Cyber bytes, not bullets, in the word of terrorism
People turn to the Internet as a form of escapism, to avoid the reality of socially acceptable behaviors and laws. But honestly, every where I look online these days, from social media, to virtual worlds, to search engines – there are terms and conditions for every site you sign up too and there are legal implications and restrictions at all intersections. Websites and profiles are being shut down because people fail to read the fine print. But this is just one relatively small part of what security and policy mean on the Internet in today’s society.
Cyber crime is apparent because of security and policy breach online and includes everything from transmission of child pornography, cyber-stalking, and unauthorized computer trespassing through cyberspace, to hacking, sabotage, and piracy. Is this because when it comes to the Internet, “what is accessible to one is accessible to all?” (Woodford, 2012).
Hidayatullah (2012) discussed the concept of “Cyber terrorism – that is becoming more and more prevalent as groups and individuals are using cyberspace to threaten citizens, groups, communities or entire countries without the threat or capture, injury or death to the attacker that being physically present would bring.”
(Computer Domain, 2012)
Could cyber terrorists have the power to access our power grids or water supply systems and control them from their PC in a different country? SANS institute (2001) suggests our power supply networks, telecommunication networks and financial networks are all vulnerable to an attack by a cyber terrorist. Laws and government acts and legislations have been implemented and e-Security policies put in place such as the “Protection of Australia’s National Information Infrastructure & E-Security Policy” and “SIFT”.
It is the governments responsibility to protect the critical networks but every body needs to be responsible for their own professional online security and personal protection against cyber terrorism.
Computer Domain. 2012. “Cyber-Warfare: The New Global Battlefield” Image. Accessed May 6th, 2012. http://www.computerdomain.net/News—-Cyber-Warfare.html
Hidayatullah, K. 2012. “Cyber Crime and Its Consequenses” Accessed May 6th, 2012. http://airwebworld.com/articles/index.php?article=870
SANS institute InforSec Reading Room. 2001. “Fighting Cyber Terrorism – Where Do I sign Up?” October 15th. Accessed May 6th, 2012. http://www.sans.org/reading_room/whitepapers/firewalls/fighting-cyber-terrorism-sign-up_804
Woodford, D. 2012. “KCB206 New Media Internet, Self and Beyond: Week 9”. Lecture Notes. Accessed May 6th, 2012. http://blackboard.qut.edu.au/webapps/portal/frameset.jsp?tab_tab_group_id=_2_1&url=%2Fwebapps%2Fblackboard%2Fexecute%2Flauncher%3Ftype%3DCourse%26id%3D_81726_1%26url%3D
Breazeal stated in her TED.com segment that robots can be used for social interaction, communication, or even to increase health and wellbeing. The technological advancement seen in robots in the last few years has truly ‘gone beyond the limits’ through this concept of media as an “extension of man” (McLuhan, 1964). Robots and the unfathomable life-size exoskeletons are the future of security and military defense.
The first use of military robots in US combat was in Afghanistan July 2002. Today, robots are used to conduct rescues and logistic operations, automatic weapons fire, reconnaissance missions, communication, bomb disposal, and even sentries. (Robotmatrix.org 2011)
Exoskeletons and powered exoskeletons are a transgression of today. Even James Cameron’s Avatar provides ideas for the possibilities of the technology.
These robots, as Susan Leong (2012) suggests, are able to extend and supplement our human abilities. These suits allow military personnel to carry bigger weapons and more weight, faster and further, increasing their everyday performance and physical capabilities. What an asset to the protection of our country! This technology increases their ability to defend and protect not only their countries and innocent civilians, but better protect themselves.
This superhuman strength through devices of robotic definition can also assist every day people on a smaller scale, in all tasks primarily associated with strength, endurance or strenuous physical tasks.
Some argue this assisting technology brings people too much power. Have we gone too far? Is it just a mark of the times and the future of defence?
Just imagine what could be next?
Breazeal, C. 2011. “The rise of the personal robots.” TED.com video, posted February 2011. Accessed April 29th, 2012. http://blackboard.qut.edu.au/webapps/portal/frameset.jsp?tab_tab_group_id=_2_1&url=%2Fwebapps%2Fblackboard%2Fexecute%2Flauncher%3Ftype%3DCourse%26id%3D_81726_1%26url%3D
Hadhazy, A. 2009. “The Science Behind James Cameron’s Avatar” Popular Mechanics, December 16th. Accessed April 30th, 2012. http://www.popularmechanics.com/technology/digital/fact-vs-fiction/4339866
Leong, S. 2012. KCB206. New Media Transgressions: Week 8. Accessed April 27, 2012. Lecture notes. http://blackboard.qut.edu.au/
McLuhan, M. 1964. Understanding Media: the Extensions of Man. New York: McGraw-Hill.
Robotmatrix.org. 2011. “An introduction to military robots.” Accessed April 30th, 2012. http://www.robotmatrix.org/military-robot.htm
( Phillips, 2012)
Phillips (2012) examined a 2009 British study that found 45% of recruiters examined the social networking sites of their potential employees, and up to 85% in the U.S. Posts on Facebook or Twitter are not exclusive to just your “friends” or people with permission to access your profile, but the world.
Kathleen stated an argument Castells (1999) posed, that even with the advances in information technology over the last two decades, there still has been no major surges of unemployment. That said however, these advances in information technology through social networks used unprofessionally by employees poses a serious threat to their professional status, leaving their bosses with no choice other than to fire them for inappropriate misconduct.
Does this ever increasing monitoring ask us to question whether employers trust their employees or respect their personal lives away from the office? CNET (2008) “Don’t let Facebook get you fired” gives some helpful insight for mastering privacy controls. Even though you may not be that concerned with your boss seeing your religious status or hobbies, its those less-than-flattering photos, comments made about a job, a boss or other co-workers getting people fired.
My advice? Have separate email accounts for social and professional purposes and do not have social media pages under your professional title except for in professional networking places such as LinkedIn. Self-monitoring is the safest way to play.
Mackay, H. and O’Sullivan, T. 1999. “An Introduction to the Information Age”. In The media reader: continuity and transformation. Edited By Castles, M. 398-410. Sage Publications: London.
CNET TV. 2008. “Don’t let Facebook get you fired”. CNET TV, posted September 29th. Accessed April 22, 2012. http://cnettv.cnet.com/don-let-facebook-get-you-fired/9742-1_53-50003863.html
Phillips N. 2012. “Look who’s watching; its not the FBI, its Facebook” The Sydney Morning Herald February 25th. Accessed 21st April 2012. http://www.smh.com.au/technology/technology-news/look-whos-watching-its-not-the-fbi-its-facebook-20120224-1ttk6.html
New Media: Health & Well-Being. Don’t forget the little guys!
There is nothing cuter than a 7-year old hypochondriac. But is it more serious than we realize? Hypochondria and Cyberchondria are serious mental conditions that can affect children, as a result of self-diagnosis online, or from others around them susceptible to the condition. How are the kids adjusting to this information overload, searching for answers to questions they are either too embarrassed or insecure to ask?
Child Mind Institute (2012) states, “children with hypochondriasis generally don’t understand their symptoms; their anxiety makes it impossible to accept they’re healthy.” Naish (2004, 1) states, “children imitate their parent’s hyper vigilance for minor symptoms.” But can these parents be blamed?
Everyone has trouble understanding the load of information out there, parents included, to make good judgments and positive health role models. But currently, typing symptoms into Google will leave you millions of pages of both credible and misleading information. Generation RX (2001) discovered the “Internet offers an easy way of accessing medical information easily tailored to a young person’s needs.”(Lewis, 2006). But is this really true?
It is obvious universal awareness and support is needed to help us all understand. Brodie’s Blog states the importance of websites like ‘Reach Out Australia’ that provide youth the information, support, and advice they need. This is definitely what we need to see more of, one accessible place for credible health information online. This could limit the negative effect of unrealistic self-diagnosis for both adults and children. But as reiterated in the presentations, if the medical situation becomes serious, ALWAYS consult a doctor.
Babble. 2012. “Hypo-mom-dria”. IMAGE. Accessed April 2nd, 2012. http://i.imgur.com/NLn5V.jpg
Lewis, T. (2006). Seeking health information on the internet: lifestyle choice or bad attack of cyberchondria? Media, Culture & Society, volume 28, issue 4: 521-539.
MiramaxFilms. 2012. “The Switch — “Hypochondria” Clip.” YouTube video; posted August 23rd, 2010. Accessed April 1st, 2012. http://www.youtube.com/watch?v=aD7Mzpw2Ga4
Naish, John. 2004. “Mum gave me hypochondria”. The Times, May 29. Accessed April 1st,2012. http://gateway.library.qut.edu.au/login?url=http://search.proquest.com.ezp01.library.qut.edu.au/docview/319079584?accountid=13380
Miller (2002) discusses how religious/faith groups are “getting the word out” using new media platforms, and the reasons behind the transition. Some find services on screen convenient, others use technology to take their religions, faith, and beliefs to a new level to reach global audiences. Churches need to “connect with their community in meaningful ways, establish a strategy for actively engaging in the social media conversation.” (Roach, 2011)
The Pentecostal movement Hillsong for example, encourages communication and networking amongst followers of Christ on Facebook, Tumblr, Twitter etc. Uploading worship video’s to YouTube is expanding and promoting their faith. This video, has had 14,832,428 views (as at 11:39am 25/3/12) and proves how followers are turning online to seek spiritual revelation 24/7. Searching through its 37,374 comments, there is a lot of both positivity and trivializing.
We have the choice of what we expose ourselves too, so I don’t think people should be afraid of hiding their beliefs because there’s a good chance someone will trivialize it. These negative comments can’t stop people believing. Unfortunately though, that is how today’s society reacts to things they don’t approve of. Instead, embrace diversity online!
Koorong Store. 2012. “Faithbook Poster” Accessed March 25th, 2012. Image. www.koorong.com.au
Miller, D. 2011. “Getting the Word Out” in Tales from Facebook. Polity: Cambridge.
Religion Link. 2012. “God and Facebook: Is social networking changing religion?” Accessed March 25th, 2012. http://www.religionlink.com/tip_110125.php
Roach, D. 2011. “LifeWay Research finds churches increasing efforts in social, Facebook” Accessed March 25th, 2012. http://www.lifeway.com/Article/LifeWay-Research-Churches-Increasingly-Fans-Facebook-Social-Media
Amusement Arcade – Music, Games and Films
“These days, we don’t just enjoy, we participate,” (Leong, 2012), a truth of today’s media scape. Within the film industry however, I believe we are enjoying, far more than we are participating, and at a cost. We read the Internet killed television, but it is also an ocean of pirates killing the film industry.
It’s common practice to download a film direct from the Internet because it’s convenient and free! Nonetheless, does anyone else believe paying for content is out of respect for those who created it?
If you choose to download films for free, for whatever reason, there are still ways to show appreciation for those creators through participation. User-generated content through YouTube, Vimeo, forums, blogs or social networking gives fans/users a chance to give something back, have a say, and offer ideas to expand the brand.
Star Wars Uncut: Director’s Cut (Pugh, 2012) is a fantastic example of this user-generated process. In doing so, they have also provided an extended platform for the brand that not only proves their dedication, but also offers free advertising and positive promotion. If you download you can play your part by participating in creating content.
To conclude, Levy (2006) proposes that a person can be judged according to their playlist. In return, can a person be judged by the number of movies they download?
Leong, S. 2012. “KCB206. New Amusement Arcade: Music, Games and Films: Week 3”. Accessed 17th March 2012. Lecture notes. http://kcb206.susanleong.net/node/4
Levy, S. 2006. The Perfect Thing: How the iPod Shuffles Commerce, Culture and Coolness. New York: Simon & Schuster.
Pugh, Casey. 2012. “Star Wars Uncut: Director’s Cut”. Accessed 18th March, 2012. http://www.youtube.com/watch?v=7ezeYJUz-84