Copy of Personal Technology Action Plan rv F13

advertisement

Personal Technology Action Plan (PTAP) Phases I-IV

Personal Technology Action Plan (PTAP)

Making Technology Work for You-Communication/Information

Phase 1 (SLOs 1a, 1d, 1e, 1g, 2a, 2c)

The Personal Technology Action Plan (PTAP) will help you explore and document your technology use in your life. During this class you will be evaluating, assessing, and configuring your personal approaches to technology while addressing important issues such as security, privacy, responsibility, etc. Remember to reference ANY resources that you have used, on a references page in APA format on the last page of your Personal Technology Action Plan.

In your own words, answer three (3) of the Essential Questions below in complete sentence

format (answers should be between two and five (5) sentences long) (3 @ 6 pts each):

Review Writing Guidelines.

Essential Questions (18 pts) No references required

How are security and privacy affected by the use of technology?

Security and privacy are affected by technology in a way that anyone who wants to can get your information. Some sites don’t offer any form of security such as credit card application sites or pop up sites.

How can technology be used responsibly?

To use technology in a responsible manner you should be educated in how to navigate through popular web sites such as face book or you tube. Looking through terms and conditions on any site would be beneficial.

Why is technology valued?

Technology is changing our society and the way we interact with people. It is changing how we learn and obtain information. It is valued because we can use it to pay bills, stay in touch with distant family and friends. You never know how much technology is valued until it isn’t there, for example, the computer system crashes at work and you end up days behind on reports and orders. You may not be able to run your business if you do not have the use of up to date technology.

Page 1

Evolution/History - What is your technological history?

(16 pts)

In your own words, answer the questions below in complete sentence format (answers should be between two and five (5) sentences long) (4 @ 4 pts each) :

Review Writing Guidelines.

At what age did you first “embrace” technology? What technology was it? Why did you like it? (4 pts)

I was seven years old when my dad allowed me my first phone call to my

“boyfriend”. I dialed his number and asked for him and then we both sat silent after a couple of minutes my dad asked if I was going to talk. I said I was waiting for Frank to say something first. Frank said goodbye and I said goodbye and we hung up. I liked the telephone it was a cool looking thing, it was a rotary dial phone I use to always dial random numbers to see if they were real or not. Just like Bart Simpson.

List three (3) items of technology that you use or have used in your daily life. Describe why each is important to you. (4 pts)

The first piece of technology I have used and find important to my daily life is a phone without it I could not talk to far away friends or family.

The second piece of technology would be a computer without it I would not be able to complete this assignment nor would I be able to do my job at work. The third piece of technology I use in my life is a television without the TV my children or husband could not watch their favorite shows I would not be able to watch my sappy chic flicks.

Choose one piece of technology that you use and cannot live without. Why? (4 pts)

I could not live without my cell phone. It has all of my information in it, from my contacts to email addresses. It is how I stay connected to those who live far away and to those who live close. I don’t own a PC or a MAC my phone has all my accounts. The advances companies have made with smart phones and tablets computers are becoming more and more obsolete.

What technology topic or device(s) would you like to learn more about and why? (4 pts)

Anything you want to know about when it comes to technology and all the different devices you can google it. If I had to pick one I would want to learn more about the inner workings of tablets. Some are more advanced than others and it’s really frustrating. I researched the tablets I bought my family for Christmas and then my husband I bought

Page 2

new

cell phones and our phones work faster and better than the tablets. He doesn’t even use his anymore.

Personal Technology Action Plan (PTAP)

Making Technology Work for You – Phase II

Ethics (SLOs 1a, 1c, 1d, 1g, 2a, 3c)

Ethics Definitions (14 pts) Seven (7) references required

Using Merriam-Webster.com, copy and paste the definitions for the terms below (If definition cannot be found on Merriam-Webster.com you may use another resource.):

Using APA format, include an in-text citation for each definition and add an APA Reference on the Reference page at the end of this document for EACH definition (seven (7) total). Note: A

“cite” button is available on the Merriam-Webster website, which you may use to create your references (choose APA style before copying and pasting into the PTAP document under

References).

Copyright ( 2 pts): the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literally, artistic, or musical material, and to authorize others to do the same. (google, 2014)

Intellectual Property (2 pts):

A work or invention that is the result of creativity, such as a manuscript or design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc. (google, 2014)

Trademark ( 2 pts

): A symbol, word, or words legally registered or established by use as representing a company or product. (google, 2014)

Patent ( 2 pts):

A government authority or license conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.

(google, 2014)

Software Piracy (2 pts):

Is a term that is frequently used to describe the copying or use of computer software in violation of its license. (linfo.org)

Page 3

“Fair use”

(2 pts): the doctrine that a brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism news reporting, teaching, and research, without the need for permission from or payments to the copyright holder. (google, 2014)

Plagiarism (2 pts): the practice of taking someone else’s work or ideas and passing them off as one’s own. (google, 2014)

Your Views on Ethics (20 pts) One (1) reference required

In your own words, answer the questions below in complete sentence format (answers should be between two and five (5) sentences long):

Review Writing Guidelines.

Explain the difference between copyright and intellectual property. (4 pts)

Intellectual property is something resulting from creativity. A copyright is something that shows ownership of the material.

From The Ten Commandments of Computer Ethics, Written by the Computer Ethics

Institute, what commandments have you broken? (4 pts) (The Ten Commandments of

Computer Ethics, Written by the Computer Ethics Institute should be included as a reference

.) I have only ever used the computer for my own personal use. I’ve never been good with computers to do any of the things listed in the Ten Commandments of Computer Ethics.

But I do know people who have violated commandment number 6 Thou shall not copy or use propriety software for which they have not paid for.

(Baker College INF 161)

Has the discussion of ethics in this class made you change your views on copyright?

Explain. (4 pts)

Yes the class discussion we had on ethics has changed my views on copyright. I won’t be posting as many pictures on Facebook if they are from someone else’s page or a different website.

Has the discussion of ethics in this class made you change your views on plagiarism?

Explain. (4 pts)

I have always thought low of people who plagiarize or even those who cut and paste an entire research paper because they don’t want to take the time to write it out and make it their own. My view still stands that plagiarism is wrong and should not be done intentionally.

Page 4

Has the discussion of ethics in this class made you change your views on software piracy?

Explain. (4 pts

) I am not savvy enough for software piracy but it is ethically wrong and while it happens a lot I don’t feel a law is going to stop it.

Personal Technology Action Plan (PTAP)

Making Technology Work for You – Security and Privacy

Phase III (SLOs 1a, 1d, 2a, 3a)

Security and Privacy Definitions (20 pts) Ten (10) references required

Using an online resource, locate the definitions for the security and privacy terms below.

Definitions that are copied and pasted, MUST include an APA in-text citation AND corresponding APA reference on the Reference page.

Anti-virus (2 pts): designed to detect and destroy computer viruses (google, 2014)

Anti-spyware (2 pts):

A software countermeasure that detects spyware installed on a computer without user’s knowledge (Web defintions, 2011)

Surge protector ( 2 pts

): a small device to protect a computer, telephone, television, or the like from damage by high voltage electrical surges. (Dictionary.com)

Firewall (2 pts):

A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. (google, 2014)

Pop-up blocker (2 pts):

A utility that prevents web site popups from displaying

(encyclopedia2)

Throwaway e-mail

(

2 pts):

Or disposable email. It is a service provided to a registered user for a given period of time (Techopedia)

Passwords (2 pts):

A secret word or phrase that must be used to admission to something, a string of characters that allows access to a computer, interface, or system. (google, 2014)

Biometrics (2 pts): another term for biometry, biostatistics (google, 2014); the analysis of biological data (Dictionary.com).

Updates (these could include Windows/antivirus/Java) (2 pts): an act of bringing something or someone up to date or an updated version of something (google, 2014)

Page 5

Pharming (2 pts): The fraudulent of directing Internet users to a bogus website that mimics the appearance of a legitimate one in order to obtain personal information such as passwords and account numbers (google, 2014).

Security and Privacy Strategies (12 pts)

Choose three (3) security pieces or strategies listed below and in your own words, explain how each strategy or device protects your technology in complete sentence format (answers should

be between two and five (5) sentences long): (3 @ 4 pts each):

Review Writing Guidelines.

Anti-virus –

Anti-virus protection is always good to have on your computer. It keeps the bugs out and can keep your computer or lap top running at a speed you like. It offers extra protection and some will even run automatic checks on your computer or lap top every time you turn it on

.

Pop-up blocker

– Pop-up blockers are a great feature if you’re a parent and don’t want your young children to see certain things such as links to porn sites or dating sites. Pop-up blockers are also nice to have if you browse the web a lot, those things can overtake your computer screen.

Passwords -

A password can help with security on your computer. You can set a password to lock or unlock your computer. You create a password or passwords for the social media sites you visit with the intension of keeping your personal information safe. Passwords also help keep children out of places they shouldn’t be on the computer, smart phone or tablet, like on Amazon buying things with your credit card.

Updates –

Updates can be a good thing and a bad thing. They are good because you get the most up to date software and security. They can be bad because they can completely change the web site or page, a perfect example would be Facebook, every time I get an update from them my phone or tablet runs slower for a few days and to me it’s annoying.

Updates also take away likable features and replace them with features you may or may not like. Facebook has done that on a couple occasions.

Virus Check Results (5 pts) One (1) reference required

Run a virus check on your personal computer and take a screenshot of the result of your virus

scan. (Your virus protection, which is software, should be included as a reference.)

TO TAKE A SCREEN CAPTURE: Locate and PRESS the Print Screen (prt scrn) key on the keyboard (the screen has now been captured to the clipboard). Position the cursor in the Word

Page 6

document where you would like the screen capture image to appear, and click Paste (on the

Word ribbon) OR Press CTRL + V on the keyboard to paste the screen capture image in your document.

TO TAKE A SCREEN CAPTURE (Mac): Hold down Command + Shift +3 at the same time. This captures the entire screen and saves it to the desktop.

Paste screen capture below : I do not have a personal computer so I took a screen shot of this from a computer at school (Norton anti-virus).

Personal Technology Action Plan (PTAP)

Making Technology Work for You–Social/Global/Cultural

Phase IV (SLOs 1a, 1b, 1c, 1d, 1f, 1g, 1h, 1i, 2a, 2c, 3b, 3c)

Page 7

In your own words, answer the questions below in complete sentence format (answers should be between two and five (5) sentences long):

Review Writing Guidelines.

Social (15 pts) One (1) reference required

After viewing the video Think b4 u Post: Your Reputation and Privacy on Social

Networking Sites would you “present yourself differently on a social media site in comparison to an employment site? Explain.

(5 pts) (Think b4 u Post: Your Reputation and

Privacy on Social Networking Sites should be included as a reference.)

I have always tried to maintain a mature persona on all social media sites. I am human and have my moments where I posted stuff about my turbulent relationship with my ex-husband and even about my now husband when we were dating. I soon realized that any social media site isn’t for venting out your relationship problems as much as it is about reconnecting with old friends and family, and posting those pictures that were not supposed to because of copy write laws. I don’t post a lot of pictures of my kids anymore, I save them in my phone and if I feel like showing them off I do it in person.

How might you react and respond if your private personal information were to become public on a social networking site or elsewhere on the internet? Explain. (5 pts)

I would be angry at myself because now after this class I see how easy it is for a hacker to get into anyone’s information and do whatever they want with it. I would try and find the person and make them delete it. If I couldn’t I would pay someone to take the site down. If anything gets put out there it will be by me and me only.

Have you ever posted a comment or a photo online you later wanted to remove? Were you able to take it down? Explain. (5 pts)

Yes I have posted pictures and even made comments

I regretted. After a few updates on Facebook I am now able to remove a post if I don’t like it and even block people’s comment’s and posts if I don’t like it, which I have done.

Global (15 pts) One (1) reference required

Do you recycle any of your technology? (Cell phones, computers, printer cartridges, paper?) Why? Why not? Explain. (5 pts)

No I don’t and I am glad I hold on to it. There are some cold calculated people out there who wait for a person to “recycle” their old technology. After all that I learned about printers having hard drives and how everything on your phone has the potential to stay there forever I will happily hold onto all my old phones, computer, and printers. I won’t even try to sell them anymore in a yard sale.

Page 8

Do an Internet search on the laws governing e-waste. Name one law and briefly describe

what the law states IN YOUR OWN WORDS. (Be sure to include the reference in APA

format on the References page at the end of this document.) (5 pts) I read about Michigan’s ewaste laws and how not only the seller but also the buyer has to make a report with

Environmental and Safety Department and have documentation of the electronics being recycled.

There are hotlines in our state that you can call to find out where you take your devices to be recycled. There are places that specialize in recycling certain pieces of your computer. In

Michigan recycling of old devices is men to be done in a safe environment so no one gets harmed from the toxic chemicals recycling these devices can cause. (SIMS recyling soultions).

After viewing the information on e-waste, have your views changed on technology recycling? Why or why not? Explain. (5 pts) (Ghana: Digital Dumping Ground should be included as a reference.)

No I knew I was hesitant about it for a reason and this transcript proved why I never sent any of my old technology away. I still have my very first cell phone and my husband has his very first computer. The stuff will collect dust in the attic.

(pbs)

Cultural (10 pts) One (1) reference required

After viewing the short video clips of The Network Effect, in two (2) to five (5) sentences describe what issues are similar to rural America and countries like Africa and Brazil?

Explain. (5 pts) (The Network Effect should be included as a reference.) I think that people in rural America may do exactly what the video showed, pool money together with neighbors and maybe even relatives just to have enough money for internet access. I think money is easier to come by in our country there are always ways to make a quick buck. It reminded me of a time when my mom needed a cell phone for her job and couldn’t afford it on her own so I added her to my plan and she paid part of the bill. Family and neighbors will help each other to make life a little better for all involved and I think that’s what this video was trying to get out.

After viewing the short video clips of The Network Effect, in two (2) to five (5) sentences describe the issues are different to rural America and countries like Africa and Brazil?

Explain. (5 pts) While in Africa and Brazil neighbors are pooling money for internet and

Page 9

skipping meals to afford it I don’t think rural America is skipping any meals. I don’t think rural

Americans are skipping meals to get there internet access. There is always a way to earn a few bucks to pay an internet bill.

(Network Effects)

Page 10

References

(n.d.). Retrieved 07 07, 2014, from linfo.org: www.linfo.org/software_piracy.html

Baker College INF 161. (n.d.). Retrieved 07 10, 2014, from Ten Commandments of Computer Ethics: http://computerethicsinstitute.org/publications/tencommandments.html

Dictionary.com. (n.d.). Retrieved 07 15, 2014, from http://www.dictionary.reference.com/browse/surge+protector

encyclopedia2. (n.d.). Retrieved 07 15, 2014, from the free dictionary: http://www.encylopedia2.the freedictionary.com/popup+blocker google. (2014, 07 07). Owosso, MI, USA.

Network Effects. (n.d.). Retrieved 07 23, 2014, from YouTube.com: https://www.youtube.com/watch?v=1lUbyH2AOOg&list=PLEB7CB3AF3EAC710E

Norton anti-virus. (n.d.). Retrieved 07 23, 2014, from Norton.com: http://buystatic.norton.com/norton/ps/3up_us_en_navnis360_nbfr.html?om_sem_cid=hho_sem_sy:us:gg l:en:e|kw0000006641|27024578476|c&country=US

pbs. (n.d.). Retrieved 07 15, 2014, from pbs.org: http://www.pbs.org/frontlineworld/about/episodes/804_transcript.html

SIMS recyling soultions. (n.d.). Retrieved 07 23, 2014, from simsrecyling.com: http://www.simsrecycling.com/Consumer

Techopedia. (n.d.). Retrieved 07 15, 2014, from Techopedia.com: www.techopedia.com/defintion/13611/disposable-email

Web defintions. (2011). Retrieved 07 15, 2014, from http://support.gfi.com/manuals/en/lanscan2011/lanscan2011manual.1.83.html

Page 11

Download