Oct 18, 2010

Internet Addiction

Addiction - "compulsive need for and use of a habit-forming substance (as heroin, nicotine, or alcohol) characterized by tolerance and by well-defined physiological symptoms upon withdrawal; broadly : persistent compulsive use of a substance known by the user to be harmful."

Can you become addicted to the internet? We all know that humans can become physically and/or mentally dependent on things such as alcohol and drugs, but does that mean that you can become hooked on the world wide web? That depends on what it means, to you, to become hooked on something. For me, it means spending a large amount of time with and/or on something and using it instead of doing things that enrich your well being. But, again, this would depend on if you find using the internet enriching to your well being. Some may say yes, others would say no, but regardless of our opinions, usage of the internet does effects us.

This isn't a subject that has been ignored by professionals. With the rising use of the internet, faster internet speeds, better posted information and research options, and more popular social websites being created (such as Facebook), the internet has become almost vital to everyday life for some people and is used in almost every business and company, sometimes every day. And so studies have been done to measure the effects of prolonged use of the web, mainly on adolescent and young people. One study, performed by Ju-Yu Yen and his team found that in young teenagers, users with "internet addiction" had poorer mental health than those who did not and also had a higher chance of becoming engaged in substance abuse. They defined an internet abuser as someone who uses the internet frequently, has problems stopping use, has issues when not using it, has communication problems with others, and has poor health and time management as a result of using the web [2].

To some readers, this may sound silly and something that you cannot relate to. But can you? Have you ever worked on homework and decided to check your Facebook, only to find that afterward, you had spent almost an hour looking at your friends posts? You lost track of time and as a result had to hurry to finish your work. This is an example of possible misuse of the internet. Be it either checking your email, reading posts on Facebook, watching funny Youtube videos, or simply searching for music, if you find that you spend time lost on the internet instead of taking care of your real life needs, you may have a problem. But how can this be? Some people have made friends on the internet, and continued to support existing relationships with people over social networking sites. Isn't this a good thing? The answer is yes and no. Using social networking for organizing events and casual conversation is a great way to keep in touch. But as said by Natalie Ward, these relationships we form over the net "lacked the depth and opportunities for reciprocity, such as granting one favor in exchange for another, that characterize real-world relationships"[1]. Relationships that do not involve physical proximity eventually degrade and no longer have the depth, trust, and strength that come with being "friends" with someone. If you substitute spending time with your friends with staying connected with them over the internet, you are changing those relationships in a negative way. It is important to keep this in mind and not let the web detract from your friendships.


So take a minute and think about what you are doing right now. How long have you been on the computer today? And how about on your phone? How much time have you spent in the virtual world and what has it helped you get done? If the answer is nothing or a small amount, you need to strongly consider if you are becoming addicted to the internet and it's uses.
In other words, go outside. Talk to someone in person. It's good for you.





--------------------------------------------
 [1] Ward, N. (2009), Falling into the net of depression: The power of the internet to cause and worsen depressive symptoms. Retrieved from http://web.njit.edu/~naw4/NWard%20-%20Internet%20+%20Depression.pdf

[2] Yen, J.-Y., Ko, C.-H., Yen, C.-F., Chen, S.-H., Chung, W.-L. and Chen, C.-C. (2008), Psychiatric symptoms in adolescents with internet addiction: Comparison with substance use. Psychiatry and Clinical Neurosciences, 62: 9–16. doi: 10.1111/j.1440-1819.2007.01770.x

Oct 11, 2010

Txting and ur Speech Skillz (lol)

Cn u read dis sentence w/o ny prob?

If so, then you are at least somewhat familiar with abbreviations and lingo used in today's text messaging or SMS (Short Message Service) communication. As you can imagine, the above sentence would most likely not be used in a formal, written document. Texting lingo as seen above is considered by many to be improper English and its use hinders and deteriorates people's formal writing and speaking skills. But is this assumption true?

 In one study, kids aged 10 to 12 were tested to see if a relationship exists between a persons use of texting and their ability to spell words. It was found that there was no relationship between a person's overall texting use and their ability to spell. It was found however, that kids who were familiar with texting had a better phonological awareness, or ability to recognize words based on their spoken sound rather than visual reading (e.g. "2day" sounds like the word "today") [1].
This brings up an interesting thought. Would someone with less than average language skills be more or less skilled at texting? In one sense, to be able to text requires a slightly deeper understand of the language the "texter" is using. To be able to recognize, understand, interpret and use texting abbreviations requires a user to have a basic, if not advanced understanding of their language. Another point of view is to consider is the length of the text messages themselves. As with the character limit on "Twitter" posts, a user may only enter so many words or letters into a single text. This forced the user to strongly consider what they are trying to say and how they say it. It forces the user to "write economically, inventively and playfully" and allows users to "play with the construction of language that they are learning about" [1].

Perhaps texting should not be seen as a fad that is destroying language, but as the next generation of communication. Languages, such as English, have evolved over time and this may simply be the next step in that process. But should texting be embraced as acceptable formal writing? The answer is no. Since many formally written papers are designed to be read and understood by a wide variety of people, they need to be written in a format that is universal. Until the abbreviations of texting are more widely known and accepted, formal language should be used. It is up to teachers and parents to teach people about the use of texting lingo. They should not teach that it is wrong and unacceptable, but instead that it should simply not be used for formal writing. There is a time and a place for texting.


Texting is not responsible for the belief that "youth have absolutely lost the skills of communication", but the next step in language evolution [2]. Texting is not going anywhere. Its use will continue to rise as the affordability of cell phones and texting plans increase. Until it is more widely known, texting lingo should be used in some cases and not in others, such as research documents. But it is certainly an acceptable form of communication and is quite effective at communicating ideas, emotions, and questions from one person to another. And isn't that what a language is supposed to be?

------------------------------------------------------------------
[2] Vaidyanathan, L., & Latu, S. (2007). Social consequences of cellular (cell) phones. Retrieved from http://www.acis2007.usq.edu.au/assets/papers/93.pdf
[1] Vosloo, S. (2009). The effects of texting on literacy: modern scourge or opportunity? Retrieved from http://vosloo.net/wp-content/uploads/pubs/texting_and_literacy_apr09_sv.pdf

Oct 4, 2010

The Stuxnet worm and how it can Kill

"[Stuxnet is] the most refined piece of malware ever discovered ... mischief or financial reward wasn’t its purpose, it was aimed right at the heart of a critical infrastructure"
-Alan Bentley

In a previous post,"Viruses, Worms, and Bugs Oh My!", I explained some basic information about computer viruses, worms, spyware, and other harmful programs that can invade your computer and cause damage and irritation. But what is the maximum amount of damage these programs can cause? In some extreme cases, bank information can be stolen and users will have to take time to recover their funds. But most commonly, these attacker programs will simply cause annoyance and frustration.

But what if they could kill you and your family?

Introducing Stuxnet, the internet worm that can kill people. But how? How can a virtual worm harm humans? The answer to that question is by infecting powerful systems, resulting in possibly grave dangers to the world. The worm can infect computer systems designed to control mechanical sytems, such as valves, alarms, pumps, and motors. Sound dangerous? If not, consider these examples:
  • The safety alarms could be disabled at a water dam, while valves designed to control water flow could be opened, allowing the dam to possibly collapse with almost no warning to the employees or surrounding residents.
  • A sewage treatment plant's pumps and safety systems could be taken over by an attacker, allowing for contaminates to infect our drinking water.
  • Perhaps the most frightening example, the safety systems could be disengaged at a nuclear power plant or on a pipeline. The resulting explosion could be devastating.
These are all very dangerous examples of what a computer worm like Stuxnet can do. But why is it different from other computer worms and viruses? Shouldn't these critical infrastructure companies be prepared for this? The answer is because Stuxnet is the first of its kind. Computers at industry plants do not run like our home and business computers, where we access a program, such as Microsoft Word, and make changes, such as deleting a file from our vacation picture album. The computers at plants are controlled by Industrial control systems, which govern PLCs (programmable logic controllers). Think of a PLC as a small computer that is programmed to do certain tasks, such as opening and closing a valve in a water plant. They are programmed for a very strict environment, with set limits regarding what they can and cannot do. They operate without any need for human interaction and it is through these PLCs that our industries run autonomously (1). Stuxnet infects computers that control PLCs and uploads its own code to the logic controllers, allowing for the PLC code and functions to be modified. But Stuxnet does not stop there. The code is also hidden from view, so a programmer checking for errors or infection in the PLC code will not see any trace of the malicious code inserted by Stuxnet. This makes the code very difficult to detect and remove.

On September 26, 2010, it was reported that Stuxnet had infected one of Iran's nuclear power plants. Although it caused no serious damage, it should be looked at as a proof of concept. The threat is real. And we are all at risk. It has been confirmed by Symantec that the people behind Stuxnet have been working with it for over a year, and most likely consisted of a team of five to ten people. The code allowed the worm to jump between portable storage devices and spread like the "Conflicker" worm via p2p networks (2).

With the advancement of automation, computer technology, and our world wide web, we are developing new ways to make life easier and more efficient. But we are also allowing for the possibility of new, dangerous threats. And with the movement to Smart Technology, such as the "Smart Grid", where our power systems would be controlled over a network, these threats are more dangerous than ever.

-------------------------------------------------------------------------
(1) Tasu, A. S. (2004). Programmable Logic Controller. Retrieved from http://www.nipne.ro/rjp/2006_51_1-2/0305_0310.pdf

(2) Chien, E. (2010, September 30). W32.stuxnet dossier. Retrieved from http://www.symantec.com/connect/blogs/w32stuxnet-dossier

Sep 27, 2010

RFID Tags and Privacy Invasion


"The fantastic advances in the field of communication constitute a grave danger to the privacy of the individual"
-Earl Warren

 Technology created to make our everyday lives easier could perhaps be seen as a double edged sword. We create some technology so that we are required to do less to achieve something or get something done. This technology does the work for us, saving us time and energy. But we must never forget that we have now placed that work in the hands of an inanimate object, which does not have moral values, privacy concerns, and responsibility. It simply does as it is designed and/or programmed to do. Which leaves it open to be attacked, misguided, and stolen from.
We, as a people, must always take a step back, look at our technology, and ensure it's effectiveness and security.



One example of consumer technology that offers a large amount of reward and danger is RFID tags, or Radio-Frequency Identification tags. These "tags" can be thought of as a barcode with a radio transmitter embedded into them. They are set to become the replacement for barcode technology. The RFID tags come in many types, with two being the most common, active and passive. Active RFID tags contain a battery within them, and can transmit and receive data autonomously, while passive RFID tags require an external power source to provide them with energy to transmit. The data transmitted from the tags is sent to a reader unit, which is responsible for receiving and transmitting data to and from the tags. The reader unit relays it's data to a database unit for storage and organization. The type of data stored on these tags can vary with what the company would like to know, but it has been reported that most companies store the product ID within the tag.


What are the benefits to using RFID tags? The tags do not require "line of sight" to be accessed, as is required with barcodes, since the barcode must be closely scanned by a machine. The barcode can be damaged easily, thus rendering it unusable, costing the consumer and provider time and energy to track, identify, and possibly replace the product or it's code. RFID tags are usually hidden in some way on the product, so as to not be damaged or be maliciously removed. The tags can have a range from less than a foot, to greater than a football field, depending on the type of tag, if it is active or passive, and it's intended use. Usually, passive tags have much smaller ranges, and the tag's size is also a huge factor. The tags can be used for inventory, allowing for quick and easy monitoring of products as they travel from a supply center to a store, or as they are moved to a shelf for sale. Another hope for RFID tags is the creation of "smart shelves" that will detect what products are currently sitting on the shelf and when the shelf is in need of restocking. This would allow for quick and accurate replacement and restocking of products, and also warn of unusual shelf activity, such as if a consumer removed a dozen cases of expensive products, a possible sign of intended theft.

You may already be using RFID tags. If you have a toll tag, or a little, usually adhesive, label on your car that allows you to drive on tollways without stopping, you are the owner of an RFID tag. Some credit/gas cards contain RFID tags for quick use, and some cell phones also use the technology. So what' the problem with RFID?
 
With the autonomous sending and receiving of data from these tags, privacy is a major concern. The tag sends data indiscriminately, so the data can be intercepted by an attacker and collected for other uses. Certain products, such as medicine, expensive electronics, and other items that their owners wish to keep private may be found and tracked by an attacker. Also, the RFID tag may not deactivate once the product is purchased. The tag may remain active even after you have returned home with the product, and this could even possibly be the goal by the product company. Many security features that can be implemented into the tag to protect the sent and received data increase the cost of production of the tag, and make it unreasonable for use by the company. Thus, less security means cheaper cost. The potential for the theft of information and unwanted tracking of consumers exists, and must be kept in mind when supporting and designing this technology.

How do you feel about buying a product, not knowing what data is bring transmitted from it and where that data is going? How would you feel if that pack of razors or bottle of medicine sitting in your bathroom could broadcast data to the outside world. As it currently exists, the world of RFID tags has the potential to offer great benefit to producers, but also creates a privacy and security threat. Should it be required for products with tags to be labeled with what data is being collected? Should tags be removed from products? Should consumers have the ability to remove or disable tags in their purchased products? These are all questions that should be asked, and should be answered. While technology makes our lives easier, we must always be aware of it, and ensure that it does not take away our privacy.

--------------------------------------------------------------

Information about RFID tags was obtained from an article by Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita and was used throughout the entire blog post. It can be read here: [link]

M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to “privacyfriendly” tags. In RFID Privacy Workshop, 2003.

Sep 20, 2010

Viruses, Worms, and Bugs Oh My!

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”
– Gene Spafford

Surely this is an overstatement. The internet is a place where many users, likely including you, spend time every day, search for products and information, keep in contact with friends, and manage your workplace and email. We use it at home, at work, and even on our phones and mobile devices. Surely it isn't such a bad place to be. With the advancement of computer technology and security, and better understanding by users to identify potential threats, isn't the internet secure?

The answer is, no. Millions of computer users, perhaps including you, know this from experience. Internet users have had problems ranging from the minor, such as unwanted internet pop-up advertisements, to the crippling, such as the theft of their personal identity, including their bank account information and credit card info. But however bad you may think the situation is, it is actually much worse. As technology has progressed, so have the threats. They have become more advanced and harder to detect and delete, and their progression shows no signs of stopping anytime soon.


Let's take a look at a few computer threat examples.
  • Spyware - Programs that monitor your computer activity and report the found information to somewhere else, potentially a hacker or company that collects information. One such example are some types of keyloggers, which store everything you type at your computer, including passwords.
  • Viruses - Infect a computer, usually through the user downloading a file that they believe to be safe, only to have the virus install itself on the host computer, sometimes with the user ever knowing that they have been infected. Some Viruses can disable or destroy a computer before moving to another one, while others do nothing other than copy themselves and spread the "infection" to other computers.
  • Trojans - The name comes from the "Trojan Horse" as read in mythology, in which the invading Greek army, unable to break into the guarded city of Troy, left a large wooden horse for the Trojans to find. The Trojans brought the horse inside, believing it to be a harmless trophy, when it actually held Greek soldiers inside, who later snuck out and opened the city gates for the rest of the army. A Trojan virus works in exactly the same way, appearing to be a harmless program that when downloaded, infects the computer and communicates with the internet to allow other malicious programs to enter and infect the computer.
  • Worms - Perhaps one of the most dangerous computer threats, worms are like viruses, only they specialize in duplicating themselves and using the infected computer's stored information, such as an email contact list to send itself to more computers. Worms work autonomously, meaning the infection and spreading code is within the worm itself, making the rate of infection across the internet unbelievably  fast and difficult to stop.
  • Bots/Botnets - A "bot" refers to a program that hides on an infected machine, allowing another user remotes control of the infected computer. Once a user has infected and gained control multiple computers, the computers are considered to be a "botnet", and can be told to perform a variety of automated tasks, such as stealing personal information, or sending cyber attacks to a certain website.
  • Rootkits - These are used by "hackers", or users with knowledge on how to break into computer systems, to hide actions and allow the hacker access to a system. They modify the computer software itself, usually through either a computer's operating system's discovered vulnerability, or by discovering a user's password. They then hide the hacker's actions and subvert anti-virus protection programs from finding and fixing the created problem. 
 Viruses and other malicious threats spread across the internet quickly, if they are designed to do so. A study done by Christopher May in 2009 included mathematical models designed to represent the infection rate and spread of biological threats with people, used instead to model the spread of computer viruses [1]. The two types of infections, both biological and virtual can be thought of in the same way, only the virtual viruses can spread much more quickly, can be harder to detect, and can be used for a variety of harmful intents. Some viruses can infect hundreds of thousands of computers within weeks. One such example is the ZeuS worm, which you can read about here, along with other great information about malicious programs. Be careful though, it's a very scary read!

If you see this on the internet, don't click either button. Close the window! It is a spyware downloader!


 “Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.”
– Kevin Mitnick

But what is the "weakest link" Kevin speaks of? The answer is us. Humans. In most cases, the blame for the infection of our computers and the spreading of viruses lies with us. It is up to computer users themselves to guard against possible infections and protect their computers. Here are a few tips to help you stay safe on the internet and prevent the most common ways that computers get infected.
  1.  Email/Instant Messaging - By far, the most common way that computers are infected is through email, especially links included in the email. NEVER, and I say again, NEVER click any links in an email. This is the safest behavior you can perform. Only in emails that you requested be sent to you (such as a password reset email) should you trust a posted link. Many attacking hackers will make the email appear to be from a site you trust, such as a bank, Ebay, or Yahoo, etc. These pages will look identical to the real emails, and in some cases, by simply clicking the link, you have opened up your computer to downloaded threats. It is better to simply go to the site directly and access whatever information or perform whatever actions were requested or to identify the validity of the email rather than click a link.
  2. Never give out personal information except in a situation where you are completely certain it is a trusted website. If you are ever asked for your bank account number, credit card information, address, social security number, or even a user name or password, make sure you know where it is going. Most websites will almost never ask you for such information unless you are making a purchase, so be careful.
  3. Install Anti-virus programs on your computer. This is an easy way to safeguard your computer against threats. You can purchase many different programs that monitor your internet and computer and protect you. Although they are less reliable, although not by much in my own opinion, there are free programs as well that you can, and should use if you do not feel like paying for internet security. Such programs as Spybot: Search and Destroy and AVG. There is no reason to not have anti-virus programs on your computer. Make sure you keep them updated and scan your computer at least once every week or so. A little but of effort here will go a long way.
Should you become infected by a virus, or if you even THINK you have a virus on your computer, unplug you computer from the internet, or turn off the wireless function if you are on a wireless network. This will prevent the virus from transferring data to a hacker or other computers. With your computer unplugged, run any and all of your virus scan programs one by one to try and find and delete any threats. Delete your "cookies" and "cache" on your computer and all your temporary internet files on any browsers you have installed.

In the end, it is up to the users to make good judgment calls about what to open, what to click, and what to download in order to keep their computers and other computers secure. The consequences of not doing so can be disastrous. Read up on how to prevent computer threats and take the necessary steps to prevent it from happening to you!


------------------------------------------------------------------------------ 

Sep 13, 2010

This Post Was Downloaded Illegally

Are you familiar with names such as Bittorrent, Limewire, Napster, or Morpheus? These are names of either current or past online file sharing programs. With the amount of users of file sharing programs estimated to be in the millions within the United States alone, file sharing is hugely popular, but has caused a large amount of criticism and legal action. But why? What's wrong with sharing? And where are the facts?

Let's first understand how file sharing works. In a very simplified description, one user will upload a file to other users across the internet. These files can be anything, from an online book, a video game, a movie, or music. Other users will download the file in a single part or in smaller pieces. As information is transferred to their computer, they in turn upload the data they have to other users downloading the same file. Imagine a bunch of people sitting in a classroom. A large amount of text is posted on the board in the front of the room, and everyone starts writing parts of it down. As users get more and more of the text copied, they begin helping other users get the text written faster and faster, while continuing to write down what they don't have. The more people in the group that have parts of or all of the text "downloaded", the faster others can "download" the file. Those who have the entire file downloaded and continue to upload the file are called "seeds", while all others in the group still downloading are called "peers". Hence the name file sharing is also called "peer to peer" sharing, or "p2p".

The issues with p2p sharing arise when looking at the content that is being shared. There are no limitations, from the software point of view, as to what can and cannot be uploaded and shared online, as the software itself will allow the uploading of any type of file. But uploading and sharing music, movies, books, and software under copyright is illegal, although the file sharing software and the act of file sharing in general itself is not illegal. It is important to remember that it is perfectly legal to use p2p programs, and many of the files shared are totally legal, from game demos, to movie trailers, to software updates. It is left completely up to the user to decide what they should and shouldn't download and upload.

How much damage can this cause to companies whose products are being downloaded illegally for free? The answer is unclear, as it is hard to exactly pinpoint to what extent the market for music, movies, and games is affected by file sharing. In many cases, it appears the "numbers" given are not quite the truth. In one study, it was reported that the music industry was losing billions within years from their CD sales. But this case did not take legal downloading into consideration, with programs such as Itunes and Amazon MP3. The company was losing billions in CD sales, but gaining billions in legal purchasing and downloading of online music. Some studies have even come to the conclusion that it does not harm the industry, but may actually spur more interest from people who download a track, favor it, then buy more music online.

But just how large of an impact file sharing has had is impossible to determine, since there are too many factors that need to be considered, both positive and negative, such as how much interest it spurred or how many people downloaded music they would have bought, or how many people downloaded music that they would not have purchased anyway. It is possible that both sides of the argument of file sharing legality are reporting excessive conclusions, but in the end it boils down to you. It is up to you to consider if file sharing is morally sound, what you should download, and how much, keeping in mind that some users have been caught and fined thousands of dollars for every music song they downloaded.

In a small twist of irony, almost every recent, accurate source I attempted to locate facts from was not public information. Each one would have cost me anywhere from $40.00 to $150.00 to read, or in some cases, view for a limited time. I searched (but did not download) for these articles on file sharing websites and was surprised to find them there, available illegally for free. This is the same sort of position some people are in considering buying music.

I choose to not download the papers, but these events seemed very fitting for my file sharing blog post.

Sep 6, 2010

On the Road, Off the Phone

SMS, or "short message service" refers to small, text based communication between mobile phones. It is commonly referred to as "texting", and if CTIA's U.S. statistics have anything to say about it, it is quite popular, with around 1.56 Trillion messages sent in 2009 [1].

That's right, 1.56 Trillion in the United States alone. And the numbers are only growing.

But with this many messages being sent, where are they being sent from? We will focus on one specific place where they should never be sent from, a car. According to the National Safety Council, 28% of  yearly automobile accidents are the result of lack of attention by drivers due to mobile phone usage, with about 200,000 accidents directly caused by texting [2]. Responding to a text message, a driver must look down and read the message, then, should they choose, reply to it. During this, the driver diverts attention from the the road to use their hand to access their mobile device, and their eyes to read what it says. In some situations, this small loss of attention can lead to a major accident. A driver many only look away for a few seconds, but many drivers underestimate just how much distance they travel in this time.

Let's think about this in a little more detail. Let's assume you are driving on a major road, but not a highway, traveling at 45 miles per hour. You receive a text message and glance down to read it. It takes you only two seconds to pick up your phone and access the message, then another two seconds to read what it says and who it is from. You have now been looking away from the road for about 4 seconds. This is a very small amount of time, but just what has happened as you read your message? Let's look at the numbers. I am more familiar when considering distances to use feet rather than meters, so I will provide a reference for both types of measurement in this example.

You are traveling 45 miles per hour, or 66 feet per second. In the four seconds you looked away from the road to your phone, you have traveled 264 feet, about three fourths (75%) of the length of a football field. Had you been on a major road, traveling at 65 miles per hour, this 4 second loss of attention would mean you traveled father than the length of a football field without paying attention to world around you. If you have ever been in an accident, had a close call, or experienced a near miss while driving, you know how quickly the situation around you can change, how quickly you must act in order to prevent an accident, and how long it takes for a car to come to a stop from when you press your foot on the brake.
Do you think putting luck in the drivers seat for over 100 yards is a good idea?



And with more and more accidents caused by mobile phone using drivers, studies have been performed to analyze and explain the effects of phone usage and driving. One study was done by Hosking, Young, and Regan at the University Accident Research Center and was aimed at the observation of the effects of texting while driving with young drivers. Subjects were put into a driving simulation and required to read and reply to text messages. The driver's ability to stay in their lane, their following distance, and eye movement were observed. The virtual road would also present obstacles to the driver, such as a car turning, or a pedestrian crossing the road, and their reaction speed and braking time to these obstacles were measured. It was concluded that drivers, while texting, spend 400% more time with their eyes off the road, and while those texting would increase their following distance from the car ahead of them, they would not reduce their driving speed. In particular, sending text messages greatly increased the drivers risk of having a collision [3]. By texting, you become a major hazard to yourself and those around you.

The final question you must ask yourself is this: Is it worth it?

Is it worth it to look at that message right now? The answer is no. Do yourself a favor and silence your phone when you drive, or if you can handle it, simply ignore that little catchy sound your phone makes when a new text arrives until you reach your destination. Because chances are, your friend does not need an immediate answer to "Lol, I just saw your roomate at the grocery store", and would letting them know immediately that you agree it's funny really be worth becoming paralyzed over? Or dying over? Or perhaps killing those in the cars around you when you cause an accident?

Your friend can wait. When you are on the road, please stay off your phone.




[1] U.S. Wireless Quick Facts. (n.d.). CTIA - The Wireless Association. Retrieved September 6, 2010, from http://www.ctia.org/media/industry_info/index.cfm/AID/10323 

[2] III, A. H. (n.d.). 28 percent of accidents involve talking, texting on cellphones - washingtonpost.com. washingtonpost.com - nation, world, technology and Washington area news and headlines. Retrieved September 6, 2010, from http://www.washingtonpost.com/wp-dyn/content/article/2010/01/12/AR2010011202218.html 

[3] Hosking, S., Young, K. & Regan, M. (2007). The effects of text messaging on young novice driver performance. In: I.J. Faulks, M. Regan, M. Stevenson, J. Brown, A. Porter & J.D. Irwin (Eds.). Distracted driving. Sydney, NSW: Australasian College of Road Safety. Pages 155-187.

Aug 30, 2010

Facebook and Online Information: The Good, the Bad, and the Lessons Learned

Life without Facebook. For many people, especially young college students, this seems impossible. Unthinkable. Surely only existing in nightmares alongside Freddy Kruger and Michael Myers. But today, those people have no need to worry, Facebook is active and only growing more and more popular, currently holding over 500 million users, 50% of which log in at least once a day [1]. It is perhaps the greatest example of social networking sites and will be the focus of this post. But what exactly is Facebook? How has Facebook and other social sites changed how we view posting online?

To answer that, let's first look a little deeper into Facebook and what it offers. If you are already a facebook user, or a user of other social networking sites, much of this may seem obvious to you already.

The Good
With tools available for users to post photo albums, stories, social updates, comments, videos, create groups and even live chat, Facebook offers it's users unrivaled communication options and is one of the most popular social networking sites in the world. With their information listed, each user can join networks they feel they are related to, such as the school they are attending, or city they live in, the purpose being to allow for possible meeting with others within the network, allowing for possible friendships, relationships, or networking. Introduced in September of 2006, a "News Feed" application was launched, a list appearing on a user's Facebook homepage that showed current and popular activity relating to their friends and networks [2] The data that appears in the feed is not requested from each user, but simply automatically collected and used, based on a users actions, without the user being aware. This allows a user to keep updated on what their friends are doing, providing possible conversational topics and gossip. Each user has their own personal page, where they can post their picture, interests, hobbies, and even personal information, such as their email, phone numbers, address, and birthday. In the end, Facebook is a social networking site, and the basic ideology behind it is to allow people to maintain communication with others, regardless of distance, making keeping touch with old, current, and new friends relatively easy and enjoyable.

But is putting so much personal information on the internet a smart decision? Ask yourself these questions:
1. If called over the phone by a unknown company and asked for your birthday, cell phone number, and address, would you prove the information?
2. If approached by a stranger and asked for photos of your recent vacation, would you allow them to look at your pictures?
3. If a stranger informed you that they attended the same university as yourself, and asked for a copy of your class schedule, would you provide one?

If you answered "no" to any or all of these questions, I encourage you to look over your Facebook profile page and see what information you have listed. So why would anyone post the info that is seen so commonly listed on Facebook pages? The answer to that is false security, which leads us to...


The Bad
Due to the widespread use and availability of online technology, we have developed incorrect and possibly harmful ideas about online security. Not regarding hackers and the forceful robbery of our bank accounts, passwords, and identity, but regarding the safety of the information we knowingly post online. As sites become more and more popular and are used more and more frequently they begin to "penetrate their users' everyday life and, as pervasive technology, tend to become invisible once they are widely adopted, ubiquitous, and taken for granted". User's believe that since their friends, family and themselves have not been exposed to misuse or abuse, their current habits are without risk. Some users, even when victim to abuse, will continue to use social networking sites, as it is seen as part of daily life and needed to fit in with their friends, coworkers, or classmates [2][3]. In one study, only 64% of users knew about and actively used privacy settings intended on filtering visible information to the public, and 70% still posted personal demographic information on their pages [4]. It may surprise many users that their personal page can found using common search engines, that companies use Facebook to look for information on future employees, and possible incriminating information on current staff. And above all, complete strangers have easy access to their personal information and conversations. Not all users actually personally know each individual on their "friends list", and this opens up a huge possibility for data phishing, stalking, or harm of themselves or their friends. How many of your listed friends to you actually know and trust?
Do you trust each of these 596 people?

Is it Facebook's fault for making such methods available to potential threats? Although Facebook certainly has not enacted policies and options to completely secure it's users, choosing to leave public searching available to increase find-ability, the majority of the fault for these incidents lies with the users themselves. But can this change?

Lessons Learned
With proper knowledge and education, users on Facebook and other social networking sites can make a much stronger effort to protect themselves and their friends. Reading the terms and conditions of a social site is usually required, but most users are not aware of the terms, many ignoring them completely [2]. But there are simpler ways to protect yourself online, such as exploring and using options that constrain what information is available to be viewed by whom, and who can search for and find you. Also, if it is not needed, do not list personal demographic information or other personal info such as class schedules or phone numbers. It is up to each person to take a step back and look at what they have posted online from a defensive standpoint. Think of your information as being viewed from an outside, unknown source and take steps to make sure that nothing is available that will put you at risk.

With social networking now an integral part of our everyday lives, we must evaluate what we make public and understand the risks of the world wide web. Social networking sites have opened up communication and organization with new ways for users to plan and stay in touch with one another, but with such popularity, misconceptions have been formed about online security and have lead to abuse and theft. Only with a defensive look at their own online identities and knowledgeable understanding of the privacy tools provided to them can users truly ensure that their information and activities will not be at risk.

---------------------------------------------------------------------------------------------

[1] facebook. (2010). Facebook Statistics. In Facebook. Retrieved August 30, 2010, from http://www.facebook.com/press/info.php?statistics.
[2] Debatin, B., Lovejoy, J. P., Horn, A.-K. and Hughes, B. N. (2009), Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication, 15: 83–108. doi: 10.1111/j.1083-6101.2009.01494.x
[3] Luedtke, J. (2003, July 17). Toward pervasive computing—RFID tags: Pervasive computing in your pocket, on your key chain and in your car. DMReview.com. Retrieved September 22, 2007, from http://www.dmreview.com/article_sub.cfm?articleId=7096
[4] Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy. December 14, 2005. Retrieved September 30, 2007, from http://www-swiss.ai.mit.edu/6805/student-papers/fall05-papers/facebook.pdf

Welcome Reader!

Greetings. My name is David McFadden and I am a student at the University of Texas at Dallas in the Arts and Technology Program. Before you begin reading, let's take a look at you, and why you are here.

The mere fact that you are able to read this paragraph allows me to assume a few things about you:

-You are connected to the internet.
-You are on a mobile phone, pda, or computer and are able to successfully operate it.
-You are able to search for topics on a search engine or use web links in order to find this site.

Considering the above statements, you are certainly included in the group of people that this blog is being written for. Perhaps you are only slightly familiar with modern technology, or you may be an expert in the latest trends of high tech gadgetry and a master of the online world. Or, perhaps, you lie somewhere in between. Regardless of which you may be, I invite you to read this blog and ask yourself questions about, and understand, the technology you use and how you use it. It is important to remember that we create technology and find ways to include it in our everyday lives, but the consequences of doing so cannot be predicted or prepared for. Sometimes the results are positive and beneficial, while other times negative and costly. We will explore examples that have produced each of these outcomes.
So please, read on, and let us better understand technology and its effects on us.