Video
youtube
VIDEO READY TO MARK
[https://www.youtube.com/watch?v=6URQLcn4eEQ]
1501HUM (New Communication Technologies) Assessment 2min video
JEOWC1302 Woncheol Jeong
Used Program list
1)Naver Capture 2)FL Studio 3)Window8 Movie Maker
0 notes
Text
New Communication Technologies Assessment 2 Online Essay

New Communication Technologies Online Essay - JEOWC1302
After the Internet was created, information and communication technology(ICT) was developed at a rapid pace, while network technology was growing, and the world had becoming increasingly comfortable. However people stated to worry about unlimited benefit of technology so to prevent indiscreet waste of comfort, society has begun to limit the ICT to people. People who can be used for ICT were the users. The users have proven themselves to privacy. ICT had become the centre of the world after that, personal information value is begun to rise increasingly. At this time, a few people was appeared, who want to see the benefit in using the personal information. They used others personal information for a variety of purposes without the consent of the people directly involved. This phenomenon is changed into one of the big social problem and it is controversial until this day. In this essay, discuss about the spills and abuse of such indiscreet personal information.
In the information society based on the network, many people have provided their personal information for the purpose of economic convenience by some organizations and individuals. However, they used the personal information of customers for their own interests, without hesitation. For this reason, customers are financially sustained serious damage. In addition to this, their information was being disclosed to others without any other restricted, or even a situation where personal information to deal took place. In this situation, but the customers complained to the Information Manager, did not receive the proper compensation. Basic problem is Commercial interests seek to maximize and then leverage the value of consumer information, while, at the same time, consumers voice concerns that their rights and ability to control their personal information in the marketplace are being violated. However, despite the complaints, it appears that consumers freely provide personal data (Norberg, P. A et al, 2007). So looks like people who they don’t want nothing just give their information to Organization or individuals themselves.The most important point is, institution or organization without permission to collect information, steal, and to sell, individuals use to impersonate others or crime.
What is the cause of the problem began to occur to personal information. The cause was a human. Phelps et al. (2000, p.27) concurred, suggesting that "most consumers are willing to give up some of their privacy in order to participate in a consumer society" (Dubelaar, C. et al, 2003). In other words, it is a human being handed your personal information for the convenience of their own. And the other cause is the activation of the electronic market. Online activation, the Internet is anonymity is guaranteed not know each other. Because of this culture, personal information will have been in the role of your signature and ID card.
Most of the leakage of personal information is in most cases a specific agency or organization to collect. Because they have a strong power compared to the general population, there is no way prevented from escaping personal information. One of biggest example is financial institution, they used many ways try to collect person information for their benefit. Some financial institutions use Internet Web sites designed to collect information from consumers via online forms, surveys or e-mail links (Anonymous, 1998). Also nations Information Agency collected personal information for terror or crime. So they checked each time 10 people’s information per 30 seconds through social network and official document. In addition, some normal companies are same, they in order to make their future customer target group. Additionally some individual persons who collect and trade personal information, people call them ‘information broker’. These people are collected personal information through their hacking program. They trade personal information with higher prices through some secret server.
These problems Is really important because all the illegal activity occurred, based on the information in information society. Information society is still in progress. But more than that the information society does not end, and will continue to happen these things frequently. In order to prevent such illegal acts is the most important individual effort. In particular, the computer and the Internet are the most important, because it is fundamental the presence of the information society. Permitting your computer network to access the Internet opens the door for an attack from a huge number of people on the Internet, (Attaran, M., & VanLaar, I. 1999). This representation is described accurately the risk of a network in information disclosure. In the future, in order to prevent information leakage from such a dangerous situation, network users must have an important exchange of these five habits.
First, don’t save your ID and password on other computer.
Second, you must shot down all programs, before computer power off.
Third, check site information care system.
Fourth, delete your important information on your computer.
Fifth, before open new e-mail, you must check that is spam or virus.
These five habits are basic action to protect personal information.
Protect your personal information
As mentioned above, the information society is still in progress. Finally, the importance of personal information will continue to be emphasized. In addition, personal information and policies related to security, jobs, measure etc. These things will come out steadily. Future "personal information network managers" will likely evolve from other industries rich in personal-information resources and management expertise and already regarded as trustworthy, such as banks and credit unions (Mulconrey, Brian. 2005). As a result, in the future information is the most important thing in the world, when used incorrectly, the damage will also be very large from now.
Development of Information and communication technology has given us a lot of benefits. However, also it has given other problem, That is personal information. The value of the personal information you have endless implications All rights reserved. A small number of organizations and groups that know these facts began to use it for illegal. However, the means to replace the personal information did not come today. In the meantime, the people rose to see the damage caused by illegal activity. In the information society, it is the most important information turned into the most dangerous. As a result, if this issue is not resolved, the information society will no longer be growing.
Reference
1) Online privacy of consumer personal information. (1998). The Disclosure, 15(11), 6-8.
2) Dubelaar, C., Jevons, C., & Parker, L. (2003). Personal information privacy and shopping behavior on the internet. Journal of Asia Pacific Marketing, 2(1), 65-74.
3) Mulconrey, B. (2005). YOUR PERSONAL INFORMATION: MANAGING YOUR MOST VALUABLE ASSET. The Futurist, 39(5), 24-27.
4) Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs, 41(1), 100-126
5) Attaran, M., & VanLaar, I. (1999). Privacy and security on the internet: How to secure your personal information and company data. Information Management & Computer Security, 7(5), 241-246.
0 notes
Text
1501HUM Assessment 2 Online Essay Base
[소개,인트로]
[본문1]
[본문-1,예시1]
[본문-2]
[본문-2,예시2]
[결론]
[레퍼런스-저널,기사 최소 5개]
중간중간에 하이퍼링크랑 사진, 인용
Diigo https://www.diigo.com/ or Bubbl https://bubbl.us/ 좋은 참고
0 notes
Text
New Communication Technologies - Task10
https://www.youtube.com/watch?v=12tjLFUqJII
https://www.youtube.com/watch?v=gCgZXU3R0XE
https://www.youtube.com/watch?v=ZzD9_GrcEEw
- Relative URL -
January 18, 1952 South Korea is <close presidential declaration of sovereignty of the ocean> to declare. January 24 the Japanese government has claimed sovereignty over the islets adjacent islands of Ulleungdo. One reason, one Dokdo issue takes place between the two countries.
Dokdo is Korea certainty historical territory. However, the Japanese government will not give up its sovereignty nor some right-wing forces are armed takeover of Dokdo Matches, failure September 59 seconds troop organization, while praying to the Dokdo amphibious vessels, followed September 28th Tokyo Hibiya (日 比 谷) 24 groups of right-wing organization in the Sturmabteilung islets, had been simulated three ships to ship Dokdo deodorant and 150 persons.
0 notes
Text
New Communication Technologies - Task9
Excellent communication skills in social media has led to the spread and development of social / political movements. Unlike the past, we can see all the circumstances of the protests and movements instantly.
Examples: [October 26, 2002, in San Francisco at that time had opposed the peace march against the Bush administration was ready to raise the heat to the invasion of Iraq. Although many people claim the reverse and peace through the mainstream media such as The New York Times was not at all like the voice said. This one of those disappointed by the attitude of the mainstream media is <Bright pass video (BrightPathVideo)> of Telecommunications - was the media's movements Webmasters parul John Reese (John Parulis). January 2003 18 days before the planned further the peace march, parul lease could not believe the mainstream media did it think the live video broadcast live over the Internet, the best way to inform a peace march to many people.
And the most affordable and convenient way for real-time relay chose a PC cam and wireless internet technology. For real-time broadcast of the march of the lease and the first parul <Bright Path Video> The crew made a wireless Internet broadcast system as a laptop computer, Pocket PC Cam camera and wireless LAN card is installed. And the location of the wireless internet hotspot around the world, including the United States tells selected hotspots near the root zone of the planned seven regional peace march in San Francisco following the maketga through the site of 802.11hotspots.com each hotspot zones and each PC Cam Events by installing a simple laptop computer with wireless internet relay system made the day <Bright path video> Site (http://www.brightpathvideo.com) and a peaceful march through San Francisco IMC (http://sf.indymedia.org) was broadcast live. The people live a peaceful march internet parul lease of the day was, or about 603,000 people.]
The campaign itself was a success, because so many parties in the United States had the interest to this. Now, using such a social media movement will be less likely to fail. Besides using the social media, is to deliver a wider range of information to people and effect will have a positive impact on the future movement
- video link :
https://www.youtube.com/watch?v=O8M7ifYEm4c
https://www.youtube.com/watch?v=GBqISY0T5SY
-Additional video description: On January 18, 2003 Americans across the nation joined in a worldwide demonstration against a possible war in Iraq. One of the largest anti-war rallies was held in downtown San Francisco where an estimated 200,000 marched up Market Street to the Civic Center Park. The "SF Peace March 03" is a glimpse of that day.
Reference:
Ball, A. (2011, Oct 20). Social media helps social movement grow. Austin American Statesman Retrieved from http://search.proquest.com.libraryproxy.griffith.edu.au/docview/900189604?accountid=14543
0 notes
Text
New Communication Technologies - Task8
https://www.surveymonkey.com/s/QNFLGY5
- Other student survey link -
This survey is entered three essential questions. The main theme is the political, social networks and have a relationship.
The first question is asking about who the politicians used the social network. This can be understood about the political use of social networks.
Second is the question about WikiLeaks. Information as a weapon inside a professional Internet media accused the wiki risk. This question is not directly related to social networks, the Internet media can understand is similar to social networks.
The last question is a question for the person with the most influential among social network users. Here, show me that only someone of celebrity class can use social networks to personal influence.
0 notes
Text
New Communication Technologies - Task7[2]
Response to the survey.
I was very surprised about the survey results. Because the results came out which is the opposite of my expectations.
I think the strongest social networks Twitter picked. Because when celebrities use Twitter, because its effects are enormous. However, the results of the survey is Facebook. Opinions of the respondents was "the correlation of millions of people can gather to create a single great power."
Second, with respect to the field of use of the social network. I picked the most used areas in politics. Bill Clinton's election time, the use of communication technologies, the use of social networks of Barack Obama. These are an example of social network used in politics. But the result was different. Because respondents picked a field of social fields of the use of social networks to be the best. This is because the variety was, first event of incidents or accidents, social network users to become a journalists.
Finally, with respect to the negative effects of social networks, I opted for cyberbullying. For example, a cyber-bullying took place against a promiscuous student in the United States. After those days, the parties have committed suicide. But the result was different. Respondents were picked of a problem that the personal information is going to those who know no sanctions. The investigation result came up to me in a very shocking, had the little bit different sight.
0 notes
Text
New Communication Technologies- Task7[1]
https://ko.surveymonkey.com/s/33H8ZHL
Three questions survey using Survey Monkey
0 notes
Text
New Communication Technologies - Task6
Some of the cyber-punk, no problem began after each movement of antisocial antisocial degenerate into existence. However, over time, began to degenerate into a non-antisocial movements crime. The problem is that classes are just a hacker. why? at first cyber punk meaning isn't hacker. However Now being used as a term which means stirring the Internet, people walking around. In the real world, pointing to an outsider, yet people working in the technical world, they sometimes exhibit the ability to justify their existence and maintenance. Most of them is hacker now.
Their crime was not threatening at first. However, this increases the radius of action of these forces began to widen. Some of them made a secret group, they gradually turned professional. They are bigger forces, gradually attacked organizations, businesses and more. The hacking of Sony is a typical example.
After that they attack the FBI or paralysis Facebook was hacked and credit information. A police official, said: "These criminal acts of cyberpunk is a challenge." The biggest problem is that they called these crimes Performing Arts. Point of a past event, they says past stage.''
Their main inde age 10-20, which turned out to be not moving as desired. Interestingly, now followed literally, teenagers in their bedrooms are more than those who proved comparable to government securities professionals. And the best, Be wants to use their skills rather than profit for evil, and, it seems,
- Reference -
War on cyber punks, Alex Dickinson, Source:ANZ Newsstand, Publication Title:The Courier - Mail, Publisher:News Digital Media, Start Page:64, Date:02/07/2011, ISSN:1322-5235, EISSN:1322-5235
Dickinson, A. (2011, Jul 02). War on cyber punks. The Courier - Mail Retrieved from http://search.proquest.com.libraryproxy.griffith.edu.au/docview/874373161?accountid=14543
0 notes
Text
New Communication Technologies - Task5[2]
T i m e T o a s t T i m e L i n e
[If you couldn't find where is time toast, you click this post title]
0 notes
Text
New Communication Technologies - Task5[1]


:Example of Cyber Punk Movie
Douglas Kellner(1943 ~) is a 'cyber' and 'punk' in combination "The combination of high-tech culture, subculture and the bottom of the street" or "bohemian subculture associated with a change of mind and senses and cutting-edge technology and lifestyle said, pointing to Technorati consciousness and culture "fusion.
Over time, the concept of cyberpunk has been expanded, cyberpunk magazine "Mondo 2000 (Mondo 2000)" is a cyberpunk technology revolution or the end of the 20th century it led people, missing hackers to anarchism, access to the computer network of government agencies, people who try to hack, as part of the counterculture movement was defined as a person who has with technical insight and a rebellious lifestyle.
As the anti-social side of cyberpunk emerged, cyberpunk crime actually increased their anti-social character. "No matter how many people you lie to, no matter how much pre-made tools you use, you will never represent the real underground hacking scene," Team Poison warned.
My personal opinion of Cyber Punk's Five Key Moments
[1980] Cyber Punk's Origin
Cyberpunk is cybernetics "and" punk "was first used in a 1980 short story by Bruce Bethke combination of the words" Cyberpunk "
[1982] Blade Runner
Blade Runner [1982] is called the father of cyberpunk movies. The film is reminiscent of the dystopia cyberpunk film of gloomy future, it sends a message of human dignity. Due to the film world is one of the factors widely announce the cyberpunk showed a lot of interest in the cyberpunk.
[1984] One of SF genre Cyber Punk
After that, 1984,cyber punk was born in one style over the SF novel "Neuromancer" in William Gibson. There's a magazine that relates to literary movements, including the science fiction editor Gardner dojo device. that times later people exactly understand what is cyber punk.
[1987~] The conclusion of the exercise
As for 1987 showed movement entered the ballast, the mirror shale Izu Group Who works as the impact of works published after another began to emerge. Cyber punk, the word is accepted as an idiom of the SF genre phenomenon It was nature, the inevitable result, a high-tech gadgetry and fashion as a dissident Never cyberpunk novel subtypes are shown in front of the '90s did not receive a response from readers is actually giving paradoxically prove the theoretical consistency of the circular was "radical hard SF' of the movement.
[1990~] Post Cyber Punk
The early 1990s, began to take on the aspects of dissolution and separation cyberpunk, and its influence can be defined as the time to full-infiltrated popular culture. Cyberspace word was the equivalent concept of computer networks, coupled with the spread of the Internet, according to the 'new' interest in the mass media about the phenomenon increases 'cyberpunk SF' compound word that has arisen is ironic. For the internal phase of the cyberpunk genre is the work of this period also began to change.
- Reference -
[cyperpunk] (Sunshine essay dictionary, 12.17.2007, figures and Thought)
War on cyber punks, Alex Dickinson, Source:ANZ Newsstand, Publication Title:The Courier – Mail, Publisher:News Digital Media, Start Page:64, Date:02/07/2011, ISSN:1322-5235, EISSN:1322-5235
0 notes
Text
New Communication Technologies - Task4
Article link
The reason that this article is meant is that the controversy over copyright infringement. In this article, it had infringed the copyright of the publisher. If so, it means that you can continue to occur frequently these days. Is that in the future all academic databases can not not put in mind whether the infringement of copyright is not infringed that difference actually. Will result in more severe cases can not create a database. Like this article. The most important thing is to not to an infringement of copyright is virtually impossible. It can not be avoid conflicts and publishers.
Reference
Swartz, N. (2005). Google delays library database. Information Management Journal, 39(6), 19. Retrieved from http://search.proquest.com.libraryproxy.griffith.edu.au/docview/227722294?accountid=14543
0 notes
Text
New Communication Technologies - Task3
While your computer is now helping to many of the men, early computers had no more than a calculator. Through a lot of trial and error, to digest a number of purposes, the computer will continue been developed. Moore's law since 1960 as a base, the invention of the transistor has been a revolution in the computer. With the development of technology was the transistor be connected to an integrated circuit, which has resulted in the innovation.
Something as important as the history of these computers, the history of digital. An example is the “infinite plasticity of the digital” (to use William Gibson’s frequently quoted 1999 phrase14) that are experts see a future in digital.
As age advances, many programmers began to emerge. In the early days, but did not have much opportunity to learn the program, was hostile to the external recognition. But people did not give up. They had made the acceptance and equality in value, in the end it will also increase the participation of women.
In the history of computers that can be described as "short" or "long", a good purpose computers for human convenience and programmers began to change. Began to be used as a bad purpose, the aftermath was unimaginable. Futurist to predict these changes are beginning to study the computer. Their research interests include new methodology, information processing, taps, social networks, and more.
- Reference -
Grounding Digital History in the History of Computing, Turkel, William J; Muhammedi, Shezan; Start, Mary Beth, Publication Title:IEEE Annals of the History of Computing, Publisher:IEEE, Volume:36, Issue:2, Pages:72 - 75, Date:2014, ISSN:1058-6180, EISSN:1934-1547, DOI:10.1109/MAHC.2014.21
0 notes
Video
youtube
New Communication Technologies - Task 2
- Relative other video link -
1. Wibbitz: Text-to-Video Software Delivers Automated Video Solution for Publishers
2.Easy Text to Video with Wibbitz
- My opinion -
I agree with this new technology idea. This technique will give you a great help in exclusively human communication. People don’t like being boring and complicated. This is especially true communication. If communication is tedious and difficult, it will be cut off communication between each other. This technology is directed towards changing the text in the video, but most changes the story on video. However, this technology will be used in the future in fiction or fairy tales, essays and various text. If so, people will have no difficulty in learning to share information. That would lead to promotion of communication.
0 notes
Text
New Communication Technologies - Task 1
Modern society is built over the tomb of a number of communication technologies. Even did it former, and will continue to do that. At first, nothing exist to call communication technologies. However since the discovery of electricity humanity was to develop the communication skills at a tremendous rate. In the development of communication technology, humanity felt the infinite possibilities of the development, which was gradually expanded the area of communications technology in all areas.
There are lots of communication technology, Internet communication is felt to be the most important thing in them. People called us the Internet generation. The reason for this is that we've developed with the development of the Internet. We have been easier to meet with abroad users, I felt the world is more closer than before. In addition, at the time, did not rule about on the Internet. All users have free activities. Szabó, Róbert; Vidács, Attila(2012) said “In the early days of the Internet, all communication was built upon trust among users”(p.52).
However, Internet communications technology is not the most nostalgic. The good old technology is radio. Before the advent of tv, radio was only thing that makes communication with the world. Additionally, I have some special memory associated with radio. In midnight, sweet song which was introduced though music program with DJ’s beautiful voice.
High-speed Internet skills test that can download movie 44 uncompressed HD quality to finish second in London was successful. If the technology is commercialized, I would really be happy. This technique means that the coming period is faster than before. But I am worried about people not to follow these communication technologies.
- reference -
R. Szabó and A. Vidács (Eds.): EUNICE 2012, LNCS 7479, pp. 52–63, 2012.
c IFIP International Federation for Information Processing 2012
0 notes