Wednesday, February 27, 2008

COM 125 - Entry #6: Protection & Prevention Methods

The following are some ways of protecting your computer in the following areas:
1) Email
The computer viruses that have historically caused the most damage (such as Melissa and LoveLetter) are those that spread via e-mail. A basic plain text e-mail message is unable to transmit a virus. It is attachments to e-mail messages that potentially contain the hazard. Unexpected attachments or those from unknown senders should be deleted. Attachments sent from known and trusted sources may also contain viruses -- it's a good practice to contact the sender to confirm that the attachment is legitimate before opening.
Tips to help avoid contracting and spreading e-mail viruses: Do not open or run unknown attachments!
If you are unsure about what an attachment is or what it does, leave it alone. If you have determined that an attachment is a virus, delete the email and the attachment. Documents and spreadsheets can contain viruses!

Microsoft Word documents (.doc files) and Excel spreadsheets (.xls files) can potentially contain a type of virus known as a macro virus. Do not open these types of attachments unless you have enabled macro protection in Word and Excel. For detailed instructions on how to enable macro protection see
Word-Enable Macro Protection and/or Excel-Enable Macro Protection. With macro protection enabled, Word or Excel will give you the option to enable/disable a macro for each document/spreadsheet you open. In general, you should open documents with macros disabled unless you know specifically what the macro does.
Pay particular attention to executable attachments!
Common extensions for executable files are:
.exe (executable files)
.vbs (Visual Basic scripting files)
.js (Javascript files)
.com (command files)
.bat (batch files)
.reg (registry files)
The only file types that are definitely safe are those that end with:
.txt (text files)
.rtf (Rich Text Format files)
Look for unexpected or multiple file extensions
If the subject line or the body of an e-mail states that the attachment is a certain type of file or if the file icon implies a certain type of file and the file extension does not match, delete the file. Also delete the file if it has multiple extensions such as picture.gif.exe. This is not really a picture file but an executable program that could potentially be a virus. If you trust the sender, contact that person to determine what you were supposed to have received.

2) Sharing Network Drives
Any time that you share a directory or a hard drive so that others on your local network can access them, you are opening yourself up to the risk of infection or malicious tampering. For this reason, we recommend that you do not share any of your files or folders over the network without the approval of your local network administrator. If you do choose to share your resources over the network, here are some precautions to take.
Share as little and as safely as possible.

1. Do not share your entire hard drive.
2. Do not share your root (C:\) directory or any of your Windows directories.
3. Don't give "Write" access! Set the access permissions to your shared folders to "Read." With "Read" access, others can still copy and see files in your shared directory but they cannot make changes to your files or delete them and if they can't, then neither can a virus.
4. Password protect your shared folders! Protecting your shared directories with passwords will limit access to only those individuals with whom you have entrusted the password.

Antivirus programs can be configured to regularly check your computer or even your incoming e-mail attachments for viruses. Because viruses are being constantly created or changed, it is important to use a program that provides regular updates. University Affiliates can obtain Symantec Antivirus free of charge by visiting
DoIT's Security Site .Apple users should note that there are currently no wild viruses for MacOS 10, and thus at present Antivirus clients for MacOS 10 are unnecessary burdens.
a. Update your antivirus program regularly:
New or modified viruses are regularly unleashed on the Internet. Updating your antivirus software so that it contains the latest virus definitions will decrease the likelihood that you are affected by a new type of virus. Here are links to the virus updates for the most popular anti-virus programs.
1) Norton Anti-virus for both Mac and PC
2)
McAfee Anti-virus for both Mac and PC

b. Check for security updates for your system:
Microsoft and Apple both regularly release security updates that fix security holes in the Windows and in the Macintosh operating systems. These holes make your system more susceptible to viruses and allow them to be spread more easily.

COM 125 - Entry #6: Cybercrime news reported in Singapore

Cybercrime is by far, one of the most difficult crimes to prove and give concrete evidence due to the widespread nature of the Internet. Of the few reports that cybercrimes were actually reported, and the criminal dealt with, many others go unreported and are simply termed as "unfounded claims" for lack of enough concrete evidence or the inability to trace the souce and track down the culprits. For example, the report "Washington State Man Pleads Guilty To Charges Of Transmitting Internet Virus" - 15 Feb 2007, is only one of the success stories. Of the 7 cybercrimes reported in 2007, i'm sure many others go unreported. This is one of the downsides of the prevalence of the Internet, despite its many uses and advantages.

One of the ways this criminal used to spread his malware was to send messages to IRC users that invited users to click on a link to a website. Once a user clicked on that link, they were connected to another computer and the malware was downloaded to that user's computer, creating a backdoor access to the computer of which the user was unaware. Users of the DarkMyst system were infected by clicking on a link disguised as a link to a movie. When they clicked on that link, other malware was downloaded. Once the backdoor was discovered, users had to spend time, money and resources to remove the unwanted code.

Not only does this take up valuable time and money to remove the malware, it is also destructive and malicious. Losing valuable information, documents and resources in the process can be very frustrating and leads to the employment of more resources to 'clean' it up.

Friday, February 22, 2008

COM 125: Cont'd Entry #4 - Elearning

A few years back, many projected that eLearning will become the major
medium of adult learning, replacing conventional methods of classroom lectures. However, recent studies indicate that although eLearning has registered a substantial growth, its penetration among the organizations is far below the projected level. Many reasons are attributed for this resistance to adapt eLearning. Among them, the three important ones are:
1. Huge initial cost of implementation
2. Long lead-time for development of courseware
3. Skepticism about the effectiveness of eLearning

The first two reasons can be attributed to the problem of perception from the industry’s point of view. Although eLearning requires huge initial investment, organizations generally overlook the benefit of the long-term return on investment. Similarly, organizations do not seem to consider the huge time saving on a long run, although the
initial lead time for courseware creation may be high. These reasons make up the 3rd factor of skepticism.

A.The following are some of the reasons that might demotivate learners from using elearning technology:
· Unattractive presentation
· Boring style of writing
· Undefined / ambiguous learning objectives
· Irrelevant content
· Too simple or too complex content
· Too much to grasp in one go

B.Other elements that can create learning blocks:
1) Inappropriate use of media:
Use of irrelevant graphics, excessive animations, flashy banners and logos, inappropriate audio effects will distract the learners’ attention and even irritate them creating a block for
proceeding further.
2) Unexplained terms and concepts:
In a smooth flowing content, sudden occurrence of a new term or a concept, if not explained properly at its first occurrence may cause a block. It may be a good idea, to give hyperlinked
pop-up boxes to explain them briefly, in case the learners require assistance.
3) Content flow disconnect / unstructured content:
As discussed earlier, the logical flow of chunks of information is very important for making the content effective. If the learners do not see a structure or if they have to go back and forth to put some pieces of information to make some sense, it will discourage them to proceed further.
4) De-motivating feedback:
While it is a good idea to test the learners’ progress in between the course by using formative assessments, the feedback should always be positive. Prolonged negative feedback will demotivate the learners and reduce their confidence level, creating a major learning block.
I do not really agree with this fourth "learning block", it doesn't make sense to simply heap constant praises on students' progress simply for the sake of retaining the students' interest and attention to continue using the program or online course. This is unrealistic and would not serve in the student's best interest.

C.Ways to improve effectiveness of eLearning content:
1) Know you target audience and their learning preferences:
The better, one knows the target audience and their learning preferences, the more effective, he/she will be able to develop the content. It is very important to review and re-review the content at the development stage with an eye on the end users and make sure that it will work for them.
2) Define clear learning objectives and work the content around them:
You need to be very clear about the objectives and outcome of the learning content, and more significantly, you should be able to clearly communicate to your learners up front, before they take a plunge.
3) Use of Keller’s ARCS model and Gagne’s events of instruction:
John Keller (1987) created the ARCS model describing the factors for learners’ motivation. Keller’s synthesis recommends that the four important factors for keeping the learners motivated are:
· Attention
· Relevance
· Confidence
· Satisfaction
The content should create attention of the learner, be relevant to his requirements, give the learner confidence during the process of learning and finally offer a satisfactory learning experience. It is always better to remember ARCS while developing the content.
Gagne’s nine learning events are the most popular and effective model for creating eLearning contents. Gagne proposed that the content should have nine distinct instructional events to be effective. They are:
(1) Gaining attention (reception)
(2) Informing learners of the objective (expectancy)
(3) Stimulating recall of prior learning (retrieval)
(4) Presenting the stimulus (selective perception)
(5) Providing learning guidance (semantic encoding)
(6) Eliciting performance (responding)
(7) Providing feedback (reinforcement)
(8) Assessing performance (retrieval)
(9) Enhancing retention and transfer (generalization).
These events should serve as the basis for designing instruction and selecting
appropriate media (Gagne, Briggs & Wager, 1992).
4) Use of interactivity / Games / Simulations:
Using interactivity in eLearning contents has many benefits. It keeps the learners involved, breaks the monotony of a single way communication, enhances the learning experience by participation and facilitates active experimentation (a component of Colb’s Learning cycle). Many theories indicate that learning by doing improves the retention of knowledge. "Creative presentations afford the opportunity for students to reach their social,
artistic and emotional goals. But more importantly, in these contexts learning becomes more enjoyable. Learners exercise choice and creativity, and there is a minimum amount of negative pressure."– says Dan Yaman, President of LearningWare, Inc.
5) Use of real life scenarios:
Cognitive Theories say that any new information is compared to existing cognitive structures called ‘schema’. Meaningful information is easier to learn and remember. If a learner links relatively meaningless information with prior schema it will be easier to retain. (Wittrock, Marks, & Doctorow, 1975, in Good and Brophy,
1990). Hence, use of real life scenarios and examples helps the learner to relate the new information with already familiar situations, improving the effectiveness of knowledge transfer and retention.
6) Facilitated learning:
One of the draw backs of eLearning is that the learners are left to learn on their own. In case the learners need assistance, there is no one to guide them. But with the present technology, self-paced eLearning can be supplemented with facilitators, by way of Webminars, simple chat, voice chat, video conferencing, asynchronous and on-line tutoring and so on.
7) Setting up of ’Communities of Practice’:
It is a proven fact that the learners learn more effectively from peers than trainers. In order to encourage peer learning, some of the facilities, such as discussion board, blogs and groups can be used effectively.
8) Podcasting/ mobile audio contents as supplements:
With new media, such as i-pod, podcasting, blogs and wikis picking up, the content supplements in these media may be used for reinforcing knowledge.

Saturday, February 16, 2008

COM 125 - Entry #4: New Microsoft Technology

Sept. 27, 2002--University of Delaware researchers, Elias and Wayne Westerman, UD visiting assistant professor of electrical and computer engineering, have developed a technology that goes well beyond the mouse and mechanical keyboard. The FingerWorks name fits because the technology uses a touch pad and a range of finger motions to communicate commands and keys to the computer. To open a file, you rotate your hand as if opening a jar; to zoom or de-zoom, you expand or contract your hand.

Elias said the communication power of their system is “thousands of times greater” than that of a mouse, which uses just a single moving point as the main input. Using this new technology, two human hands provide 10 points of contact, with a wide range of motion for each, thus providing thousands of different patterns, each of which can mean something different to the computer. This is not just a little step in improving the mouse, this is the first step in a new way of communicating with the computer through gestures and the movements of your hands. This is, after all, one of the ways humans interact. By mimicking these simple hand gestures, technology and the computer will become an integral part of our lives if it already isn’t.I think that this invention/evolution changes the way people make use of what was once the keyboard and will be, in the near future –a touch pad which fits like a glove and works by simulating common-sensical hand gestures to operate the computer. The computer also is transformed from what was merely a CPU, a monitor and a keyboard, is now a clear screen whereby images are projected onto it, seemingly like magic, with pictures plucked out from nowhere. Maybe one day, we would wake up to a “world” like that of Minority Report, whereby a very complex gestural language between man and machine exists.

The system is a multi-touch, zero force technology, meaning the gestures and movements use all the fingers in a light and subtle manner. Because of that, the system has a second major advantage over the mouse and mechanical keyboard because it can greatly reduce stress injuries such as tendonitis and carpal tunnel syndrome attributed to traditional computer work.

The touch pad acts like a video camera, recording the objects touching its surface. An embedded microprocessor then applies an algorithmic process to convert those touches into commands understood by the computer. “To observers watching somebody use multi-touch, it looks a little like magic,” Elias said, illustrating his point on a computer in Evans Hall. “People see lots of things happening on the computer screen but very little hand motion is observed.”

He said the system has been designed so the gestures used make sense for the operation being performed. For instance, you cut text with a pinch and paste it with a flick. Eventually, he said, the computer password could be a gesture known only to the user. To end off, I believe this is one invention and evolution of technology that can really make a huge impact in the world of business and in our everyday lives. For the better or worse, it’s still too soon to tell. Technology – boon or bane of our lives? You decide.

Reference: http://www.udel.edu/PR/UDaily/01-02/fingerworks092702.html

Friday, February 8, 2008

A shadow of her former lively, carefree self,
She sank down on the creaky spiral staircase...
In her crimson-soaked dress of lace and silk...
Pearls of tears rolling down her pale, drawn face...
A sigh of exhaustion escapes her lips..
And she collaspes in a tangled heap at the bottom of the dark stairs.
i wish i were blind...
so i wouldn't be able to see the hideous reflection...
and the monstrous nature of this world...
take the hurt away...
release me...
let numbness set in.
intoxicate me with pain.

Thursday, February 7, 2008

Like a dagger to my heart...
You stab me once, stab me twice, stab me thrice,
stabbing away til im cold as ice.
Tears keep flowing... i don't know why.
Yet without emotion, i cry.

slit your wrists and hope to die...

Do you ever get the feeling that you'll never be good enough no matter how hard you try and try? A worthless piece of junk, simply another statistic figure to add to the ever growing population. So insignificant and small. So worthless, empty and unloved.

How unkind can people be. Don't speak, if words are but a dagger to the heart. Don't love, if that is but an idea so abstract and difficult to grasp. Don't laugh, if laughter only seeks to mask the malice in your heart. Don't smile, if that's but a mask you wear.

So tired. So very tired. So drained. So emotionally drained. So afraid. So afraid to love, to embrace, to laugh, to smile, to be happy. Only to have all you have taken from you. So afraid, yes very afraid to get taken advantaged of, yet once again. No more. The heart can't take it no more. Enough, you say. But will the heart ever stop feeling? Yes, when numbness sets in, then maybe all the hurt, all the pain, would disappear. But until then, more pain must first be felt. So pills and alcohol are your best friends.

But dancing will be my love forever.

Monday, February 4, 2008

Quote of the day... ...






QuizGalaxy.comWhat's your Insightful Quote?
"Inspiration and genius -- one and the same."
- Victor Hugo
'What is your Insightful Quote?' at QuizGalaxy.com

Bling bling!





Cynthia Pills:



Will cause night blindness


'What effect do you have on people?' at QuizGalaxy.com

Dance Dance baby.. Ooh!

You are a seductive dancer




Look out! You are the hottest thing on the dance floor. No one can resist your charms and you’ve perfected your dancing as a means of scoring. Everybody knows that if you are a good dancer, you’ll probably bring your rhythm to the bedroom which is a huge turn on for your admirers.


Take this quiz at QuizGalaxy.com

Muah!

Your Love Quote

Love is composed of a single soul inhabiting two bodies.

Sunday, February 3, 2008

COM 125 - Entry #3: E-Commerce & E-Marketing

E-business is defined as "a secure, flexible, and integtrated approach to delivering differentiated business value by combining the systems and processes that run core business operations with the simplicity and reach made possible by Internet technology." (http://www.ibm.com). In short, E-business is the function of deploying technology to maximize custoemr value while E-commerce is the function of creating exchange over digital media. (Kalakota and Robinson, 1999.)

The WWW changes the traditional landscape of the business environment from that of being a Marketplace to a Marketspace. The impact of this digitization is evident in the following changes:

1. Content of transaction - information about a product often relaces the product itself.
2. Context of transaction - electronic screen replaces face-to-face transaction.
3. The enabling infrastructure of transactions is different - computers and communications infrastructure may replace physical resources.

A) The top 10 key factors why some E-Commerce businesses succeed:

1. Accessibility
2. Works at the Convenience of customers.
3. Transactions are done in real-time.
4. Products/Services offered are unique and one of a kind.
5. Ability to Customize products or tailor services to customers' needs.
6. Cost-effectiveness; Product/Service offered is the cheapest in the market.
7. Product/Service offered is the best in the market, or is the most established & reputable brand name.
8. Brand name is familiar to customers.
9. Website is user-friendly and easy to navigate.
10. Website is attractive.

B) Top 10 reasons why some E-Commerce businesses fail:

1. Issue of Fraud.
2. Internal politics within the company.
3. Channel conflict
4. Strong Competition faced within the market.
5. Copyright issues and the issue of fake or imitation goods.
6. No assurance of Secure transactions.
7. The ease with which customers can access other "online stores" and compare prices may lead to a loss in customer loyalty.
8. Expensive items sold.
9. No strong or unique edge/selling point.
10. Website is difficult to navigate.

C) How to make E-Marketing a success?

Now, with the prevalence of the online community and so many flagships stores and established brand names coming into the market and branching out into an online store as well, it gets increasingly difficult to differentiate one store from another. Products and services offered are similar and cannot vary much. Thus, the only way to create a "Competitive marketing edge" and win your competitors hands down would be stand for something unique or to offer your customers a uniqueness found only YOUR "online stores". One must also possess the aforementioned factors in order to make E-Marketing a success.

D) Security, Privacy & Legal issues for E-Business

The copyright environment of the WWW is virtually boundless. Any information published online may be susceptible to being replicated, the issue of fraud and privacy issues are also other concerns. Currently, there is no legal framework for the WWW that is binding on a global scale. As the rules governing the Internet are still being determined, hence the right of a Web entrepreneur are being defined with the develoment of the Internet itself.

As for the potential abuses of data collected on the WWW, the only consensus seems to lie in finding ways to protect data integrity while educating the various stakeholders. The one certainty that prevails today is that consumers need to be informed of the data collection activities of a firm and the use/trading of such data must be by consent of the consumer. This serves as the only consolation for consumers now while the other rules and regulations are being figured out.