Don't wanna be here? Send us removal request.
Text
Blog11
This semester's study of digital technology has given me a very rich understanding of this field. New digital technologies are constantly developing and rising rapidly, and their future prospects are also promising. When we look forward to the future of the digital world, it is very important to shape it in a positive and reasonable way. If we want to achieve this goal, we need to use the following ideas as considerations for the digital future:
Programming Industry and Diversity: The programming industry has always been considered an industry where women should not be present, and many female programmers are marginalized and unfairly treated within the industry due to their gender. Almost all male programmers also lead to a lack of diversity in the technical department. The Internet of Things operated by the program itself is a medium that connects people from all walks of life, and should be diverse and highly inclusive. In Module 10, it was learned that the technical department lacks social diversity, leading to the emergence of some organizations and initiatives to address this issue. And actively striving to create a more inclusive and diverse digital space, making everyone feel welcomed and valued is necessary and also the original intention. The rules of diversity and inclusivity should exist in the programming industry and the internet.
Priority protection of privacy and data security: In the topic discussed in the third module, we mentioned the existence of data protection and advertisement interceptors. The existence of advertising has driven the development of various aspects, such as commerce. There are also functions such as collecting big data for analysis to make early estimates. These new digital technologies are already inseparable from our lives, and life and work are increasingly intertwined with technology, so protecting personal information and data has become even more important. Technology companies and software developers need to make reasonable use of data collection and program applications, rather than overly prying into privacy and leaking information. The original intention of these new digital technologies is to provide people with better push content, so it is necessary to prioritize privacy and data security.
Cultivate digital literacy and critical thinking: False news and wrong information have always been serious problems, and both adults and minors need to cultivate digital literacy and critical thinking skills. Social media is the primary means of communication and source of browsing content for the vast majority of people today, and both commentators and publishers require high-quality use of social media. This echoes the reasonable application forms of social media mentioned in Module 5, and the cautious use of digital media to avoid unconscious distractions. So people should start investing in education and training programs, paying attention to evaluating sources, verifying information, and engaging in respectful conversations online. The above methods can fundamentally combat the spread of erroneous information and ensure that our dialogue is based on facts and evidence.
Encourage technological innovation: Technology has the ability to change our lives in incredible ways, and encouraging and accepting technological innovation can promote the development of new digital technologies. Artificial intelligence has been a hot topic of discussion since its inception, and people's acceptance of artificial intelligence is also quite complicated. Many people's evaluation of artificial intelligence is that it reduces people's innovation ability, but many still believe that artificial intelligence should be encouraged. Module 9 explains that AI has many uses, including healthcare, natural language processing, and music production. Even fintech has become a major disruption in the banking industry and is being used in applications such as mobile banking, robotics consulting, and small investments. The advantages of using AI reasonably outweigh the disadvantages. Encouraging and supporting the development of emerging technologies is highly likely to address global challenges and improve everyone's quality of life.
By accepting the above ideas, we can help people create a more inclusive, secure, and thoughtful digital world. New digital technology can maximize its impact based on its original intention and build an ideal new digital technology future.
Sincerely, Qianyu Lin
0 notes
Text
Blog9
I hope to develop and widely use artificial intelligence systems for practical work types, reducing the burden on people. As mentioned in the big data application section of the course, "with the emergence of big data analytics, they are now using them to gain an in-depth understanding of consumer behavior.". Specifically, artificial intelligence can collect legitimate data and information, and analyze the results to achieve the effect of predicting future trends.
In addition, the use of artificial intelligence is also very helpful for businesses. For example, artificial intelligence can be used in the checkout area of a mall, and can be used in warehouses or mall consulting services. Artificial intelligence greatly helps companies save money and can handle things in a timely manner based on precise characteristics. In addition, in China, software such as WeChat can simultaneously take into account many functions such as wallet chat and document entry. These artificial intelligence technologies belong to financial technology. Determine whether to invest or plan for future development based on data analysis. Bitcoin, for example, is a special presence in digital virtual currencies. It eliminates the loss of currency exchange and bypasses the dependence on central authorities. It can protect the privacy of all parties. Its value and authenticity will be maintained by something as nearly incorruptible as cryptography.
The views mentioned above all belong to the financial technology section mentioned in Module 9, "Technology based business that competes, supports, and/or cooperates with financial institutions.". Of course, you can even try to introduce new systems to artificial intelligence, which can independently think and make decisions based on the information and circumstances you have. This is the deep learning of artificial intelligence mentioned in the course. "This increases the depth of the machine learning process by effectively stacking neural networks on top of each other.". This type of artificial intelligence can help people give advice when they have no clue when thinking about a problem, allowing them to spread their thinking, explore innovation, and even give some ideas that people have not thought of, resulting in new markets.
0 notes
Text
Blog7
I spent about an hour on the game this week. I think it is a very interesting game. I really enjoy the challenges in the game. Because I am a person who is very lack of computer programs, although I spent an hour to challenge the game, the progress of the game is not much.
The general content of the game is mainly divided into three parts: password cracking, robot programs, and fraud identification. These correspond to the three concepts in the chapter: network crime fraud, network security, and network bullying.
For identifying whether it is a fraudulent website or email, you can identify it by observing the website address, sender, email format and title, etc. Cybercrime often takes personal information, bank or credit card information, social security number or court and work address.
The game's password cracking simulates the password cracking in the Internet. The password with numbers, letters and symbols will be more secure, and the longer password will be more difficult to crack.
Harassment by email or telephone through the network is considered network bullying. Internet bullying will have a great negative impact on adults and teenagers, and even lead to suicide or harmful behavior to society.
0 notes
Text
Blog 5
Disinformation: https://greatgameindia.com/coronavirus-bioweapon/
Disinformation is the term for incorrect information that is consciously spread to deceive individuals, groups, and nations. This link consciously misleads and deceives article viewers, and deliberately shifts the spearhead to China. First of all, there are no agents in China to carry out this series of operations. Second, the virus did not start in Canada. After reading this article, readers left messages in the comment area, and pointed out that the article's timeline was disordered, the purpose was impure, and the data could not be used as evidence.
Misinformation: https://arxiv.org/abs/2101.05626
Misinformation is the term for inaccurate information that is frequently spread in good faith but has no malicious intent. The main message of this article is to report a new method of treatment or prevention of COVID-19. The original intention of the article can be to publicize new methods to prevent diseases, without malice. However, many research institutes and the World Health Organization have issued clarification articles about garlic's inability to treat COVID-19. Readers found that the content of the article was fake because the official authority issued a clarification article, and many netizens believed that garlic had no scientific basis to cure COVID-19, as well as the loopholes in the original article publishing website.
Malinformation: https://globalnews.ca/news/8434687/bbb-naughty-list-top-holiday-scams-2021/
Malinformation is information that has its roots in the truth but is frequently overstated in a way that deceives and could be harmful. The main content of the article is that online shopping failed. The description on the website is completely inconsistent with the actual goods, but consumers paid a high price. This deliberate and exaggerated false propaganda harms consumers and deceives them. In my country, in order to avoid this situation, people usually look for the real photos of the received items uploaded by previous consumers in the comment area. Or write in the order remarks that the seller shall bear all responsibilities and expenses if the product description is not met. You can also view the credit score of the seller's product description directly. These can effectively avoid overstating information.
0 notes
Text
Blog 4- Final assignment proposal
Our group also put our audio link at the bottom of each page, if the button doesn't work, please click the link to listen!
0 notes
Text
Blog3
Website link: https://www.bibme.org/
This is a tool website that can query the duplication rate of papers. I have used it before. When I opened this website again after opening the disconnect tool, I was shocked, because according to the intercepting data of disconnect, a total of 99+programs or advertisements were intercepted. There are 92+advertisements, just one website, among which there are 92+advertisements. From this data, we can see that in the tool website I chose, a large number of advertisements provided rich funds for the website. It may also be because of these large advertising funds that this website can be used for free all the time. Because the workload and usage of the duplication checking tool website is huge, and the procedures of the website itself are relatively complex, it naturally requires a lot of human and information resources and consumes huge financial resources.
Before using the interceptor, I remember to open the page of the tool website, and the full-screen ads of various colors greatly affect the experience of using. After opening disconnect, the whole page becomes clean, without unnecessary advertisements affecting the use, and the work speed is fast and efficient. But accordingly, the length of stay on the website becomes very short.
0 notes
Text
Module 1
Illustrated by pictures, because tweets with pictures get higher participation, and politeness is the key (Online Netiquette, module1). Meaningful and text-fitting images can quickly help users and viewers grasp important information. And because most people want to relax when using social media, and their brains don't think too much, the combination of pictures and text can effectively convey information. I have been paying close attention to Wang Jiaer's concert in Toronto recently, so paying attention to his social media account to get news is a very effective and quick way. Among them, using concert posters to convey information is my favorite form (Figure 1). The inclusion of important information in the picture and the use of harmonious and polite sentences in the text are consistent with the principles of social media best practices discussed in Module 1.
In addition, as mentioned in module 1, we don't have to deal with anyone who actively sends spam or attacks. We can report those people (Creating a Social Media Plan, module 1). This view is very practical for me. In fact, I often receive spam from different brands, but the content of the email itself has no valuable information. In the face of this situation, I usually use the report spam in the email settings to block it, and the effect is very good. Therefore, I always have a lot of advertising messages in my trash can (Figure 2).
Moreover, polite speech not only exists in the text, but also in the comments and replies to others. Politely treat others' opinions and suggestions, respect others' opinions, and accept everyone's comments are included in politeness. Don't make verbal attacks because of different opinions. Attention to the above information is also one of the principled behaviors in line with the social media best practices discussed.

figure 1
figure 2
1 note
·
View note