn’t matter!

Z.jpg

 


Further Reading:

Big data, Surveillance, Permission Control

Everybody knows about the risks that come with signing up for social media sites like Facebook, Twitter, Instagram and many others. When we use these social media sites were given permission and invite the owners of these companies to our personal data. Sites like Facebook are well known for using our data in order to personalise advertisements and to track our movements on and offline.

Geofeedia – a controversial social media monitoring tools put together to pull social media feeds through APIs – was used to monitor Ferguson and Baltimore. Police were given access to the social media sites to user data by Twitter, Facebook and Instagram in order to track the protests in Baltimore and Ferguson. The ability for individuals to access the social media sites allowed for the quick distribution of content.

facebook-twitter-instagram-spy-geofeedia.jpg

The companies involved provided data which included the locations of the users of these sites to Geofeedia, who then analysed the data and delivered surveillance information to 500 law enforcement agencies. Geofeedia shows the popularity of governments using these programs in order to monitor crime and civil unrest in countries.

geofeedia.jpg

Geofeedia was discovered to have entered into agreements with the companies Twitter, Facebook and Instagram in order to gain access to the user’s data and in turn gain developer level access to information. Geofeedia was available to access the three company’s sites in order to:

  1. Facebook – Access topic feed API that let the company get a hold of posts centred around specific hashtags, places and events
  2. Instagram – Access the applications programing interface that allowed for the company to access the feeds of users and also locations
  3. Twitter – Access to search the data bases of tweets

However, after finding out how Geofeedia was using the data that was available to them the media sites restricted access when presented with the findings. The ability of a company to easily gain access to the data of these sites is worrying, but I guess as previously states signing up with the media sites means accepting the risks involved even if that means compromising your private data.

9k=-1.jpg

 


Sources:

Ethics and Respect in Photography

Ethics and respect – two words you probably wouldn’t have thought went together when taking photos. These two words are important to consider when going out and catching those candid photos of the people around you.

There is an issue of consent when it comes to taking a photo of someone on the street that you don’t particularly know. If someone doesn’t want their photo to be taken and expresses this idea to you after you have just taken a great shot what would you do? Would you respect their wishes and delete the photos that they are in? Would you show them the photo and explain why you need it? Or would you outright refuse to delete it?

For this week’s blog post I went out to the university to take some photos and had a dig through some photos on my phone to further have a look into the ethics of photography.

 

file-3-10-16-5-23-11-pmfile-3-10-16-5-25-53-pmfile-3-10-16-5-26-36-pmfile-3-10-16-5-26-56-pm

 

Now when taking these photos, I must admit that I felt a big odd. The ones taken out at the university were taken in a way that I tried to get as many people in the shot as possible. When looking further into the legal background of photography involving the general public, the privacy act protects personal information that is held or collection for inclusion in a record. A record is defined to include a photograph or other representations of a person. It’s said that if a person’s identity is apparent in a photograph or other image then the collection use and disclosure of that image is covered by the privacy act. However, the coverage of images is limited by the scope of the Privacy Act – so if the individual is acting in their private capacity, the image is still not covered. If the image was taken by someone acting on behalf of a small business this is also the case.

So when taking the photos at university I was careful not to get too close to people so that you couldn’t really see their faces. As well as this I also tried to take photos of people when their backs were turned and you couldn’t directly see who they were. In doing this I tried to protect the privacy of the people in the photo. I didn’t, however, think it was necessary to ask everybody that was in the shot whether it was okay or not to use the photo because as I said previously you couldn’t really identify them in the shot. If I was to take a portrait of someone or just a casual candid photo where you could tell who they were asking them and being careful in the way that they are presented would be a priority.

 


Sources: