User talk:Stevo sc

This is my user discussion page, I will be using this to register my work on the wikibooks project and also to discuss my educational assignments. Please feel free to comment on my contributions here. Stevo sc (discuss • contribs) 15:48, 16 February 2016 (UTC)

Wiki-exercise 1 (Educational Assignment)
As part of an educational assignment for Stirling University a discussion will be created about youtubers and the content they produce. Two youtubers, Simon and Martina, are travel, tourism and food youtube blogger who discuss different cultural experiences they personally experience throughout their travels in Asia. Recently moved to Tokyo, Japan after a long stay in Seoul, Korea they currently discuss the cultural differences between the two and western cultures. In relation to the module the idea of youtubers interactions with viewers through live blogs and responding to user comments relates to how discussion will be happening within the educational assignment. Through rising popularity of personal experiences of those living and travelling in countries much different to their own; their youtube channel has grown through meeting demands of the public. A rise in popularity can also be attributed to the rise and dominance of social media, through word of mouth and an instant easy way to share content has also led to a rise in youtuber success. As seen here... https://www.youtube.com/user/simonandmartina Stevo sc (discuss • contribs) 16:51, 16 February 2016 (UTC)

Wiki Exercise 1: Formative Feedback
It's encouraging to see that your post includes some reflection on how your review relates to themes within the module. This could be expanded through referencing some of the academic literature on the topic in future exercises. Your reflection could also be a bit more critical and move away from generalisations such as "the rise and dominance of social media". While you have added a link at the end, your reflections would be enhanced through more integration of wiki markup through further links to relevant concepts and websites. Also make sure to complete all parts of the exercise, as you have failed to comment on others' posts.

A post of this standard roughly corresponds to the following grade descriptor: Satisfactory. Among other things, satisfactory entries may try to relate an idea from the module to an original example, but might not be very convincing. They may waste space on synopsis or description, rather than making a point. They may have spelling or grammatical errors and typos. They might not demonstrate more than a single quick pass at the assignment, informed only by lecture and/or cursory reading. They may suggest reading but not thinking (or indeed the reverse). The wiki markup formatting will need some work. Sprowberry (discuss • contribs) 10:11, 29 February 2016 (UTC)

Wiki-Exercise 3
In post-modern era of today we are living in a world more connected than ever with the dominance of the internet and the rise of social media. With the world so connected almost everyone can comment, share or post information online. This has led to the problem of having so much information available that it can be easy to be distracted by this information overload. In dealing with the abundance of information It is important to be concise in looking for information and searching through it. When searching for information through a search engine it is important to use multiple key words to limit the amount of responses you get. If you keep your search results too vague then you can end up with thousands if not millions of different results so key words to the point can limit these searches and make it easier to find the information you need.

When looking through information it is important not to completely read the whole article or journal, skim reading or focusing on abstracts and introductions can although a quick and easy insight into whether or not this information is relevant. If it is not relevant the information can be discarded without reading the entire piece of information and you can look for information for relevant.

Shin (2014) posting on Forbes on how to deal with so much information http://www.forbes.com/sites/laurashin/2014/11/14/10-steps-to-conquering-information-overload/#6d49171824fe. One particular useful point is limiting the use of emails. With most post getting excessive amounts of emails today it is time consuming and unproductive to read through every single one. Limiting email communication to fewer people with relevant information can allow a faster communication line and limit the excessive emails that are irrelevant. Stevo sc (discuss • contribs) 16:23, 1 March 2016 (UTC)

Hi Steven, It is really hard to stay focused online and not get distracted! When thinking about targeted advertising and cookies, it becomes even more difficult to stay on task as you are being shown things which are specifically suited to you and how you use the internet, how would you avoid this and remain focused? I find it difficult to not become distracted by the vast quantity of information that comes up and using key words is defiantly a good way to avoid finding information that is irrelevant to what you are looking for. Is there any other ways that you sift through the vast quantitates of information that is available on the internet? The post from Forbes is a really interesting read! I would never have thought that by limiting the use of emails you would limit unwanted information. When you sign up to things such as public Wi-Fi, often your email address is required and you end up with an abundance of unwanted emails from advertisers or companies which are mostly junk, so this is a very interesting way of limiting unwanted information on the internet. I also find it difficult when online to know what is true and useful information and what is not, and deciphering between the two can be difficult, how do you tackle this? Mhairisedgwick (discuss • contribs) 10:43, 2 March 2016 (UTC)

Hi Mhairisedgwick thank you for the comments. When it comes to cookies and advertising I usually find they can actually be helpful in keeping information relevant as they allow your computer to know what you usually look for. There are many ways of sifting through information it's just about finding a way that works for you. Searching with key words is just something I find useful.

To combat whether information is correct it is important to look at the source of the information. If the source is reputable then the information can be trusted but if it is on a platform such as Wikipedia that can be edited by anyone, although it can still be useful, such be treated with caution. Stevo sc (discuss • contribs) 14:51, 2 March 2016 (UTC)

Hi Steven. Thanks for including the Forbes article, I found it to be an interesting read and can see how it helped you. I included and article posted by The Telegraph on my page which helped me a lot! I agree with the fact that it is important to skim read an article before reading it in full. I find it so easy to get drawn in to a really good article which, although is informative, does not actually have any relevance to what I am looking for and thus not actually finding out what I need. SophieNHayes (discuss • contribs) 11:00, 4 March 2016 (UTC)

SophieNHayes I looked on your page and I think the articles point on limiting emails and social media is relevant to your point on sifting through information. Thanks for the comment.

Wiki Exercise 2
How visible are you online? What forms does that visibility take? What kinds of information are available about you online? Who have you chosen to share it with and why? How much of this information is under your control? Consider any and all online platforms where you have a presence (Snapchat,Tumblr, Tinder, Instagram, Facebook, gaming networks such as Steam, Google+, LinkdIn and so on). During the week, read your classmates’ posts and then post comments in response to two of them by no later than

I would say my online availability is very high. As an active user of Snapchat, Tumblr, Tinder, Instagram, Facebook and gaming networks mainly PSN I use a lot of different online social medias. As a mostly non-priave member of all these social platforms I can be visible to anyone who wishes to search for me. I chose to only actively share information with my friends on facebook but on other platforms such as Instagram and Tumblr I am more open to sharing information with a wider range of people worldwide with similar interests as myself.

In being so visible there is a danger that can come from sharing too much information. As anything you post or share online, unless done privately, can be seen by anyone you could put yourself in danger by sharing information with people who mean to do harm with it. To combat this it is important to make social media platforms private and ensure you don't share too much information with the wrong people.

Stevo sc (discuss • contribs) 16:41, 1 March 2016 (UTC)

Hi Steven, Do you find that there is ever a danger with sharing to much online? I personally am only really active on Facebook and snap chat, but even between these two platforms I feel as if my online presence is quite high. Although my profiles are private there is nothing stopping the people I am friends with sharing my content and so on. Do you think there is ever really a way to keep private online? I think that once you have put yourself out there on the internet on any level whither privately or not, there is not real way of knowing the level of people who are able to see your content. It is interesting that you share a lot more on tumbler, it is not really a sight I am familiar with, what sorts of things do you share? and is there a limit to the number of people who can see this content? Mhairisedgwick (discuss • contribs) 10:51, 2 March 2016 (UTC)

Hi Mhairisedgwick thank you for the comment, I've went back and added information about the dangers of sharing information online. In regards to tumblr what I would post of share is open to anyone to see however it is never anything private or information about myself. It is usually just funny clips or posts about hobbies. Stevo sc (discuss • contribs) 14:43, 2 March 2016 (UTC)

Hi Steven. I agree with everything you have said as I too am far too visible online. Even though my accounts are mostly private, my friends on Facebook for example are able to share things I have posted to their friends, in turn just creating a domino effect. I do not believe that there is ever going to be a way to fully privatize any profiles you may have online and was wondering what your thoughts were on this? I found your comments on tumblr very interesting as, although I do not use it now, used to have a Tumblr account and you could essentially be completely anonymous on Tumblr which I found very interesting. SophieNHayes (discuss • contribs) 10:49, 4 March 2016 (UTC)

Thanks for your comment SophieNHayes my thoughts on my online visibility at present are quick relaxed. I do not mind that the information I provide is publicly available because I feel it has no substance to be misused as it is not that personal or valuable. However my opinion could change in the future as social media consistently has access to more and more information.

Wikibooks Group Project- D mans
This is the discussion point for our group wikibooks project, feel free to comment below about the project. Stevo sc (discuss • contribs) 15:31, 8 March 2016 (UTC)

Mhairisedgwick  Kirstyyy smith AdilAslam1 I thought this would be an easier way to discuss the group project if you guys agree. If either of you know the other two guys usernames can you add them in, thanks. Stevo sc (discuss • contribs) 15:34, 8 March 2016 (UTC)

Hey guys, myself and Stevo sc have been working on headings and pieces we would like to contribute to the overall page, a number of other groups have come up with headings etc so we are going to add to certain topics. Under the disadvantages section, we are going to discuss negative affects of misused identity and the dangers of this. We have also been considering the effects of our own identity within ourselves online, and the fact that you can be so easily influenced by what you see online, for example focusing on body image, unrealistic goals, celebrity culture etc.

We are also going to add a section on crime prevention, including how law enforcement and the police use social media to combat crime, and how they prevent crimes from occurring in the future through the internet. What were you guys thinking about doing? we also discussed adding to other peoples information on certain sections that interest us. Mhairisedgwick (discuss • contribs) 15:43, 8 March 2016 (UTC)

Does anyone have any ideas for sections they would like to do, or for a section we could add and complete together as a group? Mhairisedgwick (discuss • contribs) 15:44, 8 March 2016 (UTC)

Yeah Mhairisedgwick that sounds good. We're adding these points in the advantages and disadvantages to so much information being available online. What have the rest of you thought about doing? Stevo sc (discuss • contribs) 15:52, 8 March 2016 (UTC)

What do you guys think about the topic of social media, the breakthrough of social media in the last 15 years and the development of sites like youtube? AdilAslam1 (discuss • contribs) 16:23, 8 March 2016 (UTC)

AdilAslam1 That sounds great we could all have a social network/network subtopic eg youtube/ facebook/ my space / bebo etc and see how they have developed into current day media forms? Mhairisedgwick (discuss • contribs) 16:32, 8 March 2016 (UTC)

hey guys, thought this might be helpful in terms of referencing and keeping our articles neat. https://en.wikipedia.org/wiki/Wikipedia:Tutorial/Citing_sources. Mhairisedgwick (discuss • contribs) 16:29, 8 March 2016 (UTC)

Mhairisedgwick Stevo sc Hey guys! Yeah I think using this page as a discussion is a great idea! I was wondering if maybe it would be a good idea to talk about the different ways that we can actually access the knowledge and data? For example it's so easy now with laptops, phones, ipads etc? Or has something like this already been taken? Thanks Kirstyyy smith (discuss • contribs) 16:34, 8 March 2016 (UTC)

this page will help with the background of the social media starting trends http://www.digitaltrends.com/features/the-history-of-social-networking/ AdilAslam1 (discuss • contribs) 16:42, 8 March 2016 (UTC)

Another point that I thought might be useful is the evolution of search engines? For example how we have so many such as Google, Yahoo, Bing etc and how they're so easy to access and find information. Google clearly being the most popular one. We could also go on to talk about the different ways in which to access the internet, there are so many such as Internet Explorer, Google Chrome, Firefox and loads more. Therefore our access to knowledge is literally endless with so many ways in which we can access information. Kirstyyy smith (discuss • contribs) 16:58, 8 March 2016 (UTC)

Kirstyyy smith That's a good point, there is already a category for search engines or maybe just Google so we could maybe do a subheading? Or a full on bit if you have a lot to talk about. Stevo sc (discuss • contribs) 17:51, 8 March 2016 (UTC)

AdilAslam1 Yeah all the stuff on social media could be its own category, I think that's a good thing to talk about. Stevo sc (discuss • contribs) 17:53, 8 March 2016 (UTC)

heres another article that could help guyshttp://historycooperative.org/the-history-of-social-media/ AdilAslam1 (discuss • contribs) 09:43, 9 March 2016 (UTC)

D man choo this is the stuff weve been discussing AdilAslam1 (discuss • contribs) 09:49, 9 March 2016 (UTC)

Stevo sc Hey Stevo_sc, after looking at the page an internet of everything and getting replies from people do you think we should split ideas up so you look into police prevention of terrorism and crime like he said, and I will look into identity theft online? that way we both have a section each and we can afterwards look over each others and add bits in? Let me know what you think Mhairisedgwick (discuss • contribs) 11:43, 9 March 2016 (UTC)

Mhairisedgwick Hey Mhairi, yeah that sounds good I'll focus on the police protection side of access to so much information. I will leave out the terrorism side of that as there is already someone working on that in another sub topic but yeah that sounds good. Stevo sc (discuss • contribs) 15:08, 9 March 2016 (UTC)

Guys was just looking through some interesting sites online, AdilAslam1 if you are thinking about focusing on social media still this is a really good site that gives some stats and general usage figures you might want to take a look at. http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/ Let me know if you find it any use. Mhairisedgwick (discuss • contribs) 13:02, 9 March 2016 (UTC)

Hey D man choo, was just wondering what area you were thinking of looking at for the project? if you have any ideas so far? think it would be good if we all did something together as well as our own separate bits we have been working on? Mhairisedgwick (discuss • contribs) 13:16, 9 March 2016 (UTC)

D man choo,Stevo sc,AdilAslam1,Kirstyyy smith, Hi guys, was thinking, when I am discussing Identity theft, do you think it would be relevant to discuss catfish the TV show as a current example of how often this kind of thing happens? I found a few websites which are really useful when I am discussing my topic, wondered if anyone could have a quick look and tell me if im on the right track? http://www.webroot.com/gb/en/home/resources/articles/pc-security/malware-identity-theft, http://fusion.net/story/188777/catfish-tv-show-episodes/, I am also keen to look into academic journals and other websites to back up my argument. What does everyone think? Mhairisedgwick (discuss • contribs) 13:45, 9 March 2016 (UTC)

hey Mhairisedgwick, i personally think that catfish would be relevant but it is a specific genre of identity theft, infat its kind of the opposite in a way, but if you can word it to the topic then i cant see why not. AdilAslam1 (discuss • contribs) 13:50, 9 March 2016 (UTC)

AdilAslam1 Yeh, I see what you mean, thanks for your thoughts! just found some facts on their website that I thought would be interesting,for example '73% of catfishes passed off photos of another person (or of multiple people) as themselves' Which I thought was an interesting starting point, to convey the idea that it is actually really easy to steal someone's identity online, starting simply with stealing photos etc. Then move on to more serious examples of identity theft. Just thought using this an example would keep my post current and relatable, after all we all have profile pictures and basic information about ourselves online, and we rarely think of the negative consequences that could occur. Mhairisedgwick (discuss • contribs) 13:57, 9 March 2016 (UTC)

D man choo, Stevo sc, Mhairisedgwick, Kirstyyy smith, how do i add a sub heading/heading to the access to knowledge page, cheers guys AdilAslam1 (discuss • contribs) 14:24, 9 March 2016 (UTC)

Mhairisedgwick Hey! I think it's a perfect idea to talk about the TV Show Catfish as I feel a lot more people would be able to relate due to the fact that it's quite a popular TV show. It will also help to raise awareness of the problem. I think it is relevant as people are accessing strangers Facebook profiles and stealing all their information. They have managed to access that persons personal life so in a way are accessing their knowledge and data to use for their own benefit. If that makes sense? Kirstyyy smith (discuss • contribs) 15:05, 9 March 2016 (UTC)

Mhairisedgwick Yeah I agree with everyone else catfish is definitely relevant and worth mentioning. Stevo sc (discuss • contribs) 15:10, 9 March 2016 (UTC)

So for my point on the police and government use of internet information for protection I was going to look at child protection and reference the National Crime Agency command. They are organization that use access to information to protect children and prevent Child Exploitation and Online Protection for children, do you guys think this would be relevant? D man choo,Mhairisedgwick,AdilAslam1,Kirstyyy smith, Thanks. Stevo sc (discuss • contribs) 15:31, 9 March 2016 (UTC)

I also found this article that's got a lot of information on how the police use the internet to protect the public Stevo sc (discuss • contribs) 16:01, 9 March 2016 (UTC)

Also thank you Mhairisedgwick for your link on how to reference I got it to work and referenced above correctly. Stevo sc (discuss • contribs) 15:31, 9 March 2016 (UTC)

Hey guys sorry ive been off wikibooks for a few days. I'm currently working on the commercialization of our online prescence due to the unlimited access corporations have to our data, as well as the positive effects of being able to find representation online through interaction with others. I think the identity theft and police use of social media are really good topics. Im gonna try and finish up my sections but if I find any info that could help those sections I'll post links here. D man choo (discuss • contribs) 16:50, 9 March 2016 (UTC)

Adil there's a section in the book 'New Media' in our reading list which has a whole topic about Youtube and user generated content which looks pretty useful. It starts about page 221. Im doing a section in the wikibbok called Collaboration which is under the advantages of access to data section, you could put the stuff about youtube and user content under there if you want. D man choo (discuss • contribs) 14:07, 10 March 2016 (UTC)

D man choo cheers, ill definitely have a look at that, ive got a passage written so far but was going to put it in social sites, but i might do both if i word them differently AdilAslam1 (discuss • contribs) 15:11, 10 March 2016 (UTC)

So to add to my point on police use of internet information for child protection I've found more useful journal articles. This article "Police ‘skimming surface’ of online child protection" on harriet line explores how police action online could go further and be more intrusive into the public's information which I think is really relevant. This article "Online Security and the Protection of Civil Rights:A Legal Overview" Talks about how that the police's use of information online does not against the civil rights of the individual members of the public. I think this article is an interesting counterpart to the first one and I can talk about how there needs to be a balance between police protection of civil rights, by not invading members of the public's personal information too much.

I then found this article which looks at police protection of children online through scanning social media. The article "Online Police to Hunt MySpace Paedophiles" Is a little dated with reference to myspace but it is still useful at pointing out how police use online information through social media to protect children and members of the public. Stevo sc (discuss • contribs) 15:28, 10 March 2016 (UTC)

So this is the basic outline of the plan for my part. How is everyone getting on with there parts? I have found a lot of really useful articles so if you need any help just ask. D man choo,Mhairisedgwick,AdilAslam1,Kirstyyy smith Stevo sc (discuss • contribs) 15:28, 10 March 2016 (UTC)

Stevo scD man choo,AdilAslam1,Kirstyyy smith That looks great Steven, really interesting piece! guys I was just doing further research for my section and am currently considering the amount of information people can access about us online, just out of interest who has a public Facebook profile? and if your account is private can people that are not friends with you still see basic information and pictures? Identity theft is a serious and growing problem, and I have been considering if we have all these social media outlets are we allowing people to target us much more easily? my facebook profile is private to my friends but I am aware people who are not my friends can still access a lot of my information. Mhairisedgwick (discuss • contribs) 17:12, 10 March 2016 (UTC)

Stevo sc Those articles look great Steven, looks like you're getting on well with your piece! I am currently working on how we can actually access the internet through technology, so I am hoping to be finished with that soon Kirstyyy smith (discuss • contribs) 17:39, 10 March 2016 (UTC)

Stevo sc,D man choo,AdilAslam1,Kirstyyy smith,Also guys was just wondering, does anyone have any personal experience with identity theft? or know of anyone who's had photo's or personal information used? I don't have any first hand experience, but I have heard of a few cases and just wondered if any of you knew of any you would like to share? thanks guys Mhairisedgwick (discuss • contribs) 17:28, 10 March 2016 (UTC)

Stevo sc,D man choo,AdilAslam1,Kirstyyy smith, guys don't know if anyones interested but just thought I would share some of the links and resources I used when researching my section for the project. I found them really interesting and its definatly worth a look! http://www.bbc.co.uk/consumer/22342924, http://ieeexplore.ieee.org.ezproxy.stir.ac.uk/stamp/stamp.jsp?tp=&arnumber=7111875, http://www.actionfraud.police.uk/fraud_protection/identity_fraud. If anyone is interested and wants me to send more links let me know. How is everyone doing with the project? I am just looking over my final copy now and will upload it this afternoon. Mhairisedgwick (discuss • contribs) 12:04, 11 March 2016 (UTC)

This is my into guys !Stevo sc,D man choo,Mhairisedgwick,Kirstyyy smithWhilst it it is unclear when the first ever social networking sites were created, the dominance of several companies spearheaded the industry for the last decade. This can be attributed to the levels of usage and the number of users on the sites. The main social networking sites include Facebook, Twitter, Tumblr, Instagram e.t.c However, something that has not been included in this bracket is possibly the most popular of them all, YouTube. AdilAslam1 (discuss • contribs) 13:01, 11 March 2016 (UTC)

this is the next partWith the levels of information gathered by YouTube, when creating an account, it is certainly clear that they have minimum restriction to whom can and cannot use the website, outside of political influence. The content which can be published is also becoming more relaxed in recent years through different innitatives by YouTube, an example of this would be creating over 18 access levels and more recently introducing a paid service named YouTube Red. AdilAslam1 (discuss • contribs) 13:01, 11 March 2016 (UTC)

AdilAslam1 That's looking really good well done! are you using academic journals or mainly online sources for your research? I am using a mix of both, unsure how many references to use, I have quite a bit of quotes and statistics, but I am worried iv made got to much. Mhairisedgwick (discuss • contribs) 13:06, 11 March 2016 (UTC)

Stevo sc,D man choo,AdilAslam1,Mhairisedgwick It looks like you guys are getting on really well with your topics. I am excited to see the end result. I am currently just trying to fix my section up a bit so will properly submit it later. How many references should we be aiming to use? Kirstyyy smith (discuss • contribs) 14:05, 11 March 2016 (UTC)

Kirstyyy smith] its going good, i think thats there probably isnt a limit at all since its your information primarily [[User:AdilAslam1|AdilAslam1 (discuss • contribs) 14:09, 11 March 2016 (UTC)

this is the next part YouTube hosts many different genres which range from Comedy to Music and How to and Blogging. However content that has reached the site has still been provocative and extremely conservative. The death of Sadaam Hussien is one of the videos that has been widely criticised for being on the platform and has been called to be removed, however because the exact nature of the video does not contain explicit images that users could not handle, YouTube allowed the video to remain their. AdilAslam1 (discuss • contribs) 14:35, 11 March 2016 (UTC)

Stevo sc,D man choo,AdilAslam1,Kirstyyy smith, Hey guys, just wanted to give you all a look before I posted it on the main page. Does this look okay to everyone?

The internet is one of the most prevalent ways in which identity theft and fraud occurs in the modern era, now with over 1.6 billion social network users, there is a vastly expanding amount of personal data, easily accessible online, spanning from our names and date of birth, to our addresses, phone numbers and personal photos. All easily accessible online, and yes, although profiles can be private, is there any real way to know how visible we are online? Firstly we have to consider what ‘identity fraud’ actually is, and what is the difference between theft and fraud? To begin with pretending to be someone you are not is not technically fraud, it only becomes fraud when that individual’s identity is used for deception for example to obtain documents or credit cards under a false identity. Identity theft could be as simple as using someone else’s name and photos to deceive others online interacting under a false alias. The television series ‘Catfish’ which is a documentary program which addresses just this very matter, focusing on online interactions between social network users and the show tries to unite them. The program uncovers a large amount of identity theft on a smaller scale, whereby false identities or photos are used to deceive the person on the other end. ‘73% of catfishes passed off photos of another person (or of multiple people) as themselves’ This example really emphasizes how common it actually is, to have your identity stolen, even on a smaller scale.

‘It has been suggested that the proliferation of the Internet into the daily lives of so many around the world may be fuelling some of the growth of identity theft.' By accessing a stolen identity, criminals can use this alias to commit any number of crimes spanning from ordering and buying goods to ‘obtaining credit cards loans and state benefits’ this can have serious implications on the person whose identity has been stolen. ‘If you’re a victim of identity theft, it can lead to fraud that can have a direct impact on your personal finances and could also make it difficult for you to obtain loans, credit cards or a mortgage until the matter is resolved’ Although initially it may not seem as if useful information can be accessed on social media, fraudsters are able to link information provided over several different social media accounts and can actually find out in depth information which is vital to setting up official accounts, such as bank accounts. A lot of the time, security questions have answers which can be found online for example, mother’s maiden name or first primary school, is often all information which could potentially be found via social media. ‘26% say they use easy to remember passwords such as birthdays or names’ ,which is also all information which could be accessed online through social media.‘Criminals are becoming adept at hacking through weak passwords or taking advantage of consumers over the internet.’ This makes us question, should we really be making all this information so readily available online?

‘routine activity theory, suggests that particular online victim routines facilitate opportunities for identity theft victimization.’ This suggests that people who regularly shop online, for example, or have a regular online routine are more likely to become victim to identity theft. The fact that something as simple as our online routines would make us more likely to become victim’s, makes it questionable as to how we can take steps to prevent this. Having strong passwords and private account settings on social media is a key starting point. ‘Up to one in five of us have lost money as a result of cyber criminals and the average loss per online attack is a staggering £247 per person.’ this figure demonstrates just how often internet fraud takes place, and often goes unnoticed checking up on your banking and finances if you are heavily active online is key in protecting against fraud.

Although identity theft is not necessarily a crime in itself, ‘Fraud is a crime in which some kind of deception is used for personal gain. As technology advances, fraudsters have become increasingly sophisticated and many types of fraud exist.’ Online and internet fraud is only one of the many types of fraud out there and is a problem that is only getting worse with the growth in social media and online activity. Mhairisedgwick (discuss • contribs) 15:03, 11 March 2016 (UTC)

that looks great, can definitely go straight into the project. Whet section are you thinking of putting it under? D man choo (discuss • contribs) 15:17, 11 March 2016 (UTC) D man choo Thanks! iv put it in now under the illegal access section just slotted it in on the end, hope its okay there! Well done Mhairi the looks really good I would just put it straight in as well. Stevo sc (discuss • contribs) 15:51, 11 March 2016 (UTC)

So this is what I have as a rough guide to what I'm doing.

With such a vast amount of information available online one key advantage of this is using the information to prevent crime and disorder. The police can access the wide information available and assess the nature of the content to prevent criminal activity or to find those responsible for criminal activity that has already happened; the police and law enforcement use this intelligence to prevent crimes from happening in the future. To use the internet for the protection of the public the government and the police access individuals in the public’s information they post online through social media and other websites.

Police can use the information posted online as evidence in proving criminal activity. An example of this is in Chicago where Naperville Detective Rich Wistocki used information posted online as evidence to prove gang and drug related crimes. In this particular case photo evidence was posted online of gang members in possession of drugs, committing illegal graffiti and pointing guns to other individuals. Wistocki (2006) said whilst talking about the individuals posting information on social media "These guys put this out there, thinking that nobody's watching. That it's only their friends, but they are wrong". The police used the easily accessible information posted online as evidence in their case to arrest and detain the individuals that were involved in the criminal activity.

The police can also use the information that members of the public post online in child protection. The government use of internet information to protect children on and offline falls under The National Crime Agency command. They are an organization that use access to information to protect children and prevent Child Exploitation and Online Protection for children. The NCA's CEOP Command (formerly the Child Exploitation and Online Protection Centre) works with child protection partners across the UK and overseas to identify the main threats to children and coordinates activity against these threats to bring offenders to account. They use information to protect children from harm online and offline, directly through NCA led operations and in partnership with local and international agencies. In assessing the content of information that a child is exposed to online they can use this to prevent any harmful or paedophilic actions from happening to them. They can do this by tracking registered offenders who have a sexual interest in children and who have failed to comply with their notification requirements under the Sexual Offences Act 2003 as well as tracking potential offenders’ online activity. There is a question however as to if the police go far enough and spend enough time and effort accessing information online to prevent crimes. The article "Police ‘skimming surface’ of online child protection" on harriet line explores how police action online could go further and be more intrusive into the public's information. The hurdle for accessing information online to prevent crime is that there is such a vast amount of information to go through that is available that it can be very hard to find what is relevant in the protection of the public and preventing criminal activity .Another hurdle the police have to overcome in accessing the individuals from the public’s information online is invading a person’s privacy. The article "Online Security and the Protection of Civil Rights:A Legal Overview" Talks about how that the police's use of information online does not against the civil rights of the individual members of the public. The police must comply with the civil rights of people in the public when accessing information and there needs to be a balance between police protection of civil rights, by not invading members of the public's personal information too much.

With such a huge dominance in communication through social media the police can use these social media platforms to search for information of criminal activity through the information shared. By scanning social media the police can protect children online from harmful content or abusive users of social media. The article "Online Police to Hunt MySpace Paedophiles" shows how police have used the information on social media to prevent crime. With reference to MySpace the police used the online information through social media to protect children by searching through potential offenders paedophilic activity. Stevo sc (discuss • contribs) 16:24, 11 March 2016 (UTC)

I'm going to pad it out and add more to it but Its the basic outline of my part. Hope everyone is getting on well with there posts. Stevo sc (discuss • contribs) 15:49, 11 March 2016 (UTC)

Those look great guys you've done a really good job! Kirstyyy smith (discuss • contribs) 16:26, 11 March 2016 (UTC)

If anyone wants to add an image to their section there is a very useful guide here: https://en.wikibooks.org/wiki/Using_Wikibooks/Inserting_Images D man choo (discuss • contribs) 16:12, 11 March 2016 (UTC)

D man choo Thank you so much, I was having trouble with this earlier. Kirstyyy smith (discuss • contribs) 16:22, 11 March 2016 (UTC)

When I tried to do it I couldn't get any image from the internet to work - it had to be one from Wikimedia Commons D man choo (discuss • contribs) 16:24, 11 March 2016 (UTC) Thanks D man choo I couldn't get it to work either so I shall give it read now. Stevo sc (discuss • contribs) 16:28, 11 March 2016 (UTC)

Stevo sc,D man choo,AdilAslam1,Mhairisedgwick Guys I'm still editing my section but this is a rough idea of some of my material, what do you think? I'll obviously add more references into it etc.

We live in a day and age where technology is so advanced that there are now so many different devices that we can actually access the internet from. We have phones, computers, laptops, iPads and so much more. The most common way to access the internet is through computers. The computer was invented in the 19th century by mechanical engineer Charles Babbage. As it started out, computers were the only way that we could access the internet, meaning that our access to knowledge and data was limited as we could only use the internet if the computer was close by. In the 1980’s the laptop was created by Alan Kay, laptops are portable computers that you can take with you anywhere. This meant that it is easier for people to access information as having portable computers meant that people were no longer limited to one zone. Then of course we have mobile phones, particularly smart phones. When mobile phones were first invented in 1973 they were much simpler than they are now. The internet was not actually invented until the 1980’s and was introduced to mobile phones I the 2000’s. As well as being able to connect to Wi-Fi (Wireless Internet) 3G was invented and launched in May 2001. 3G allows you to access the internet wirelessly as long as you have signal. It stands for ‘third generation’ as it is the 3rd type of access that technology that has been made widely commercially available for connecting mobile phones. Having 3G on your mobile device means that you can use the internet wherever you go and this means that you are able to access all the information you want whenever you want. With even more advancements in technology, tablets and iPads have also been created. Tablets are basically netbooks but without keyboards. They are touch screen devices and the average iPad is around 9.7 inches in size. These can also be used to access the internet and are becoming increasingly popular, they are very quick and easy to use and allow you to access endless amounts of data and knowledge. With so many different devices allowing us to access the World Wide Web, and other forms of information, we have endless possibilities. We can access the internet pretty much however, and whenever we want. Kirstyyy smith (discuss • contribs) 16:30, 11 March 2016 (UTC)

YouTube hosts many different genres which range from Comedy to Music and How to and Blogging. However content that has reached the site has still been provocative and extremely conservative. The death of Sadaam Hussien is one of the videos that has been widely criticised for being on the platform and has been called to be removed, however because the exact nature of the video does not contain explicit images that users could not handle, YouTube allowed the video to remain their. AdilAslam1 (discuss • contribs) 16:45, 11 March 2016 (UTC)

YouTube is very popular amongst the 13-19 demographic and is mainly due to the introduction of video blogging, Internet personalities share their life and thoughts with the world and upload them onto YouTube, these types of videos have a cult like following amongst younger audiences partly because of the ability to relate to similar real life problems. This is however, a very difficult position for some of the people on the personalities because their thoughts and traits are available to the rest of the world, as well as this, the users who subscribe to them, can in apart feel as though they are a part of their life breaking down barriers that were once seemingly non existent! AdilAslam1 (discuss • contribs) 16:47, 11 March 2016 (UTC)

YouTube is clearly a very popular site amongst certain people and has very much a following and usage in the most popular websites, but it has its limitations and it also has boundaries that it is willing to adhere to, but the one thing out of YouTube's control, is their ability to censorship content to entire audiences as they themselves are limited in this front, as opposed to a nation like North Korea! AdilAslam1 (discuss • contribs) 16:48, 11 March 2016 (UTC)

Wiki Exercise #4: Wikibook Project Reflective Account
Working as part of team can be a very challenging but rewarding experience that can be both productive and offer great end results. With regards to the wiki project we undertook, this was not only team work within small teams of five people but also a much wider collaboration with over 20 other individuals in our topic area for discussion.

As the teamwork itself took place mostly online without a physical conversation face to face with all the team members that posed many challenging difficulties but also had some benefits as well. In not working face to face with other individuals this meant a delay in communication as information could not be passed instantaneous and a response would have to be waited for. This meant delays in productivity waiting for responses. Enzenburg discusses these negative sides to teamwork suggesting this can cause a restriction to productivity.

Shirky suggests a great equality in working online collaboratively. . This has some truth as in working with the wider group online mean, although there would be a delay in a response you would get a response from several people within your group and the wider wikibooks community. This allows for knowledge and information to be shared on a wide scale.

In the wiki project that was undertaken my personal experience was mixed. With other deadlines around the time I did not start my contributions to the wikibooks project straight away. When I began my research into what I could add to the project it was very evident that some individuals had a strong presence within the project and a lot of areas had been covered all ready. This posed a challenge in making sure I was not added a contribution that was already there, however through communicating with my small group D Mans and the the larger group I found my area to contribute and done so. Stevo sc (discuss • contribs) 11:00, 6 April 2016 (UTC)

Comments
I am very much in agreement with your comment regarding the delay in response as a disadvantage of online group work. This would be especially evident during the process of topic allocation and if you were collaborating in a small group, perhaps a pair, and needed a sort of 'permission' to contribute with your own idea(s).

You talk about deadlines being a problem. Although I was present for most of the project, there was a few days in which I was dealing with other university coursework so didn't access wikibooks at all, when I came back there had started a real discussion on topics. I had a mixed feeling towards this, I was of course delighted that the ball had started rolling and the project would finally get of the starting line, but I feel like I missed a good chance to contribute and show some of my own ideas. For yourself, coming much later to the project, I imagine this would have felt on an even greater scale. In the need to contribute you might have found yourself like I know a lot of people did, commenting on the work people had done, as opposed to being able to contribute in a more creative sense where at the late stage, a clear structure had already been determined. People would comment on how they thought something was a ‘good idea’, or people were doing ‘great work’. No doubt, this is valuable, and this sort of comment follows one of (Jenkins et al 2006: 5-6) points in defining participation, "where members feel some degree of social connection with one another (at least they care what other people think they have created)." However it can feel creatively empty, and I’m sure people would have much rather been able to contribute more to the structure. Many would have been disadvantaged by the timing of the project in relation to their deadlines, so immediately there is an inequality, certainly in contrast to the 'great equality' you write is suggested by Shirky. MrRobot 321 (discuss • contribs) 09:51, 8 April 2016 (UTC)

Stevo sc I totally agree with your comments Steven, the project has defiantly provided insight into the wikibooks community and has been an interesting learning experience. The comments you make about certain individuals having a much stronger presence did certainly make the project slightly harder as it meant collaboration was difficult in terms of fitting in with how they wanted the project to be conducted. Having said this, I feel like I have learnt a lot from this, adapting and collaborating, which I think gives us an insight into how the internet really works.

When you discuss group work I agree a lot of the communication was done online, I found the user discussion pages a great way to share work and ideas with team members. For instance links on how to reference and navigate wikibooks and use of the Tearoom all enabled a great learning environment and pushed for us to use our initiatives, rather than being reliant on tutors to show us what to do, giving us an insight into the endless power of information accessible on the internet. Mhairisedgwick (discuss • contribs) 14:00, 10 April 2016 (UTC)

Marker’s Feedback on Wikibook Project Work
If this were a traditional essay, your mark would have been higher, as while you have clear evidence of secondary reading and a good grasp of some of the critical currents in digital media and culture, you have not fully engaged in the collaborative aspects of Wikibooks. There's minimal evidence of engagement (including not responding to colleagues' posts for the wiki exercises when you were expected to offer 2 responses per exercise). Contributions are mainly clustered in a short period of time and you did not work with colleagues beyond a few conversations.

Content (weighted 20%)

 * Your contribution to the book page gives a good brief overview of the subject under discussion in your chosen themed chapter. There is a good range of concepts associated with your subject, and the effort to deliver critical definitions, drawing from relevant literature and scholarship, and your own critical voice in the building of a robust argument is very much in evidence. The primary and secondary sources you found about the chapter’s themes cover a good range and depth of subject matter.

Understanding (weighted 30%)

 * Reading and research:
 * evidence of critical engagement with set materials, although some ideas and procedures more securely grasped than others
 * evidence of independent reading of somewhat circumscribed range of appropriate academic and peer-reviewed material
 * Argument and analysis:
 * well-articulated and well-supported argument featuring variable depth of understanding
 * satisfactory level of evidence of critical thinking (through taking a position in relation to key ideas from the module, and supporting this position in discussion);
 * satisfactory level of evidence of relational thinking (through making connections between key ideas from the module and wider literature, and supporting these connections in discussion);
 * evidence of variable independent critical ability

Engagement (weighted 50%)

 * Evidence from contributions to both editing and discussion of content suggests somewhat deficient standard of engagement (i.e. volume and breadth of activity as evidenced through contribs)
 * lack of engagement with and learning from other Wikipedians about the task of writing/editing content for a Wikibook
 * Lacking in reflexive and creative use of discussion pages

Overall Mark % available on Succeed

FMSU9A4marker (discuss • contribs) 14:47, 3 May 2016 (UTC)