Exercise 2.1 Virtual environments and your cognition
Ethics on Facebook
Examining the privacy policy of the site gives clear information how they would use our personal information and how to utilise the privacy settings provided by the site to secure our information. The age of a member is used to filter content appropriate for a member and also the site provides clear notice it does not knowingly allow anyone under the age of 13 years to register. This has been implemented by prompting the user to enter the date of birth at registration time, though the site cannot actually verify users input.Further it acknowledges tracking site users by IP address and also how certain data mining practices are used. Providing content that may be most suitable for the member is stated in favour of this practice. The site assures they do not identify any individual in providing these services. However there will always be instances where individuals would feel their privacy being lost, compromised or invaded due to the modern technology and ethics being questioned.
Read the latest case to appear against facebook.
I think it is difficult to say you are happy with the ethics of any technology, because technology evolves and new possibilities emerge and information you provide today can be and will be used and shared in new ways tomorrow. Take a look at current face book
privacy policy for complete information.
Social cognition & visual cognition
Cognition is the scientific term for the process of thought. Social congnition is an approach to understand social phsycology. This approach tries to analyse the underlying cognitive processes to understand social phsycology. Main process areas of analysis are perception, judgement and memory of social stimuli, information processing and behavioral and interpsonal consequences of cognitive processes. See definition ofsocial cognition at International Social Cognition Network.Visual cognition is the process of interpreting and understanding visual information.
Exercise 2.2 Virtual worlds and "citizenship"
What is Virtual
Three definitions are proposed by H. Tavani in his book, Ethics and technology asa) As opposed to or contrasted with "real" - virtual object
b) As opposed to or contrasted with "actual" - virtually finished the task
b) Express as a feeling - When conversing electronically or on a telephone with someone who's physically many miles away but feeling virtually there.
Join second life
Download of the client was quite quick, created a profile and chose a community called Bigpond to arrive at Second life. The look and feel, graphics, controls provided and the simultaneous tasks happening were quite good. There were times when you press the arrow keys to move the avatar and there is a few second lapse but compared to some of the web sites with much less interaction than second life I think response was really good.Interface and bandwith
Interface is quite easy to follow, cannot complain about the bandwith requirements. Help provided was easy to read and find the information. Functions are provided in a variety of formats such as menu, short cut & context sensitive.Exercise 2.3 Create and record your online persona
Avatars on the virtual world can be represented by a picture, graphic or a 3D character. Second life offers variety of customization as hair color, body shape, height and even eyes and tatoos.I would definitely use a persistent avatar across all sites.
Exercise 2.4 Online Identity and your state of presence
With every web site requiring a user id and password to register with them users are faced with a burden of keeping track of their user id/password information. Some websites have adopted the email id as a means of creating user ids.With the current situation the idea of a one id across the online environment seems to be a required solution to the problem. However in the real world the person and id is both present when required for verification, but in the online world this would
not be able to be achieved.
- Phishing
- Use email, web sites, games or instant messaging to trick people into disclosing sensitive information by pretending the communication was from a legitimate user or organization.
- Pharming
- Hijacking a web site URL and redirecting the user to a non legitimate web site trying to collect unauthorized information
- Privacy invasion
- Access or collecting information about someone without their consent
- Identity theft
- Pretending to be someone else by using the user id and password or name and address or other verification related information about a person without their knowledge and to gain access or execute an unauthorized task
No comments:
Post a Comment