Sunday, November 13, 2011

The misuse of Technology!

Technology has given us a way to connect and learn from one another in ways that we could have never imagined a decade ago. With the continued use of this technology, we have been able to do many great things as well. However, there are those that misuse technology.
            The article titled Cyber bullying and Sexting: Technology Abuses of the 21st Century was found on the EBSCO database website, which is a database of published articles and scholarly journals. The author of this article, Del Siegle, has a Ph.D. and this also shows that this is a scholarly journal. Another way that I realized that this was a scholarly journal was that it had various references as well as quotes from other experts in the field. Finally, it included statistics from research done by various experts as well as several colleges. The presence of all of these things gives me no doubt that this is a scholarly journal.
            This article was mainly about Cyber bullying and Sexting. It defines both of these terms and presents evidence of both. It also gives the reader various statistics on how much these things are happening in the schools that our children attend. It starts talking about cyber bullying and how it has continued to follow children from kindergarten all the way up to high school. It also gives examples of the various kinds of bullying that occur online. It then moves on to talk about Sexting and how the popularity of text messaging has lead to a massive increase in Sexting. The article also mentions the severe consequences that the increase in Sexting has had.  It ends with a list of various things parents and teachers can do to educate their children and stop Cyber Bullying as well as Sexting. It concludes by saying that technology has made vast improvements in our lives and has helped us in many ways but the misuse of it has cause harm like no other as well.
            This article does convey a successful rhetorical message since it has high credibility due to the amount of research that has been put into it as well as the credibility that the author has by having a Ph.D. The people that read this article would really be convinced about the things it talks about and would really take into account the overall message that we need to do more things to stop this misuse in technology. 

Saturday, November 5, 2011

How Harmful can Technology Really be???

          With the advancements in technology many task have been made easy. Now we don't have to drive to the groceries store or the mall to buy something you need because you can do it on your computer. You don't need to go to the library to check out a book, now you can just download it to your phone and you don't even have to go to school because you can take online classes. Alex Sanders mentions on his article that we don't even have to go out to find dates anymore because now you can find a a date online. All these advancements in technology are very helpful but its sad that now we practically don't have to leave our homes because we have everything we need on the tips of our fingers. But is this in any away safe?? Well it can be very harmful! Since you don't need to leave your home you don't get any type of exercise, putting you at risk of health problems. It is also very harmful for your eyes to stare at a computer screen for hours. So since most of the time we don't even have to use our brain much technology is also making us useless.
I'm not trying to say that technology is horrible but I feel that we shouldn't really on technology to do everything. We should not forget that our safety is at risk with the use of technology either through identity theft, social networks or just through the daily use of it.

Friday, October 28, 2011

Sexting, the Bad use of Technology!

What is sexting??
It is the performance of sending inappropriate messages and picture messages through a text message from mobile to mobile. There have been huge advancements in technology and this includes cell phones. Years ago they didn’t even exist and now you can get on the Internet, text, call, or even chat with anyone whenever you want. This advancement in technology is very useful but not everyone gives it good use.
One of the not good uses of the cell phone is sexting. Sexting is the new thing now, forget about writing a cute anonyms note to the cute guy in your math class just send them a picture to make sure they know you are interested. Many teens are now putting themselves in danger as they send pictures of themselves to boyfriends. Guys now ask for you to proof your love and the best way they find to do this is by getting their girlfriends to send them semi-nude or nude picture of themselves. Girls do this thinking only their boyfriend is going to see it and as soon as he sees it he promised he would erase it but this does not always happen. Teen boys love showing of their trophies even if those trophies are inappropriate pictures of their girlfriends. Teen’s committing Sexting do not realize what the consequences might be for their actions. Inappropriate pictures can follow teens for a long time, and you never know where these pictures might end. What if their parents where to see these pictures? What if in the future their boss sees these pictures? Teens girls while sexting create a disturbing reputation for themselves. But this is not all, in the "Sexting, Teens Can Go Too Far" news report it talks about how four teenagers got arrested for exchanging inappropriate pictures of themselves.Their are many consequences for taking and exchanging nude pictures of themselves so teens should get educated about this because the advancements in technology should not get bad uses.

Sunday, October 23, 2011

Wii, lets Play!

This video is an advertisement for Nintendo Wii. The claim that this advertisement seems to be showing is that everyone can play Nintendo Wii. Throughout the video the two asian men continue to tell different people that they want to play Wii. The evidence they present is that they go around to different places, like the city, the country, and small communities, and play Wii with the people that live in those communities.  The evidence they use is presented as facts but when closely analyzed they are more like opinions.
The warrant of this advertisement is that everyone should buy a Nintendo Wii and this is supported by the claim that everyone can play the Nintendo Wii. The people from the different races and from different places help support this claim and therefore the warrant.
In my opinion this advertisement seems to be very convincing because it shows a variety of games being played by all kinds of people and it seems like they are having fun. This also shows that Nintendo Wii has games for all ages and for any member of the family so not just could kids enjoy it but also parents and other adults. It also shows that many of the games are sport games which make people active therefor allowing them to get a fun exercise.

Sunday, October 16, 2011

Identity Theft

So how hard do you think it is for someone to steal your identity???
Well let me tell you that's it's not very hard at all!
All that an identity thief needs to steal your identity is one small piece of personal information about you. A thief can still your identity just by getting a hold of your name, birth date, email, address, etc. Many people worry about buying stuff online using their credit cards and personal information but they don't realize that they should be taking other precautions too that are not as obvious. We all need to be very careful about where and to who we share personal information about us. 
Lisa Rogak on her article talks about 10 things you should know about Identity Theft. Some of the reasons she mentions are the following:
The first thing she mentions is that thieves don't need your credit card number to still your identity. We need to keep our social security cards, passports, licence and other personal document in a secure place. She then talks about how the non financial personal information we reveal online is enough for a thief. We need to be careful about posting birth dates on social networks or telephone numbers and other personal information, on websites even if its for businesses purpose. She continues to say that we need to review every bank statement at least once a month. One of the last things she mentions that I think is super important is to go paperless. When you receive bank statements, bills, and letters in the mail they usually include a lot of your personal information in it. For example they include your address, name, sometimes phone numbers, and account numbers.
Little changes in our actions like the ones Lisa Rogak mentions in her essays can really help protect our identities from thieves! You really never know when someone may be out to get you so its better to be safe than sorry!   
 

Sunday, October 9, 2011

Security on Facebook

I have recently read two articles on security techniques that people can use while on Facebook. These two articles talk about the "super log-off" and "white walling" on Facebook. I found these two blogs on different websites but they are very similar indeed. They both reference the same person, Michael Ducker, who is a program manager at Microsoft. This reference appeals to logos since they are citing from professionals in the field. However, in the blog titled "Risk Reduction Strategies on Facebook" by Danah Boyd, she also references two other people, two Facebook users that practice these strategies. Boyd uses these direct quotations from the users and it demonstrates another usage of logos in her blog, making it more reliable to the reader. Another difference is the length and presentation of the blogs. Boyd presented a long narrative style blog while the author of "Privacy Tip: Try the super log-off" Rune Rasmussen uses a shorter list type blog. I believe that Rasmussen's style is more effective towards the intended audience, which are normally between the ages of 15-28, in presenting the information since of the simpler presentation. This is a great example of ethos since she uses a fair minded presentation for the intended audience with an appropriate level of vocabulary.
Boyd also uses pathos since she gives personal accounts of why the users of Facebook use these strategies. When she writes "Both of these girls live high-risk situations. Their lives aren't easy and they're just trying to have fun." These words evoke uneasy feelings since with the things that are put on Facebook they can get in trouble.
Both of these blogs are very effective in their own way in appealing to the reader's logic, emotions, and by making the writer more credible. They have their advantages and disadvantages over each other but since they are by different people, it is logical that they would. In the end, the message about being safe on Facebook and using the safety strategies is clear to all of those that read it.

Sunday, October 2, 2011

Bullying Outside the Playground!

          Did you know that more than half of kids on the internet say they have experienced cyber bullying by either doing it to someone or having it done to them? And more than one out of three say that they have experienced it more than once. Cyber bullying is the harassment of a child by another child. If it involves an adult then it is no longer cyber bullying, it is cyber harassment or cyber stalking.
          We may not be subject to cyber bullying but many of our younger siblings may be, and unfortunately they don't know what to do about it so most of them don't tell anyone. This causes many tragedies some may not be as extreme but others may have irreparable consequences. In isafe.org they reported that many children commit suicide or murder because of cyber bullying. Many children get threaten through calls, text, and the Internet and once they feel they have no way out they rather commit suicide. Many children get bullied through the Internet because the children doing the bullying are not afraid of what might happen if they get caught.
          I'm sure that there are many kids out there that start cyber bullying their classmates as just a game but these kids do not realize what their jokes and games are causing. We as adults should help educate children and give them information about what can be do to prevent situations like these both for the bully and the child being bullied. You may ask your self how can we help exactly, we might not have time to go far out of our way to try and create a program or class but we do have siblings we can create a trust connection with. We should create a trust bond with children in our families to have a greater possibility to be informed if they are in a horrible situation like cyber bullying. We can also help teach them what is wrong to do online, and what they can do to help their friends who are being cyber bullied. We may think that doing these things is not going to make a great change but if everyone where to do them we could see a greater change!

Sunday, September 25, 2011

I Thought You Were 30?


I found this cartoon on Cartoonstock.com, which is targeting grown up women who are using the internet to find a date. The argument of the visual is that people on social networks are not truthful about their identities. Many people lie about their age and names while others are too truthful and give all their real information like their address. The cartoon wants the audience to think twice before using the internet to build a relationship with a significant other and releasing personal information to people they haven’t met yet. The visual appeals to honesty. It’s showing us that not everything someone tells you through social networks and the Internet is the truth and that you shouldn't trust everyone you encounter on the Internet. This visual evokes laughter to the reader but that just goes to show how careless we can be while using the Internet. Some people may see situations like this, as funny until they have a problem as you can see on the visual. People that are looking for relationships on the Internet are being criticized and the cartoon is shows that these people can be careless at times. The whole cartoon centers on the older woman and the child. They make it visible that the boy is young as they drew him really short. They also showed the difference in the ages as the older woman is really tall. The cartoon only uses bright colors on the people's clothing which makes the reader focus on the people and not their surroundings. The visual emphasizes how kids are trying to exploit grownups using the Internet but it ignores that there is also grownups trying to exploit kids using the same medium. The role of the language is to support the visual by explaining in greater detail what is going on.
We should really take the time to realize some dangers we are encountering on the Internet and start thinking twice about our actions. Not everyone we encounter on the Internet and social networks are bad people but we should really get to know people before we start sharing our personal information with them.

Sunday, September 18, 2011

Technology can be Safe!

I’m pretty sure that everyone has heard about the tragedy that happened in Bastrop county recently. But how is it that so many people have found out so quickly? The reason is the advancement in technology. About two weeks ago there was a horrible fire that burned down many acres of land and homes. Many people were in danger but thanks to the news, the Internet, and cell phones, all these people were able to evacuate to safety. The fire lasted many days and as it grew families were being evacuated to safety. Many families were able to contact family members to ask for help and others were offered help. 
It is amazing to realize how times have changed and along with time so has technology. When many people think about the inquiry area I chose; Identity, Privacy, Safety, the first thing that comes to mind is that social networks and other advanced technology can be dangerous but it's not always this way. The proof of this is this horrible event that happened recently. Back in the day, families who lived far away from each other could last weeks without knowing anything about each other but not anymore. If something horrible were to happen years ago it would have taken a very long time for anyone to find out. Thanks to the Internet and social networks many families were warned before the fire could get to them. Social networks were also helpful so that donation drives could be organized to help all the harmed families. Without technology none of this could have been possible and thanks to technology families are safe and ready to start all over again.
I am very thankful for technology because I was able to keep in contact with all my family during this event. I am from Austin and my family lives very close to Bastrop so my family was extremely worried that are home was in danger but thanks to the Internet and news I was able to keep my parents informed about how the fire was spreading. I am going to take the opportunity to ask everyone to support all these families because it is not going to be easy to start all over again but we should all do our part and help!

Sunday, September 11, 2011

The inquiry area I have chosen is; Identity. Privacy and Safety. Out of the three inquiries I have chosen this one because as a community we have lost all three things. We don't have our own identity anymore, we don't have any privacy and therefore we are not safe. We have lost these three things mainly because of the new technology that has arose throughout the years, like the internet and social networks.

Even though the rise of the internet has taken away these things, I also believe that as human beings we put ourselves in danger daily. By using social cites such as Facebook and blog cites, we expose information about ourselves that makes it easier for ciber stokers to find us.I'm excited to look more into the subject and to inform others of the dangers that are out there.