Big Idea 5 Reflections
5.1
Our Project (Electric Cars)
Beneficial
- Gives valuable and accurate information on the cars as well as facts
- Provides services which can help someone decide on their car situations
- Extra features that could entertain while still informing and comfortabalizing users relating to cars
Harmful
- May not always be up to date
- Does not cover all electric cars, just the brands that are full electric
- Doesn’t compare with other options
Beneficial
- Can easily access resources and information
- Quick and convenient search engine
- There is information which covers basically any topic which can help anyone utilizing this resource
Harmful
- Anybody can add anything on a website which can be accessed
- Can lead you to corrupt sources which can harm your computing source
- Information can be misleading
FIFA 23
Beneficial
- Entertaining, easy to have fun playing
- Way to play/do something with friends
- Become more cultured in terms of soccer (football)
Harmful
- Can be addictive (dopamine issues)
- Takes up a lot of time
- Takes up a lot of space on a computing platform
Dopamine Issues Reflection
In our modern world, dopamine issues refer to our addiction and need for technology, specifically in things like social media, entertainment, games, etc. These technological issues pose great threats to those who need to be productive rather than preoccupied. Social media and gaming can also cause problems that relate to cyber bullying, leading to stress and anxiety.
5.2
How does someone empower themself in a digital world?
- Empowering one’s self in the digital world can just be making enough money and being in a place where technology is available and affordable for someone.
How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
- One thing that Del Norte High School provides, is the ability to access a free school chromebook, therefore allowing a student to “empower” themselves by gaining easy access to technology, therefore allowing them to compete with the rest of those in the digital world.
Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
- Barriers that can block digital empowerment include restrictions such as money (cannot afford technology) or location (not technologically advanced enough such as a third world country).
5.3
Intentional or Purposeful Bias
- Facebook is obviously more used by the older generations while other social media apps such as TikTok or Instagram are more used by the younger generation
- I don’t think that the producers of the apps and programs intended for this age gap, but I think that they have to work with what they have
- This is why the bias exists between these platforms since the companies would make more money through advertising something that would be appealing to their user base (Facebook ads for the older generation, TikTok ads for the younger generation)
- The other “intentional bias” we discussed regarded the voices of Siri, Alexa, etc.
- This bias I think is obviously intentional regarding the female voices as the female voice is seen by many as likely more soothing and less threatening or aggressive
- Therefore, companies would likely choose the female over the male voice to make their products more appealing to users and therefore make more money
- Algorithms that influence decisions such as suggested searches used by programs would also show the use of intentional bias to try and skew the user’s attention and suggestions to be something that would benefit the company
Racist Computers
- In the video, the owner of the computer thinks that the company was actually racist and bias when developing the software for the camera since the camera doesn’t follow him but does follow his coworker who has white skin
- I think this is merely an unintentional result of the producers not doing enough testing or coding for the database regarding the camera’s sensitivity to different skin colors
- This is obviously a harmful product but could be easily fixed through more testing and experimentation so that is more accessible and usable for a wider range of the population
- One thing that could be done to easily collect more data (skin colors) is to utilize crowdsourcing
Final thoughts:
- I feel like the bias we learned about today, specifically in computing, is generally unintentional by developers since there are always factors that couldn’t be considered. For example, the racist camera was just a result of probably not enough experimentation/crowdsourcing or simply just a choice to get as little criticism as possible from the users. There is also the fact that they need to make as much money from the users that they get which they can’t exactly control.
5.4
Crowdsourcing
- Crowdsourcing is when data is obtained for a purpose through the use of various methods, some may be harmless, some may be harmful
- One crowdsourcing idea that our group implemented into our project regarded the log in page
- Our log-in page implemented not only the username and password, but what car they currently drive which is collecting data regarding the users that use our platform
- We also have a like dislike page for users which collects data on users’ favorite cars which then travels to a database which can be used to add appealing aspects to out website for the users
- At N@TM, I am thinking of maybe using surveys to crowdsource information for anyone who interacts with my project and then use that data from the survey to conduct a conclusion which can be a form of testing for the program, allowing me to correct or improve on anything that wasn’t up to par (based on the survey results)
5.5
Legal and Ethical Concerns
- When creating a repository in GitHub, you are given many different options for license types, including GNU GPL v3.0, MIT License, Apache License 2.0, and GNU GPL v2.0. All these licenses call for your repository to remain an open source of code, which different requirements for people using your code. For example, MIT License states that the owner’s software may be used, modified, and distributed by other people with credit given to the owner, completely for free. This will most likely be the most common license for this class, as it allows you to do whatever you want as long as you include the original copyright and license notice in any copy of the software/source.
- From the discussion, I learned that licensing is pretty complicated and there are many different options depending on how private the owner of the software wants it to be. Digital rights are also important because they allow for an agreement between companies and consumers online, such as social media platforms and music streaming platforms and distributors.
- My personal website should use the GPL License as it is simple and doesn’t restrict users since my personal is mainly just a bunch of blog posts users can look at. For our group frontend repo, we should use an MIT License because we want to let anyone view and maybe even improve on our code, but it is important to give credit to us and acknowledge the license in the event that they use our code. Similarly, our backend repo should use the mit License for similar reasons.
5.6
Safe Computing
- In the first week of this class, we learned about and used a public and private deploy key to deploy and create our personal repositories. Another example would be Slack. When we signed up for slack Slack, which we signed in for using Google, it allows Slack to have access to PII that is stored in our personal Google accounts. In our project, certain PII is obtained through the sign up system where our database will take certain information from users such as name, pw they choose to use, favorite cars, etc.
- I’ve been taught to be very cautious with PII online through repeated exposure to the internet and people informing me about cyber security and potential scams. For this reason, I’ve been pretty secretive about my identity online and choose not to enter personal information or customize accounts with private, personal information if prompted.
- A good password could be created with a combination certain password requirements that some website require such as a special character: )!@#$%^&*, capital letter: ABCDE, number: 12345, and be at least ___ characters long. A bad password is something like a common phrase or series of characters that is easy to guess. It is also important to use different passwords for different accounts and services because if someone were to find one of your passwords and email which you use for many different accounts, they could gain access to basically your whole online presence, A step that is used to assist your online security is two-factor-authentication (2FA), which is highly secure as it requires your account info to be accurate. How it works is it will send a code to the email or phone number that is linked to your account and you must tell it that code in order to authenticate that it’s really you who is trying to access your account.
- Symmetric encryption is when a single string of characters is scrambled/encrypted in one step and can be decrypted in one step. Asymmetric encryption is when information is encrypted using both a public and private key. This is how the deploy and security keys are set up in my fastpages repository.
- When working with AWS deployment, we used symmetric encryption when we created the instance
- Sometimes, we get lost of mail which sometimes appear as spam, but other times go into the main inbox that have some sort of flashy, fake advertisement to lure people in. These typically tell the person to click a link or put in info to claim some sort of reward but in reality they are more times than not, scams. I have clicked on and looked at these emails out of curiosity but have never fallen victim to the scams as I am aware of them.