Monday, February 2, 2009

Conceptual Research & Reflection Project


Concept 7: Netiquette



Quote: “Good communication practice on the Internet is not something one ‘learns’, but something one ‘practices’ so as to teach others, less familiar than yourself, how it is done.” [Allen, n,d]



Netiquette is social networks of etiquette in which provides the do’s and don’ts of online communication. [S T Ross, n,d] The primary reason for its existence is to provide guidance on good manners for internet users who utilize the world of WWW. But who provides this ethics of practice? There are plenty of websites that list and contain do’s and don’ts for netiquette, stemming from Edutopia, Netiquette Guidelines & countless other websites of similar information. But who are these people? They are people just like you and me who are promoting good behaviour and exercising the ethic of maintenance. However they do not take responsibility for doing it ‘right’, they are merely teaching others less familiar then themselves, how it is done.

Our goal in contributing to networking sites, email & various other communication media is always to interact with other people and its social communities. Ignoring the particulars of social behaviour/netiquette is the easiest way to lose out on the benefits of social networking. [P Sturges, 2002]There are many problems that occur online, that destroy online communities and it is vital that we teach others the practices of netiquette to ensure these problems don’t weaken sociability online.

There is no one ‘ruler’ in cyberspace controlling the manners/behaviour of internet users to make certain they are ethically doing the right thing and given this potentially dangerous problem, internet users must ensure that they practice netiquette online and teach others of this social responsibility. [S T Ross, n,d]

Previously this concept has been very grey, because of the disintegration of online communities & as such is created from societal evils. [L Weir, 2009] There is a perception that there are evidently no consequences in an online environment because there is no one to get in to trouble with & it is virtual by all means. My evaluation of online bad behaviour is due to no face to face authorities, mystery of the internet, a vast difference in communication styles & ages from around the globe & day to day society networks. There will always be people that don’t follow the norm and show no remorse.

It is very critical in today’s online society to ensure that interacting over communicating systems through the internet is done safely and effectively. To ensure that good communication practice is used on the internet, it needs to be taught from an early age so that internet users take this approach to online communication in the future & so they can teach others. [L Weir, 2009] Educators must take responsibility and become aware that students from an early age need to be educated on internet behaviour. By doing so, this will enable good network netiquette, the implementation of ethical social responsibility that one practices on a day to day basis and to show others how it is done.

As teaching netiquette to the youth from a young age is critical to the future of online communication, it is also important for internet users of today no matter what age, to teach others the rights of netiquette, respect others, share information & communicate ethics of maintenance to head in this same direction. [S Hambridge, 1995].




Site 1: Behave Yourself – Online Manners Matter
URL Link:
http://www.edutopia.org/Whats-next-2008-netiquette-guidelines



This article written by Laila Weir outlines the importance of educating children from a young age about netiquette & online manners. Laila stresses how critical it is to teach students about Internet communication and that it is just as important as teaching manners in society networks. The internet is now a very big part of society and do’s and don’ts should be strictly taught to ensure students educate & teach others how it is done. The article also outlines the reasoning behind her assumptions & opinions and provides ways of forward thinking in our education system.



Site 2: Etiquette Online: From nice to necessary
URL Link:
http://www.ifsm.umbc.edu/~preece/Papers/Etiquette_online.pdf



Preece’s article evaluates the current evolution of netiquette in a variety of asynchronous communication systems. She speaks about how the perceived ‘manners’ and ethical boundaries of internet publication is often blurred. She stresses that netiquette is a necessity in to days world wide web due to social problems & the perception that there is no consequences in an online forum. Preece has provided a range of solutions given to sole this ongoing bad behaviour with reference to current solutions in place. This site is credible as Preece is a significant writer & professer of informationm systems & has been cited in many publications.


Concept 17: The Impact of text-based real-time chat



Quote: “Real-time internet-based text chat is a significant part of contemporary internet use. The question than to be asked is: what is the difference here that makes this mode of communication popular; and then what impact does it have of the kinds of communication and social interaction that take place?” [Allen, n,d]



Instant messaging (IM) is a type of real-time communication that allows interaction between people based on typed text. Chat happens in real-time right before your eyes as a faster conversation than technologies such as email & can be moderately fast paced. [J Marquez, 2005]

Text-based real-time chat allows people to more easily form and sustain friendships and romance attachments & engage in debatable social & political discussions directly from their home. (Tyler p 196, 2002). However IM provides the user with the ability to hide behind the computer screen, show none of the physical signals that they would normally see face to face & created a desired impression of ones self. You loose cues such as interpretation of tone, facial expressions, body language & giving the end-user the time to pick & choose his or her words. [J Marquez, 2005]

This creates a lot of control for the user enabling a person to hide behind a false character they wish to pursue. For the receiver it is also hard to discern the motives in a conversation. [R Farm, 2003] IM grants people time to respond & can be used to consider certain words to be said when talking about touchy topics however IM also allows a person to think their responses through to ensure that arguments become less heated & easily resolved. IM can also help with shyness & socialising issues unlike email or telephone by helping a user to sit behind a desk and feel normal, free to be one self & to be accepted by his or her peers because through text you cannot see what a person looks like & thus breaks down the barrier of stereotypes.

As entities are becoming more information based the need for effective information sharing, team working & ethical environments has become vital in the workplace.
IM also raises a great debate in the workforce as it is a very useful tool for work colleagues because it fits in perfectly with busy schedules & enables the ability to multi-task. [R Farm, 2003] The benefits it presents are that it allows you to communicate for free with other workers & customers where distance is a problem. It also provides efficient productivity with getting answers immediately, quick communication & clarification, co-coordinating & scheduling tasks & the ability to get the job done faster. IM can also be used for presentations via Web-cams & online meetings, thus savings time & money. Another advantage to this growing tool in business is the convenience of working from home. Using IM as a tool for business purposes also has its downfall when it comes to lost productivity [D Shinder, 2004] by spending more time than necessary ‘chatting’ and abusing the tool for personal use & more involved conversations. This tool can also be a distraction to employees by wasting a lot of time talking to family & friends & also be open to viruses & security risks. Chat conversations can be lost unlike email however it is now possible to save a conversation for later reference. [Businessknowledgesource.com, n,d]




Site 1: The Effect of Instant Messaging on the Social Lives of Students Within a College Dorm
URL Link:
Http://www.stanford.edu/class/pwr3-25/group2/pdfs/IM_Social.pdf



Juan talks about the consequences of face to face social interactions & explores the ways that IM affects the social lives of students. He speaks about the research, history & background of IM and trends found in standard online communication tools. Juan gives a better indication of whom, when & how often IM is used within students. The author of this essay evaluates that IM real-time text based chat affects everyone differently depending on their personality & social nature & that IM only enhances students social habits & it’s the direct cause of this.



Site 2: Instant Messaging: Does it have a Place in Business Networks
URL Link:
http://windowsecurity.com/articles/Instant-Messaging-Business-Networks.html



This article looks at the pros & cons of allowing online communication using instant messaging in the workplace. I think Deb outlines her debate in a fair way & presents reasoning for her opinions. She also talks about the relationships between the ongoing updates to Voice over IP & that it is slowing the growth of instant-messaging. It provides answers to ensure that IM is made secure in the work environment & how to stop users from using it on the whole. This website is significant for business owners to evaluate communications through technology & how to handle implementing this tool in the workplace.





Concept 26: Privacy & Security



Quote: “The internet is a profoundly ‘open’ system and advanced internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media.” [Allen, n,d]



The internet has crossed boarders on global levels and changes need to be made in order to protect our security & privacy. Users must realise that necessary measures should be taken to protect not only personal details & identity but also there computer & software. [J Nielsen, 2000] There are many aspects of privacy & security generated from the internet and they can affect all means of life. Internet users of today must become aware of various threats & need to ensure that they take responsibility for the protection of privacy & security to take steps to prevent these unwanted attacks over the internet.

Privacy on the internet is the responsibility of the individual. One must be cautious at all times when producing private information on to the internet. Internet users should never trust technology with identity details as hackers actively seek to exploit others for their own gain. [Center for Democracy & Technology, n.d] These motivations include criminal, social & political demons & limited technical understanding with users also creates an attractive environment for security breaches.

“The object must be to bring policy to the internet, and bring the internet to everyday privacy polices” (Attaran & Van Laar, 1999)

Security & privacy measures must be taught to internet users in order to protect themselves from harmful internet consequences. It can be argued that it will not solve the problem long term & therefore internet users will switch back to traditional methods of communication.

The most secure way to ensure our information is protected is using an encrypted program. However to protect all mediums on the internet the realistic way to do this would be to make a built-in feature of all computing basics & encrypt all information at all times. Turn on all security settings by default, and automate all updates. You cannot rely on the user to ensure he or she is safe from these vulnerabilities, the computer industry and/or government needs to take responsibility and take control over the security & privacy measures that can be put in place to ensure simplicity. [J Nielsen, 2004] Some examples of these security & privacy breaches range from the following:

- Viruses
- Spoofing
- Worms/Spiders
- Hackers
- Spammers
- Identity Theft
- Unwanted content
- Collection of personal data
- Stored information from web browsers & IM

To ensure the user takes the right steps in protecting ones self from security & privacy breaches, the following measures can be taken:

- When using internet for financial details one must use a secure program
- Never reveal your true identity
- Protect your passwords
- Constantly update your virus protection
- If you are subscribing to an online website check the companies online privacy policy
- Use 2 emails – One for personal use & one for online merchants [Privacyrights.org, 2008]

The internet is an influential medium allowing the fast transfer of immense quantities of information between users world wide and whilst this brings great benefit, it has given rise to new vulnerabilities. The answer to these consequences lies with companies at large, computer designers & not so much the user, as it is to unrealistic to assume that the average users cannot beat the threats online.




Site 1: Security & Human Factors
URL Link:
Http://www.useit.com/alertbox/20001126.html



Nielsen Norman Group focus on leading edge research into countless user experience tools & topics and their impact in the online environment. Jakob Nielsen is the founder of this large organisation who is a significant authoritarian on usability & how to achieve security & privacy threats by applying rules of a more computer based design. I believe in Nielsen’s opinion that the fix does not rely on the human to make changes but for the computers to be the change. This article shows you different ways in which security can be protected & debates how design is an important factor is protecting our online environment.



Site 2: The Australian Government Net Alert
URL Link:
http://www.netalert.gov.au/home.html



This site helps facilitate families & students with useful information & tips to ensuring that a safe online environment is used. This site should be more advertised in the marketing world as I’m sure many internet users do not know these help centers like this even exists. This national net alert has features including: tips, awareness, downloadable programs & news & events to ensure your family is protected. This site also provides safety advice & solution guides for parents, librarians & teachers. This website also shows the government’s contribution to helping Australian families, companies & students with using the internet.

Concept 13: Communication is not complete upon

receipt



Quote: “The Key to effective email management is to consistently and conscientiously respond to and act upon the email you receive, while recognizing that others may not be as efficient as yourself” [Allen, n,d]


Email is a system that sends and receives messages electronically through the World Wide Web. This communicative tool is a popular way for people to interact with others for personal & business use. An email can be created & sent straight away to anyone on a global level & thus why it is widely used for all purposes. [D Dunn, 2008] However what comes with this is the concept that communication is not complete upon receipt & thus raises uncertainty that the recipient may or may not respond. [Mindtools.com, n,d] This is because if the recipient does not get back to the sender, subsequently there is no communication between the sender & receiver. As a result communication comes to an end at the hands of the receiver & the sender does not have any control of what happens after the email has been sent. Communication is only complete when a reply is received!

It can be argued that when we send an email to someone we expect a reply immediately; however this is not the case depending on the recipients’ circumstances and that we cannot rely on others to be as efficient as ourselves. This also stems out to assume that we can rely on automated processing information but not on humans.
It is impractical for efficient users to assume that when a message has been received, it will automatically get responded to or acted upon.

For successful email communication, emails should be responded to in an efficient way however this is not always the case. In my personal experience I have come across several recipients who choose not to reply in a quick manner, I have waited hours, days and sometimes my emails never get returned. In such circumstances humans have no control other the receiver and thus need to recognise that others may not be as efficient as me!

To ensure that emails are acted upon there are several ways in which the recipient can become an efficient user. Firstly, you can attach a ‘read receipt’ on to the email to get notified if the recipient has viewed your email, though this does not guarantee that the reader has paid attention to the text & whether they have any intention to reply. [Marc, 2007] Other key recommendations are to keep emails short, precise, identify the type of response that is required & include a title that is going to grab the reader’s attention. Stay away from long emails as it is tedious for the reader and they may choose to ignore the email altogether & sometimes you will find that the recipient may just ignore the email for no reason at all. [J Jasper, n.d]

A good way to be efficient is if you do not have time to reply, a notification should be sent to the sender that you will reply when you get some time. [Marc, 2007] This shows how one can take responsibility of the email & that notice has been taken. We also must realise that not everyone is going to be efficient email users & that as humans we cannot be relied upon.


Site 1: Effective Mail – How to communicate powerfully by email
URL Link:
http://www.mindtools.com/CommSkll/EmailCommunication.htm




This site is extremely vital for any internet user in ensuring that emails get responded to & provides tips & effective ways in which you can send your emails to ensure that the recipient will want to read it. This site provides general insight to email communication & how powerful it can be when used in the right way. This site shows credibility & enables users to trust the information provided. Mind Tools emphasis that a simple rule to get your email noticed is for it to be useful to the recipient.



Site 2: Efficient Email Use Enables User Productivity
URL Link:
http://www.processor.com/editorial/article.asp?articles/P3016/23p16/23p16.asp&guid (Please note this URL always goes back to homepage after it has been published, it won't let me get to the exact article. If you insert the head title into the search it will find the article immediately.)



This article written by Darrell Dun emphasis’s the importance of being an efficient email user. Darren believes that users in the workforce should be educated with email etiquette & provide simple tips that will improve the experience for employees & ensure the best results for the recipient. Darrell focuses on implementing policies to govern the use of email to ensure efficiency & encourages appropriate practice in the workforce. This includes how to implement a policy; adopt a compliance policy appropriate for the industry; limit or eliminate the use of personal folders; communicate some end-user email guidelines & attachment rules.

Bibliography/Reference

Title: Behaveyourself.com: Online Manners Matter

URL: http://www.edutopia.org/Whats-next-2008-netiquette-guidelines

Public Education – 2009 – The George Lucas Education Foundation

Date Accessed: January 22, 2009

Writer: Laila Weir Reference: [L Weir, 2009]

Title: Beyond Emily – Post-ing Etiquette

URL: http://www.edutopia.org/netiquette-guidelines

Public Education – 2009 – The George Lucas Education Foundation

Date Accessed: January 22, 2009

Author: Laia Weir Reference: [L Weir, 2009]

Title: CDT’s guide to online privacy
URL: http://www.cdt.org/privacy/guide/start/
Publication: Center for Democracy & Technology
Volume: Chaptor one
Date Published: No Date
Date Accessed: January 25, 2009
Reference: [Center for Democracy & Technology, n.d]

Title: Efficient Email Use Enables User Productivity

URL: http://www.processor.com/editorial/article.asp?articles/P3016/23p16/23p16.asp&guid
Author: Darren Dun
Article covers: General Information
Date Published: April 18, 2008
Date Accessed: January 26, 2009
Volume: 30 Issue: 6 Page: 11
Reference: [D Dunn, 2008]

Title: Efficient Email Tips URL Link: http://www.businessknowhow.com/manage/emailtips.htm

Author: Jan Jasper

Publication Date: No Date

Publication: Business Know-how ATF Attard Communcations Inc

Date Accessed: January 25, 2009 Reference: [J Jasper, n.d]

Title: Effective Mail – How to communicate powerfully by email
URL: http://www.mindtools.com/CommSkll/EmailCommunication.htm Author: No Name
Publisher: Mind Tools Ltd Published
Date: No Date
Date Accessed: January 26, 2009
Reference: [Mindtools.com, n,d]

Title: Email Communication Problems: How to Communicative Effectively
URL:
http://www.marcaandangel.com/2007/05/28/email-communication-problems-how-to-communicate-effectively/
Author: Marc (no last name provided)
Publication: May 28, 2007
Date Accessed: January 25, 2009
Reference: [Marc, 2007]

Title: Is the Internet Changing Social Life? It seems that More Things Change, the More They Stay the Same.
Author: Tyler, T.R
Journal: Journal of Social Issues
Year: 2002 Volume: 58 Issue: 1 Page: 195-205

Title: Instant Messaging – Collaborative Tool or Educator’s Nightmare! URL: http://www.unb.ca/naweb/proceedings/2003/PaperFarmer.html Date Accessed: January 24, 2009
Author: Rober Farm
Education: Mount Saint Vincent University, Canada
Published: 2003 Reference: [R Farm, 2003]

Title: Instant Messaging: Does it have a Place in Business Networks
URL: http://windowsecurity.com/articles/Instant-Messaging-Business-Networks.html
Date Accessed: January 24, 2009
Author: Deb Shinder
Published: November 2, 2004
Updated: April 6, 2005
Section: Articles – Misc Network Security
Reference: [D Shinder, 2004]

Title: Leadership & Management Program - Efficient Email
URL:
http://www.inclentrust.org/pdf/lamp2003/Efficient%20Email%20Module%20_July%202003_.pdf
Author: Nancy Johnson, Cynthia Cordero, William Macharia
Date Published: July 2003
Date Accessed: January 26, 2009
Version: 1 Module 5

Title: Netiquette Home Page

URL: http://www.albion.com/netiquette/

Date Accessed: January 22, 2009

Published Date: No Date provided

Author: Seth T Ross

Reference: [S T Ross, n,d]

Title: Netiquette Guidelines
URL: http://www.dtcc.edu/cs/rfc1855.html
Date Accessed: January 22, 2009
Last Page Update: 24 October, 1995
Author: Sally Hambridge
Reference: [S Hambridge, 1995]

Title: Privacy and the Internet – Travelling in Cyberspace Safely Fact Sheet URL: http://www.privacyrights.org/fs/fs18-cyb.html
Publication: Privacy Rights Clearing House
Date Accessed: January 25, 2009
Published Date: 2008 Reference: [Privacyrights.org, 2008]

Title: Pros & Cons of using instant messaging at work URL: http://www.businessknowledgesource.com/smallbusiness/pros_and_cons_of_using_instant_messaging_at_work_022590.html Date Accessed: January 24, 2009
Published: Ongoing 2003-2009
Reference: [Businessknowledgesource.com, n,d]

Publication of Education: Curtin Univesity – Internet Communications – Concepts Document URL Link: http://www.webct.curtin.edu.au
Author: Allen Date Published: No Date Reference: [Allen, n,d]


Title: Remember the human: The first rule of netiquette, librarians and the Internet.
Author: Paul Sturges
Journal: Online information review
Year: 2002 Volume: 26 Issue: 3 Page: 209-216
Publisher: MCB UP Ltd Reference: [P Sturges, 2002]

Title: Security & Human Factors URL: Http://www.useit.com/alertbox/20001126.html
Date Accessed: January 25, 2009
Author: Jakob Nielsen
Published Date: 2000 Reference: [J Nielsen, 2000]

Title: The Effect of Instant Messaging on the Social Lives of Students Within a College Dorm
URL: Http://www.stanford.edu/class/pwr3-25/group2/pdfs/IM_Social.pdf Date Accessed: January 24, 2009
Author: Juan Marquez Reference: [J Marquez, 2005]

Title: User Education Is Not the Answer to Security Problems
URL: http://www.useit.com/alertbox/20041025
Date Accessed: January 25, 2009
Author: Jakob Nielsen
Published Date: 2004 Reference: [J Nielsen, 2004]

Title: World Privacy Forum URL: http://www.worldprivacyforum.ord/index.html
Date Accessed: January 25, 2009
Published: Ongoing, No Date

It is drawing near to the end!

WOW!!! What a journey...


I have now completed all the tasks and finalising my blog ready for submission. This blog has enabled me to show all my ups and downs, my accomplishments & hard times. as i have never done anything like this before i have learnt & thoroughly enjoyed the experience. I have a new appreciation for blogs and completely understand how it all works. I never realised how big the communication stems here on the internet and can use so much of it in my day to day life. I will take away the knowledge that i have gained and use it in the workforce, personal life & for sharing. As an accountant on a day to day basis this is very far from what i am used to, it gave me a real challenge and opened the doors to new experiences.


The friends i have made and experiences i have shared with other NEt11's got me through this subject & made this an incredible & satisfying journey. Some to name are Tess, Rhys, Chris, Antony, Jamie, Hans, Duane & Louwna. To Cynthia & Peter, man i have to give it to you, you guys definitely have a passion for this and it really shows. The amount of encouragement & help that was provided through the course was astounding, this is the first subject learning with Curtin as i am normally a CSU girl but boy do u guys give Curtin a great reputation. Don't you wish all lecturers were like Cynthia & Peter, i certainly do! So many thanks to you all, i wouldn't have got through this subject without you.


I guess what i'm trying to say is that i had a blast but now it's closing near and we all move on to bigger and better things. Looking forward to creating my own HTML site in the future and starting up a blog about wedding tips. I have only 10 months to go and my Degree will be complete, not long to go now. I hope everyone does really well in this subject and i hope i contributed & helped some of you to along the way. Great Summer everyone!!!


So this is peace out from me... Last post to come will be my concepts project!



















Everyone take care, good luck in everything that you do & never give up because when you have the courage to begin, you have the will to succeed!! Cheers

Mon x

Friday, January 30, 2009

Module 4 - Evaluating the Web!

So i checked out the tutorial recommended at Net.Tutor


The source i have chosen to use is Wedding Central Australia

Title: Wedding Central Australia

Publication: Wedding Central Australia Pty Ltd

Date Accessed: 31 January 2009

Date Publishing - Ongoing - 2009

Author: No details provided


The main purpose of this site is to provide people of Australia one of the biggest wedding directories online. It's directories provide information & links to anything you need to create your special day. It stems from function venues, decorators, entertainment, videographers etc which is Australia wide. This site also provides online forums, photo galleries, announcements etc. I believe based on the Net.tutor and from my research on this site, it is very reliable & has the credibility for anyone to trust and use this information provided. The site has authority as Wedding Central Australia is a very well known wedding company that controls many aspects of the industry including bridal expos, wedding magazines and has a huge presence online. I'd imagine the authors would be employees of the company who put the website together and get all the information approved by managers before submitting the information online.


Content - Each directory record has a website link and also a profile which provides more information about about the business & also allows for reviews & testimonials. With a site like a directory based site you must always go directly to the business you found to find out more, it only is an introduction to each business.


The information is current and added to the site on an ongoing basis & changes when a business changes it's status. The site also does provide recognition to other websites & vice versa with other prestige wedding businesses.

When choosing whether which body of information when to refer back to this site would probably be going to the original site. Reason being is because my view could come across as bias as i show my appreciation for the site and the favourtism for the site over others. Others may not have a good experience when searching this site, they may not like the design, user friendliness of it or other reasons. Also my annotation could become old and the site may continue to update & improve OR go bad after my annotate is published, therefore making my view unreliable.

In terms of external users to help judge whether this site is useful or not would be to first look at who publishes the information, for eg Wedding Central Australia. My annotate would help them review the site as it provides good feedback as to what the main purpose is, why it is credible & reliable and a direct link to the site. An about us, reviews & open forums judge if it is useful or of interest to them.

Module 4 - Boolean searching task

First i began reading up on Boolean Searching on the Internet

I remember doing something similar when i did information technology for the HSC, wow that was a long time to ago! These tutorials and search techniques i find really helpful, i really do struggle when searching the web, especially for technical accounting rulings for work, i can never seem to find what i'm looking for, but i am getting better and really starting to understand how to get my answers quickly & smartly.

So the key words i previously used were with an additional word function "Sydney Wedding Venues Function"
I think to get the best results with accurate findings i should use AND, therefore
"+sydney +wedding +venues + functions" Lets see... I actually got 113,000 hits for this one, the information is relevant and gives me exactly what i am after.

Lets try OR instead and see if this is better... "Sydney wedding functions OR Venues". This actually came up with better results giving 143,000 hits. So using OR has proven to give the biggest number of hits.

Overall the both search options used have given relevant information so that isn't a concern for either techniques.

Lets give it one more go, lets try NOT "Sydney Wedding Venues NOT Melbourne"
It has given us 510,000 hits BUT, yep wait there is a but, when looking at the search results the URLS provided don't really give me the answers i am looking for, don't get me wrong there are still relavant sites here but its a time waster to have to trail through each one to find what i am looing for. Also there are no unversity sources

Module 4 - Searching the Web

So close yet so far, the end is almost near and i have only a few tasks to get through, lately i have been reflecting so much about this subject and the many tools i will take away from it, there is so much that people don't know about the internet & it's communication. I'm thinking that high schools should really make a compulsory internet subject, i think it is going to be needed in the future, i also think it should be a core subject for any bachelor degree, EVERY single person will use it & will be able to take this information away with them in any workforce chosen!!

Neways back to the topic, Searching the Web! I think this experiment will be fun.

So we have to choose our most commonly used search engine & do a search with words of my choosing. Well Google is the only place i go to search, no one else even gets a thought! Ok i'm going to search for "Sydney Wedding Venues"


OK WOW i got 164,000 hits!!! See below: I have copied & paste my results into paint for your reference!!



Here are the first five hits for this search:



Now.. I'm using Copernic to search through 3 search engines. Tried setting up the 3 search engines in Copernic, but i have no idea how to do it? I searched the help online and when i search it goes to sponsored links only?? I can't seem to find where i can insert my three different search engines to use, when i click on the "Web" icon, it goes straight to Copernic Find? . Does Copernic even have the option to trail through other search engines with our choosing? Argh this is so frustrating, i'm going to the webct discussion board to see if anyone else has had this problem. Be right back...

In the mean time i'm going to put "sydney wedding venues" in the Search box and choose "All" and see what happens. Yep it says no matching documents but brings up 83 web results. The results only seem tp come from Google & Ask.com?? The search doesn't even compare to searching directly from a search engine, why would anyone want to waste there time with this? Copernic is so basic and i find it so hard to use when searching the web...

I just had a look at Jamies blog and he seems to have the same problem when searching the "deep web"! Phew, i'm not the only one who can't navigate around this site.. OK I worked it out, the home version only allows you to search from their criteria. From the search results it did allow me to search other search engines including: Google, Ask.com, Windows Live & Yahoo.com . But no deep web! However the first five hits of this search brings up Google only. See below for my results!

Overall, i would NEVER use Copernic to trail the internet for searching the web, it needs to stick to searching your network and thats about it!!! Pretty ordinary experience with Copernic but can't go wrong with Google. Is results provided me with exactly what i was looking for & they were pretty accurate. Not that i need to use 164K results BUT it's better than 83 and gave me more options than Copernic.

Wednesday, January 28, 2009

Module 4 - Downloading Tools/Plug ins Task

1. Adobe PDF Reader

I already have Adobe's PDF Reader on every computer i own. I find this program one of the most used programs i have simply because it allows me to PDF anything i want. This is great because i can share my documents with other people that have all kinds of PDF viewers. It is user friendly, fast & has many built in features to collaborate your electronic documents. I mainly use this program for PDF'ing invoices, CV's, letters, spreadsheets, & financial data. When preparing something in word or excel it is easy to convert to a PDF file and send to a client, this also enables the client to see it in a clean format rather than opening the actual file use to create the document.

2. Shockwave player
So i clicked on the "Check this page" on webct to see if i have a flash or shockwave application, to my surprise it asked me to install the program. I really should invest in a good one so i installed the Adobe Flash Player . So i installed it, really quick & easy to do! I have to say though Adobe's website is incredible, just looking at there flash demonstration entices you to have their product! This program will come in handy when i download my favourite shows which i have always wanted to do but never got around to it :)

3. Media Player
I already have Windows Media Player which i think works great, again it is easy to use & loads really quickly. So i downloaded Real Time Player for this experiment. This website is also really hi-tech and up their with Adobe. SO i downloaded the Basic Real Player which was really easy to do. In a matter of minutes i had this brand new spanking player on my PC. When comparing to Media Player they both offer the same features & interact with many other programs. I think i like the look of Windows Media Player better when it comes to the actual play, stop, etc panel. Although i really like the Real Player features with it's built in online movie library, i love the fact that it is all right there and you don't need to go searching for movies. The only difference between the full featured player and basic is that you can't burn from this player which is fine because i use Nero for burning anyway. It also gives you 500 movies instead of 200 in the library but hey 200 movies is pretty good! And for what i'd use it for limited audio & visual control would be suitable for my needs.

4. Search Managers/Combiners
So i'm thinking..... A search manager, to be honest i've never used one before and do i really need it! Well let's download it and see what the fuss is all about... I chose Copernic for this experiment. Downloading the program was quick & easy to do, now to test the program to see if it works. Ok so i'm going to search for my concept project file which is currently in Microsoft word. Lets see if it can find it?
Yep, it quickly assembles the search results with your different criteria. So i tried a few more files and i have to say it is pretty accurate and so quick. I think this would be really good to use at work when searching in a client directory or my email directory to be able to find a file quickly, i always seem to have this problem and it takes me forever to find files sometimes, with Copernic it enables the user to gain access quickly & efficiently. Not bad at all!!! I don't think it will benefit using this program for private use but would definitely gain productivity time for business use. I also like the fact that it separates web results from desktop results, it is user friendly. However i have heard of scenarios where people have used search programs and were unable to locate the file or email even though they know it is on their hard drive! Has anyone experienced that and if it is true then why bother with a search program that doesn't do it's job.

5. Bookmark Manager

When learning about this in our topics i always thought that they would not be useful for me as i rarely would need to manage my bookmarks. But i guess we can only try... so i downloaded BookMark Buddy. This program managers your bookmarks & favourites which enables you to find bookmarks quickly & filter by date, rating & site changes. I think the best feature that this program offers is that it checks the status of your bookmarked sites in the background to see whether they have been updated or move since the last time you used it. In my personal experience this gets me everytime, i go to use a bookmark from my favourites and all of a sudden it's gone. This would be the only reason why i would use this program! The only other feature i like is that it maintains your lists based on what you recently visited, favourites etc. Other than that i don't think i'd use this program on a day to day run, i'm to lazy & don't have enough bookmarks to manage...

6. Offline/Browser Copier

I have never used an offline copier before but i would think that it would be very useful when working on uni projects & searching for information. The fact that it can save complete copies of your sites & almost anything online for later study is GENIUS. For example when researching & preparing for my concepts project i had countless websites running at the same time, but if i had to finish up and wanted to remember & keep all this information, this offline copier would be able to store all this information for me to be able to work on it later and offline. This program is extremely efficient for business & personal use and i would recommend anyone to use it.

Out of all the programs i downloaded today i would have to say that the flash player & offline copier would be the ones i'd use most. Flashplayer for lifestyle reasons & offline copier for university & studying reasons. From this experiment today i have definitely learnt some great tools to take away with me to make me a more efficient user in the online & offline environment of the internet.

Monday, January 26, 2009

Concept Research & how i am going with it!

Hi Guys

HaPpY AuStRaLiA DaY - Go the Green & Gold

So i have been working on my concepts project over the last few days and thought i'd give you an update as to how i am travelling.

Firstly i found it really hard to choose concepts that were right for me, there were so many interesting ones and it took me a good while to get the 4 of topic! The research has been time consuming & i have been creating notes ever since, I think the hardest part so far is having to choose the particular path you want to take each project! There is so many things you can discuss so i went on what interested me the most. I also found it really difficult to get into really deep writing, don't you think it's hard to do in only 500 words? You're just beginning. So trying to keep it to the point & down in words + also get my point across was a mission. I am almost done, now i have to put together & make it a damn good project!


For me this project is one of a kind. It has been really hard to get everything together & to even grasp the idea of what we even have to do. I have never done anything like this before & so i hope i have done each project right!! Fingers crossed! The threads on Webct & Cynthias tips have been really helpful & have sent me in the right direction.


I am hoping to finalise my findings & write up a final draft of each concept over the next week. Summer school is almost coming to an end and i can't believe how fast it has come and gone. I am so glad i chose this subject even though it has taken me on a ride - Good & bad. I sure have come out on top ;)