Friday, February 6, 2009

Concepts Project

Concept Number 3. Effective Internet communication combines technical and communicative competence.

“Internet technologies for communication are so much more powerful in their ability to manipulate, transform and process data, information processing and communicative skills must be developed in concert”(Allen, n.d)

Common language is the key to effective communication between two humans. For example, I could not effectively communicate with a foreign person if I did not speak the same language. The inclusion of hand signs or drawings in the advent that I was faced with this predicament would not be considered effective either. Trust me on this, I have been faced with this situation when travelling throughout Europe – hand signs did not work to well. However, I could communicate effectively with the same person if I was chatting to him or her over the Internet, assuming my inability to be multi-lingual in speech and writing. This is intriguing to me and I am sure it is evident when I am querying items for sale that exist in other countries or simply chatting over the “net”. By simply tapping on a keyboard when using the Internet can provide the means of effective communication with anybody from another country. So how is it possible for me, an english speaking Australian, to communicate with a non english speaking person from another country?

Understanding this mystery requires some technical aptitude in computing and Internet usage, as well as communication skills. Effective communication between humans also extends to computers, because like humans, they are required to communicate using a common language. This common language, in computer speak, is known as communication protocol/s, whereby the “protocol is a set of rules or standard that that two or more computers use to communicate with each other” (Protocol, 2009). The protocols are used in the exchange of messages between computers, and assist the computer in knowing what to do with the message. An example of a communication protocol is internet protocol or in more common terms IP, which is used in the Internet. This protocol specifies the rules of how computers communicate in the Internet, such as packet formation and routing so that the message can reach the specified destination. The computer hardware itself does not recognize internet protocol, therefore IP software is required to be installed onto the computer before any communication is realized in the Internet. Therefore, before any Internet communication is possible, the computer must be set up properly with the ability to communicate in the virtual environment.

So, now that I know a little about the technology side of computer communications, what does that mean to me? Firstly, it is evident I don’t know enough about my system and the technologies that exist inside my computer that allow me to connect to the “net”. However, I now understand how the messages are able to be passed. The protocols and software that are used in conjunction with each other enables me to communicate widely throughout the globe. As an example, my experiences extend to shopping over the Internet for items that aren’t readily available in Australia, therefore I have to deal with sellers from other countries. This is normally done by accessing a virtual shop front and browsing the products. The IP allows me to reach a desired destination, whilst interface software builds the website that I am able to understand.

Tyson, J., (n.d), How Internet Infrastructure Works. Retrieved February 5, 2009 from http://computer.howstuffworks.com/internet-infrastructure8.htm

This is an informative web article explaining in detail the “workings” of the infrastructure that drives the Internet. The information is supported by appropriate hyperlinks that further explain in detail the technologies described in the article. It is appropriate as an educational tool for somebody who wishes to know more about how the Internet works and its related technologies. It is also a relevant document to support the understanding of communication protocols that are used when connecting and interacting in the Internet. Jeff Tyson is a Microsoft-certified systems engineer and has worked as a system administrator for the U.S. Department of Defense.

Clarke, R., (2004). A Primer on Internet Technology. Retrieved February 6, 2009 from http://www.anu.edu.au/people/Roger.Clarke/II/IPrimer.html

The author’s article is very informative on Internet technology explaining the elements of Internet infrastructure, which comprises architecture, protocols, and software. It embraces the communication process of the Internet with further hyperlinks explaining these technologies. As an educational tool, it is suited for knowledgeable users who are wanting more than the basics. The article was written with the purpose of providing strategy and policy discussion. Roger Clarke is the principle of Xamax Consultancy P/L and a fellow of the Australian Computer Society. Roger Clarke has also published a variety of information technology related work. Xamax Consultancy P/L provides leading-edge advice to corporations and government agencies in relation to the strategic and policy impacts of advanced information technologies.

Concept Number 23. Human-computer interfaces

“The Internet lessens the recognition of difference between humans and computers because, at a distance, it is often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or a machine” (Allen, n.d).

Depending on the way in which you are communicating over the Internet, it is possible you do not know who or what you are communicating with, such as human or machine. Whether it is human or machine, at times it doesn’t really matter. For example, if I was shopping online for a guitar and paid the amount via PayPal facility, I would expect a receipt to be emailed to me. Normally, the receipt would be generated through automated software using the email specified by the user in the transaction. However, if I was querying the specifications and condition of the guitar before deciding to buy it, and the means of communication was by email, it would be important to me to know that a human was responding to my query. “The Internet has progressed into the public domain in a way that it is part of the world’s most popular culture” (Internet History, 2006). Commerce on the Internet is everywhere and is not necessarily a bad thing. As life becomes busier and time is a deficiency within one’s non working social agenda, commercial organizations have developed ways to satisfy specific commercial needs for the “time poor”. For example, financial institutions have enabled a means through Internet communications and associated programming technologies of completing banking requirements over the Internet at any stage of the day. This is frequently used in my experience and no consideration is given to who or what I may be dealing with at the “other end” during the transactional process. The advent of this type of technology and it’s proliferation amongst users, as well as its adoption by society in general would no doubt in my mind influence the break down of traditional human communication.

Communication over the Internet extends beyond commerce, email, blogs and chat rooms. Included in human-computer interfaces are online games, which has become a popular method of gaming amongst the youth of today. Online gaming has caused social issues whereby addiction is the resulting affect. Video game addiction is a new concept and as such, much debate about its existence occurs amongst researchers and psychologists who study and work in the field of addiction. Griffiths (cited by Essau, 2008, p 232) defines video game addiction as “any behavior that features all the core components of addiction. These components include salience, mood modification, tolerance, withdrawal symptoms, conflict and relapse”. Online games have been developed so that thousands of users can play the same game online at any point in time, and in coherence with each other. An added attraction to this medium is the ability to compete and play against real people as opposed to a computer generated model or avatar. Online gaming enables fantasy worlds whereby a player can interact with other players inside a virtual world. This type of game play has proven to be exceptionally popular. A study by Huh and Bowman (2007, p. 5), identified that “video game users showed extraverted personality traits, and that online gaming was more popular than a single user mode type game”. Moreover, online gamers play the game to establish social relationships within the “virtual world”. The popularity of video gaming using the Internet medium may be due to its potential of providing a substituted reality to life to which a gamer can be immersed whilst being totally anonymous at the same time.

Exhibits: Internet History. (2006). Retrieved February 5, 2009, from http://www.computerhistory.org/internet_history/

This web article produced by the Computer History Museum highlights the development and popularity of the Internet spanning from its development stages in 1962 through to 1992. The author’s also identify any major development associated with networks that occurred within each year of the detailed period. The article is useful if you are seeking to understand how the Internet was developed and associated individuals who played key roles in its development. Moreover, the events that made the Internet popular, resulting in human-computer interaction the way we know it now. The Computer History Museum’s mission is to preserve and present for posterity the artifacts and stories of the information age.

Schlimme, M. (2002). Video Game Addiction: Do we need a Video Gamers Anonymous? Retrieved February 5, 2009, http://serendip.brynmawr.edu/exchange/node/1719

This web article explains how video game addiction occurs and relates the relevant issues to a variety of reference web sources that are hyperlinked to support claims. What is good about this article is that further discussion is available for users of the article and the discussions are published on the site. The discussions are from people who can relate to the article and wish to post their observations or thoughts on the issue being presented. Serendip advise that there articles are not “authoritative” but rather a learning tool and source to contribute to by its users.

Concept Number 7. Netiquette

“Good communication practice on the Internet is not something one 'learns', but something one 'practices' so as to teach others, less familiar than yourself, how it is done” (Allen, n.d)

I have on occasions received emails that appear to be written in a way that implies anger or has some level of abusive trait. Upon questioning the “tone” of the email with the originator, it revealed that these traits did not exist; it was just the way the “tone” was set in the email. Online forums contain some useful information provided by users with common interests or goals, however on many occasions; the forums turn “ugly” due to some disbelief or opinion between users. The ugliness either gets moderated or expelled from the site or is just left there as is. This is annoying because often, the subject goes “off topic” and does not encourage future user participation. I am not an expert on “netiquette”, however I am a strong believer in that some form of formal structure over user behaviour with regard to communications within the Internet is required, particularly in online forums.

In my research into “netiquette”, I have identified unfamiliar terms such as emoticons and internet acronyms. Furthermore, I have realized that my understanding of netiquette falls short of what I thought to be just the usual swearing and spamming that goes on inside various Internet environments. Let me start with emoticons :), a clever way of showing emotions inside text communications. I have seen these before and quite liked them, but never really understood that they are a part of netiquette. If used properly, I can see much benefit in clarifying “tone” in email communications as previously discussed. A smart gesture in a piece of text that may prove offensive can be clarified by a simple smiley or laughing face. “Emoticons are particularly popular in chat rooms and instant messaging, but can be used in all forms of Internet communication” (What are Emoticons?, 2007). Internet acronyms are another way of communicating over the Internet or mobile phone. This method has time advantages, such that it alleviates the need to type or press the full spelling of the words. There are numerous acronyms that can be used; hence I have taken a list of them so that I can refer to them if needed. I feel the need to have to know these, as a problem may arise if I don’t understand a particular acronym and have to ask the sender what it actually means. This nullifies the only benefit (time saving) that I can see with using Internet acronyms. The research into netiquette also identified rules that should be followed during all types of Internet communications. It was determined that, although some rules may be different, depending on where you are retrieving the research information, they essentially mean the same thing and are trying to send the same message. The message is simply to respect and communicate in a way that you would appreciate being communicated to. Therefore, I support netiquette and am now aware of its rules and meaning. It is evident that the Internet is not “controlled”, therefore, it is the responsibility of the users to use the environment in an appropriate manner.

What are Emoticons? (2007). Retrieved February 5, 2009, from http://www.netalert.gov.au/advice/behaviour/netiquette_emoticons/What_are_emoticons.html

This article provides a listing and display of relevant emoticons used in Internet communications and through the use of hyperlinks, seeks to provide further assistance with related topics to educate the user. It is a useful reference point when you are self educating netiquette related topics. NetAlert is a government organization and is part of the Australian Government's ongoing commitment to providing a safe online environment for all families, especially children. The main web page facilitates user complaints with regard to Internet content and also provides a free Internet content filter for installation to home pc’s.

Master the Basics: Netiquette. (2008). Retrieved February 5, 2009 from http://www.learnthenet.com/english/html/09netiqt.htm

This web article is informative for users who are not familiar with netiquette rules. The article is written clearly and is easy to understand, and includes quizzes and examples making the educational experience more interesting. It covers 10 rules of netiquette and ends in a very good assessment of user responsibilities in the virtual world. Learn the Net is a company who provide high quality educational products and services in print, CD-ROM and to the desktop, via the Internet and intranets. Yahoo!Internet Life has ranked Learn the Net among the Top 100 Sites in 1999 and 2000.

Concept Number 26. Privacy and Security

“The Internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the Internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media” (Allen, n.d)

Due to ineffective security measures, I have had to rebuild my computer twice because of virus infections. My computer got infected with these virus’s during Internet usage and as a result, caused my computer to freeze upon “boot up”. Furthermore, when I scan my computer with the installed antivirus software, numerous unwanted tracking cookies, spyware and adware are identified and quarantined. Although the Internet’s great strength is its openness, its greatest weakness is its security. However, I have been aware that the Internet was not created with security in mind for quite some time.

Society has become so dependent on computers and the Internet, whether it is for commercial use or personal use such as shopping or study purposes. However, this dependency is also subject to numerous threats that could affect your life. Privacy and security vulnerabilities within the computing environment are very real and it does not take too much research to determine the extent of these vulnerabilities. “Since 2004 (and growing steadily since then) AusCERT has seen an increased level of threat in the use of Trojan horse malware to facilitate online identity theft. More than ever, it is critical that home users or SMEs (Small and Medium-sized Enterprise) without dedicated IT security support feel confident in the security of their computer before conducting any form of e-commerce or e-government transactions online” (Protecting your Computer from Malicious Code, 2008). Large corporations spend thousands of dollars on computer security protection, whether it is for protective software, maintenance, specialist staff, audits and specialized systems. There main goal is to protect their data from malicious use, however, this does not mean that they are entirely risk free. At a personal level, the home computer is generally used for data storage, Internet communications and information processing but is also subject to similar threats including identity theft, virus attack, password Trojan attack and denial of service attacks. Therefore, it is important to understand how to protect yourself from security vulnerabilities.

To have a greater understanding of these threats and ways to mitigate the risks of these threats, it is important to educate yourself into how you can protect your privacy and security within the computing environment. During my research I found helpful hints about computer security through the Auscert website. I also identified that I require changing the way I view and use the Internet, so as to counteract some vulnerabilities that exist. Below is a brief outline of ways I found best, during my research, to mitigate risk against threats which ultimately protects you and your computer:

• Install appropriate firewall, antivirus, spyware scanning and spam filtering software
• Block unwanted instant messages using appropriate instant messaging software
• Stay up to date with software updates for operating systems and applications
• Reconsider opening email attachments from unknown sources and do not enter suspicious websites.
• Enable more security in the internet browser application.
• Regularly run antivirus scans using the installed antivirus software

Even though the Internet is an “open” source of communication with limited security and control applied to it, it is also a source to identify how to counteract these issues. It is obvious to me that it is the user’s responsibility to ensure they are protected against malicious software. Unfortunately, there is too much uncertainty regarding privacy and security within the popular space of the Internet and the threats appear to be growing, which results in the ensuring user protection is applied and maintained.

Protecting your Computer from Malicious Code. (2008). Retrieved February 5, 2009, from http://www.auscert.org.au/render.html?it=3352

This document, prepared by AusCert provides very insightful information about computer protection to the home pc user. Furthermore, the document describes recovery practices after infection as well as numerous links to associated information. The document is also updated by Auscert and history is recorded. AusCERT is the national Computer Emergency Response Team (CERT) for Australia and a leading CERT in the Asia/Pacific region. They operate within a global network of information security experts and are active global members of security response networks, such as FIRST which enables access to accurate and timely information about threats and vulnerabilities on a regional and global scale.

The Internet - truly revolutionizing - truly a risk for internet identity theft! (2009). Retrieved February 5, 2009, from http://www.identity-theft-protection-made-easy.com/internet-identity-theft.html

Identity theft is a growing concern and is an important issue to all Internet users. This article provides a comprehensive and informative listing of threats, causes and protection advice regarding identity theft through the addition of hyperlinks to main web page data. The article is also very well written so that it can be used as an education tool for an inexperienced computer user. Identity Theft Protection Made Easy.com is constructed so that the author’s anonymity is evident; however contact options are included in the source. The site information claims the author is a security consultant that is partnered with a security firm.

Reference List

Clarke, R., (2004). A Primer on Internet Technology. Retrieved February 6, 2009 from http://www.anu.edu.au/people/Roger.Clarke/II/IPrimer.html

Essau, C. A, (2008), Adolescent Addiction: Epidemiology, Assessment, and Treatment, Elsevier, San Diego.

Exhibits: Internet History. (2006). Retrieved February 5, 2009, from http://www.computerhistory.org/internet_history/

Glossary: Protocol. (2008). Retrieved February 5, 2009 from http://www.learnthenet.com/english/glossary/protocol.htm

Huh, S. & Bowman, N, (2007), Perception and Addiction of Online Games as a Function of Personality Traits, Conference Papers - International Communication Association; 2007, Annual Meeting, p1-1, 1p.

Master the Basics: Netiquette. (2008). Retrieved February 5, 2009 from http://www.learnthenet.com/english/html/09netiqt.htm

Protecting your Computer from Malicious Code. (2008). Retrieved February 5, 2009, from http://www.auscert.org.au/render.html?it=3352

Schlimme, M. (2002). Video Game Addiction: Do we need a Video Gamers Anonymous? Retrieved February 5, 2009, http://serendip.brynmawr.edu/exchange/node/1719

The Internet - truly revolutionizing - truly a risk for internet identity theft! (2009). Retrieved February 5, 2009, from http://www.identity-theft-protection-made-easy.com/internet-identity-theft.html

Tyson, J., (n.d), How Internet Infrastructure Works. Retrieved February 5, 2009 from http://computer.howstuffworks.com/internet-infrastructure8.htm


What are Emoticons? (2007). Retrieved February 5, 2009, from http://www.netalert.gov.au/advice/behaviour/netiquette_emoticons/What_are_emoticons.html