Don't wanna be here? Send us removal request.
Text
Blog Post #13
CEID100: The Final Project - Alisha, Samuel, and Kyea.
0 notes
Text
Blog Post #12
For my final Blog Post of the semester, this is my "Best of CEID100"!
Thank you Professor Hoskins for a great semester!!!
0 notes
Text
Blog Post #11

Dear Visionaries,
The digital age has brought a new era of increasing innovation and interconnectedness. As we come upon an extraordinary technological revolution, we must ask ourselves: how can newer technologies be utilized to build a future that empowers humanity, creates equality, and preserves our planet? After reading Module 11, here are three different pathways to help shape a more positive digital future:
1. Embracing Interoperability for Global Connectivity Interoperability—seamless communication across various devices and platforms—can offer unprecedented opportunities to connect people and ideas. By expanding cloud-based computing and Software as a Service (SaaS), we can establish fair access to digital tools regardless of geographic or socioeconomic barriers. This could create an environment where students in remote areas connect to global classrooms, and small businesses have access to sophisticated tools once utilized only by large corporations. Open standards and collaboration must drive this kind of vision, reducing silos and creating a more interconnected world.
2. Tackling Information Overload with Ethical AI The rapid growth of data demands more advanced solutions to manage and filter information. Artificial Intelligence (AI) and machine learning can be used to create personalized, ethical filtering systems that focus on quality over quantity. These systems can help reduce digital noise while also promoting transparency and diversity in the content we consume. Furthermore, integrating augmented reality and prevalent computing into education and public services can also improve accessibility, making information not only extensive but meaningful and actionable.
3. Building Sustainability through the Internet of Things (IoT) The IoT provides an opportunity to address pressing environmental challenges. Smart cities, supplied with sensors to help optimize energy use and reduce waste, can greatly decrease our ecological footprint. Other devices such as smart grids and appliances can transform resource management, getting communities to use energy more efficiently and react adaptively to changing needs. By focusing on sustainability, we could make sure that technological progress aligns with the preservation of our environment and planet.
So, let us innovate with intention, utilizing our powerful tools to create a digital future focused on equity, sustainability, and shared progress. Together, we can make sure that technology is a force of good, creating a world where humanity will continuously improve.
Sincerely, Kyea Ferrier
0 notes
Text
Blog Post #10
For my blog this week for Module 10, I took the CourseAcademy beginner “Learn HTML” course, which highlights the importance of programming languages and their role in translating human-readable instructions into machine-executable code. It introduces programming as a connection between human expression and computer functionality, emphasizing the structured, precise nature of various programming languages compared to the uncertainty and overabundance of natural languages.
In Module 10, this week we discussed HTML (Hypertext Markup Language), a fundamental web development language, and its historical evolution. Although it’s not a “true” programming language, HTML is the foundation of the web and allows browsers to display webpage content through tags and elements. It assists in linking (hypertext) and displaying structured information (markup). Over time, HTML has advanced through various iterations, leading up to HTML5, which standardized web development in 2014. As discussed in Module 10, HTML5 goes over key challenges like video integration and cross-platform functionality, making it important for modern web design.
The content in Module 10 directly complements CourseAcademy’s beginner course, “Learn HTML”. The beginner course introduces HTML basics, such as syntax, tags, and elements like <html>, <body>, <h1>, and <p>. It connects with the module’s focus on HTML’s simplicity and foundational role in web development. By linking the theoretical bases of HTML with practical learning, CourseAcademy provides students with an understanding of how to create functional, accessible web pages and better comprehend HTML’s relevance within greater programming concepts.
0 notes
Text
Blog Post #9
After there was a shift from online to remote education, prompted by recent global events, it has presented both opportunities and challenges in creating engaging and personalized learning experiences. Although digital learning platforms are easily accessible, students still face issues with motivation, feedback, and adapting to the different paces at which they learn. Here’s where Artificial Intelligence (AI), specifically adaptive learning AI, could improve remote education.
Imagine there was a remote education platform powered by adaptive AI. This platform could customize learning experiences based on individual students’ strengths, weaknesses, and various engagement levels. Unlike traditional e-learning platforms that usually provide a one-size-fits-all experience, an AI-powered system could assess students in real-time, recognize where they’re struggling or improving, and adjust the different lesson plans accordingly. For example, if a student is going through some difficulty with a specific math concept, the AI could respond by providing additional exercises, interactive visuals, or even video tutorials, progressively increasing the difficulty only when the student demonstrates readiness.
By utilizing deep learning and natural language processing (NLP), this AI program could also provide immediate, personalized feedback on students' written assignments or interactive assessments. The NLP-driven feedback would not only showcase the errors made but also explain main concepts, helping to create a deeper understanding. Additionally, sentiment analysis—a tool in NLP—could detect frustration or disengagement in written responses or interactions with chatbots, prompting the AI to adjust its approach or alert instructors who could intervene with support or encouragement.
A pro to this system is its capability for unsupervised learning: as students interact with the platform, the AI would identify patterns over time and continuously refine its approach. This self-improving mechanism would help ensure that each student benefits from an increasingly tailored educational experience, promoting a sense of accomplishment and motivation.
In conclusion, an AI-driven platform could be an invaluable resource for instructors, providing insights into each student’s progress and suggesting instructional strategies. This data would allow educators to intervene more effectively, ensuring that no student is left behind as the semester commences. Ultimately, AI has the potential to bridge this educational gap by meeting each student wherever they are, helping them to realize their full potential, regardless of their starting point.
0 notes
Text
Blog Post #8
Spotify has redefined the music industry by recreating the idea of traditional consumption. As a pioneer in the digital age, Spotify’s innovative approach to streaming has changed how we listen to music. Rather than just buying individual tracks or albums, users can now have access to a large library for a low subscription fee. This shift not only changed traditional sales models but also attracted users who had previously relied on illegal downloads or expensive physical media.
One of the key factors in Spotify’s success is its approach to patent collaboration. Instead of engaging in costly patent disputes, Spotify collaborates with other tech companies through patent pools. This strategy helps them to sidestep legal battles and create a smoother integration with new technologies into their platform, ensuring ongoing innovation without the risk of expensive lawsuits.
Spotify’s use of both proprietary and open-source technologies is another innovative strategy. While it controls essential elements like its recommendation algorithms, the company also embraces open-source solutions. This allows for collaboration with the broader tech community, helping Spotify stay agile while revising its essential features.
The company’s freemium model, offering free, ad-supported access as well as premium subscriptions, has been a game changer in lowering the barrier to entry. By attracting a large user base with the free tier, Spotify effectively convinces users into paying subscribers, generating revenue while keeping operational costs low.
Finally, Spotify’s customer-centric personalization through its algorithm-driven features, like Discover Weekly and curated playlists, sets it apart from competitors. By tailoring music recommendations to individual preferences and listening habits, Spotify creates a unique, engaging user experience that keeps listeners coming back.
0 notes
Text
Blog Post #7
This week in Module 7, we learned extensively about cybersecurity, breaking it down into key components like endpoint security, network security, disaster recovery, and information security. In correlation to the activity with PBS’s Cyber Lab Game, which was to teach us about cybersecurity through various challenges, the information from Module 7 significantly increased my understanding of the topic and how I can react to certain situations when it comes to cybersecurity.
In the game, I was tasked with defending systems from various cyberattacks, similar to how endpoint and network security function in real-world scenarios. The concept of endpoint security, as described in Module 7, was especially useful when identifying malicious threats and employing antivirus measures during the gameplay. Understanding the analogy of the “electrified perimeter fence” allowed me to visualize how antivirus software and other defenses work in protecting end-user devices.
Additionally, the disaster recovery section was also helpful. Throughout the game including these scenarios where players must respond to breaches effectively, it helped to reinforce and remind me of the importance of having a well-prepared response plan.
In conclusion, Module 7 and the PBS Cyber Lab Game complemented each other well by providing a foundation that improves the practical cybersecurity skills learned during the course of the game.
2 notes
·
View notes
Text
Blog Post #6
youtube
This week, in Module 6, it was discussed how Photoshop has revolutionized image creation and manipulation; specifically in entertainment, fashion, and journalism. It is agreed that although some level of enhancement can be expected in aspects of product marketing, the application of Photoshop to human images raises significant ethical concerns. In fashion, models are consistently altered to fit an unrealistic standard of beauty, which then impacts society’s perception of body image, especially among young people. This has led to a lack of diversity in media representations and harmful self-perception trends, such as “Snapchat dysmorphia,” where users modify their images to resemble distorted, filtered versions of themselves.
The ethical considerations go beyond entertainment and beauty standards into the realm of photojournalism. Here, manipulated or selectively edited images have the power to shape public perception, sometimes at the cost of truth. A key responsibility of photojournalists is to showcase the truth through imagery, as seen in the controversy surrounding the World Press Photo of the Year 2013. Though accusations of image manipulation were cleared, the suspicion raised important questions about journalistic integrity.
In my group’s Public Service Announcement (PSA), we discuss some more tragic instances, such as the deaths of Liam Payne and Kobe Bryant, where the ethical boundaries of media and photojournalism were further tested. As explained in the video, TMZ’s quick release of images related to Liam Payne’s death and their reporting on Kobe Bryant’s helicopter crash before family notifications were met with major public outrage. These situations represent the delicate balance between reporting news and respecting personal privacy and dignity, specifically in times of grief. The use of Photoshop to enhance or alter images in such sensitive contexts becomes especially controversial.
In conclusion, while Photoshop can be a powerful tool, its use in journalism and media needs stricter ethical guidelines to ensure that the truth is preserved, and individuals’ privacy and humanity are respected during vulnerable moments.
Group Members: Samuel Ashitay and Alisha Frambroze.
0 notes
Text
Blog Post #5

Disinformation (deliberate intent to deceive):
In Module 5, we learned that disinformation is false or manipulated information that was intentionally created to deceive or mislead others. This can be identified through the inclusion of fabricated stories, conspiracy theories, or altered media, that are often used to influence public opinion or cause harm.
Examples: In 2021, videos showed an eerily realistic, but fake, version of Tom Cruise engaging in various activities. Although they were meant to be taken as a joke, many viewers believed the videos were real, leading to confusion about the actor’s actual actions. The creators used advanced AI tools to manipulate the content purposefully to deceive viewers for entertainment. CNN
2. Misinformation (unintentional spread of false information):
In Module 5, we learned that misinformation is false or inaccurate information that is spread without malicious intent. This can be identified through an individual sharing misinformation that they believe to be true but is factually incorrect or misleading.
Example: In an interview, Salma Hayek mentioned a false fact about the brain, related to left-brain/right-brain dominance, while discussing the popularity of certain film genres. Although Hayek did not intend to mislead anyone, this myth is scientifically inaccurate and has been debunked, yet it continues to spread widely. Psychology Today
3. Mal-information (true information used maliciously):
In Module 5, we learned that mal-information is information that is true but shared with the intent to harm an individual, often by exposing private details or manipulating the context. This can be identified through the inclusion of leaked private documents or the release of genuine information in a distorted manner to hurt someone’s reputation.
Example: Private photos of Jennifer Lawrence were stolen and maliciously leaked online. This is an example of malinformation because real and private content was shared publicly to harm the individual, as well as their career/influence. This led to significant public outcry and legal action against the perpetrators. Teach Privacy
0 notes
Text
Blog Post #4

For my final project, my group has chosen monetization, specifically when it comes to monetization on social platforms. My focus is on monetization through sponsored content and brand deals, where many strategies can benefit both influencers and brands. For influencers, brand deals can provide a primary income source, which allows them to turn their content creation into a full-time career. Influencers build trust and relationships with their audiences/followers, and when they partner with brands that align with their own values as well as audience interests, the sponsored content feels more genuine and organic. This authenticity can lead to higher engagement rates, where followers are more likely to trust and purchase the products or services being promoted by their favourite influencer(s). Influencers can also monetize in various ways, including flat fees, commissions, affiliate marketing, or free products, depending on their reach and audience engagement.
For brands, sponsored content is also an effective method to reach targeted demographics. With the growth of social media, traditional advertising methods like TV commercials are becoming less effective, especially among younger audiences who spend more time on platforms like Instagram, YouTube, and TikTok. Partnering with influencers gives brands direct access to various niche markets, as influencers curate content for specific interests and communities. These collaborations also offer an opportunity for brands to create personalized marketing campaigns with a human touch. Sponsored content is relatively cost-effective compared to traditional forms of advertising, and brands can track their return on investment (ROI) through different metrics such as clicks, likes, shares, as well as conversions.
In conclusion, brand deals help create long-term relationships between companies and influencers. These partnerships can often lead to ongoing collaborations, boosting brand loyalty and recognition. Consumers view products recommended by their favourite influencers as more trustworthy, driving purchase decisions. The combination of targeted outreach, engagement, and the influencer’s credibility results in a powerful monetization cycle, where both influencers and brands profit from their respective platforms and audiences.
My group: Kyea Ferrier, Alisha Framroze, & Samuel Ashitey.
0 notes
Text
Blog Post #3
When I consider the scope of online data collection, specifically by data brokers, I notice how vast and invasive it is. Companies (like the ones mentioned in Module 3) Acxiom, Experian, and Oracle track and gather personal data from a variety of sources, including online behavior and public records, to create detailed personal profiles. This information contains everything from shopping habits and search histories to more intimate details like ethnic identity and even sexual orientation. The primary goal for these data brokers is to classify individuals based on their perceived commercial value, which is then sold to various marketers, banks, insurers, and sometimes even governments.
From what we’ve learned in Module 3, the process of collecting data is not only limited to cookies and website trackers, but it also extends across multiple devices, using techniques like cross-device tracking. This means that regardless of whether you’re on a laptop, smartphone, or even a smart TV, your actions are being monitored and compiled into a comprehensive digital profile. These data points can be surprisingly specific, with categories like “Asian Heritage” or “Streetwise Singles” reflecting highly niche demographic segments.
After utilizing Disconnect on Firefox, what I’ve noticed to be particularly concerning is how little transparency or control we (users) have over this process. The idea of being categorized and sold to the highest bidder, without consent or awareness, showcases a grater issue of privacy erosion in the digital age. This system not only commodifies personal data but also undermines users’ sense of privacy, leaving them exposed to manipulation and targeted ads based on personal characteristics they may not have knowingly shared.
In conclusion, I was extremely surprised and discomforted by the idea that forty-six trackers were following me on my search through the Amazon website. Out af all the eight websites I surfed, Amazon had the greatest amount of trackers. After this little experiment, I can understand why it really puts users/consumers in an uncomfortable position, especially when they’re unaware that almost everything they’re looking at and searching is being watched by various companies. I believe that if large companies like Amazon plan on using this kind of strategy for their company, all users should be notified of this pre-sign-up or pre-account creation.
8 WEBSITES VISITED:
Civic or Non-Commercial Sites:
United Nations – https://www.un.org
National Park Service – https://www.nps.gov
E-Commerce Sites:
Amazon – https://www.amazon.com
Etsy – https://www.etsy.com
News Sites:
The New York Times – https://www.nytimes.com
BBC News – https://www.bbc.com/news
Social Sites:
Tumblr – https://www.tumblr.com
Reddit – https://www.reddit.com
0 notes
Text
Blog Post #1
During Module 1, there is an importance when distinguishing self-presentation and self-branding. Erving Goffman’s concept describes self-presentation as how we adapt our behaviour depending on the social context, similar to an actor/actress when they are on stage. This means showcasing different aspects of our ourselves based on our audience without necessarily being inauthentic (Goffman, 1959). For example, an influencer such as Emma Chamberlin represents a relatable, authentic personality on her YouTube channel, yet maintains a polished, business-oriented image for her brand Chamberlain Coffee. This kind of adaptability aligns well with Goffman’s idea presented in the module, that shifting our presentation is a legitimate strategy.
In contrast, self-branding is a more specific process of marketing yourself, often used for personal gain. Emma Chamberlain showcases this through her approach to personal branding. By building a distinctive online presence and utilizing her platform to promote her coffee business, she embodies these examples of self-branding, promoting authenticity while also strategically positioning herself as a relatable yet aspirational figure (Marwick, 2015).
Throughout Module 1, there is an emphasis on building a personal brand, which involves several key strategies. As mentioned through the steps for personal branding, it’s essential to be involved, engage with others, post frequently, and manage your image. Emma Chamberlain’s success reflects these practices. She actively engages with her audience across various social media platforms, consistently posts content that resonates with her brand’s identity, and also maintains a strong, cohesive image across her social media and business endeavours. As explained in the strategies for personal branding, this continuous engagement and careful management of her online presence is pivotal for sustaining a robust brand.
Emma Chamberlain’s approach emphasized the balance between self-presentation and self-branding. While she presents different aspects of her personality depending on the platform, her expansive brand remains authentic and engaging. This reflects how effective personal branding requires not only presenting yourself in varied contexts but also maintaining a consistent and compelling overall image.
In conclusion, Emma Chamberlain’s success in leveraging both self-presentation and self-branding strategies showcases the best practices for building a personal brand. Her ability to adapt her persona while maintaining a cohesive brand identity highlights the movement between authenticity and strategic self-promotion represented in Module 1.
1 note
·
View note