Author Archives: joelywoley93
This is my E-petition
Thank you Mr Gill
Your name has been added to the Open the Redland Bay Mental Health Facility E-Petition as specified below.
Please print this page if you require confirmation.
I commented on this post by Helen Razor http://dailyreview.crikey.com.au/at-least-the-games-industry-wins-in-abbotts-war-on-red-tape/11537#comment-46957. My comment was “Impeach Abbott”
Message to Barrack Obama
The importance of freedom on the internet cannot be mistaken. For a democracy to be truly effective you need a well informed populous, what better tool is their than the internet for the spreading of important information to large numbers. As Benjamin Franklin famously said Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”
Australian Government Clean Feed
The Australian government had plans to censor the Internet and the Labour government on New Years Eve, 2007, originally proposed it under the guise of protecting children. The arguments for this proposal were that it would limit access to adult content, internet users would be able to complain about sites they found offensive and that websites that promoted crime and terrorism would be blocked.
The arguments against far outnumbered and there was a huge public outcry. The majority of people felt like this was a huge invasion of our civil liberties and heralded a move towards a nanny state. Plans for Internet censorship have failed so far in Australia and I hope that remains the case.
The National Broadband Network in today’s technological age is an advent that would cement Australia’s place amongst the world leaders economically. The main benefit of the NBN is a faster Internet mode for all Australians. This style of Internet is particularly import considering how large are country is. It was originally proposed as a fiber to premises plan, which would be the most effective but due to costs the new government has claimed that a fiber-to-the-node system is better suited (Gregory, 2014). I feel this is a shame because it just seems like if it is not done as effectively as possible now, in the future it is going to just end up being replaced at higher cost.
Gregory, M, What the NBN cost- benefit review doesn’t tell you, http://www.businessspectator.com.au/, date accessed, 05/09/2014.
My local representative is Jane Prentice; my state representative is Campbell Newman and my federal representative is Teresa Gambaro.
Jane Prentice’s last speech was concerning three soldiers deaths from the Enoggera Barracks. I didn’t really have an opinion on it but I don’t agree with Australian involvement in Afghanistan.
I posted a comment on http://madelineparamor.wordpress.com/2014/09/05/week-six/comment-page-1/#comment-3 week 6 post and I just said that she was posting some good stuff.
Burning Chrome was a very interesting story. To see how William Gibson imagined Cyberspace in 1982 was quite interesting. It was also where the term cyberspace was first used. This short story is one of the founding myths of the cyberpunk genre and it explored the world of hacking in a way that was relatively easy to follow, where he would described the characters Bobby Quine and Automatic Jack as “computer cowboys”. Describing it this way made it seem a lot more interesting then the reality of hacking, which can be hard to translate into a plot entertainingly.
This is a timeline I made that represents important moments in the personal computer’s history. It mainly focuses on it’s creation and the factors that contribute to it’s ubiquity in modern life. Here is the link.
Here are the references for the timeline.
- Abbate, J. 1999, “Getting small: a short history of the personal computer”, Proceedings of the IEEE, vol. 87, no. 9, pp. 1695-1698.
A Brief History of the Computer
Herman H. Goldstine
Proceedings of the American Philosophical Society, Vol. 121, No. 5 (Oct. 17, 1977), pp. 339-345
- Lenton, D. 2001, Rebuilding the bombe, H.W. Wilson – Applied Science & Technology Abstracts.
Which of Stephen Stockwell’s books are in the Griffith Library?
These are the Stephen Stockwell book’s currently in the Griffith Library.
• Isakhan, B., 1977 & Stockwell, S., 1954 2011, The secret history of democracy, Palgrave Macmillan Ltd, New York; Basingstoke.
• Stockwell, S.E. 2010, Rhetoric and Democracy: Deliberative Opportunities in Current Electoral Processes, VDM Verlag Dr. Müller.
• Stockwell, S., 1954 & Informit 2005, Political campaign strategy: doing democracy in the 21st century, Australian Scholarly Publishing, Melbourne.
• Stockwell, S., 1954 & Scott, P., 1961 2000, All-media guide to fair and cross-cultural reporting: for journalists, program makers and media students, Australian Key Centre for Cultural and Media Policy, Nathan, Qld.
Cite three academic references that may prove useful for writing an essay on “Alphaville”
• Brody, R., 1958 2008, Everything is cinema: the working life of Jean-Luc Godard, Metropolitan Books, New York.
• Buss, R. 1994, French film noir, Marion Boyars, New York; London.
• Meehan, P., 1948 2008, Tech-noir: the fusion of science fiction and film noir, McFarland, Jefferson, N.C.
What is a book that will assist you to find out about possible research methods to explore social media?
Wiley, J, 2010, The Handbook of Online and Social Media Research: Tools and
Techniques for Market Researchers.
What is the latest thinking on Internet addiction?
Since the rise in popularity of the Internet, professionals have been debating whether pathologic use should be classed as an addictive disorder. Recently it has been discovered that Internet addiction is associated with certain brain lesions and dysfunctions. It also aversely affects the part of the brain associated with executive functioning, most notably working memory. Those most likely to be effected by pathological Internet use are people in their teens and early twenties.(Hsu,Chang, Tseng, Chiu, 2014).
The database I used for this information was “ClinicalKey”.
Hsu, W, Lin, S, Chang, S, Tseng, Y and Chiu, N, 2014‘ Examining the diagnostic criteria for Internet addiction: Expert validation’. Journal of the Formosan Medical Association, N.P, Australia Clinical Key, Viewed 19 August 2014.
What are IT engineers thinking about surveillance cameras?
Currently IT engineers are looking to develop surveillance cameras further, after recognizing the importance they will play in the protection of assets (Wang, 2013). Areas they are looking to improve are thermal imaging and facial recognition. They believe these advances can act as a deterrent for crimes. An interesting aspect to explore in an essay would be whether the government using these sorts of technologies would encroach on our civil liberties.
The database I used for this information was “Science Direct”
Wang, X, Intelligent multi-camera video surveillance: A review, Pattern Recognition Letters, Volume 34, Issue 1, 1 January 2013, Pages 3-19,
Papers that that would be useful for this subject are
Weber, K. 2006, “Privacy invasions: New technology that can identify anyone anywhere challenges how we balance individuals’ privacy against public goals”, EMBO reports, vol. 7, pp. S36-9.
O’Rourke, A. 2005, The Right to Privacy, Control Publications Pty Ltd, Victoria.
IVy, K. 2002, “CTRL SPACE]: Rhetorics of Surveillance from Bentham to Big Brother”, Library Journal, vol. 127, no. 19, pp. 67.
I have been using new communication technologies to communicate with my friends since primary school. These were before the days when my parents would trust me to keep a mobile phone, so instead I was using instant messenger on the computer. As soon as school finished I would rush home and start talking to my friends about the days events. As I got older my methods of communicating with friends and family started to change. Strangely enough, it was my mum who made me create a Facebook account. I have a lot of relatives who live in the UK and she wanted me to stay in contact with them.
Because I use Facebook primarily to communicate, one of my main concerns is privacy. The price you pay is not monetary but agreeing to have your information sold to third parties. I operate under the assumption that I have nothing to hide so it doesn’t really matter but every now and then Facebook will ask me to disclose information that just seems creepy. For example, when was your first kiss? Most of my friends don’t know that so why would I want to tell Facebook.
The amount of private information I’m sharing on Facebook can at times be quite unnerving. An option for monitoring this is to go to graph.facebook/markzuckerberg, but replace Zuckerberg’s name with your own (Costa, 2010). With the current legislation the Australian government is trying to implement regarding Meta data, it seems that privacy concerns are only going to increase for the public.
Costa, D 2010, ‘Facebook: Privacy Enemy Number One?’, PC Magazine, 29, 7, p. 1, Australia/New Zealand Reference Centre, EBSCOhost, viewed 19 August 2014.
This video is interesting because it explores our privacy on the internet. It details how we are being tracked on the internet and provides an answer for those who find this practice invasive.
I enjoyed this video because I liked the idea that we don’t have to be passive and we can take actions to protect are privacy.
My name is Joel Gill, I am 20 years old and I love boxing but my favourite thing in the world is napping. I currently have no career goals and am just enjoying being a student. New communication technologies is compulsory for my course but it also seems pretty interesting.
My favourite digital technology would have to be my laptop. It is hard to imagine a week without. I can’t imagine attempting to function without it. Studies have even shown that in the case of disadvantaged students, laptops provide a tool for these students to engage in difficult learning material future. Outperforming classes that don’t have these tools.(Mouzaa,2014)
Mouza, C, 2014, ‘Learning with Laptops’ , Journal of Research Technology in Education