Tuesday, August 18, 2009

Topic 2 - Virtual environments & cognition

Exercise 2.1 Virtual environments and your cognition

Ethics on Facebook

Examining the privacy policy of the site gives clear information how they would use our personal information and how to utilise the privacy settings provided by the site to secure our information. The age of a member is used to filter content appropriate for a member and also the site provides clear notice it does not knowingly allow anyone under the age of 13 years to register. This has been implemented by prompting the user to enter the date of birth at registration time, though the site cannot actually verify users input.

Further it acknowledges tracking site users by IP address and also how certain data mining practices are used. Providing content that may be most suitable for the member is stated in favour of this practice. The site assures they do not identify any individual in providing these services. However there will always be instances where individuals would feel their privacy being lost, compromised or invaded due to the modern technology and ethics being questioned.
Read the latest case to appear against facebook.

I think it is difficult to say you are happy with the ethics of any technology, because technology evolves and new possibilities emerge and information you provide today can be and will be used and shared in new ways tomorrow. Take a look at current face book
privacy policy for complete information.

Social cognition & visual cognition

Cognition is the scientific term for the process of thought. Social congnition is an approach to understand social phsycology. This approach tries to analyse the underlying cognitive processes to understand social phsycology. Main process areas of analysis are perception, judgement and memory of social stimuli, information processing and behavioral and interpsonal consequences of cognitive processes. See definition of
social cognition
at International Social Cognition Network.Visual cognition is the process of interpreting and understanding visual information.

Exercise 2.2 Virtual worlds and "citizenship"


What is Virtual

Three definitions are proposed by H. Tavani in his book, Ethics and technology as
a) As opposed to or contrasted with "real" - virtual object
b) As opposed to or contrasted with "actual" - virtually finished the task
b) Express as a feeling - When conversing electronically or on a telephone with someone who's physically many miles away but feeling virtually there.

Join second life

Download of the client was quite quick, created a profile and chose a community called Bigpond to arrive at Second life. The look and feel, graphics, controls provided and the simultaneous tasks happening were quite good. There were times when you press the arrow keys to move the avatar and there is a few second lapse but compared to some of the web sites with much less interaction than second life I think response was really good.

I spent nearly about two hours exploring the environment of Bigpond.


Point mouse on the avatar and right mouse click to access avatar properties, you can change hair color, body shape, height, eyes and even add tatoos!


Online help guide was quite good - I received an invitation to join a group and accepted it, but then didn't know how to "get out of the group". Consulted the help and there is a function called "leave."


Next I tried the Serach for places function, use the pull down box to see available categories. You can selecte a place from the list, click on teleport to arrive at the selected place.


Apart from the attractive nature of the characters and the surroundings I had a sense of “cannot trust any character” throughout the time I spent there. Who is really behind the character or avatar appearing there?
I entered a real estate agency which I cannot remember the name. I was greeted by possibly the receptionist there. She showed me properties available for rent for 8000 L(Linden dollars) with two weeks upfront payment required. During this encounter I learnt something new. She said I see you arrived here yesterday? I figured out that we can right click on the other character, and see their profile data or may be the shared content at least.



I left the real estate office, but wonder who would have been really behind the character? But then again the whole experience of a virtual environment is whether to be your real self or to explore your imagination and new possibilities?

Interface and bandwith

Interface is quite easy to follow, cannot complain about the bandwith requirements. Help provided was easy to read and find the information. Functions are provided in a variety of formats such as menu, short cut & context sensitive.

Exercise 2.3 Create and record your online persona

Avatars on the virtual world can be represented by a picture, graphic or a 3D character. Second life offers variety of customization as hair color, body shape, height and even eyes and tatoos.
I would definitely use a persistent avatar across all sites.

Exercise 2.4 Online Identity and your state of presence

With every web site requiring a user id and password to register with them users are faced with a burden of keeping track of their user id/password information. Some websites have adopted the email id as a means of creating user ids.

With the current situation the idea of a one id across the online environment seems to be a required solution to the problem. However in the real world the person and id is both present when required for verification, but in the online world this would
not be able to be achieved.
Phishing
Use email, web sites, games or instant messaging to trick people into disclosing sensitive information by pretending the communication was from a legitimate user or organization.
Pharming
Hijacking a web site URL and redirecting the user to a non legitimate web site trying to collect unauthorized information
Privacy invasion
Access or collecting information about someone without their consent
Identity theft
Pretending to be someone else by using the user id and password or name and address or other verification related information about a person without their knowledge and to gain access or execute an unauthorized task

Monday, August 10, 2009

Topic 1 - Social networking, workgroups and workflow


Exercise 1 - Social networks

Since the introduction of computers many things humans did in the “real world” have been introduced into the computer processing form as "online world". For example people used to go to the bank to do banking but now they conduct banking online
– by logging in into the bank website. Similarly interaction among people in the real world has been transformed in to computer use in the form of social network sites or social networking sites.

The main characteristics identified are the ability to maintain a profile about who you are, include a picture, set up the people whom you want to be connected with , allow others to post comments on your site enabling an interactive experience & categorise information that you post in your site.

New emerging technologies such as ability to interact with mobile devices, posting information in a variety of formats, chat functionality to communicate with your network of contacts are also being introduced in to new sites.

A social network has been defined as a web based service that allows individuals to create a profile, maintain a list of users with whom they share a connection, view and traverse the list of connections and those made by others according to article
social network sites: definition, history and scholarship by Boyd M. and Ellison B. Further according to this article the unique feature of a social network isn’t to allow individuals to meet strangers, but to enable users to articulate and make their social network visible.

Online communities

Online communities are about a group of people who share a common interest and want to exchange information & resources on their desired topic.

In his book Viirtual Community Howard Rhiengold mentions while he wanders through information space if he finds information that does not interest him but he knows of a friend from the world wide affinity group of online friends that will find the information useful, he would send them a pointer or simply forward the entire text. And others have been doing the same help for him. This would be an important aspect for online communities to exist and sustain and Rhiengold identifies this as an informal unwritten social contract.

Exercise 2 - Would you change your profession

I think a study into social networks and online communities would not change my professional practice. But definitely this study already has influenced a better perception about social networks and ways these could be used to achieve positive results.

Reference URL
http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html

http://rheingold.com/vc/book/2.html

What is a folksonomy?

Due to the increase in social network sites and their applications a new form of categorising or bookmaking and annotation of photographs became popular. This facility is also known as social classification, social indexing and social tagging.
This was required because the site users were the content creators as well as opposed to earlier systems where site creators were the creators of content.

The result of this new tagging process is Folksonomy.
according to an article on internal corporate blogs

Another interesting thought on Folksonomy is found at Folksonomy as Symbol which shows how embracing Folksonomy changes the way essentialism, Western tradition began with. As an example using a hammer as a doorstop is an oddball use of a hammer according to essentialism. However this inhibits thought, reflects cultural hegemony, it is unenforcable and alienates meaning. Folksonomy returns meaning to us.

Refernce URL
http://ebiquity.umbc.edu/_file_directory_/papers/341.pdf
http://cyber.law.harvard.edu/node/3281javascript:void(0)


Exercise 3 - Heuristic evaluation results


Subject: Commonwealth bank: Nielsen's Heuristic Evaluation
Sender: sanjeewa_f@hotmail.com
From: sanjeewa_f@hotmail.com (NHE)

system=Commonwealth bank
date=2009-08-11 07:47:47
comment=
q1=7
q2=7
q3=7
q4=7
c4=Very consistent look and feel
q5=7
q6=7
q7=5
q8=7
c8=Identifies requied fields, error messages clearly indicate
the field they refer to
q9=7
c9=Provide available or applicable values for most selection
q10=5
c10=Good detail of help documentation available. But this is
displayed in a different browser window and can be obstructed
by the current browser giving user the impression nothing
happened.


This test was done using
Nielsen's Heuristic evaluation form

OLR - Online learning record

This blog is my Online Learning Record for subject ITC213 - Computer Supported Collaborative Work.

I plan to organize the blog into below structure initially.
  • Introduction
  • OLR Exercises
  • POD work
  • Evaluation Report
  • Commentary
  • Scrapbook
  • Practice Exam
As the subject progress adoptions will be made as required.

Introduction

I am studying online systems major for my BinfoTech course. Looking forward to completing all my core subjects this year and for the course completion next year. It's been a hard working few years, but time spent wisely, I think.

I work as an Analyst Programmer for an automotive company in Sydney. My work involves development & user support for the company business applications running on AS/400 computer systems.

Spending time with my 10 year old daughter and my wife is the escape plan to work and study. Although occasionally it works in the opposite direction too.