Technology As We Know It!

Today, the value of computers is one of the most controversial issues. The computer is not only used for facts any longer. We now use computers for personal reasons such as for online communication, social media, and so much more. Computers are major advancements everyday. More and more features are being put on the computer to benefit the everyday life of people.But as stated before, IS the computer beneficial or does it have more negatives than anything.

In the article “Who Am We?”, the author, Sherry Turkle, talks about how the internet form communities of people because of the online communication. In my opinion, people talk more on computers which includes cell phones because it is a lot faster. You have different social media websites that allows you to out a message in someone’s mailbox and it sits there until they see it. Your able to see if they received the message or not. It makes it so much convenient. Whereas with a letter, you don’t know if the person received the letter or not unless they call and tell you. But Turkle’s main concern was that people was overindulging the internet which I can understand. People spend 24/7 on the internet.

I also felt that “A Rape In Cyberspace” by Julian Dibbell also brought up the negatives of the computer/internet. This article talks about one of the biggest issues that happens in the internet which is privacy and security. The main type that many people face is when it comes to money. I think many people face this around the holidays because of the Christmas shopping and Cyber Monday. That is why it is important that you make sure that the site is on is legit. I never put my information on a website if it is not a company that I heard of. But the article makes you wonder how secure the internet actually is.

Another article that I found interesting and enjoyed is called “Why Your Brain Isn’t a Computer?”.They say that the brain works as a computer because we can retain information for a long time. Well researchers say otherwise. We actually have the power to control and choose as to what goes in our minds. Computers, on the other hand, doesn’t. Computers aren’t able to choose what goes in or not. Whatever people put in is what information computers get. And in my opinion, computers can also figure out calculation on its own that the brain can’t do. If the brain can do it , it usually takes long.

Overall, I think that the computers are beneficial. I think that there are some useful features that computers offer. But just like with anything you have to be careful. There are always dangers in everything that you do.


Six Easy Methods You Can Use to Protect Your Identity


“Roughly 15 million people have their identities stolen every year in the United States, with each person loosing an average of $3,500.” This is very crazy and scary number of people. It makes me kind of not even want to put any of my personal information online when shopping or paying bills online. Because it is an huge chance that someone can steal it. With the holidays right around the corner, more and more people will be shopping online. Be very careful on what you put on certain websites! Make sure you take the proper steps necessary to protect your identity.

identity theft

According to the article, that my fellow blogger posted on twitter that is shown above, there are 6 easy methods that can be used to protect your identity.

  1.  Password Protection: Try to make a password that is unique! Easy passwords like 12345 or 1111 are easy for people to figure out if they are trying to break into an account.  
  2. Choosing a Password: This method is just like the first method. Make sure that your password is unique. If you need another password for another site, try to switch the numbers up a little.  
  3.  Protecting your mail: If you have emails that contain any of your personal information like bank account numbers, try to delete them so that no one can get into your email and see that important information.  
  4. Beware of “Charities”: Never give your personal information over the phone or on the internet to a company that you never heard of. This can be a scam to get free money from you or get your information.
  5. Public Wifi Networks: Never use public networks. That is the easiest way to get hacked.  
  6. Disposing of Electronics: Erase all of your data from your old electronics before you throw it out or give it away.

Hopefully, you use these tips. As, Christmas is approaching this is the best time that scammers will try to scam you. Protect yourself the right way!

iSecure: Narrative

This is our Twitter link for this article

Chelsea R:

  1. Ever feel like your personal information is being violated by others? Well, iSecure is a new app for kids as young as elementary to adults who have everyday jobs. This app can be downloaded on your smartphone. iSecure provides a useful means to share documents under tight security. To get started, new members will need to click the the sign up button. Complete the registration and your profile information.

slide 1

  1. To download this app, go to the app store on your smartphone. DeVoss and Porter states that “ they want a “free net.” The Internet of course is not free” Well, The app is totally free.Once it’s downloaded, this screen will appear and you will be ready to secure your files! (DeVoss and Porter, pg. 192).

slide 2

  1. To begin, fill out the iSecure registration information which includes your full name, username, password, email, and other personal information. Also, it is important to make sure you agree with the Terms and conditions of iSecure. According to DeVoss and Porter, “Think of it as a set of guidelines governing the relationship between writers, readers, and publishers.” So, You can’t move on without agreeing!(DeVoss and Porter,pg.185).


  1. Once you are registered for the app, you are then able to use your username and password that you created from the start. “Critics accuse the computer of promoting homogeneity…” says Bolter. So, your username and password will help keep all of your files and other things safe from being copied by someone else. Click the Sign Up button and begin! (Bolter,pg.11)

slide 3

  1. The iSecure set up is a simple and easy process. The first step to setting up your profile for iSecure is filling out personal information you want to share with others. This includes your birthday, interests, education, and many more.

slide 5

Julia M:

  1. The second step to setting up your iSecure app is creating a profile picture for your account for you and your friends to see. You will be asked to either upload a saved photo from your phone or take a new photo on your smartphones camera. However, if you chose to not upload a picture to your profile, that is ok too. In a previously read article by Danielle Devoss and James Porter, these two authors discuss the idea that came out after Napster’s death, such as “We thus use the term ‘post-Napster’ to symbolize the death of Napster as it was originally conceived: a space for free file-sharing and for consumption not framed by costs and fees but by an ethic of open distribution and collaboration” (Devoss, Porter 182).

slide 6

  1. The next step is a fun way to get connected with your friends securely! You can search friends through your contacts on your smartphone or by email, it’s your choice. Simply add your friend by clicking the + button. They will get the request notification in the inbox and then chose to confirm.

slide 7

  1. This last and final step is creating your secret password for iSecure. (probably the most important step) This password is confidential only between you and your friends. An important thing about this step is to not forget to inform your friends through messaging the confirmation of the password. And remember; you now have two passwords! One to log on, and one between your friends.

slide 9

  1. Congratulations! This screen will appear when you have completed the registration process. You are officially a member of iSecure! By clicking on the Get Started button, you will be transferred to the Home Page. As Bolter expresses in his article ‘Writing in the Late Age of Print,’ Word processors already demonstrate the flexibility of electronic writing and allowing writers to copy, compare and discard texts with the touch of a few buttons (Bolter, J.D. 9).

slide 9 new

  1. This leads me to presenting the homepage. This page offers different links to test and try out. You will see icons that show the features that the app provides. You can then click the profile icon to be transferred to your profile. This will allow you to be able to edit certain features and begin your writing! Electronic technology provides a range of new possibilities, where as the possibilities of print seem to have been played out. (Bolter, J.D. 2)

slide 19

Jim A:

  1. This profile page is just like any other one either on another app, a website, or blog. This includes your picture, personal information, interests, and many more.

slide 11

  1. From your home page, you can also have access to different sites by linking to sites such as Google, Twitter, Facebook, and even WordPress to your friends. Click on the site of your choice to begin linking. This takes the idea of the building of the Open access network (free worldwide file sharing) as mentioned in Devoss & Porters article on Napster (Devoss & Porters 196)

slide 15

  1. You can now start sharing and linking files from the site. You will be taken to that site through iSecure. Then you would select the file from your computer or smartphone by clicking the “Add File” button. These overwhelming features are similar to idea of how humanity was dealing with the rise of the computer, in today’s case the smart phone (Bolter 23-26)

slide 16

  1. iSecure can also send live messages while your friends are using the app with you. First you select a friend, then type your message just like a regular text message, allowing communication solely through the app. This form of messaging is a product of the early PC in the 1970’s, particularly the multi-user domains, used by authors to improvise scenes for stories (Turkle 1, 4).

slide 13

  1. This app not only allows you to communicate with others, but share media such as pictures and videos. Simply click the icon to open your “camera roll” to select pictures and videos from your phone. Then drag the select image/video into your friends box to share.

slide 14

Alexis L:

16.When you receive messages, pictures, videos, or links from your iSecure friends, they will go directly to your inbox which can be accessed through your home page strictly on the app, this feature still follows proper ethics of delivery hi-lighted by Danielle Devoss and James Porter by still being able to identify original authors and senders, just in a more secretive and secure way (Devoss Porter 197).

slide 17

  1. iSecure serves as another one of “semi-closed platforms” termed Chris Anderson and Michael Wolff. Another App that separates the internet from the web. You can navigate through iSecure and it’s features through the “Settings” option which can be found on your homepage. It’s here you can log off and deactivate your account if need be (Anderson, Wolff, 1).

slide 12

  1. One unique feature about this app that makes it more secure is there is no home screen icon that appears on the home page of your phone’s screen to access it. To open the app, you simply go to make a phone call, type in the numbers that coordinate to your password used to sign up for the app followed by the pound key, simply go to place the call, and the app will automatically open.

slide 4

  1. Since there is no icon for this app, when someone sends something through iSecure, to be notified, the numbers to your collaborating password will show up as a missed call making you aware that you need to check your App. This allows you to be able to have full privacy so no ones of your secret messages.

slide 18

  1. The final unique feature iSecure offers, is the quick and easy way to close out of the app. To close out of iSecure, simply wave or give your phone a quick shake. The motion censors on your smartphone will know to immediately quit the app and return you to your phones home screen. It’s the small security features such as this that as Bolter would  say “refashion” or “remediate” the types of security features we are typically used too on our phones today (Bolter 23).

slide 20

Works cited

iSecure: rationale

Our app iSecure, puts an emphasis on keeping your most treasured writing works in a secure working space in a cloud.  Through a secure password provided network, it keeps unwanted eyes, such as hackers, away from stealing your ideas.  Compatible for any smart phone or table, you can go anywhere composing your texts, hassle free and leak free.  It can even be used on the computer as well.

The features iSecure include: password protection, the ability to organize your documents, as well as a drag and drop capability to secure any file.  It can be used for any digital format, including the sharing of video.  When sharing to others it provides a security clearance to receive the documents, went sent by the writer.  It can be sent to one’s phone, e-mail, Facebook, Twitter and even one’s writing blog.

Much of what the features of this app, relate to the theories and ideas of the future of writing.  It bares similarities to Devoss and Porter’s argument for file sharing in terms of the concerns of hackers as well as the government violating your privacy (Devoss & Porter 190-92).  It bares similarities to Bolter’s idea of sharing work, which is similar to writer’s blogs, electronic book sites as well as social media (Bolter 5).  While all of these unite people through communication and the sharing of information, iSecure ensures that all of this is handled securely to the recipient (Bolter 11-13).

The research we have done as a group on our Word Press group “Do Not Distrub”, relates to the features of iSecure.  The topic we discuss in our page talk about internet/password security, concerns of privacy invasions as well apps for writing.  With what iSecure provides, it is a useful for tool for anyone including the aspiring writer.

Information Revealed at a Shockingly Young Age

Today society is fully aware of the extravagant, advanced technologies that are being brought up and invented for really anyone, no matter how old they are. There as not only been various amounts of gadgets and portable techniques but the internet itself has allowed children as young as five years old post personal and private information on the web for anyone to see.

child using laptop  <—-Now does this look normal…?

  • the majority of children during this survey have shared personal information on the internet
  • over 1/3 of kids admit that they have clear their browsing history so that their parents can’t see what they have looked up in the past
  • 3/4 of parents say they don’t even monitor their children online!

Not only is the revealing of personal information among children this age unexceptable, but it is also dangerous. This increases cyber bullying, fraud, and rumors. What’s even more unbelievable is that about 41% of children said they shared their full name and photos of themselves.

Just wait, there’s more…about 1/5 gave their exact location and their school.

I believe that the solution to this craziness is that parents should be way more protective over their children; they know more than you think. With the amount of influences and peers surrounded by children, it is not safe to ignore society’s technologies.


What Should I Write About?

struggling with writing pic

Are you someone who tends to get stuck when it comes to creating a topic to write? Or maybe you are someone who goes back and forth between ideas and remains indecisive? Jeff Goin’s article, “How To Never Worry About What To Write Again” is an encouraging and well-thought article that helps writers organize their thoughts to create an endless topic to write about. This article caught my eye during my search for what to write as one of my blog posts. I, along with many others have always been one of those people that suffer from writers block. If there is not a given topic to discuss and write about, it is not always easy coming up with your own.

 Don’t chase trends. Write with a worldview. And trust that the topics will follow. According to Goins, there are three important questions writers must ask themselves to solve this issue.

1. What’s wrong with the world? This should present your perspective, nobody else’s. Listing possible ideas for how your writing is different and unique than others is a helpful strategy.

2. What one experience I have had that’s unique to me? Take your own story, and connect it with other peoples’ experiences; whether they may be happy, depressing, embarrassing, adventurous…etc. People will then give you their reacts and thoughts which allows them to be able to connect with you and your writing.

3. What’s something that’s easy to me that’s hard to other people? This question might make you think…but what’s writing without thinking? People don’t realize how other people such as friends, family, even strangers are great tools for being influenced for writing.

Utilizing these three questions can easily allow a writer, author, publisher, whoever it may to create ideas they never thought they could.

A Lesson in Internet Security

A fellow blogger of mine posted this on her twitter account

A recent article from Voice of America, Study: People Ignore Computer Warnings, focuses on the concerns for people’s attention towards their safety on the computer.  This study mentions a group of researchers at Brigham Young University (BYU) in Utah, testing the psychology behind this issue on a particular matter.  They tested computer user’s tendencies when their computer either has a virus or other potentially harmful intrusions.  Although the students said before that they were deeply concerned about their safety on the internet, the following paragraph says otherwise.

The procedure was that the students bring their own laptops, while playing a game identifying pictures of the superhero, Batman, as being animated or photographed.  Each user was making their selections, while warnings of potential malware popped up on the screen.  In spite of the warnings the students ignored these and they were given a notice that their computer was being hacked.  However, the threats to the student’s laptops were fake and no real harm was done.  On the other hand, it contradicted the concerns of the students’ attitudes towards internet safety, as mentioned earlier.

Anthony Vance, a professor of information systems at BYU, concluded that the students who were ignoring these messages were going through a process of habituation.  This means that the participants in the experiment discounted the warnings numerous times, due to its common reoccurrence.  Professor Vance believed that if the brain responded better to these messages than they can interpret them as being a threat to their computer.  He proposed that one way to do so is to make the warnings fresher in the persons mind.  This proposition means that these cautions would be more unique each time they pop up on the screen.

In my opinion, we see these warnings as being similar to pop up adds that we see on occasions while browsing the web as a distraction.  When we see any window or advertisement while browsing Facebook or Youtube show up on our screen, we try to ignore it.  Sometimes we see warnings on our computer as a potential security threat due to the fact that it is not from our own security software.  In the end, there is no certainty on telling what is safe on the internet.

There have been certain ways in which I have made my computer more secure.  In the last two years, I have used two different security programs for my laptop.  I have used Trend Micro Security and Microsoft Security Essentials, but it has only been Microsoft that has worked well.  It has uncovered more viruses and malware that have hit my computer more than Trend Micro.  During the summer my laptop was discovered to have 23 viruses that Trend failed to stop.  After that, I got rid of Trend and went to Microsoft for security purposes. There are many other anti-virus programs to use for your computer as well as your smart phone.  While each one’s features vary in reliability, it is best to install the one fit for yourself.

To avoid mistaking potential computer warnings as being annoying ads, I have found software to block them as a means of sorting them apart.  For my internet browser, Google Chrome, I currently use Ad Block to remove ads when I browse pages such as Facebook, Hulu and, my most commonly used site, YouTube.  It has been the most effective software that I have used for these unwanted pop ups, while browsing through the network.

What the results of the Brigham Young University study had shown is no different from our own problems on the internet.  While we, along with the participants, act as if we are careful with our own computer security, in truth we tend to blindly ignore warnings about potential malware.  While there is plenty of advice as mentioned above, it is best to be as careful on the internet and don’t go on sites that we deem suspicious.