Tuesday, April 1, 2008
Monday, March 31, 2008
P2 Context
According to wikipedia.org, which is constructed by the voice of the people, Net Neutrality is defined as “a broadband network free of restrictions on the kinds of equipment that may be attached on the modes of communication, where communication is not unreasonably degraded by other communication streams.”
Breaking down and analyzing this context of this quote is the fundamental basis of our video research podcast. Many large companies are data mining information about consumers and selling it off to other companies for mass profits. Such information consists of personal addresses, contact addresses, consumer purchases, and much more. All this data created and sold for what? Companies want market data to analyze and predict consumer trends.
Are companies safeguarding the data they are collecting or are they exploiting them to other firms globally? What about the thought of companies knowing more about you than you know about yourself?
It is easy for companies to data mine behind our backs since they hold all the keys. In exchange for offering ‘free’ services (We say ‘free’ because there is an opportunity cost), we must forgo personal information. Some individuals are unaware of what the consequences are. May we refresh your memory of telemarketers. Using a contest form as an example; Before the internet, one would have to fill out a sheet in which you place your name, address, and phone number. After the contest is done, this information is sold off to telemarketing companies, which in turn call your house or send ads in your mail. Similarly today, filling out online contests forms or downloading software that requires some sort of registration is collected, organized, and marketed off to other companies-Which coincidentally, your new e-mail inbox is later cluttered by advertisements and viruses. This example is minimal compared to the power these companies have with this information.
The real question we, as users, are faced with is, how much is too much is too much before our identities are completely lost in translation over the internet by money hungry fascist corporations? Our time to act is now.
Works Cited
Amazon. 1 Apr. 2008 "http://380ne.com/logos/amazon.jpg".
Blogger User Terms. Blogger. 1 Apr. 2008 "www.blogger.com".
Dollar Sign. 1 Apr. 2008 "http://www.hwdsb.on.ca/delta/departments/Family_studies/FS/Images/Dollar%20Sign%203.jpg".
Ebay Logo. 1 Apr. 2008 "p://www.xtour.at/ebay_logo.jpg".
Facebook User Terms. Facebook. 1 Apr. 2008 "http://www.facebook.com/terms.php".
Free Money. 1 Apr. 2008 "http://ca.youtube.com/watch?v=ltkNlM6ofrE".
Google Logo. 1 Apr. 2008 "http://3.bp.blogspot.com/_9zkWh3ktrn8/R1FpIO__AaI/AAAAAAAABf4/zyVEqQrX7Ac/s1600-R/google_logo.jpg".
Hmmm. 1 Apr. 2008 "http://ca.youtube.com/watch?v=TmzuSeCIEEI".
Lithgrow, Michael. "Net Neutrality in Canada Under Siege: Bell Implements “Traffic Shaping” Service to Throttle Internet Access." 31 Mar. 2008. 1 Apr. 2008 "http://artthreat.net/2008/03/net-neutrality-canada-under-si".
Mel's Video Blog #1: Flight of the Conchords (HBO). 1 Apr. 2008 "http://ca.youtube.com/watch?v=tyTM9hG9ePM".
"Net Neutrality in Canada." The It Nerd. 1 Apr. 2008 "http://itnerd.wordpress.com/2008/03/28/net-neutrality-in-canada-the-debate-starts-now/".
"Net Neutrality." Wikipedia. 1 Apr. 2008 "www.wikepedia.com".
Pak, Tony. "http://www.yorku.ca/dapina/lw2970/ip/?p=185." Osgoode Law School (York). 1 Apr. 2008 "The beginning of the end of net neutrality?".
Piere Intro. 1 Apr. 2008 "http://ca.youtube.com/watch?v=BQnj6SN3OaA".
Privacy Google Agreement. 1 Apr. 2008 "http://www.google.com/accounts/TOS".
Rogers Logo. "http://www.telephonestogo.ca/images/rogers_logo.gif".
Sorensen, Chris. "TheStar.Com | Business | Rogers Website Messages Irk Google." The Toronto Star 29 Mar. 2008. 1 Apr. 2008 "http://www.thestar.com/Business/article/284761".
Tim Berners Lee. 1 Apr. 2008 "http://www.edht.org.uk/Images/people/TimBerners-Lee1.jpg".
Tuesday, March 18, 2008
Monday, February 25, 2008
Week 6: Project 2 Proposal
Introduction
The concept of the video will be the notion of hyper-surveillance, with a specific focus on the issue of privacy. Other areas of discussion will include references to Legislation, the Bill of Rights, and the current-day similarities to George Orwell's 1984.
Concept
The video podcast will focus on how privacy is infringed upon in many areas of one's daily life and activities. Throughout the course of our research for this podcast, as well as in the presentation of the podcast itself, we intend to answer the following question regarding surveillance and breaches of privacy: How far is too far? Our intention is to convey the concerns and precautions that one must take when it comes to their personal privacy, not only online, but with any technologically related medium. An important issue is that in today's surveillance society, one is constantly being watched, but if we are doing nothing wrong, then should there be a reason to worry? Nearly all of the technologies in today’s society consequently also have methods of surveillance. Cellular phone conversations can be overheard, instant messaging conversations are routinely archived, and built in webcams on personal laptop computers can be controlled remotely. The methods by which our actions can be recorded are endless, and it is our goal through the video podcast to bring attention to these methods.
Also, corporations such as Facebook, Google, and Microsoft often take great lengths to obtain our personal information, but what guarantees do we have that this information is dealt with accordingly? It may be possible that Facebook sells our information (such as who we talk to, our relationship status, etc) to advertising companies. Google always crawls the web to capture any information it can, but just how powerful are their web crawlers? Microsoft requires personal information for most installations, and with the introduction of ActiveX, are there any more barriers to that information? These topics as well will be covered by our video podcast.
Research Approach
The basis of our research will involve a combination of field research and a variety of conventional research to further support our arguments. We will include live interviews with random subjects and incorporate supporting evidence from scholarly journals and other personal blogs or video podcasts to show opposing views about the issue. Some of the video podcast we will be using will be taken from www.current.com. One of the main articles that we will focus on is “public surveillance functions of private security” by Alison Wakefield. We would also be looking at different articles on the infringement of privacy involving internet. Lastly, we would also assess different major corporations and their methods of gathering data.
Treatment
The podcast will incorporate a hit television show ‘24’ type theme, where multiple segments of events are happening at once during a specific duration. The camera will play a neutral roll, capturing our interaction with each other. Many shots will be filmed from the shoulder to not only capture dramatics, but also carry good audio quality. The type of atmosphere we are trying to generate would be action pact and adventurous to draw the attention of the audience as well as keeping it formal to come off as factual.
Our footage would contain research that will be placed in dialogue, which is backed up by visual aids. Interviews of individuals as well as other extended metaphors will be placed to further emphasis our story. Much effort will be placed on ‘what makes a good blog’ by including comic relief and emotion.
Week 5: The A-Team
Team members: Clarianne Asuncion, James Purdy, Mark Shannon, Victoria Wighton
The initial concept for our video podcast is regarding Google and its relation to privacy in the online world. Features such as Google Analytics and Googlebots pry into the darkest corners of a website, and quite possibly, password protected information such as bank accounts and secure web sites.
Also, we will speak about privacy in regard to other applications which have yet to be determined, but may include cell phone conversations and ATMs.
Monday, February 4, 2008
Week 4: A little bit of Fashion Sense?
Fashion. Where is it heading and what is considered hot? Your answers can possibly be found watching H&M’s video podcast. Yes, I know it’s a sponsored podcast that probably employs some scheme to convince us to buy their products. What makes this interesting is it goes around the world interviewing individuals what they think would be the next step in fashion, what would they want to wear, and what is hot now in fashion.
A lot of companies are trying to sponsor media, so they can data mine and gain valuable information on consumer trends. However, this podcast pertains difference perspectives on fashion around the world. To me this is very interesting because, metaphorically, I live in a box. I do not travel, nor talk to anyone outside the GTA. If I could finance traveling, then I could experience this first hand. Well, with my reality check in place, this isn’t happening any time soon so I would like to appraise H&M for bringing the world closer to my finger tips.
Asides from bringing awareness through another set of eyes, what makes this podcast good and exciting to watch is how it is edited. Fast paced music which reasonably quick shots make it interesting enough to follow without having to track back and recap the action. It is professionally done. The only weak point about this podcast is, yes, there is an H&M advertisement in the middle that is incredibly long. Overall, this podcast is a good form of entertainment and enlightens me by showing different cultures in regards to fashion.