Group Assignment for ALC205

ALC205 Collaborative Assignment

Group Members and links to their blogs:

Luke Galbraith

Panuruj Sakdiset

Xiiu Yan

A plethora of proposals were considered when deciding what we wanted to create for our video. Our ideas evolved throughout the process. Initially a mockumentary styled piece was the direction we had decided. It was based around the popular TV show Survivor. The original proposal was too difficult to film given the environmental factors required to mimic Survivor, so we aimed to specifically deal with the tribal council. While the idea would be achievable it got dismissed as we felt it moved too far away from the original ideas of surveillance that governed us to emulate Survivor in the first place.

16900537284_d3630a0a42_z.jpg

Image: Stranded‘  by Manuel Schmidt, CC (By 2.0)

 

Big Brother was also considered as a possible reality show to imitate. We were considering a compilation. This would involve creating a series of comedic interactions between people that were caught on camera. We believed this idea lacked originally, and we also didn’t want to face legal trouble from the Big Brother twitter account.

The final mockumentary style considered was a parody of a reality school show, which stars destructive students in the classroom. It would have been fun to make and Deakin would be a great central location (as we all study there) to meet up and get the filming done. It was later discovered that within our group, a student was going to be overseas for the time we intended to film together. Not wanting to leave a member out of the process, we decided to discard these ideas and go for something that would involve all of us and be achievable internationally. We overcame this hurdle by finally deciding on a unique idea that encapsulated a strong essence of the main concepts considered within this unit. We each recorded ourselves in our room for 30 minutes to recreate and represent CCTV. These were fast forwarded and placed together to portray what those watching the surveillance footage would see. To reflect on our experiences for both the assignment and ourselves we provided a 30 – 40 second response about our thoughts and realisations from the entire experience. One of our group members decided not to film this section however, because they were too uncomfortable being on camera again. 

Screen Shot 2016-10-07 at 1.11.54 pm.png

Image: Screenshot of our concept in action.

 

To work productively in a group, there are various stages that must be met. Intake, study, objectives, goal setting, intervention strategies and evaluation are all integral parts of the whole process. Initially after communicating through the ALC205 discussion board we created a group chat on Facebook to plan and discuss what we want to do for our video. This platform was easily accessible to every group member and allowed us to discuss and collaborate with more beneficial platforms later. After the initial contact on Facebook, a range of collaborative online media provided more specific and advantageous benefits to the entire group. For example, Google Documents allowed everyone to share and co-author our documents and work.

We had originally hoped to meet up and film the video in person, however half of the group were off campus students, which provided difficulties when attempting to all meet up.  We decided it was best that we each work on our own specified tasks and piece together the video as a whole production at the end. Instead of face to face meetings, we held frequent group calls on Skype, JoinMe and Google Hangout, which allowed for concise and efficient discussion and planning of our video. After a few meetings, we had finalized our idea and begun delegating tasks and responsibilities. The structure of our video allowed for an even share of the work, which provided a harmonious and enjoyable environment for everyone to work in.

279865720_e9ea6401f8_z.jpg

Image: Surveillance Cameras‘  by Gavin Stewart, CC (By 2.0)

 

In the digital age, most of us are constantly under surveillance both in the public and more concerningly in private places. CCTV is the most common form of surveillance in public places, but deceptively can be similarly found in areas which are thought to be private. The aim is to control and prevent people from performing illegal acts. This reasoning might be acceptable to some, and be considered fair and just, to many others in society (including most people in ALC205) it creates discomfort knowing that someone is also watching.

The video that we created intends to emulate and show how the surveillance of CCTV and other recording devices affects our behaviour and subconscious. We tried to replicate how the everyday person might react under these conditions, and being constantly watched. The four separate videos that were shot, were all taken in the most comfortable and relaxed place we all could think of, our bedrooms. Despite this, we all exerted examples of unnatural behaviour.

15258582922_24118f2c26_z.jpg

Image: CCTV‘  by Rafael Parr, CC (By 2.0)

 

Given that our entire group mentioned the discomfort and awkwardness of the surveillance experiment, these responses aren’t the typical reactions that would be seen in everyday public. With CCTV, you often can be oblivious to the cameras or can ignore them quite easily. In our video however, the camera was the focal point of the room and the constant thoughts and reminders of being recorded played a significant part of our discomfort. These emotions also showed that while we are most comfortable in our own rooms, when that privacy is abused and removed, we notice both consciously and subconsciously immediately.While our approach did not aim to be dystopian, it seemed unanimously that the experience gave a feeling of unsettlement. It demonstrated just how much invasive our surveillance technology is. While there are undoubted benefits to the CCTV system our project accentuates that these strengths ultimately come at a cost.

Within this modern and developed world, cameras are everywhere and can be found around every corner or even on us (for the majority of people that have a smartphone). By filming our footage on phone cameras, we are displaying how the everyday person can be their own surveillance camera, either filming themselves or others. This fact seems to scare many civilians as they think that getting filmed is an invasion of privacy. Isn’t that something that is happening on a daily basis without us even knowing? How come we are scared of those we can put a face to, yet ignore those we cannot? Why are we uncomfortable filming ourselves or getting filmed by a friend, when we mostly do not look twice at the CCTV cameras all around?

 

“Under Observation, we act less free, which means we effectively are less free.”

Edward Snowden

 

Check out our video 🙂

 

Written by Luke Galbraith, Ben Lawless, Panuruj Sakdiset & Xiliu Yan.

 

 

 

 

 

Images: 

Edward Snowden 2015, Mass Surveillance in an Invasion of Privacy, International Trade News, retrieved 2nd of October 2016, <http://www.internationaltradenews.com/news/articles/mass_surveillance_is_an_invasion_of_privacy/>

Gavin Stewart 2006, Surveillance Cameras, photograph, retrieved 4 October 2016, <https://www.flickr.com/photos/gavinandrewstewart/279865720/in/photolist-qJok3-gAj8Dm-qJohF-qJogu-9DXu2z-8jcsSE-8d1ADr-qif6Cr-5TXEX-7WEzrB-9W5hCs-63GGnv-sgr8rh-6wRqgn-8Kjf8y-HaAT4-oXGss-6WAtk3-JHfUg-GiYvbX-jZQV5-gUyMo-e3uZxg-azFqCi-5JPCk6-VZxyW-yW2VU-oLDWeu-6WwsMk-9EVYXz-iXk6Hd-emcVv-8gU4wP-6WwttH-7Zese-hxiLQX-59qDdo-hxhjRC-dDgdoa-kRcXtw-F8hqD-7VibC7-6WAtTw-8Qkqcd-4HWanj-nS1TL-6WwtmH-pWytsC-6WwsSD-4KGLFA>

Manuel Schmidt 2015, stranded, photograph, retrieved 4 October 2016, <https://www.flickr.com/photos/63929583@N07/16900537284/in/photolist-rKrEVS-qFKwVt-7tMez6-pmjG51-5snqqB-TdSvD-7A8XdT-qyudxo-8TFkc5-avZH73-4cKbR-8TGV38-uYehTy-jqtpE8-4PUPw8-q2P5mF-4PUQ94-4PUPL6-4PUQjK-4PZ6Mo-4PZ5xj-nbcMZw-4PZ7eb-4PZ71G-5XLCuJ>

Rafael Parr 2014, CCTV, photograph, retrieved 4 October 2016, <https://www.flickr.com/photos/rafaelparr/15258582922/in/photolist-pfme6U-7pZfGM-aFMn6g-cm573Y-b2DZaP-mKaGLB-bT3qJK-4Da5AR-cEKajS-5ggr3K-bH1Lxk-p2nBWJ-29zhki-iCycND-6ggAP8-cm575w-h1NSS4-sznXM-9uKCu4-88BdsR-aUYEhn-mFGdUg-bPnwh-57DpEp-5mxh2R-EUTyoV-5mxn2M-65MyYu-4v1xfx-G38Sh-5F2NEa-51GZA3-5n9XQM-buFP3P-F12r-4QqbKZ-fQK2J9-bVaLfb-e9WPbF-85TQbh-9ZytnV-5hEoWd-2YC2eh-61w43P-byro7c-9AWhWt-zQUv5-9VzsTn-56X3D6-f9EpqR>

Thomas Hawk 2009, Surveillance, photograph, retrieved 4 October 2016, <https://www.flickr.com/photos/thomashawk/13124559245/in/photolist-kZLNde-eaqBye-6GVSiZ-6GWi9g-9kQQ6-9kQU2-6H1oau-9kQW6-9kQRS-9kQYf-q1keGK-48n4sA-4jiJg3-aw5ZnY-xuXD-4jiL2J-LUQa1-4bWLna-7BFbir-ggqHE-6sYW81-8zrHfE-9tYZtp-4xBuJt-peVbFy-f4A53y-bBY9F2-4KYQpB-6H9BL7-dYNhJx-fbvyQS-48Ri2G-aPnSB-qJoib-qJoj5-qJoh6-qJokG-b2vtQ-qJok3-gAj8Dm-qJohF-qJogu-9DXu2z-8jcsSE-8d1ADr-qif6Cr-5TXEX-7WEzrB-9W5hCs-63GGnv>

Peek-at-you

So unless you have been living under a rock… that is in the middle of space…of a different universe… while also being dead, I’m sure you have heard of the phenomenon Pokémon Go. I’m not planning to Raichu guys an explanation of the game mechanics, but the general premise of the game is a scavenger hunt, with users travelling around the city/country/globe searching for new Pokémon and items.

13189339513_08650de804_z.jpg

Image: ‘Pokemon’ by Seika, CC (By 2.0) 

 

One of the most exciting parts of the application is its Augmented reality (AR). This creates the appearance of Pokémon in the real world and helps to make the dreams of millions (having Pokémon in real life) not a Farfetch’d reality. It also requires your location settings to track your movements and know when to spawn the Pokémon onto your device. Research done by Roesner and colleagues highlighted how AR technologies create a greater risk for breaches of privacy and surveillance (2014). Unlike many other applications, AR requires constant access to functions of a device such as camera, microphone, location or password. Because of the duration of access the applications require, Pokémon Go could leave its users open to tracking among other risks while using the game.

 

Geolocation services are of vital importance in Pokémon Go. Without them, the can cannot track your location and spawn wild creatures to specific areas. Relatively harmless you may think, as Google Maps have similar tracking for when we try to find a location. But have you made any serious thought into what this information can be used for? A journal by Jia and colleagues demonstrated how Geolocation technologies could be attacked by outside parties. These attacks can give access to the victim’s country, city, town, all while knowing the specific time you were at these locations to (2015). So playing this can game can allow for anyone to know my location??? Shut your Meowth!!

4267327909_06db8899e7_z.jpg

Image:’WILD PIKACHU APPEARS‘ by Sadie Hernandez,  CC (By 2.0) 

The sad thing is that the every day user has also found ways to affect our privacy while using the game. Armed assailants used the game to lure victims to specific areas, for the intention of robbing them (Yuhas 2016). While this isn’t the typical form of privacy risks, you would associate with a mobile game, it should still be in the forefront of your mind, as you should never take a Chansey when it comes to your life. The nature of the game places its users in an outdoor environment and you need to be aware of your surroundings.

 

 

While these technologies are foreign and new concepts to many individuals, as with all other aspects of our life and our devices, we need to be wary of the risks and harms they could cause us. If Exeggcute(d) correctly, the possibilities remain endless however, and Pokémon Go could be the pioneering application that demonstrates to the world how devices will be used in the future. Fombona and colleagues discovered the educational benefits that VR and Geolocation provide by creating an innovative learning environment for uses (2015).

 

Virtual Reality

Image: ‘Virtual Reality Demonstrations by UTKnightCenter, CC (By 2.0)

So I don’t want to be all Gloom(y) about Pokemon Go and the technology it uses. There are many benefits and enjoyable experiences that would cease to exist without the game. With most new technology, there will always be issues and teething problems… which I wanted to share to the reader. If using the game I just want all users to be aware of the potential risks that they could incur.

 

Anyways I got to go, I see a Dragonite on my nearby list and need to find it ASAP!!

Bye

 

References:

 

Fombona, J, Coto, V & Caldevilla, D 2015, ‘Mobile augmented reality interaction: an approach to the phenomenon’, Informação & Sociedade: Estudos, vol. 25, no. 3, pp.117-129, ProQuest

Jia, Y, Dong, X, Liang, Z & Saxena, P 2015, ‘I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache’, IEEE Internet Computing, vol. 19, no. 1, pp. 44-53, doi: 10.1109/MIC.2014.103

Kumar, M 2016, 6 Important Things You Should Know Before Playing Pokemon Go, The Hacker News, retrieved 28 August 2016, http://thehackernews.com/2016/07/pokemon-go-privacy-hacks.html

Roesner, F, Kohno, T & Molnar, D 2014, ‘Security and privacy for augmented reality systems’, Communications of the ACM, vol. 57, no. 4, pp. 88-96, Academic OneFile

Yuhas, A 2016, Pokémon Go: armed robbers use mobile game to lure players into trap, The Guardian, retrieved 27 August 2016, <https://www.theguardian.com/technology/2016/jul/10/pokemon-go-armed-robbers-dead-body>

 

Images:

Jordan Bajc 2011, Wild Pikachu, photograph, retrieved 29 August 2016, https://www.flickr.com/photos/jordanbajc/6279650112/in/photolist-ayURcw-9X2ELo-bdnn1i-59oeqg-dPMXRE-nSuwZD-dPGkCB-dPGjGP-kPdAQC-kPbBsp-kPbBpi-fAjrJb-4f2xFE-oH7uGh-dPMWZG-az8dY1-8uTR8k-prpFav-5aUCoE-7gQSmb-dARjS3-ojnJuy-6j242F-7gLVyT-6GUVpp-pxiUQt-5GahTy-oeKE7q-aNrhTX-6GUVoF-5V2Yn4-7kxbUw-7f4ke7-4EL7jv-dvoUng-bD8Zmt-9XbzvZ-7f4ktW-fvT97F-7f4jYY-5yHJuy-7f4jP3-7eZr2T-4s3ixS-aKcj58-dxSx7g-hYRkf6-bnhfqH-7eZqXB-m6uP8p, CC Attribution 2.0 Generic

Sadie Hernandez 2010, WILD PIKACHU APPEARS, photograph, retrieved 29 August 2016, https://www.flickr.com/photos/sadiediane/4267327909/in/photolist-7v6aV8-6y3pWB-8N54Ew-4ryB9D-J3mqqR-FVokgC-dScXrQ-4RzHnV-dLJiFG-qexm6R-amKeUJ-7zibzw-516QGy-8p2xQo-aX8UbT-pXipf6-pXgX3a-e9TjuA-qeHwbp-7vuFro-5XgRER-2AnyQC-7oaGgP-dmaBNP-emnzto-emgM5F-emgNwT-sbY9i4-7RdSFV-dwfXqN-qeE93E-qCLMA-Gp7i3m-51CYwr-51H3vd-51CRcD-51H3aL-51Hf5j-51H3ky-Gp7fTw-51CXng-Km6i5-51Hbcs-5eSAVK-mDMqLB-HjCp8a-51CYmD-HjCpmr-51CWwF-51HffC, CC Attribution 2.0 Generic

Seika 2014, Pokemon, photograph, retrieved 28 August 2016, https://www.flickr.com/photos/nseika/13189339513/in/photolist-m6uP8p-qCufCu-7VGJoK-4mbGfi-yGz95-atP5Mw-6LXE7e-51Lto8-dGsqdy-dARDYw-7DraAA-8tpPPd-8tpUFb-8QcRYL-dLbCzT-6L8xm-5LP4t4-2NcK1u-oHcyc-dLbDQp-7Uv35n-4c5GLP-xs6Rm-57A3ht-ajj8ri-azLgPb-6Ki2TT-dQu6Sz-6Ki2Eg-dZbu1m-8swmoe-nvENnR-a1UHBm-dZipkJ-8zyEGK-eC5YBo-2yTdow-3wW2GC-U8wbT-qHYbFq-atNo65-atNmky-dUmpHm-7Z75Pj-8tpWTu-ebaYib-xs6Ng-xs6QS-8tq2XW-xs6PY, CC Attribution 2.0 Generic

UTKnightCenter 2015, Virtual Reality Demonstrations, photograph, retrieved 29 August 2016, https://www.flickr.com/photos/utknightcenter/17190334762/in/photolist-sc3XC7-DcfiTZ-p3HJAb-dc3jAr-bi5s4a-4HYWqe-FuDtxW-G9QvSn-dTVmG6-JrEqK5-8Yto7z-mUfLFY-ph9pmA-CD9KoY-bhwazi-snCSgd-CvYCX3-8BPYAc-rpHzg8-kKZytZ-rpB7Uy-rUCei9-rG59Xc-HGz8n1-qKaJu5-bcE3rH-rUCgEU-GED8m4-qJPZEL-rGanMp-9T1Reo-rDSUrN-dc3ikp-ocoTT-fpDFfo-dc3itZ-EiuGRb-59kHBk-4GXcBN-4YsFF7-59pW2u-59kGWT-59pWzJ-rSSiHx-59kJgX-59pUEG-bhpJHP-6WCX8j-59pWwL-59kJv4, CC Attribution 2.0 Generic

 

 

 

Hey Siri, are you protecting me?

 

If you are like myself, you must have discovered the convenience and occasional enjoyment that talking to your phone can provide. I am not referring to making a phone call or aimlessly chatting at your devices like a crazy person, instead I mean making commands to our personal artificial intelligence Siri (or whatever other system non apple devices use). Being able to yell ‘Siri, put an alarm on for 8am’ before bed or asking for the weather in the morning, must have saved me multiple seconds of time on a daily basis. Upon reflection however, the ‘how’ of these functioning technologies becomes slighting alarming. To know the weather for example, requires the phone to know the location of where I am. While I appear lucky to be an Apple convert, because they aren’t selling off my data like other companies (see tweet below), I still want to know a bit more about the mysterious Siri.

6751892711_f59c0452e8_z.jpg

Image: 015 of 365‘ by Yogesh Mhatre, CC (By 2.0)

 

The habits of people using Siri or one of its rival counterparts have found to be significantly influenced by environmental factors (Moorthy & Vu 2015). After research was undertaken, participants in the study were found to be more cautious about disclosing information through voice activated programs. This showed how people are still unaware about how the intricacies of the technology that can cause hesitations. Privacy was still the primary concern for users, as seen by the significantly amplified caution for using voice-activated programs in public. Another study by Humphreys (2005) further showed that privacy is a concern for mobile users. While using cell phones in public, different body language techniques were used to create private space such as the turning of the head, looking away and not making eye contact with others in the public or engaging in other activities in the appearance of being preoccupied.

 

5784376625_ea299537da_z.jpg

Image: Phone Manners‘  by  Jellaluna, CC (By 2.0)

Not actually knowing if there were genuine fears and concerns about the Siri technology, I decided to perform some research to gain a better understanding of how the technology works.

The general premise of how it works is this; once you have spoken your phone sends those audio files to a remote server. These files are then translated into a text command that can be analysed and is finally fed back to your phone to create a response (Damopoulos et al 2013). While this is all through safe servers and a secure process, if someone were able to infiltrate this program… think of the access they would have. Asking Siri to call someone gives access to your contacts or asking for directions gives away your location.

 

779_2012_579_Fig9_HTML.gif

Image: (Damopoulos et al 2013, fig. 9)

The above table shows how a hijacked Siri program could steal sensitive information such as your passwords (in a relatively more educated and specific manner than I ever could). Pretty much the take away is they redirect your voice messages and generate their own questions and response instead. The sad thing is that if I were trying to send an email and was asked to confirm my details, I wouldn’t have even questioned it…. well until now.

 

While there are many failsafe’s and protections in place to protect our information, it still doesn’t completely protect us from hacking (see tweet below). One of the wonders and benefits of technology is how it is rapidly changing and making the lives of its users easier. But for not only me but also yourself, please just be wary about what you say to your ‘friend’ Siri.

References:

Damopoulos, D, Kambourakis, G, Anagnostopoulos, M, Gritzalis, S & Park, J 2013, ‘User privacy and modern mobile services: are they on the same path?’, Personal & Ubliquitous Computing, vol. 17, no. 7, pp. 1437-1448, doi: 10.1007/s00779-012-0579-1

Humphreys, L 2005, Cellphones in public: Social interactions in a wireless era, New media & society, vol. 7, no. 6,  810-833, doi: 10.1177/1461444805058164

Moorthy, A, & Vu, K 2015, ‘Privacy Concerns for Use of Voice Activated Personal Assistant in the Public Space’, International Journal of Human-Computer Interaction, vol. 31, no. 4, pp. 307-335, Science Citation Index

Images:

Jellaluna 2011, Phone Manners, photograph, retrieved 28 August 2016, <https://www.flickr.com/photos/90859240@N00/5784376625/in/photolist-9P9rDt-dccScM-7xjuWJ-rCifXv-dbeJ4i-81JzpW-kP8hL1-brxwU8-pi8Z2B-nVtKGn-nJ9a-bsr77R-5gpWTz-or5GW3-oTintK-aDkfck-dCDCEf-rF2XS7-pRNmJ9-odTDK6-oHz2kH-oV45sA-gYPWeA-db5NoN-JJRDc-oHxcgf-dat3cP-dbXfUD-dat3qe-bnyECu-dbdvmy-FSMYmZ-5VSpsc-oSDUj1-qweiLS-eAF3ip-bA2A4x-6LxgBk-A5LcX-fgjNqQ-3QjPyX-buh8UR-qFY4Yr-8LP6xG-9n5fE9-cadkCj-dcuNQA-ncMnz2-dbdrwB-oHxdTU>,  CC Attribution 2.0 Generic

Sean MacEntee 2012, siri, photograph, retrieved 28 August 2016, <https://www.flickr.com/photos/smemon/8070397213/in/photolist-di9TVx-dgPbsG-5LUyPg-5CC6sP-fpZ8XK-7hNggk-6AqvrP-axkfW5-r4DZdv-k3JuP-cT9yX3-cEa5QY-a7bXPM-hyF9Ln-98htXa-3T5Qaw-7fSiTv-93qrUL-6hF1tE-8soStg-6hAQyB-cEa6S5-9WXUwC-iFLRWP-dy1Ygm-5TG4AW-5TBJ9e-71mkCr-58wAAe-5iSDsd-5iSDhJ-aiUUcR-88q2WN-5iSDJo-96wkyw-p4o2V-5iNmMc-92od8X-axsBMW-2dJJ6c-77EUWC-cUgkZ5-nJsFc2-5iSDAS-htZqcr-6AwqUL-iSqatP-iDoSGH-a8HvBE-cEa76A>, CC Attribution 2.0 Generic

Yogesh Mhatre 2012, 015 of 365, photograph, retrieved 28 August 2016, <https://www.flickr.com/photos/hinkelstone/2435823037>, CC Attribution 2.0 Generic

 

 

 

Not what I Sexpected…

So here we are. Another unit completed in my Communication and Media degree. While normally I feel relieved to be closer to my graduation day, this feels different. While initially resisting the requirements to maintain an active online identity, once I began to embrace the concept a strange thing happened… no longer did work feel like coursework but instead became part of my everyday routine. I found myself checking my twitter account on a daily basis, which for someone that initially came in with a borderline distain for twitter, this was quite strange. I never dreamt this would happen… but never thought I would start a blog or post a video on YouTube, so apparently this is the year of the strange.

When creating my video, one of the most difficult parts was trying to find valuable sources for the sexting topic. While there are many research papers around, many discussed or complained about the same thing. Using the Deakin library greatly assisted my research; with learning to use the abstract to identify articles relevance became an immense timesaver. Changing the keywords from ‘sexting’ to ‘sexting positives/negatives’ or ‘sexting education’ for example helped to narrow my search for useful information.

With around 20 scholarly articles found it became time to cull them down to be able to meet a 7-minute deadline. I decided to link the articles with relevance and found mutual topics of:

Who is sexting?

Why they are sexting?

What benefits can be found in sexting

Why are people scared or against sexting in the first place?

Doing this kept the subject broad enough to become applicable to a large audience, while still being able to provide valid and strong arguments.

So now my topic had been chosen, my research was completed and I had planned out my video there was only one thing next. FILMING!!! With limited technology (only an iPad) and no form of audio equipment I set up my workspace and began filming. With an initial hour of ‘um’ and ‘ahh’ muttering things looked bleak but as it started to become more natural, I got into the swing of things rather quickly.

Upon filming and then finally editing I learnt many things that I wish I knew before I had started. If I ever record another video (GOD HELP ME NO!) then I will take some new information into the work.

  • Lighting: I started filming throughout the day in my shed, and once I begin editing released that there was different lighting for specific sections. The door is a tinted glass so the weather outside changed my lighting. So make sure all externally lighting is covered and no light bulbs die during recording (a very annoying surprise).
  • Filming: Take as many shots as possible, even if you think you have nailed it record some more because often their will be some pauses or repetition of words (actually is now my mortal enemy).
  • Editing: JUMP CUTS. When you haven’t recorded enough footage or recorded too much footage then these will become both your best friend and worst enemy. Was I happy with the amount of jump cuts used… probably not but it did make me look and seem like a real Vlogger.
  • Visuals and Sound: Get audio recording equipment and a decent camera… that is all.

The best way to counteract not having decent equipment though is to use other people’s work (creative commons for the win y’all). While my iTunes playlist is updated with many fresh Soundcloud beats and my computer is filled with Freeimage photos, they also provide awesome content that make editing and production so much easier.

While this would have to be one of the most difficult and eye opening tasks I have completed, it would have to also be one of the best. I challenge anyone out there to find a topic and Vlog about it because you don’t know yourself until you watch yourself for 7 minutes.

 

Ben out!

(659 words)

 

Enjoy and i apologies for the scary image that is currently on your screen.

 

 

 

 

My broader online engagement:

I have vastly improved my online engagement in the second half of the semester and really began to enjoy it. I have been commenting on videos and podcasts (occasionally), posting on twitter, making videos and interacting with fellow class members.

Please view Tiffit tally for specific engagement.

 

 

References

 

 

 

 

What the hell am I doing?

 

What the hell am I doing? I have never been someone that writes in a diary or thought that my life was worth blogging about. The whole premise both scares and confuses me, but I guess… here I am. As a society we have moved from an oral culture to a ‘book culture’, which is also known as secondary orality (Ong 1982). This shift is what began the rapid technological advancements we have today. The transformation of the Internet into Web 2.0 has now given the everyday person the ability to become authors of content (Hew & Cheung 2013). Changes of technology and habits h
ave been a disadvantage to passive users like myself. My previous thoughts on the notion of blogging were that it was a selfish act used to promote oneself and show the world how cool they are. But after sitting in a café, rewriting my first paragraph over 13 different times and realizing that I have half filled a coffee loyalty card in one sitting, I have developed a greater respect to the skills and intricacies it requires to produce an interesting blog. So for the sake of an assignment and for my own personal growth, I am attempting to become more socially prevalent… What the hell am I doing?

question marks

The “global village” is where past and present ideas can freely interrelate in a dynamic and adaptive culture. A growing offspring of these ideas among all professionals is their tendency to use the Internet for many purposes. Amie Baumwell, a social media strategist believes that “having a social media presence isn’t an option anymore-it’s a necessity” (Durrani, 2012). In this regard I tend to agree. In the medical field, social media is used by two-thirds of the doctors for professional purposes and 94% of physicians are using consulting apps while on the job (OBizMedia 2011). These statistics are not surprising given the fact that 41% of people’s choice of doctor, hospital or medical facility is affected by social media (Ottenhoff 2012). Conversely, incorrect uses of technology can negatively affect someone’s professional standings. A study found that 43% of hiring managers admitted to using social networking sites to research potential candidates (Grasz 2014). So Ben, you’re telling me that posting a video of yourself downing a beer bong the night before an interview isn’t a good idea? Who the hell knew? The president of a creative marketing agency 23 Kazoos Wendy Kenney, agrees with the importance of social media sites. She believes that they are essential for professionals. The only problem is that many use them as an advertising medium, where they instead should be used as a listening medium (Durrani, 2012). This once again proves that the online world is a valuable and beneficial resource, but only if used correctly… No wonder why I feel so much pressure!

Loose Cannon Picture

For me, caution has been a large part of my hesitancy to using social media, which stemmed from a personal mishap in the professional sense. During previous full time employment, I was in charge of issuing both staff and student cards. Me, being an 18 year old, thought it would be hilarious to issue myself a fake card. Loose Cannon was a nickname of mine at this time (reason not provided), so a card was made and posted on my Facebook page – 152 likes in 12 hours = new personal record. The next day at school, some students were talking and laughing about it in class and were overheard by a teacher. What then followed was a meeting with the head of school, were I was informed that it wasn’t the image professional staff should be portraying; especially as the school logo was still present. One formal warning and immediate deletion of the photo later, a lesson was learnt. This was my first and last taste of creating a negative online footprint, and made me realize that anything you do online can be discovered, even if you think you aren’t accessible by colleagues. What the hell was I doing?

https://www.easel.ly/index/embedFrame/easel/3620365

As seen above, social media use can be categorized by the 7 types (Fleming 2012). In the spectrum, I fall into 3 of the demographics – spectator, collector and joiner. Since I was first given my own laptop at age 11, the online community has been a large and crucial aspect of my life. My philosophy in regards to social presence derives from Tu and McIssacs definition “a measure of the feeling of community that a learner experiences in an online environment” (2002). I believe that someone can develop a strong presence without having to post regularly and share every experience with the world. I’m a corny clique, believing that quality is better than quantity (if you can call any of my posts “good quality”). This type of usage would make me a content/open strategist (Ollier-Malaterre & Rothbard 2015). This is because I am friends with both colleagues and friends on all my accounts, but do not filter my content posted.

 

While I am quite a prevalent user of many social networking sites or applications (I have been asked by friends to simmer down my snapchats), this hasn’t translated to my twitter profile to date. Both due to the lack of follows and current low interest in the medium, my account is relatively quiet I have even been tasked in previous units with maintaining a healthy twitter account (1), but have yet to spark an interest in constant tweets. I have made a few tweets (2) and joke attempts (3) in the past few months, but the lack of support – and tweeting talents – has again discouraged my support of twitter.

 

 

 

I am aware of the irony that is I won’t tweet due to a lack of followers, and that I have a lack of followers because I don’t tweet, which I guess leaves us in a standoff. Resolution can only occur with someone making the first move… and because I am stubborn, I now patiently await the couple of hundred followers to make the first move.

 

What the hell have I done? I have now written and completed my first blog. In the beginning what started as a scary and foreign project actually became pretty enjoyable. By improving and reflecting on my digital identity, it has been shown that I should see improvements in technological capabilities, career prospects, peer respect just to name a few (Ainsa 2016). So I know you are dying to ask, is this also your last ever blog? I believe I will take the advice of a great man and start to “live online (a bit)” (Brown 2016).

10422069_1089385781092540_2421743242876387925_n.jpg

What the hell am I doing?

(1,084 words, not including citations and captions)

References:

Ainsa, T 2016, ‘OLLEGE STUDENTS’ DIGITAL IDENTITY: PERCEPTIONS TOWARDS EMPLOYMENT AND CAREER’, College Student Journal, vol. 50, no. 1, masterFILE Premier

Brown, A 2016, ‘meMedia and Media Studies 2.0: Making, Sharing, Learning’, WordPress, weblog post, 5 March, retrieved 12 March 2016, < https://adamgbrown.wordpress.com/2016/03/05/memedia-and-media-studies-2-0-making-sharing-learning/>

Durrani, A 2012, ‘Making a big footprint online’, podiatary management, vol. 31, no. 6, pp. 155-160, CINAHL Complete

Fleming, G 2012, Global Social Technographics Update 2011: US And EU Mature, Emerging Markets Show Lots Of Activity’, Forrester, Weblog post, 4 January, retrieved 18 April 2016, <http://blogs.forrester.com/gina_sverdlov/12-01-04-global_social_technographics_update_2011_us_and_eu_mature_emerging_markets_show_lots_of_activity>

Grasz, J 2014, ‘Number of Employers Passing on Applicants Due to Social Media Posts Continues to Rise’, According to New CareerBuilder Survey, Career Builder, retrieved 18 march 2016, <http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?sd=6%2F26%2F2014&id=pr829&ed=12%2F31%2F2014>

Hew, K & Cheung, W 2013, ‘Use of Web 2.0 technologies in K-12 and higher education: The search for evidence-based practice’, Elsevier, vol.9, no.1, pp47-64, ScienceDirect

OBizMedia 2011, ‘The Doctor’s Tech Toolbox’, Infographic material, SpinaBifidaInfo, retrieved 16 April 2016, <http://www.emrthoughts.com/files/2011/07/DoctorsToolboxLrg.jpg>

Ollier-Malaterre, A & Rothbard, N 2015, ‘How to Separate the Personal and Professional on Social Media’, Harvard Business Review, retrieved 16 April 2016, < https://hbr.org/2015/03/how-to-separate-the-personal-and-professional-on-social-media>

Ong, W 1982, ‘Orality and Literacy: The technologizing of the word’, Methuen & Co. ltd, New York

Ottenhoff, M 2012, ‘Infographic: Rising Use of Social and Mobile in Healthcare’, Infographic material, thesparkreport, retrieved 16 April 2016, < http://thesparkreport.com/infographic-social-mobile-healthcare/>

Tu, C & McIssac, M 2002, ‘The relationship of social presence and interaction in online classes’, The American journal of distance education, vol. 16 no.3, pp. 131-150, Education Source

 

My general engagement to date has been relatively poor. I have always been someone that observed but never posted much, which is something I have relatively maintained. As I am still quite young, I am still unaware of where my life will end up and if what I say will affect my chances. While researching this assignment is changing my beliefs on the matter, it is unclear if I will be adopting an active approach after this course. I have attached the few engagements that I have undertaken.

 

 

 

 

Making it less TAXIng

While the Taxi industry is currently in trouble with the current popularity of Uber, some people might think that this could be the end of the Taxi industry. Me on the other hand, feel this brings on an exciting chance for taxi’s to update their operations and retake the position on driving throne.

My plan is to use 4 simple mechanics from video games and apply them to the Taxi industry to increase engagement and improve the industry as whole. This will require either a new or at least update of the current app. Let the Gamification begins….

 

1.Fast Feedback:

This process would involve being able to search all available local taxi drivers in the area and view them on a map. You will be able to see their ratings from previous drives and any comments left by customers. Once selected you can be connected to the driver where you can arrange pick up spots and how to identify you (so Taxi’s aren’t stolen) etc. You can also review and be reviewed after your journey with both a ?/5 rating and a written review if required. Beanhunter is one of many sites that use this system, by having multiple reviews and ratings about coffees. This allows you to choose the best destination in the area while minimising the risk involved.

Screen Shot 2016-04-22 at 2.14.56 am.png

Bean Hunter

2.Badges/evidence of accomplishment:
These awards can be given to both the drivers and the passengers on the Taxi app. Badges for reaching distance travelled, amount of taxis called, consecutive weeks and reaching a certain amount of stars. Physical rewards such as a percentage discount, free rides and priority service can be given for hitting specific badge goals. An example of a successful badge system employed by Foursquare. Some of their ideas such as a dragon badge for using the app on ‘Game of Thrones’ nights can add excitement for a whole range of demographics.

Screen Shot 2016-04-22 at 2.06.08 am.png
Four Square Badges Explained 

3.Points:

The points system i would adopt would mean that points are earned at the end of each journey. You will receive a total that is based upon this very complicated formula: A x B = T (A = the score you receive from the driver out of 5, B = the total distance travelled, T = total points earned). These points can be used to give you a discount in future travels. The system would be similar to the Flybuys system how you earn points that can eventually be used as credit for other journeys. Teaming up with other organisations will increase the value and importance of these points too.

Screen Shot 2016-04-22 at 2.23.55 am.png

Flybuys

4. Community/Competition:

Community in this idea would involve everyone having the ability to see the drivers in the area and communicate with them directly to organise any specific details (if needed). It also allows everyone to share their experiences of events and promotes all people involved being better behaved. Having better reviews could also be used in a priority system, so your service will faster the more repeat positive reviews you have. The competition aspect of the app would be that you can have scoreboards to compare yourself to people globally, in the area, or even just in a friendship group to see who has the most points. Splitting bills can also be arranged with the app by seeing previous fares amongst the group and making everyone pay different amounts accordingly. Jeans for genes uses a leaderboard system to show who has donated the most, which will give positive PR and recognition for anyone that donates.

Screen Shot 2016-04-22 at 2.49.25 am.png

Jenes for Genes

 

I believe with these little (well maybe not so little) changes, the Taxi industry can take a giant leap forward and increase their chances of driving supremacy.