Month: February 2022

Wow and Wonder #5

As social networks and news media grow faster and faster, false information is spreading rapidly on the Internet. Since many people post information anonymously on social media, this leads them not to carefully confirm the accuracy of the information. This can have a very bad effect on society.

Wow:

  1. The rapid development of social media has led to a variety of ways for people to socialize.
  2. But anonymity leads to people talking out of turn on the Internet. Fake new is becoming more and more common.
  3. At the same time, amplified propaganda seriously endangers the social order.

Wonder:

I wonder if removing anonymity makes fake messages lee frequent? But would this result in no one daring to post real information in their real names? Such as fear of retaliation.

Related Course Links:

https://www.theatlantic.com/ideas/archive/2021/10/disinformation-propaganda-amplification-ampliganda/620334/

Showcase Posts 1

The concept of digital privacy can be described as the protection of information about citizens who use digital media, such as some social media and websites, which are digital media. Digital privacy is equivalent to the personal privacy of citizens on the Internet. In the age of digital information, many people are most concerned and worried about the security of their personal data. However, in the current network environment, the protection of personal privacy is not perfect, and there are even big loopholes. In fact, using unfamiliar Wi-Fi outdoor for work or entertainment can leave a digital trail on the network. Such traces can lead to personal privacy leaks and such vulnerabilities can easily be used by some people to do bad things.

Although, cyber security experts strive to help computer users protect personal information. But hacking techniques are also advancing and it is difficult to go for very tight protection. Even now, many cell phone software is forcibly collecting the personal information of users. This has led to a distrust of the Internet by many citizens. The debate over digital privacy is slowly diminishing as technology advances. The reason for this is that some users believe in advanced technology and the company’s commitment. A very large percentage of users also do so because there is no way to leave the network and they are forced to accept and trust that their privacy will not be compromised. At the same time, many users on the Internet are not aware of the need to protect their digital information awareness.

With the development of mobile Internet including 5G technology, it is absolute that people’s information is leaked. Therefore, we must first be prepared for this idea. Internet data development is getting better and better, and the means of collecting, organizing, analyzing, and predicting user data in information system services are getting more and more mature. For example, a woman often searches for information about cosmetics, and her phone will often push cosmetics ads to her. Also if one type of video is often watched on TikTok, it will push related videos to the user. This situation is a disguised leakage of personal information. But most users choose to accept it because it improves their online experience. In the face of such a situation, first of all, the protection of digital data must be continuously improved. And secondly, the relevant laws must be improved. Finally, citizens should also be aware of self-prevention and not disclose privacy on their own.

To conclude, in the face of the online environment, users must protect their personal privacy. When users find out that their personal privacy has been compromised, the user must use the law to protect themselves.

Related Course Link and Materials:

https://cmadland.github.io/edci338-202201/articles.html#visitors-and-residents-a-new-typology-for-online-engagement

First Comment:

I think Jiaxin’s point of view is very similar to mine, and she found some problems that I did find. For example, she believes that users can use the Internet to build good social relationships with others and to communicate about their studies and work, all of which are beneficial to the development and convenience of users in all aspects. However, I am more answering the question of data privacy for users. So all in all, we both found different focuses in our articles, but the direction of thinking is the same.

Second Comment:

Jingjing’s article shows that technology is evolving faster and faster, and that the advantages outweigh the disadvantages, such as the unity of continuity for residents and visitors. I think that is a good point and even gives me a good idea. Then, the questions in her wonder were the ones I focused on answering in my showcase.

Wow and Wonder 4

Each country has a different educational model, which reflects the diversity of education. For example, traditional education models and modern technology education. Both models have advantages and disadvantages, but what they have in common is that they are all about the betterment of students.

Wow:

  1. Education is not only about imparting knowledge, but also about developing students’ strengths.
  2. Modern technology education can enhance the personalized educational environment, which requires strong technical support.
  3. The traditional education model can be relatively conservative and srict and stereotypicl.

Wonder:

I wonder if the fact that big cities are using technology in education means that the traditional education model is obsolete.

Related Course Links:

https://ebookcentral-proquest-com.ezproxy.library.uvic.ca/lib/uvic/reader.action?docID=4832579&ppg=6

Digital Privacy

In the era of digital information, the most important concern and worry for many people is whether personal data security is safe. In the whole global network environment, the privacy of the masses is hardly guaranteed, and even the country’s network is not necessarily secure. In this situation, privacy leakage will lead to more and more fraudulent behavior, which will also lead to companies will lose a lot of customers. Although many technical departments are perfecting this technology now.

Wow:

  1. Internet data is developing better and better, and the means of collecting, organizing, analyzing and predicting user data in information system services are maturing.
  2. If hackers get hold of the data, it is easy to cause a privacy breach.
  3. At prsent, the major platforms are relatively simple means of authentication, behind which hides a greter risk of leakage of personal privacy information.

Wonder:

I think it is not the best done yet. I wonder if there is any better way to change this situation?

Related Course Links:

https://cmadland.github.io/edci338-202201/articles.html#visitors-and-residents-a-new-typology-for-online-engagement

My own Visitor/Resident map:

© 2024 coolpudding

Theme by Anders NorenUp ↑