Thursday, October 30, 2014

assignment 7

Blog Assignment 7: Privacy Scavenger Hunt

EPIC Recommends Research on "Privacy Enhancing Technologies"

The federal agency declared his development of a research agency of privacy, EPIC expressed support for Fair Information Practices and Privacy Act Consumer Rights. EPIC recommends research on Privacy Enhancing Technologies ("PET") to "minimize or eliminate the collection of personally identifiable information." EPIC said current privacy issues, including identity theft, security breaches and financial fraud. Its purpose is to basically look for more privacy and take care of consumer rights.


EPIC Obtains New Documents About Lack of Student Privacy Enforcement

EPIC has obtained new documents from the Department of Education of parents and students detailing complaints about the misuse of education records. The Department released the documents in response to a request from the Freedom of Information Act EPIC. EPIC is awaiting more documents on the implementation of the agency of the Family Educational Rights and Privacy Act. EPIC has uncovered documents that reveal the schools and districts have disclosed personal student records without consent, possibly in violation of federal privacy law students. The problem is basically that are invading their privacy of these people to disclose their information without their consent.

Obama Issues Executive Order to Strengthen Consumer Privacy

President Obama signed an executive order today to improve the safety of consumer financial transactions. The Order will require improved security for financial transactions of government properties, including chip and PIN technology has significantly reduced the financial fraud and identity crimes in Europe. The Executive Order states that "the government should further strengthen the security of consumer data and encourage the adoption of improved around the country in a way that protects the privacy and confidentiality safeguards. I think it's a great idea to improve security of financial transactions of consumers. This is basically to give a solution to ones of the problems United Stated.
 

Tuesday, October 28, 2014

assignment 6

For blackboard privacy setting are: That they have servers of programs and software to keep your information safe. one of those Program is SSL. SSL is a secure connection for the user computer to the Blackboard Server, making more safe to use. Also the user can always go to setting and control what Blackboard has permission to uses.

Privacy setting for Facebook is that we have the choice to choose or  audience. For example,  if we post something we have the choice to public for everyone or just for certain people. Also we have the choice to maintain our picture private in many ways. We have the control to choice what the public can see and do in our Facebook.

 Instagram privacy setting are: Intragram is app where one can shared pictures and videos with people that are following you or the ones that you are following. the privacy that Intragram has, is the choice of making  your pictures private. the only way people are going to be able to see your posts are by following you and you accepting them. as well the choice of making your pictures only visible to you.

Kik privacy setting are: kik gives the used all of the control. now kik has added additional protection for their user. now with the new update, kik user can chose who can talk to them and see the person profio without sending a message. they also have "block" you can block people for sending message, the information that one uses to create a  account can't be accesses your personal information. kik is just a app that lets you talk to people without sharing any information.

Tuesday, October 14, 2014

Group progress report 1



Our group is composed of four members. As of now, we split the work up, and each of us have an assigned,specific role. Our project topic is centered around the idea of movies. Joselin Santos has been assigned the role of doing research on how movies are easily copyrighted. Sajni Bhakta has the role of searching how easily it is to illegally download movies. Lissania Alarcon has the work of conducting research on what is the process and consequences of illegally downloading movies. Last but not least, Ana Villasana has the role of searching up on how movies get leaked online first.

Specific research that we will be doing is using articles and journals that relate to our topic. One article we found was about Copyright Laws for Movies, and it talks about what copyright is, what triggers copyright protection, how if a movie is produced, it gets leaked right away. It also talks about authorization, and if you want to state that your work is your own without anyone getting it, then you have to claim it’s yours. It gives a lot of information like the consequences you will face if you copyright someone else’s work and if you get caught, you can be fined with about $150,000. It also explains to us the laws, and expectations, what pirating is and what it does, and fan fiction, and stealing other people’s work is not right or fair because they worked hard to produce or make it. They also talk about how they prevent copyrighting and protect the owners work. The legal boundaries of how much work can actually be considered fair to use.

Sources we will be anticipating to use are the UHD database web site, the library’s web site, and basically anything interesting we can find online that relates to our topic. For example, we will be using educational web sites so we can have factual information like iseek.com, google book search, and google scholar.We hope to use educational web sites because those are the sites that will give us factual information and more details we can use to put together our project.

Thursday, October 9, 2014

assigment 5















The tragedy of Macbeth by William Shakespeare
http://www.gutenberg.org/ebooks/1129

These book it can be read on any mobile like Ipad, computer or phone.


Rome and Juliet by William Shakespeare
http://www.gutenberg.org/ebooks/search/?query=rome+and+juliet

These book it  can be read online and Kindle without image.

Alice's Adventures in Wonderland by Lewis Carroll

  This book it can read online and audio mp3.


Monday, October 6, 2014

assignment 4

The life of chinese gold farmer


This article talks about some of the famous jobs in China. It starts from a small office space fluorescent in Nanjing, China. The main character in this article is Li Qiwen who work sitting in a chair in front a computer playing a game called World of War craft. Li works every day in the evening for a living. His job is to login with thousands of other players in that way  they share vast virtual world of the game with, converging in town to trade their loot. At the end of each week Li informs his supervisor all the profits. After that he and his friends getting paying.


 This article also talks about the games that are addict to many persons to have a big obsession. These types of video games are most important to them that anything else even their personal life. Li and his friends take this work very seriously not only for make money also for have fun this become an obsession for them.Also talk about many places where they sell those types of game for example, Wal-Mart and eBay. 
 This article basically talks of all proceeds from each game. The total cost of each coin. The differences value of money from china and America and many other countries. These types of job are a good deal for players like Li and his supervisor. Not only for them also to the gray market which include the overall economy around this.