Oct 18, 2010

Internet Addiction

Addiction - "compulsive need for and use of a habit-forming substance (as heroin, nicotine, or alcohol) characterized by tolerance and by well-defined physiological symptoms upon withdrawal; broadly : persistent compulsive use of a substance known by the user to be harmful."

Can you become addicted to the internet? We all know that humans can become physically and/or mentally dependent on things such as alcohol and drugs, but does that mean that you can become hooked on the world wide web? That depends on what it means, to you, to become hooked on something. For me, it means spending a large amount of time with and/or on something and using it instead of doing things that enrich your well being. But, again, this would depend on if you find using the internet enriching to your well being. Some may say yes, others would say no, but regardless of our opinions, usage of the internet does effects us.

This isn't a subject that has been ignored by professionals. With the rising use of the internet, faster internet speeds, better posted information and research options, and more popular social websites being created (such as Facebook), the internet has become almost vital to everyday life for some people and is used in almost every business and company, sometimes every day. And so studies have been done to measure the effects of prolonged use of the web, mainly on adolescent and young people. One study, performed by Ju-Yu Yen and his team found that in young teenagers, users with "internet addiction" had poorer mental health than those who did not and also had a higher chance of becoming engaged in substance abuse. They defined an internet abuser as someone who uses the internet frequently, has problems stopping use, has issues when not using it, has communication problems with others, and has poor health and time management as a result of using the web [2].

To some readers, this may sound silly and something that you cannot relate to. But can you? Have you ever worked on homework and decided to check your Facebook, only to find that afterward, you had spent almost an hour looking at your friends posts? You lost track of time and as a result had to hurry to finish your work. This is an example of possible misuse of the internet. Be it either checking your email, reading posts on Facebook, watching funny Youtube videos, or simply searching for music, if you find that you spend time lost on the internet instead of taking care of your real life needs, you may have a problem. But how can this be? Some people have made friends on the internet, and continued to support existing relationships with people over social networking sites. Isn't this a good thing? The answer is yes and no. Using social networking for organizing events and casual conversation is a great way to keep in touch. But as said by Natalie Ward, these relationships we form over the net "lacked the depth and opportunities for reciprocity, such as granting one favor in exchange for another, that characterize real-world relationships"[1]. Relationships that do not involve physical proximity eventually degrade and no longer have the depth, trust, and strength that come with being "friends" with someone. If you substitute spending time with your friends with staying connected with them over the internet, you are changing those relationships in a negative way. It is important to keep this in mind and not let the web detract from your friendships.


So take a minute and think about what you are doing right now. How long have you been on the computer today? And how about on your phone? How much time have you spent in the virtual world and what has it helped you get done? If the answer is nothing or a small amount, you need to strongly consider if you are becoming addicted to the internet and it's uses.
In other words, go outside. Talk to someone in person. It's good for you.





--------------------------------------------
 [1] Ward, N. (2009), Falling into the net of depression: The power of the internet to cause and worsen depressive symptoms. Retrieved from http://web.njit.edu/~naw4/NWard%20-%20Internet%20+%20Depression.pdf

[2] Yen, J.-Y., Ko, C.-H., Yen, C.-F., Chen, S.-H., Chung, W.-L. and Chen, C.-C. (2008), Psychiatric symptoms in adolescents with internet addiction: Comparison with substance use. Psychiatry and Clinical Neurosciences, 62: 9–16. doi: 10.1111/j.1440-1819.2007.01770.x

Oct 11, 2010

Txting and ur Speech Skillz (lol)

Cn u read dis sentence w/o ny prob?

If so, then you are at least somewhat familiar with abbreviations and lingo used in today's text messaging or SMS (Short Message Service) communication. As you can imagine, the above sentence would most likely not be used in a formal, written document. Texting lingo as seen above is considered by many to be improper English and its use hinders and deteriorates people's formal writing and speaking skills. But is this assumption true?

 In one study, kids aged 10 to 12 were tested to see if a relationship exists between a persons use of texting and their ability to spell words. It was found that there was no relationship between a person's overall texting use and their ability to spell. It was found however, that kids who were familiar with texting had a better phonological awareness, or ability to recognize words based on their spoken sound rather than visual reading (e.g. "2day" sounds like the word "today") [1].
This brings up an interesting thought. Would someone with less than average language skills be more or less skilled at texting? In one sense, to be able to text requires a slightly deeper understand of the language the "texter" is using. To be able to recognize, understand, interpret and use texting abbreviations requires a user to have a basic, if not advanced understanding of their language. Another point of view is to consider is the length of the text messages themselves. As with the character limit on "Twitter" posts, a user may only enter so many words or letters into a single text. This forced the user to strongly consider what they are trying to say and how they say it. It forces the user to "write economically, inventively and playfully" and allows users to "play with the construction of language that they are learning about" [1].

Perhaps texting should not be seen as a fad that is destroying language, but as the next generation of communication. Languages, such as English, have evolved over time and this may simply be the next step in that process. But should texting be embraced as acceptable formal writing? The answer is no. Since many formally written papers are designed to be read and understood by a wide variety of people, they need to be written in a format that is universal. Until the abbreviations of texting are more widely known and accepted, formal language should be used. It is up to teachers and parents to teach people about the use of texting lingo. They should not teach that it is wrong and unacceptable, but instead that it should simply not be used for formal writing. There is a time and a place for texting.


Texting is not responsible for the belief that "youth have absolutely lost the skills of communication", but the next step in language evolution [2]. Texting is not going anywhere. Its use will continue to rise as the affordability of cell phones and texting plans increase. Until it is more widely known, texting lingo should be used in some cases and not in others, such as research documents. But it is certainly an acceptable form of communication and is quite effective at communicating ideas, emotions, and questions from one person to another. And isn't that what a language is supposed to be?

------------------------------------------------------------------
[2] Vaidyanathan, L., & Latu, S. (2007). Social consequences of cellular (cell) phones. Retrieved from http://www.acis2007.usq.edu.au/assets/papers/93.pdf
[1] Vosloo, S. (2009). The effects of texting on literacy: modern scourge or opportunity? Retrieved from http://vosloo.net/wp-content/uploads/pubs/texting_and_literacy_apr09_sv.pdf

Oct 4, 2010

The Stuxnet worm and how it can Kill

"[Stuxnet is] the most refined piece of malware ever discovered ... mischief or financial reward wasn’t its purpose, it was aimed right at the heart of a critical infrastructure"
-Alan Bentley

In a previous post,"Viruses, Worms, and Bugs Oh My!", I explained some basic information about computer viruses, worms, spyware, and other harmful programs that can invade your computer and cause damage and irritation. But what is the maximum amount of damage these programs can cause? In some extreme cases, bank information can be stolen and users will have to take time to recover their funds. But most commonly, these attacker programs will simply cause annoyance and frustration.

But what if they could kill you and your family?

Introducing Stuxnet, the internet worm that can kill people. But how? How can a virtual worm harm humans? The answer to that question is by infecting powerful systems, resulting in possibly grave dangers to the world. The worm can infect computer systems designed to control mechanical sytems, such as valves, alarms, pumps, and motors. Sound dangerous? If not, consider these examples:
  • The safety alarms could be disabled at a water dam, while valves designed to control water flow could be opened, allowing the dam to possibly collapse with almost no warning to the employees or surrounding residents.
  • A sewage treatment plant's pumps and safety systems could be taken over by an attacker, allowing for contaminates to infect our drinking water.
  • Perhaps the most frightening example, the safety systems could be disengaged at a nuclear power plant or on a pipeline. The resulting explosion could be devastating.
These are all very dangerous examples of what a computer worm like Stuxnet can do. But why is it different from other computer worms and viruses? Shouldn't these critical infrastructure companies be prepared for this? The answer is because Stuxnet is the first of its kind. Computers at industry plants do not run like our home and business computers, where we access a program, such as Microsoft Word, and make changes, such as deleting a file from our vacation picture album. The computers at plants are controlled by Industrial control systems, which govern PLCs (programmable logic controllers). Think of a PLC as a small computer that is programmed to do certain tasks, such as opening and closing a valve in a water plant. They are programmed for a very strict environment, with set limits regarding what they can and cannot do. They operate without any need for human interaction and it is through these PLCs that our industries run autonomously (1). Stuxnet infects computers that control PLCs and uploads its own code to the logic controllers, allowing for the PLC code and functions to be modified. But Stuxnet does not stop there. The code is also hidden from view, so a programmer checking for errors or infection in the PLC code will not see any trace of the malicious code inserted by Stuxnet. This makes the code very difficult to detect and remove.

On September 26, 2010, it was reported that Stuxnet had infected one of Iran's nuclear power plants. Although it caused no serious damage, it should be looked at as a proof of concept. The threat is real. And we are all at risk. It has been confirmed by Symantec that the people behind Stuxnet have been working with it for over a year, and most likely consisted of a team of five to ten people. The code allowed the worm to jump between portable storage devices and spread like the "Conflicker" worm via p2p networks (2).

With the advancement of automation, computer technology, and our world wide web, we are developing new ways to make life easier and more efficient. But we are also allowing for the possibility of new, dangerous threats. And with the movement to Smart Technology, such as the "Smart Grid", where our power systems would be controlled over a network, these threats are more dangerous than ever.

-------------------------------------------------------------------------
(1) Tasu, A. S. (2004). Programmable Logic Controller. Retrieved from http://www.nipne.ro/rjp/2006_51_1-2/0305_0310.pdf

(2) Chien, E. (2010, September 30). W32.stuxnet dossier. Retrieved from http://www.symantec.com/connect/blogs/w32stuxnet-dossier

Sep 27, 2010

RFID Tags and Privacy Invasion


"The fantastic advances in the field of communication constitute a grave danger to the privacy of the individual"
-Earl Warren

 Technology created to make our everyday lives easier could perhaps be seen as a double edged sword. We create some technology so that we are required to do less to achieve something or get something done. This technology does the work for us, saving us time and energy. But we must never forget that we have now placed that work in the hands of an inanimate object, which does not have moral values, privacy concerns, and responsibility. It simply does as it is designed and/or programmed to do. Which leaves it open to be attacked, misguided, and stolen from.
We, as a people, must always take a step back, look at our technology, and ensure it's effectiveness and security.



One example of consumer technology that offers a large amount of reward and danger is RFID tags, or Radio-Frequency Identification tags. These "tags" can be thought of as a barcode with a radio transmitter embedded into them. They are set to become the replacement for barcode technology. The RFID tags come in many types, with two being the most common, active and passive. Active RFID tags contain a battery within them, and can transmit and receive data autonomously, while passive RFID tags require an external power source to provide them with energy to transmit. The data transmitted from the tags is sent to a reader unit, which is responsible for receiving and transmitting data to and from the tags. The reader unit relays it's data to a database unit for storage and organization. The type of data stored on these tags can vary with what the company would like to know, but it has been reported that most companies store the product ID within the tag.


What are the benefits to using RFID tags? The tags do not require "line of sight" to be accessed, as is required with barcodes, since the barcode must be closely scanned by a machine. The barcode can be damaged easily, thus rendering it unusable, costing the consumer and provider time and energy to track, identify, and possibly replace the product or it's code. RFID tags are usually hidden in some way on the product, so as to not be damaged or be maliciously removed. The tags can have a range from less than a foot, to greater than a football field, depending on the type of tag, if it is active or passive, and it's intended use. Usually, passive tags have much smaller ranges, and the tag's size is also a huge factor. The tags can be used for inventory, allowing for quick and easy monitoring of products as they travel from a supply center to a store, or as they are moved to a shelf for sale. Another hope for RFID tags is the creation of "smart shelves" that will detect what products are currently sitting on the shelf and when the shelf is in need of restocking. This would allow for quick and accurate replacement and restocking of products, and also warn of unusual shelf activity, such as if a consumer removed a dozen cases of expensive products, a possible sign of intended theft.

You may already be using RFID tags. If you have a toll tag, or a little, usually adhesive, label on your car that allows you to drive on tollways without stopping, you are the owner of an RFID tag. Some credit/gas cards contain RFID tags for quick use, and some cell phones also use the technology. So what' the problem with RFID?
 
With the autonomous sending and receiving of data from these tags, privacy is a major concern. The tag sends data indiscriminately, so the data can be intercepted by an attacker and collected for other uses. Certain products, such as medicine, expensive electronics, and other items that their owners wish to keep private may be found and tracked by an attacker. Also, the RFID tag may not deactivate once the product is purchased. The tag may remain active even after you have returned home with the product, and this could even possibly be the goal by the product company. Many security features that can be implemented into the tag to protect the sent and received data increase the cost of production of the tag, and make it unreasonable for use by the company. Thus, less security means cheaper cost. The potential for the theft of information and unwanted tracking of consumers exists, and must be kept in mind when supporting and designing this technology.

How do you feel about buying a product, not knowing what data is bring transmitted from it and where that data is going? How would you feel if that pack of razors or bottle of medicine sitting in your bathroom could broadcast data to the outside world. As it currently exists, the world of RFID tags has the potential to offer great benefit to producers, but also creates a privacy and security threat. Should it be required for products with tags to be labeled with what data is being collected? Should tags be removed from products? Should consumers have the ability to remove or disable tags in their purchased products? These are all questions that should be asked, and should be answered. While technology makes our lives easier, we must always be aware of it, and ensure that it does not take away our privacy.

--------------------------------------------------------------

Information about RFID tags was obtained from an article by Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita and was used throughout the entire blog post. It can be read here: [link]

M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to “privacyfriendly” tags. In RFID Privacy Workshop, 2003.

Sep 20, 2010

Viruses, Worms, and Bugs Oh My!

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”
– Gene Spafford

Surely this is an overstatement. The internet is a place where many users, likely including you, spend time every day, search for products and information, keep in contact with friends, and manage your workplace and email. We use it at home, at work, and even on our phones and mobile devices. Surely it isn't such a bad place to be. With the advancement of computer technology and security, and better understanding by users to identify potential threats, isn't the internet secure?

The answer is, no. Millions of computer users, perhaps including you, know this from experience. Internet users have had problems ranging from the minor, such as unwanted internet pop-up advertisements, to the crippling, such as the theft of their personal identity, including their bank account information and credit card info. But however bad you may think the situation is, it is actually much worse. As technology has progressed, so have the threats. They have become more advanced and harder to detect and delete, and their progression shows no signs of stopping anytime soon.


Let's take a look at a few computer threat examples.
  • Spyware - Programs that monitor your computer activity and report the found information to somewhere else, potentially a hacker or company that collects information. One such example are some types of keyloggers, which store everything you type at your computer, including passwords.
  • Viruses - Infect a computer, usually through the user downloading a file that they believe to be safe, only to have the virus install itself on the host computer, sometimes with the user ever knowing that they have been infected. Some Viruses can disable or destroy a computer before moving to another one, while others do nothing other than copy themselves and spread the "infection" to other computers.
  • Trojans - The name comes from the "Trojan Horse" as read in mythology, in which the invading Greek army, unable to break into the guarded city of Troy, left a large wooden horse for the Trojans to find. The Trojans brought the horse inside, believing it to be a harmless trophy, when it actually held Greek soldiers inside, who later snuck out and opened the city gates for the rest of the army. A Trojan virus works in exactly the same way, appearing to be a harmless program that when downloaded, infects the computer and communicates with the internet to allow other malicious programs to enter and infect the computer.
  • Worms - Perhaps one of the most dangerous computer threats, worms are like viruses, only they specialize in duplicating themselves and using the infected computer's stored information, such as an email contact list to send itself to more computers. Worms work autonomously, meaning the infection and spreading code is within the worm itself, making the rate of infection across the internet unbelievably  fast and difficult to stop.
  • Bots/Botnets - A "bot" refers to a program that hides on an infected machine, allowing another user remotes control of the infected computer. Once a user has infected and gained control multiple computers, the computers are considered to be a "botnet", and can be told to perform a variety of automated tasks, such as stealing personal information, or sending cyber attacks to a certain website.
  • Rootkits - These are used by "hackers", or users with knowledge on how to break into computer systems, to hide actions and allow the hacker access to a system. They modify the computer software itself, usually through either a computer's operating system's discovered vulnerability, or by discovering a user's password. They then hide the hacker's actions and subvert anti-virus protection programs from finding and fixing the created problem. 
 Viruses and other malicious threats spread across the internet quickly, if they are designed to do so. A study done by Christopher May in 2009 included mathematical models designed to represent the infection rate and spread of biological threats with people, used instead to model the spread of computer viruses [1]. The two types of infections, both biological and virtual can be thought of in the same way, only the virtual viruses can spread much more quickly, can be harder to detect, and can be used for a variety of harmful intents. Some viruses can infect hundreds of thousands of computers within weeks. One such example is the ZeuS worm, which you can read about here, along with other great information about malicious programs. Be careful though, it's a very scary read!

If you see this on the internet, don't click either button. Close the window! It is a spyware downloader!


 “Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.”
– Kevin Mitnick

But what is the "weakest link" Kevin speaks of? The answer is us. Humans. In most cases, the blame for the infection of our computers and the spreading of viruses lies with us. It is up to computer users themselves to guard against possible infections and protect their computers. Here are a few tips to help you stay safe on the internet and prevent the most common ways that computers get infected.
  1.  Email/Instant Messaging - By far, the most common way that computers are infected is through email, especially links included in the email. NEVER, and I say again, NEVER click any links in an email. This is the safest behavior you can perform. Only in emails that you requested be sent to you (such as a password reset email) should you trust a posted link. Many attacking hackers will make the email appear to be from a site you trust, such as a bank, Ebay, or Yahoo, etc. These pages will look identical to the real emails, and in some cases, by simply clicking the link, you have opened up your computer to downloaded threats. It is better to simply go to the site directly and access whatever information or perform whatever actions were requested or to identify the validity of the email rather than click a link.
  2. Never give out personal information except in a situation where you are completely certain it is a trusted website. If you are ever asked for your bank account number, credit card information, address, social security number, or even a user name or password, make sure you know where it is going. Most websites will almost never ask you for such information unless you are making a purchase, so be careful.
  3. Install Anti-virus programs on your computer. This is an easy way to safeguard your computer against threats. You can purchase many different programs that monitor your internet and computer and protect you. Although they are less reliable, although not by much in my own opinion, there are free programs as well that you can, and should use if you do not feel like paying for internet security. Such programs as Spybot: Search and Destroy and AVG. There is no reason to not have anti-virus programs on your computer. Make sure you keep them updated and scan your computer at least once every week or so. A little but of effort here will go a long way.
Should you become infected by a virus, or if you even THINK you have a virus on your computer, unplug you computer from the internet, or turn off the wireless function if you are on a wireless network. This will prevent the virus from transferring data to a hacker or other computers. With your computer unplugged, run any and all of your virus scan programs one by one to try and find and delete any threats. Delete your "cookies" and "cache" on your computer and all your temporary internet files on any browsers you have installed.

In the end, it is up to the users to make good judgment calls about what to open, what to click, and what to download in order to keep their computers and other computers secure. The consequences of not doing so can be disastrous. Read up on how to prevent computer threats and take the necessary steps to prevent it from happening to you!


------------------------------------------------------------------------------ 

Sep 13, 2010

This Post Was Downloaded Illegally

Are you familiar with names such as Bittorrent, Limewire, Napster, or Morpheus? These are names of either current or past online file sharing programs. With the amount of users of file sharing programs estimated to be in the millions within the United States alone, file sharing is hugely popular, but has caused a large amount of criticism and legal action. But why? What's wrong with sharing? And where are the facts?

Let's first understand how file sharing works. In a very simplified description, one user will upload a file to other users across the internet. These files can be anything, from an online book, a video game, a movie, or music. Other users will download the file in a single part or in smaller pieces. As information is transferred to their computer, they in turn upload the data they have to other users downloading the same file. Imagine a bunch of people sitting in a classroom. A large amount of text is posted on the board in the front of the room, and everyone starts writing parts of it down. As users get more and more of the text copied, they begin helping other users get the text written faster and faster, while continuing to write down what they don't have. The more people in the group that have parts of or all of the text "downloaded", the faster others can "download" the file. Those who have the entire file downloaded and continue to upload the file are called "seeds", while all others in the group still downloading are called "peers". Hence the name file sharing is also called "peer to peer" sharing, or "p2p".

The issues with p2p sharing arise when looking at the content that is being shared. There are no limitations, from the software point of view, as to what can and cannot be uploaded and shared online, as the software itself will allow the uploading of any type of file. But uploading and sharing music, movies, books, and software under copyright is illegal, although the file sharing software and the act of file sharing in general itself is not illegal. It is important to remember that it is perfectly legal to use p2p programs, and many of the files shared are totally legal, from game demos, to movie trailers, to software updates. It is left completely up to the user to decide what they should and shouldn't download and upload.

How much damage can this cause to companies whose products are being downloaded illegally for free? The answer is unclear, as it is hard to exactly pinpoint to what extent the market for music, movies, and games is affected by file sharing. In many cases, it appears the "numbers" given are not quite the truth. In one study, it was reported that the music industry was losing billions within years from their CD sales. But this case did not take legal downloading into consideration, with programs such as Itunes and Amazon MP3. The company was losing billions in CD sales, but gaining billions in legal purchasing and downloading of online music. Some studies have even come to the conclusion that it does not harm the industry, but may actually spur more interest from people who download a track, favor it, then buy more music online.

But just how large of an impact file sharing has had is impossible to determine, since there are too many factors that need to be considered, both positive and negative, such as how much interest it spurred or how many people downloaded music they would have bought, or how many people downloaded music that they would not have purchased anyway. It is possible that both sides of the argument of file sharing legality are reporting excessive conclusions, but in the end it boils down to you. It is up to you to consider if file sharing is morally sound, what you should download, and how much, keeping in mind that some users have been caught and fined thousands of dollars for every music song they downloaded.

In a small twist of irony, almost every recent, accurate source I attempted to locate facts from was not public information. Each one would have cost me anywhere from $40.00 to $150.00 to read, or in some cases, view for a limited time. I searched (but did not download) for these articles on file sharing websites and was surprised to find them there, available illegally for free. This is the same sort of position some people are in considering buying music.

I choose to not download the papers, but these events seemed very fitting for my file sharing blog post.

Sep 6, 2010

On the Road, Off the Phone

SMS, or "short message service" refers to small, text based communication between mobile phones. It is commonly referred to as "texting", and if CTIA's U.S. statistics have anything to say about it, it is quite popular, with around 1.56 Trillion messages sent in 2009 [1].

That's right, 1.56 Trillion in the United States alone. And the numbers are only growing.

But with this many messages being sent, where are they being sent from? We will focus on one specific place where they should never be sent from, a car. According to the National Safety Council, 28% of  yearly automobile accidents are the result of lack of attention by drivers due to mobile phone usage, with about 200,000 accidents directly caused by texting [2]. Responding to a text message, a driver must look down and read the message, then, should they choose, reply to it. During this, the driver diverts attention from the the road to use their hand to access their mobile device, and their eyes to read what it says. In some situations, this small loss of attention can lead to a major accident. A driver many only look away for a few seconds, but many drivers underestimate just how much distance they travel in this time.

Let's think about this in a little more detail. Let's assume you are driving on a major road, but not a highway, traveling at 45 miles per hour. You receive a text message and glance down to read it. It takes you only two seconds to pick up your phone and access the message, then another two seconds to read what it says and who it is from. You have now been looking away from the road for about 4 seconds. This is a very small amount of time, but just what has happened as you read your message? Let's look at the numbers. I am more familiar when considering distances to use feet rather than meters, so I will provide a reference for both types of measurement in this example.

You are traveling 45 miles per hour, or 66 feet per second. In the four seconds you looked away from the road to your phone, you have traveled 264 feet, about three fourths (75%) of the length of a football field. Had you been on a major road, traveling at 65 miles per hour, this 4 second loss of attention would mean you traveled father than the length of a football field without paying attention to world around you. If you have ever been in an accident, had a close call, or experienced a near miss while driving, you know how quickly the situation around you can change, how quickly you must act in order to prevent an accident, and how long it takes for a car to come to a stop from when you press your foot on the brake.
Do you think putting luck in the drivers seat for over 100 yards is a good idea?



And with more and more accidents caused by mobile phone using drivers, studies have been performed to analyze and explain the effects of phone usage and driving. One study was done by Hosking, Young, and Regan at the University Accident Research Center and was aimed at the observation of the effects of texting while driving with young drivers. Subjects were put into a driving simulation and required to read and reply to text messages. The driver's ability to stay in their lane, their following distance, and eye movement were observed. The virtual road would also present obstacles to the driver, such as a car turning, or a pedestrian crossing the road, and their reaction speed and braking time to these obstacles were measured. It was concluded that drivers, while texting, spend 400% more time with their eyes off the road, and while those texting would increase their following distance from the car ahead of them, they would not reduce their driving speed. In particular, sending text messages greatly increased the drivers risk of having a collision [3]. By texting, you become a major hazard to yourself and those around you.

The final question you must ask yourself is this: Is it worth it?

Is it worth it to look at that message right now? The answer is no. Do yourself a favor and silence your phone when you drive, or if you can handle it, simply ignore that little catchy sound your phone makes when a new text arrives until you reach your destination. Because chances are, your friend does not need an immediate answer to "Lol, I just saw your roomate at the grocery store", and would letting them know immediately that you agree it's funny really be worth becoming paralyzed over? Or dying over? Or perhaps killing those in the cars around you when you cause an accident?

Your friend can wait. When you are on the road, please stay off your phone.




[1] U.S. Wireless Quick Facts. (n.d.). CTIA - The Wireless Association. Retrieved September 6, 2010, from http://www.ctia.org/media/industry_info/index.cfm/AID/10323 

[2] III, A. H. (n.d.). 28 percent of accidents involve talking, texting on cellphones - washingtonpost.com. washingtonpost.com - nation, world, technology and Washington area news and headlines. Retrieved September 6, 2010, from http://www.washingtonpost.com/wp-dyn/content/article/2010/01/12/AR2010011202218.html 

[3] Hosking, S., Young, K. & Regan, M. (2007). The effects of text messaging on young novice driver performance. In: I.J. Faulks, M. Regan, M. Stevenson, J. Brown, A. Porter & J.D. Irwin (Eds.). Distracted driving. Sydney, NSW: Australasian College of Road Safety. Pages 155-187.