Thursday, May 31, 2007

Time to say goodbye...

Well this will most likely be my last blog for this site. Therefore I will try to make it a good one for you.
My impressions of New Communication Technologies is that it is definetly something different. Don't get me wrong I loved the tutorial tasks. They were good as I learned alot of new things like how to use photoshop, some new tools were shown to me in word and excel that I didn't even think existed, learning all about the blogger world and also that google isn't the only search engine on the internet. The lectures were interesting, long, but interesting all the same.
I did learn from them and I thouroughly enjoyed Jason Nelson's lecture as he is really funny! But Stephen also does a really good job in the lectures, he get's really excited about what he is teaching and I find that really helpful when listening to him and wanting to learn.
I just find this class different as I have never done a subject like this before.
Now with the movies that were shown, all I can say is weird haha
goodbye and so long...
My name is Hope Kerslake, say hi to your mum for me. (",)

Playing around with photoshop...

Ok I did this picture because I was bored plus photoshop is fun! (",) Now that I have the hang of it. This would be newsworthy as I'm in the picture with Britney Spears. You could say I'm her new best friend and I am helping her through these troubled times. Haha.

Sunday, May 27, 2007

Using excel...

Ok now excel was a little harder doing the exercises then word was. This is because I haven't used excel in a very long time, therefore I was trying to grasp everything. There weren't really any problems with the exercises, just that I had to get used to excel and all it's tools. Exercise 3: using graphs was the easiest as I had done graphs often throughout high school therefore it came easily. But on the other hand, the advanced exercise took me a while as I didn't know what macros where and it was just unfamiliar territory for me. But I find the software useful but not really for me as I don't usually use excel.

Tuesday, May 22, 2007

Microsoft word!!!

I found this Microsoft word exercise considerably easy. I have used this software for a very long time so I guess you could say it comes naturally. haha. I found no problems, but this exercise showed me new things that I could do with microsoft word that I hadn't known how to do. Track changing and mail merging is a great example. When I first started doing these exercises I was like what the? but then I began to understand it and I find these two to be very useful for future references.

Thursday, May 10, 2007

My Essay!!

CYBER STALKING



Society has developed and expanded throughout the centuries as new technologies have emerged, in particular the internet. The internet has evolved so quickly that it is becoming easier and cheaper to access throughout the world. Due to this rapidly expanding modern communication, crime, also known as cybercrime has become more evident. An element of cybercrime that is emerging on the internet is cyberstalking. Cyberstalking is found to be similar to traditional stalking as it uses a number of the same means, but is different to the way that the internet is used for the means to stalk its victims. Another difficulty with technology advancing so rapidly is that legislation is struggling to keep up with these new forms of crime. Current laws do not address this problem appropriately and they don’t protect users of the internet from these crimes.

Stalking has been claimed to occur because of a variety of reasons, the main being that there is some sort of infatuation with the victim. Other reasons include stalkers wanting to re-establish a broken relationship or institute a romance or friendship in some way with their victim. (Stalking 2005, p.2) Stalking has also been claimed to occur because of a creation of certain environments and in consequence cyberstalking came about as it is an occurrence of the internet and its environment. (Grodinzinsky & Tavani in Richard, A.S, and Herman, T.T 2004, p.561). There is although, disagreement that the internet has led to the rise of stalking cases. Mark Zwillinger, an employee of a legal team of computer crimes believes that a nasty email can be sent so quickly and easily that they may not even be a stalker. He believes that the internet is just a way to change their means and that it is not to be blamed. (Cyberstalking rears its head in the workforce, 2001, p.1)
Cyberstalking has many different methods in which depend on a particular part of the internet that is being exploited. The methods are:
-Email stalking,
-Internet stalking, and
-Computer stalking.
Email stalking is a way in which there is communication through using emails. Internet stalking is using global communication through the internet and computer stalking is using someone else’s computer under unauthorized control. (Ogilvie 2000, p.2) Cyberstalking is becoming easier for offenders as they have access to all the personal details of individuals on the internet. A study conducted by David Huffaker of Northwestern University showed that out of 68 random weblogs produced by teenagers between the ages of 13 and 17, many had revealed their actual names, ages and offline locations. (Teen bloggers at risk for cyberstalking and cyberbullying 2006, p.1)
The most common form of cyber stalking, which is measured as the least threatening, is unwanted emails. These may begin as a few misdirected comments at the victim but could then escalate to a number of emails being sent daily. Other forms can include spamming (sending large quantities of unwanted mail) and sending viruses (Ogilvie 2000, p.4). Online threats are another form of stalking and many see them as some type of prank. Sometimes though if treated the wrong way it can soon turn into a very serious matter and more acts of stalking can occur. Such acts may include; identity theft, damage to data or equipment, transmission of threats, computer monitoring and the solicitation of sexual purposes” (Calson analytics, 2006 p.2).

An example of some forms of cyberstalking that can escalate is the case of a woman in Massachusetts, USA in 1999. This woman had a dispute with another user in her chat room about the user’s alias. After the disagreement, whenever the woman logged onto the same website the user was waiting for her. The user began to become more violent and then threatened the woman’s father and supplying information to her about his address. The woman took her fears to the police but they did not take it seriously as cyberstalking was a relatively new occurrence so she sought legal advice and was able to prosecute the user. (Cyber-Stalking 2005, p.1) But some people are not so lucky. A study was conducted in America in which stated that 75% of cases that were referred for prosecution by the federal authorities, concerning stalking, were thrown out because of lack of evidence. (Smith 2004, p.6) Cyberstalking has come to a point where more cases are coming apparent because of the lack of legislation in some countries. Queensland was the first jurisdiction within Australia to introduce laws against stalking into section 359B of the Queensland Criminal Code in 1993. These laws were again changed slightly in 1999, but since then nothing has come about even though technology has advanced quite a bit in almost a decade. (Sullivan 2002, p.3) Dr. Olgilvie believes that including e-mail and internet communications within the definition of offensive communications would make it easier in prosecuting offenders, but so far only Victoria and Queensland have done this. Dr. Olgilvie also believes that catching and prosecuting offenders has proved as the stalker is only a digital address and while they can be traced they can also hide and shift their address so they can’t be. (Jackson.A. in Healey, J 2002, p.33)

So in conclusion cyberstalking has been brought about by the new technological era, but the internet cannot be blamed as it is just a means for the offenders to use. However the legislation concerning cyberstalking should be updated as many offences are getting thrown out because of some of the legislation in some countries. It is also proven that it is hard to try and catch and prosecute an offender as he is hidden behind a screen and address.











References:


Caslon Analytic note cyberstalking (2006) Caslon Analytics, retrieved April 30, 2007, http://www.caslon.com.au/stalkingnote.htm

Healey, J (Ed.) (2002) The Internet uses and abuses, Volume 161. Rozelle NSW: The Spinney Press.

M/Cyclopedia of New Media (2005), Cyber-Stalking, retrieved April 30, 2007,
http://wiki.media-culture.org.au/index.php/Virtual_Communities_-_Cyber-Stalking

News-medical.net (2006), Teen bloggers at risk for cyberstalking and cyberbullying, retrieved May 7, 2007, http://www.news-medical.net/?id=16048

Ogilvie, E (2000) Paper presented at the Stalking: Criminal Justice Responses Conference convened By the Australian Institute of Criminology, Sydney, 7-8 December.

Richard, A. S., and Herman, T. T (Ed.) (2004) Readings in Cyber Ethics: Second Edition. Sudbury: Jones & Bartlett.

Smith, R. G (2004) Criminal forfeiture and restriction- of –use orders in sentencing high tech offenders. In Trends and Issues in Crime and Criminal Justice, No 286. Canberra: Australian Institute of Criminology.

Sullivan, B (2001) Cyberstalking rears its head in the workforce, retrieved May 8, 2007, http://www.zdnet.com.au/news/security/soa/Cyberstalking-rears-its-head-in-the-workplace/0,130061744,120218777-2,00.htm

Sullivan, D (2002) A critical analysis of Queensland’s cyberstalking legislation. NSW Society for Computers and the Law Journal, Issue 48.

Victims of crime helpline (2005) Stalking, retrieved May 7, 2007,
http://72.14.253.104/search?q=cache:58od6vEWLM8J:www.magistratescourt.vic.gov.au/CA256902000FE154/Lookup/Family_Violence_documentS/%24file/Stalking_brochure_2005.pdf+stalking+occurs&hl=en&ct=clnk&cd=3&gl=au

Tuesday, May 1, 2007

What to do...

Ok so it has come to the point where I really need to get a topic for my essay. But what to do? We have learnt so much throughout the weeks, that I am not sure what to choose. I could talk about the
*Internet.
*Television.
*Games.
*Virtual realities on the internet. or;
*Net art and Digital creativity.
But if I do choose one of these subject matters I would have to think of an essay question that revolves around one of these topics as they are too broad.
So I will have to get back to you....

Sunday, April 29, 2007

Chatting people up in 3D...

Alrighty so after experiencing 5 minutes in active world (which took longer to download) lol I am here to tell you the qualitative difference between this 3D world and msn. I found that the 3D active world is quite exciting as my character can do the macarena! It like literally dances it, it was so awesome! That is definetly a good difference as on msn you can write that you are doing the macarena, but you can't actually show people that you are doing it! Another good difference is that you can explore and walk around different worlds and chat to many different people without adding them and you don't have to know them either. Whereas on msn you have to add people to talk to them and you have to know their address to add them so you can talk to them. With the socialising aspect the 3D world does make a difference as its like a different world where you can run around blowing kisses, doing the macarena to other people and you can actually see the person as well. It's like putting yourself into another world with other people. If that makes sense lol