Tuesday, June 24, 2014

Print Media Doomed?

Ch. 9 Ethics & Issues 9-1 p. 465
Will widespread wireless broadband connections kill print media? I believe that technology, not necessariliy wireless broadband connections, will ultimately kill print media in its current form. Like Jason Price said in his article ( http://thethirstydogblog.com/2013/12/print-media-doom/ ) , younger people prefer using their technological gadgets to read so do not subscribe to the typical print media like newspapers and magazines.

Will widespread wireless broadband connections, such as Wi-Fi, put an end to printed newspapers and magazines? Why or why not? Yes, because it is so easy to get audio, video, and written content that meets or exceeds what a newspaper or magazine would provide. Websites like twitter give you world wide information before CNN or your local paper knows about the next “big event”. Real time information is made possible by wireless connections and cellular data. Why wait for a newspaper to tell you what all your friends are talking about in real time right now?
Would you prefer to read newspapers and magazines in print or on a  mobile device that provides similar or better readability as compared to print media? Why or why not? I like my newspapers and magazines on my mobile device to help me not have so much clutter. With tools like Pinterest and Evernote, I can curate the online content I read so I can find and later use things from the online content to do things later - cook, sew, study for a test, teach a class, build something, etc. Much better than a bunch of ideas pinned to a bulletin board or stacked in a file cabinet.

How can the media industry take advantage of the wireless internet trend? I think they have by connecting to ways that today’s reader can curate content they read - the media industry “listens” to people on Twitter to find out where “the news is happening”, they follow blog writers on Pinterest to see what diy project people are working on, they share content on Facebook to draw people to their brand. Social media has provided many great ways to connect with users of media content. The more ways an industry can share, the more money they can stand to make.

Cloud Based Data Storage

Ch. 7 Ethics & Issues 7-3 p. 369
Is data stored in the cloud free from prying eyes? No, data in the cloud is too easily intercepted or shared because there is no absolute way to prove that another individual or company would not be able to access the information. This article by TechRadar http://www.techradar.com/news/internet/data-privacy-how-safe-is-your-data-in-the-cloud--1170332#null , asked some excellent questions that each individual should ask himself before storing data in the cloud. First, how important is privacy with the data? Does it matter if a company uses your data to market things to you? Second, how reliable do you believe the service to be that has your data? It is important to remember that business do fail or stop providing services. Third, what about data encryption? If your data was hacked into by an unknown party, would that cause you distress? Fourth, how continuous is the service? What would happen if the company didn’t allow you access to your data? Fifth, how well does your internet connection perform? Will you able to access your data when you need to if for some reason your internet connection failed? Sixth, how important is copyright? If you upload a photo, video, or written document and these are shared without your permission, how would these resources be protected from dissemination to others without your consent? If these questions do not give you pause, then using cloud storage is a good choice.

Should data kept in the cloud be treated the same way legally as items that are kept in one’s home? Why? Yes, the items in the cloud are still data that you have created and should not be accessed by others without your permission or a warrant from a government official that makes you aware of their access of your data.

Should the government be able to access your data in the cloud without your knowledge or permission? Why or why not? The government shouldn’t have access to your data without your knowledge, however even using social media and having “private” settings, someone should screen shot something you said and share it without your consent with anyone they wanted to. If the content is digital someone somewhere could access it. This Computer World article ( http://www.computerworld.com/s/article/9241553/No_your_data_isn_t_secure_in_the_cloud ) said it well “if you're a consumer and you're storing photos, videos, digital music or innocuous documents on a cloud storage service, you may not mind that a hacker or the government gets access to your files.”

What types and amount of personal data are you comfortable storing in the cloud? Why? I am only willing to store digitally - on the cloud or on a computer - those innocuous things that if the government, a family member, friend, or boss saw them it would not have a negative effect. I am even more picky with cloud based data because I know how easy it is to share digital data and once it is shared, it can never be taken back.

Website accessibility

Ch. 6 Ethics & Issues 6-4 p. 328
Should Web Sites be held accountable for accessibility levels for physically challenged people? Yes, I believe that websites should be held accountable for accessibility levels for physically challenged people because the accessibility features help others even if they are not challenged in some way. Within the education community, there is a push to give multi-tier systems of supports in order to help all people, not just those with challenges be successful. Using ideas based on the Response to Intervention website (http://www.rtinetwork.org/essential/tieredinstruction), making websites accessible to all people through video or audio or translation services would be a part of core instruction for all people.

Should the government require that all Web Sites meet the W3C accessibility guidelines? Why or why not? I believe that unless there is a government mandate, many websites will put accessibility on the back burner because it takes extra resources to convert existing web content into accessible content for all people.

Do Web sites hosted by disability organizations have a moral obligation to meet the guidelines? Why? Absolutely, an organization meant to assist those with a disability have a moral obligation to make their content accessible by the individuals who would need to access their resources. I think of my grandfather who became blind as a young adult due to a familial disease. He needed resources in braille or on tape so he could continue to study in college. Thanks to organizations in his day, he was able to get what he needed to be successful. Today’s students need web resources but more must be done to make them accessible.

What can be done to encourage people and organizations to make their Web sites more accessible? The National Federation for the Blind is even having a conference on Web Accessibility Day ( https://nfb.org/web-accessibility-day ) to help businesses and educational entities implement accessibility of web content and to promote government policy changes.

Monday, June 2, 2014

Application Software Comparison

This blog is to fulfill Research Task 2 – Critical Thinking Chapter 3 page 191 item 3 Research – Application Software Comparison

Web applications are becoming increasingly popular, and some people prefer the convenience of using a Web application instead of application software installed on their computer. For example, some prefer to use Google Docs (a Web application) to Microsoft Word. Your boss notices this trend, and asks you whether it will benefit the company to use Web applications instead of application software. Compare software installed on your computer with a comparable Web application. Are any security risks associated with using the application software? How do the features compare between a Web application and the application software? Would you recommend using a Web application to application software? Why?

Web applications have been extensively useful to me personally and professionally. Personally, I didn’t want to spend money on buying application software. I knew I would use a word processor, spreadsheet, presentation software, and database software, but spending hundreds of dollars for this software wasn’t in my budget. Professionally, I wanted to have students submit written work electronically to save paper and printer toner. It also allowed me to grade students work and give them feedback so they could edit their papers without having to print multiple versions. Another reason I liked the Web applications was so I could grade from my smartphone on the fly without need for my laptop. I was the co-worker that pushed for using Google Apps in Education at Battle Creek Academy. I ended up being the only teacher that used Google Apps in Education extensively because other teachers didn’t want to learn a new “software”. It is important to remember that Google Drive has similar functionality to create documents, spreadsheets, and presentations like Microsoft Office Applications but they do not have the same creation features within each type of web application. http://money.cnn.com/2013/11/13/technology/enterprise/microsoft-office-google-docs/ pointed out that Google Drive “productivity tools may lack some of Office's advanced features” but what they do have is easier to use. This CNN article also pointed out three of Google’s main selling points - the service is free, it is accessible anywhere you have internet connections, and it supports significant sharing and collaboration between users. The biggest drawback for our school was the issues with institutional internet connections through Comcast that could from time to time disappear - then students couldn’t work on anything because there was not an offline option of Google Drive to use. This con is also changing as Google Drive continues to evolve.

There are inherent security risks with any digital file, but even more so with cloud based digital files like those on Google Drive. I would not put confidential material in Google Drive files because it is as simple as being logged into Google and a few clicks and I am into someone else’s Google Drive where I can access all their files says http://www.eweek.com/storage/google-drive-10-reasons-to-choose-another-cloud-data-storage-service/ . There is also the sharing features of Google where you can give read or write access to different levels of individuals. Sharing digital files this easily puts those files at a security risk if there is confidential information or information that should be kept private. It is also important to consider that files uploaded to Google drive or created there may be “lost, stolen, exposed, made irretrievable, or obtained directly from a service provider with a court order” says http://www.darkreading.com/risk-management/google-drive-privacy-4-misunderstood-facts/d/d-id/1104086 .

I would recommend using a Web application if the file being created does not need to be private. I would recommend using a Web application because it allows users to collaborate and create content together in real time from anywhere with an internet connection. I would recommend using an offline application software for financial information and content that should be kept private.

Ethics in Action - Plagiarism

This blog post is to fulfill Research Task 1 – Web Research Chapter 1 page 52 item 5 (Ethics in Action - Plagiarism)

The Internet has increased the ease with which students can plagiarize material for research paper assignments. Teachers are using online services, such as TurnItIn and PlagiarismDetect.com to help detect plagiarized papers and to hep students understand how to cite sources correctly. Visit the Turnitin Web site ( turnitin.com ) and then write a summary of how this service is used. How does this service attempt to prevent plagiarism through the Turnitin Write Cycle? How prevalent is plagiarism on your campus? What is your school’s official policy on disciplining students who submit plagiarized papers? Does your school have an honor code?

The TurnItIn website is used to help a writing instructor give feedback to a student quickly to help a student improve his writing. The cloud based program compares the written work submitted by a student to a database of written work to determine how original the submitted written work is. A color coded report is created reflecting what percentage of the written piece comes from a particular database source.  There is also a part of the program that allows peers to comment and critique the submitted work. This can help the submitter to develop critical thinking skills as the written submission is edited. TurnItIn can be integrated with an existing learning management system.

The service attempts to prevent plagiarism by using the Turnitin Write Cycle. I found an infographic at http://www2.bgsu.edu/departments/english/cconline/spring2013_special_issue/Vie/history.html that outlined the turn it in write cycle. First, the idea is that the “originality check” will inspire a writer not to plagiarize content in his initial written submission. That hopefully will engage a writer to write original content rather than copy content from another author. Second, the “PeerMark” peer reviewing process helps a teacher manage assignments and facilitate collaboration between students to enhance the submitting writer’s writing. Third, “GradeMark” paperless grading allows a teacher to provide in depth feedback to a writer so future assignments can be better written based on the feedback. These three components make up the Turnitin Write Cycle.

I was unable to find any data on how prevalent plagiarism is on the Kellogg Community College website. I am sure it happens. Kellogg Community College has an official “Academic Integrity Policy” found at http://www.kellogg.edu/wp-content/uploads/2014/02/Academic_Integrity_Policy.pdf This policy states that a student who admits responsibility for some form of academic dishonesty will first receive a warning, if it happens again the student will be put on probabion, if it occurs for a third time the student will be suspended, and if there is a fourth infraction, the student will be dismissed from Kellogg Community College.  Kellogg Community College's honor code is “Define Yourself“ and that seems to encompass the ideas that a student needs to take responsibility during their time at Kellogg Community College to develop who they will be when they leave. I think academic honesty is a big part of that as people look for jobs after their education has ended.

Plagiarism is so much easier today with the availability of digital resources that can be copied easily. Programs like TurnItIn can be useful to help fight plagiarism and help writing instructors teach students how to cite sources properly.

Sunday, June 1, 2014

Noisy Laptop Fan?

This blog post is about how to fix a noisy laptop fan. It fulfills the requirements for Hands-on Task 2 –Chapter 4, Problem Solving @ Work: Item 4: Noisy Fan (page 251).

I found the answer to the following question.
After moving to a new office, you turn on your computer for the first time and hear a buzzing sound inside the case. You turn off your computer, the noise winds down, and you wait several minutes before turning the computer back on. When you turn on your computer again, however, the noise resumes. What could be causing this?

I used this website 5 Things You Can Do To Silence a Noisy Laptop Fan and completed the tasks on my laptop that were easy enough to do without installing new software nor buying something new. I think that for my laptop, the two main reasons for all the noise were a dirty computer with dust inside and too many programs beginning at startup. My first line of action is to decrease the number of programs that begin at startup. I clicked my Start button and typed msconfig in the “Search programs and files” box and then clicked the magnifying glass. The msconfig file came up and I clicked on it. I clicked the “Startup” tab and unchecked the programs that I don’t need to begin at startup.  There were a lot of things I don’t need “right away”. I reduced my starting programs to 7 from nearly 20 and my fan got quieter right away.  Now I needed to restart my computer. Next I am going to go about blowing out the fan to get dust out of my computer so the fan can run with the least amount of resistance. I used the forced air can to blow out the little fins where heat is dissipated. This seemed to help quiet my laptop down as well.

I learned how important it is to be aware of the Microsoft Configuration (msconfig) that your computer has so as to optimize your computer’s performance. I also learned how easy it was to quiet a computer down just by being aware of the items that are part of the computer startup and paring down these to the absolute necessary items for startup. I became aware of how easy it is to clean the fan and fins on the computer. It has become obvious just how much dust can accumulate in my laptop even when it is on a hard surface. As I help co-workers trouble shoot their computers, these two actions will be very helpful as a first line of defense against a noisy fan.

Tuesday, May 27, 2014

Installation Media Required

This blog posts deals with the Hands-on Task 1 – Chapter 3, Problem Solving @ Work: Item 7: Installation Media Required (page 187).

I found the answer to the following question: Each time you start Microsoft Excel and attempt to use one of its advanced features, a dialog box appears asking you to insert the installation disc. You are unable to locate the installation disc. What are your next steps so that you can use the advanced features of Microsoft Excel?

At my previous job, the person to contact would have been our information technology consultant. I would send an email to him letting him know that I needed a particular feature installed on my computer. Generally he would remotely take control my my computer and install the required component or would give me access to the network drive that contained the necessary software. As the Microsoft article on  Advanced Excel features discusses, since the initial install of the software was done as a network administration, I would have to create an alternate network installation of the Microsoft Excel Software. However, if I did not have access to the network location where this software is stored, I would need to get access from the Microsoft Site for Office with my Product key. On this site, I can either download and re-install Microsoft Office or I can order or burn backup copies of Microsoft Office.

By completing this task, I am reminded just how much business computers are locked down from installing anything that may negatively impact a business computer. I am also reminded that most enterprise versions of Microsoft Office and other software is often loaded onto a desktop workstation from a network location. I have to keep track of where those locations are if I need to access something, but usually those areas are close guarded with passwords that are not given to the common worker. I am also reminded not to procrastinate on a project because the feature I might need may need to be installed when the information technology professional has time in his or her schedule. I have always worked close with the information technology personnel at work and intend to do the same in the future.

Friday, May 23, 2014

Ban Mobile Devices?

p. 219 Should mobile computers and devices be banned from the classroom?

Are mobile computers and devices too distracting in the classroom? Why? Yes, mobile computers and devices can be distracting in the classroom, but it is up to the teacher to help students understand how to use these devices for positive educational purposes and not be distracted by them. One method to keep students engaged is to have students answer a quick question at the beginning of class using Poll Everywhere which is a program that students can text something to and see changing results on a graph. The potential distraction can then be turned into a positive learning experience. Other teachers have used Poll Everywhere for similar interaction like in the article from Transforming Education through Technology journal http://thejournal.com/articles/2012/03/28/revisiting-cell-phones-bans-in-schools.aspx

Should instructors, departments, or entire schools be able to ban mobile computers and devices in the classroom? Why or why not? In article by NBC (http://www.nbcnews.com/id/35063840/ns/technology_and_science-tech_and_gadgets/t/some-schools-rethink-bans-cell-phones/#.U39LDSjRax0 ) it discussed how schools have been banning devices in the classroom, but students are bringing and using them anyway. These devices have so many applications that make them useful for instruction that I do not believe they should be banned. When I was teaching a geometry class, I actually had students text me answers in class to questions I posed. This allowed students to answer without the fear of shame or embarrassment  from fellow students about getting a wrong answer. I would text back that they were right or needed to try again. It was an amazing tool to help keep those students engaged and it helped me to make sure all students were attempting to answer the question. Officially at that time all electronic devices were forbidden in school. I had advocated for their use in class for educational purposes and I was allowed to attempt their educational use with students using their own devices. It had a positive effect on the students I used it with.

What are proper and improper uses of mobile computers and devices in the classroom? Why? I think in order to use mobile devices properly in the classroom, a teacher has to play with and experiment with similar devices in order to make the best use of them in the classroom. Just getting a bunch of iPads or other mobile device for classroom use without allowing a teacher to become familiar with the device first, benefits no one because the educational uses often get passed over for more non-educational uses that a student may use it for. At https://www.commonsensemedia.org/educators/1to1/phase2 there are teacher resources that discuss how to implement a 1 to 1 technology iniative. Some proper ways of using mobile devices would be to increase interaction in real time, give access to applications to support learning, and increase individualization of education.

Is the use of a mobile computer and devices more of a distraction than taking notes or doodling in a notebook pad during class? Why or why not? This educause article
http://www.educause.edu/ero/article/distraction-engagement-wireless-devices-classroom discussed how to take mobile devices from distraction to engagement.  I do not think that the mobile devices are the cause of the distraction, they are a symptom of classroom climate. It is a teacher’s responsibility to make their class interactive as possible that a student doesn’t have time to be distracted by a mobile device or even just stare out the window. In the educause article it said “distractions caused by computers might be the result of a failure to involve students in the classroom rather than the reason they are not engaged.” This supports my concern that it isn’t the object itself that distracts, but the lack of meaningful classroom interaction with the teacher and other students that allows a student to use their mobile device or notes as a distraction. Another valuable idea is that “professors can actually contract with students to elicit their self-regulation”. Depending on the age of the students, these kinds of contracts will likely have varied success. Helping students to be able to learn self control is a priceless gift to them as they prepare for the work world. If a teacher is using a varied amount of active learning activities in the classroom that require “constant feedback, such as questions and answers, discussions, general assignment feedback, group collaboration, and hands-on activities” then mobile devices could be a tool to aid in these active learning activities, rather than a distraction.

Should you be judged by your internet communications?

p. 100 Should you be judged by your internet communications?

Should employers require that employees adhere to e-mail authoring policies?
I think that employees should adhere to e-mail authoring policies because these policies are in place to protect a business and employees. But I think that employers need to go beyond just e-mail. Employees today may be communicating via text message, email, blog posts, comments on internet sites, etc. and these employees must be aware of their rights and responsibilities for what they write. The model policy for internet, intranet, email, phone, and fax from the government of New Zealand http://www.justice.govt.nz/justice-sector/strategy/justice-sector-information-strategy/publications/information-knowledge-management-guide/7.14-model-policies-on-the-use-of-the-internet-intranets-email-phone-and-fax did a great job of outlining the importance of positive appropriate usage of internet communications. This site reminded me that what is written is part of the public record and could be used as evidence in a court of law. I am guided by the verse from the Bible that says in Philippians 4:8, “Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things.” Following this guidance could inform a person’s internet communications and help have a positive communication experience with others.

In general, has e-mail’s impact on communications been positive or negative? Why? I think that in general communication via the internet has been positive. It has allowed short and quick communication. It has allowed for quick feedback that can have a positive affect on communication. A research study into email ( http://www.itdl.org/journal/jun_04/article06.htm ) as feedback showed that email communication can “increase the likelihood of student achievement and satisfaction and promote learner retention.”  

Would you judge somebody by the quality of his or her e-mail message? Why or why not?
I do judge individual's by their email and internet communication. I believe with the tools available today that there is no excuse for a poorly written email. Tools are available to check spelling and grammar as well as applications where a person can speak words and those same words are typed in proper context with correct spelling. In my sewing hobby, there is the adage, measure twice, cut once. I think the same can be said for communication via email and the internet, think and read twice, send or post once.

Could someone's professional reputation be enhanced or hindered by the quality and effectiveness of his or her internet communications? I believe a person's professional reputation could be either enhanced or hindered by his or her internet communication. This article in Forbes magazine http://www.forbes.com/sites/susanadams/2013/03/14/6-steps-to-managing-your-online-reputation/  did a great job of reminding the reader how to keep a positive online reputation. I personally have created several blogs for the things I am most interested in and I try to add content occasionally to them either in written or video format. The idea that if negative information is on the third page of a Google search, then people won't notice it seems logical. It is still it important to know that negative unprofessional content may exist sometimes posted by others. When writing content or posting pictures or videos to the internet, referring to the guidance from Philippians 4:8 would go far to keep a person’s internet reputation positive.

How to deal with technology overload?

This blog posting is in response to my Ethics and Issues questions for OIT 100 Introduction to Computer Information Systems

p. 9 How can People best cope with technology overload?

 What steps can people or society take to cope with technology overload? In an article by Take One Step: Wellness at Work some useful steps include setting boundaries on technology use, setting a schedule for checking email or text messages, making use of face to face interactions, and avoiding adding more features or applications than you really need on your devices. I thought these steps were the most helpful to guide people into a better relationship with ever present technology. However, I think in today's society boundaries are more often than not loosely defined if present and it makes it hard for people to make a decision to limit their technology use, even when it is for their own good.

How might one determine if he or she suffers from technology overload? I found some useful questions to ask oneself at http://www.doctoroz.com/quiz/internet-addiction-quiz The first question was do you feel preoccupied with the internet? Then it asked Do you feel the need to use the Internet for increasing amounts of time in order to achieve satisfaction? Have you made repeated unsuccessful efforts to control, cut back or stop Internet/technology use? Do you feel restless, moody, depressed or irritable when attempting to cut down or stop Internet/technology use? Do you stay online longer than you originally intend to when you log on? Have you jeopardized or risked the loss of a significant relationship, job, educational or career opportunity because of the Internet/technology use? Have you lied to family members, a therapist or others to conceal the extent of your involvement with the Internet/technology use? Do you use the Internet/technology as a way to escape problems or to relieve a dysphoric mood (for example, feelings of helplessness, guilt, anxiety or depression)? These questions created by Dr. Kimberly Young from the Center for Addiction Recovery would be very useful for a person to come to terms with their technology overload. I would be concerned however that a person who is overloaded wouldn't notice that these questions apply to his or her life. Sometimes an outside intervention is needed to help an overloaded individual see that his or her behavior isn't helping them lead a better life.

How can technology companies help to alleviate the problem of technology overload? In an article by Jonathan Fader, he discusses some key points that I think would help technology companies alleviate the problem of technology overload. Technology companies need to recognize and share with their users that technology has power to "prevent you from being present" in an activity. They should demonstrate how to set boundaries with technology by scheduling screen free time into your day. One idea was to stack phones on a table when eating out together with others and the first person to look at their phone pays the bill. Technology companies should make it easier to create specific alerts to content notifications that really are important or come from important people. Turning off the blinking LED light could help a person focus on the here and now. People should plan for breaks from technology. People should use a real watch or clock instead of the technology to tell time. Technology companies should provide guidance on how to find therapists trained in cognitive behavioral therapy to help people change their behavior.

Should those identified as technology addicts be able to receive health insurance benefits for counseling services? Why or why not? Technology addicts should absolutely receive health insurance benefits for counseling services. These addicts may suffer from similar detrimental affects to their relationships with their family and coworkers. These individuals deserve to have an opportunity to make positive behavioral changes in their lives that may necessitate the use of an outside individual to help effect this change and be an accountability individual to the addict.