Starting Over At Forty

What's Next?
"Starting over is a huge step at any age and resilience is more important than age alone. However, people over 40 and beyond have the gift of experience weighing in on their side"
There are many of us out there who are taking second and sometimes third chances or more, starting over; going back to school, starting a new career, remarrying, or starting a new phase in our lives. We go through many phases in our development in life. For example, in our 20's we are so busy trying to figure it out; we are setting goals but there are so many unknowns. In our 30's we think we have it figured out and we think we have the greatest wisdom to live by. By our 40's we reflect upon our accomplishments and we start realizing how much have not figured out, so began making changes and deliberate choices to move forward in new directions.
Forty is a decade that most women start thinking about the other side of their life, so they go back to school to advance in their careers or change careers altogether. Re-making and reshaping their lives and situation for more exciting and rewarding opportunities and lifestyle. Some people re-marry at forty, relocate to other cities and states, and etc...
Forty is like a crossroad period. Most people need the change in order to feel fulfilled, useful or that they can contribute to a better life for them-selves, their friends and others in the work environment or in the community in general.
Change can be difficult and deliberately starting over can be scary and extremely difficult. But for those of us who have been through difficult times before, we understand that perseverance is a good friend. People who win in life move forward by taking one foot and placing it in front of the other. They never give up and they rely on the at hand resources they have been blessed with. " Life can knock you down and trample your expectations, but you have a choice of staying down or getting up and that's what defines your ability to start over."


Flexible Spending Accounts: The Benefits

Serve and set examples to others. This is what the world and Regis University teaches us. When looking at the statement to serve others and a business connection, one must look at the benefits an employer provides for their employee. Recently, employers have begun to look at the different ways to help with healthcare costs and how to maximize the benefits they provide for their employees. One way to accomplish this is by creating a Flexible Spending Account for their employees.
A Flexible Spending account is an employee benefit program that allows you to set aside money on a pre-tax basis for pre-determined health care and dependent care expenses (Federal Flexible Spending Account Program, 2009). Basically, this means that each employee keeps more of their money (Federal Flexible Spending Account Program, 2009). A Flexible Spending Account saves individuals money by reducing income taxes (About.com, 2009). An individual who contributes to this account does not report this money to the IRS due to it being taken out pre-tax (About.com, 2009). This allows an individual to save hundreds of dollars a year by increasing your spendable income (About.com, 2009).
There are three types of Flexible Spending Accounts. The first one is the health care flexible spending account. This is used to pay for eligible health care expenses that occur and are not covered under a person’s insurance (Federal Flexible Spending Account Program, 2009). Some examples would be co-payments or over-the-counter-medicines (Federal Flexible Spending Account Program, 2009). The second type of account is a limited expense health care flexible spending account. This flexible spending account is used in place of the general spending account if the person participates in a High Deductible Health Plan (Federal Flexible Spending Account Program, 2009). This account allows for the employee to submit dental and vision expenses (Federal Flexible Spending Account Program, 2009). The third account is the dependent care flexible spending account. This account is used to pay childcare or adult dependent care expenses so that the employee and their spouse can work, attend school, or job hunt (Federal Flexible Spending Account Program, 2009).
You are probably asking how the account works. During January, an employer usually requests that each individual determine how much they want to contribute to the account for the entire year because there are limits. One way to determine how much a person should contribute is to make a list of the expected out-of-pocket medical expenses for everyone in the family (About.com, 2009). Once you determine the amount you are going to contribute, the money will be automatically taken out of your paycheck. Besides the employee contributing, most employers contribute at least a hundred dollars for every hundred dollars put in and not exceeding $1500 (Hamilton Health Care, 2009).
An individual is able to utilize this program if they incur medical expenses that are not covered in their health insurance plan. In order to get reimbursed, one has to submit a copy of the Explanation of Benefits and proof of payment to the administrator (About.com, 2009). After that is submitted, they will issue you a reimbursement check (About.com, 2009). Some of the expenses that are eligible for reimbursement are: fees to medical providers, fees for hospital services or laboratory, acupuncture, inpatient treatment, smoking-cessation programs, false teeth, hearing aids, crutches, wheelchairs, some fees that are in excess of reasonable amounts, costs of vasectomies, hysterectomies, and birth control, non-elective cosmetic surgery, co-pays, deductibles, braces, and prescription drugs (About.com, 2009). These expenses can be costly and cause financial hardships if one does not have a backup plan. The Flexible Spending Account gives a peace of mind to these types of costly expenses.
In conclusion, employer-provided benefits, such as the flexible spending account, have a profound effect on our financial situation. Employers have begun to use this type of account to serve their employees as well as their patrons. The Flexible Spending Account allows for employees to save pre-tax for when emergencies come up. This is vital when our economy is facing a hurdle like we are now. I personally use the flexible spending account so I can rest assure that money is being saved for emergencies. This gives me a peace of mind. Anyone who has the opportunity to take advantage of this account should. Employers are looking to serve and take care of their employees so employees should look to serve and take care of their self and their family.

References:
About.com, (2009). Flexible spending accounts. Retrieved June 16, 2009, Web site:
http://financialplan.about.com/cs/insuranc1/a/FlexSpendPlan.htm
Federal Flexible Spending Accounts Program, (2009). Did you know? Retrieved June 16,
2009, Web site: https://www.fsafeds.com/fsafeds/index.asp
Hamilton Health Care, (2009). 2009 benefits guide. Retrieved June 16,
2009, Web site: www.hamiltonhealth.com/Portals/0/pdfs/HHCS%20Benefit%20Guide% 2012-10-08.pdf

Ontology, Bumblebee haircuts, and

the Internet


by Jeannie Reynard


Sometimes in the growth of computers and the internet, it is necessary to step back from the console long enough to learn something that will really have an impact on your world. In this respect, it is time to catch up with some of the latest and greatest endeavors taking place today. To understand some of the work that is sprouting so many social networking sites, interactive games, and mash-ups, it is important to learn a few things about ontology and tags.



In the database world, ontology is a specification of the data instructions that commits to a conceptualization and allows collaboration based on that framework. Whew! That sounds confusing. In 1992, Tom Gruber of Stanford University wrote about the use of ontology as related to data. He stated that, “We use common ontologies to describe ontological commitments for a set of agents so that they can communicate about a domain of discourse without necessarily operating on a globally shared theory. We say that an agent commits to an ontology if its observable actions are consistent with the definitions in the ontology” (http://tinyurl.com/Gruber-1992).


In 2007, following the work of T. Berners-Lee’s (and others) and the creation of the Semantic Web, Gruber wrote more clearly about the use of ontology and simplified its purpose. In terms of data modeling and application, Gruber said, “The key role of ontologies with respect to database systems is to specify a data modeling representation at a level of abstraction above specific database designs (logical or physical), so that data can be exported, translated, queried, and unified across independently developed systems and services. Successful applications to date include database interoperability, cross database search, and the integration of web services” (http://tinyurl.com/Gruber-2008). I am grateful to the extra fifteen years that Gruber spent refining this concept! I think it all boils down to stipulating what you mean for the words to mean before you say what you say. That way the next person can count on what you meant and “commit” to meaning the same thing when he uses the same words. Write your programs that way and put them out there for others to work theirs with yours so that everybody’s programs can collaborate!


Now consider that when you put data into a database it is possible to tag this data and pull the tag into use in other interesting ways. Tagging is now a collaborative effort to find a way to share huge amounts of data with tags that can interplay. Simply put to use, these grand gestures of intellectual giants brings to your web and mine the applications that build and share on these foundations. Let us say that you want to look at a Google map and determine who has the cheapest gasoline in town… ontology was there first to build that foundation. Perhaps you want to reach across a database or three and pull data together to research bumblebees, aprons, and haircuts. Google may not have ran into this type search before, but with ontology and tagging working together, you can potentially get to something relevant to your search. Now consider this across the entire World Wide Web, connecting a million databases and all that data communicating with usable little tags. This is mining data and allowing collaboration that is surely going to generate a quantum leap in knowledge, medicine, and even bumblebee haircuts.


The time has come for the average web surfer to spend a little time gaining an understanding of this type of effort. Although it is not my nature to search out the complex, I do want to be a participant in this new way of learning and sharing knowledge. It sounds more difficult than it really is. You might have an interest in this grand new scheme and may be able to sort out some of the problems that are not yet resolved.



Take a few minutes becoming acquainted with ontology and meta-tags at the links below. Your handy search-engine will take you to a host of sites that describe in better detail what applications and resources are growing around this new field. Whether you understand it all at once or in little bites, this technology is going to have a major impact on your world tomorrow.

Gruber, Tom, Ling Liu, and M. Tamer Özsu. "Ontology (Computer Science) - definition in Encyclopedia of Database Systems." Tom Gruber. 17 June 2009 . (http://tomgruber.org/writing/ontology-definition-2007.htm)

Gruber, Tom. "Ontology (Computer Science) - definition in Encyclopedia of Database Systems." Tom Gruber. 17 June 2009 .
(http://tomgruber.org/writing/ontology-definition-2007.htm)%22Tag

(metadata) -." Wikipedia, the free encyclopedia. 17 June 2009 .
(http://en.wikipedia.org/wiki/Tag_(metadata))

Going back to college after years of dealing with Dyslexia

The Struggles:
Today many people including this writer has struggling and dealt with the humiliation from dyslexia. Most of the people as they grow up have learned to deal with it although they still feel anything from stupid to ashamed. It was not easy to grow up with it because most did not know anything about it including me. So going to city run schools back in the 60s and 70s you would be sent to special classes. That alone says something to the other kids. It took me many years to face my problem, as I felt inadequate. I have had many teachers while they had good attention fail to understand what was going and in the end would give up on me. We live in a world that is all about reading and writing. I go to work each day with a real fear that if I have to send a email or write something people will most likely ask question on what I wrote. I know my job and I do it very well. However, if I am unable to relay my information that makes sense to the reader what does one do?



The learning to deal:
Over the years, I have found many things out. I need a degree to excel in my company. Asking others to proof although they will help, they end up changing most of it. That is where I learn to swallow my pride. Most say that they understand, but it does always feel that way. I have lived with this for over 48 years now so, other than a few times a day where you feel inadequate you start to learn how to deal with it. I think it was a blessing that we now have spelling and grammar checks on computers. One also understands that after you write that email or paper you re-read it repeatedly. I myself have re-read this 7 times. Just think if I did not have spell, grammar, and re-reading it repeatedly what this may have said! Therefore, what does it mean, it took me 48 years and determination to understand to face college again.


Universities:
Today more and more students are showing up at universities with dyslexia. It is still patchy at most universities that offer help to the student. Consequently, these students do consistently poor then other undergraduates students (Richardson & Wydell, 2003; Singleton, 1999). It is interesting that the UK has spent more time researching this topic then I would have expected. Not to say US do not have information but it considerable less.

Ref:
Developmental Neuropsychology, Vol 29(1), 2006. Special issue: Special Issue on Writing. pp. 175-196. Contribution of Lower Order Skills to the Written Composition of College Students With and Without Dyslexia. Connelly, Vincent; vconnelly@brookes.ac.uk ;Campbell, Sonya,; MacLean, Morag,; Barnes, Jim, Department of Psychology, Oxford Brookes University, Oxford, England



Reading, Writing, and Assistive Technology: An Integrated Developmental Curriculum for College Students; Engstrom, Ellen Urquhart; Journal of Adolescent and Adult Literacy, v49 n1 p30-39 Sep 2005. 10 pp. (Peer Reviewed Journal); http://search.ebscohost.com.dml.regis.edu/login.aspx?direct=true&db=eric&AN=EJ719840&site=ehost-live

Remember Your Manners

Everyone at one time or another has experienced that tightening feeling in your chest, the red tint in your vision, or the feeling of your face on fire. Some bozo just cut you off, is on the phone, doesn’t signal, is driving too slow, keeps you from making a light; all of a sudden the famous words “lets get ready to rumble” come to mind. Sound familiar? It makes you tense just reading about it, doesn’t it?
It is pretty clear there are a lot of idiots driving on the road. The good drivers quickly get tried of the morons’ driving on the roads everyday. By giving into the temptation of acknowledging the road rager, you have sunk to the lowest level.
Road rage is defined as violent behavior exhibited by drivers in traffic, often as a manifestation of stress”. Road rage is often associated with aggressive behavior. People do some bizarre things when they are angry. They run you off the road, brandish a weapon, yell, make obscene gestures, and even follow you to your destination.
To avoid the threat of a road rager, the victim must control the situation. Here are some tips to try next time you are a victim of road rage:
Ø If being tailgated, change lanes.
Ø Don’t make eye contact. By making eye contact, you acknowledge them.
Ø Stay behind the person that is angry. They are less likely to do damage to you or your vehicle if you are behind them.
Ø Don’t return gestures.
Road ragers are very angry, self centered, power hungry and vindictive people. They could careless about others and often are not thinking of themselves.
Our roadways are very overcrowded so it is normal for some to play chicken with others. The rager could be unhappy in his or her life, for example at home, professional, or upset with a family member.
Secondly, the road rager can become upset at the absent minded or stupid driving of the person talking on the cell phone. However, the absent minded or the person talking on the cell phone can become a road rage themselves. Verbal confrontations on the phone while driving can often lead to confrontations on the road.
Another cause of road rage could simply be a misunderstanding between drivers. A driver may make an error of judgment but the perception of the other driver is that he or she is driving aggressively, which ultimately leads into road rage.
Human beings are very territorial. As individuals we have personal space or territory, which is essentially our defense mechanism. Anyone who invades this territory is potentially an aggressor. The time it takes the aggressor to cross this territory gives the defender time to prepare to avoid the attack. On the flip side, if in a tight space such as a subway train or a crowed bus, the space can be reduced dramatically. This can cause tension. In most cases if territory is “invaded”, if someone stands too close, our social education tends to result in defensive body language rather than physical aggression.
The car is just an extension of territory. If a vehicle threatens this territory by cutting in, for example, the driver will most likely carry out a defensive maneuver. This could be backed up by carrying out an attempt to re-establish territory by honking the horn or flashing lights, which are probably the most common.
In some circumstances, the defending driver may wish to take it one step further to satisfy his true feelings of the incident. I spoke to 3 friends, 3 family members and 3 co-workers and found 9 out of 9 of them admitted to having chased after a driver. These results were quite shocking but not unrealistic. With several different levels of stress such as nutritional stress (poor diet or inadequate nutrients), emotional stress (negative emotions or increased stress in daily life), physical stress (illness or headache) and environmental stress (too much traffic or inadequate highways), it’s no wonder everyone is so angry all the time.
On a more positive note, there are ways to handle road rage. Here are just some examples:
1. Think positive thoughts.
2. Don’t challenge a driver that is angry.
3. Eat properly and get plenty of rest
4. Practice safe driving.
5. Remember people make mistakes.
6. Avoid angry drivers. Report them to authorities or simply make a turn to get away from them, even if it’s out of your way.
7. Reduce stress levels by eating healthy and staying fit.
Although these positive suggestions are easier said than done, if everyone takes a deep breath before preparing to drive and learn to let things slide off your shoulder perhaps it would make a stress free environment.

How much is your college degree worth?

How much is your college degree worth?

Ever since I was a little girl I have been told just how much a college degree will get you. It was drilled into my brain that if I didn’t get a degree that I wouldn’t be able to make it on my own. Now that I’m an adult, I have learned that having a college degree may or may not get you anywhere. When I was in my 20’s I was a property manager and I made more money than I will once I get my teaching degree. Let’s see, is racking up ten’s of thousand’s of dollars in debt really worth it? My answer is YES! I loved being a property manager but I knew that was not what my calling was. When I finally decided to take that leap of faith, I knew I wasn’t going to be able to make it on my own but I knew I’d be so much happier.

Sandy Baum is an economist from Skidmore. She studied the value of a college degree for the College Board. People have always said that college would cost $1 million dollars by this time. Sandy’s studies have concluded that a college degree is only at about $300,000 dollars. In fact, people that have a college degree will make an average of $20,000 more a year than the people that do not.

Also, as we have seen with this economy, many people have lost their jobs. I have read and watched on tv that anyone is getting laid off. Looking at the studies that Sandy has done, more people are laid off without degrees than one’s with degrees. Once you have a degree, more doors open up and you have more opportunities to grow in a job, with a company and within yourself.

A college degree to me is worth more than a million dollar paycheck. It’s worth the satisfaction of knowing that I did something that I wanted to do with my life. I followed my heart and my soul to become what I wanted to. I believe that the debt, the time in classes and studying are worth getting my degree and being able to show everyone that I made it.

College Degree




Online Education

Should students take online courses?  


By: Sarah Alegre


I say yes.  As a matter of fact for some people this may be the only way they are able to obtain an education. 


Benefits of Convenience


Most people today have very hectic lives.  Between their jobs and their families, sometimes there is enough time in the day to attend a normal college class in a classroom.  Online courses are available anytime and anywhere.  This gives people the flexibility to squeeze a course or two into their busy lives.  If a person doesn’t live near a college campus, no problem, they can still get a degree online (Hentea & Pennington).


Benefits of the Format


There are also some pluses to the style of learning that online courses offer.  There is the benefit of working at your own pace.  Although “own pace” doesn’t necessarily mean a slower pace, it still might give some people more time to absorb the same material.  Moreover, the ability of personal identities to remain concealed means that all students, regardless of race, sex, disability, or appearance are on equal ground.” (Richardson & Swan)  As much as we don’t like to admit this, some of us still have tendency to judge a book by its cover.  Online course give at least a little bit of anonymity and may give shyer students a better opportunity to participate (Richardson & Swan).


For some students in-classroom learning may be more appropriate and more effective, but for those who don’t have the time online courses are definitely the way to go.


References:


Hentea, M., Shea, M. J., & Pennington, L. (2003). A perspective on fulfilling the expectations of distance education. In Proceedings of the 4th Conference on information Technology Curriculum (Lafayette, Indiana, USA, October 16 - 18, 2003). CITC4 '03. ACM, New York, NY, 160-167. DOI= http://doi.acm.org/10.1145/947121.947158


 Richardson, J. C., & Swan, K. (2003). Examining Social Presence in Online Courses in Relation to Students' Perceived Learning and Satisifaction. JALN, 7(1), 68-88. Retrieved June 5, 2009, from http://www.sloan-c.org/publications/jaln/v7n1/pdf/v7n1_richardson.pdf


Benefits and Disadvantages of Online Courses

"Improvements in communication technology and virtual teaching methods are making online education an increasingly viable option for many students,"

(Retrieved June 5, 2009 from
http://memphis.bizjournals.com/memphis/stories/2008/07/28/focus2.html)

The benefits of online learning are many. Online learning offer students the option to take course at anytime from anywhere. Course materials are avaliable 24 hours a day 7 days a week and students are becoming more technologially savvy, learning how to use the internet as an educational medium. In many cases students learn at their own pace and for some students online learn is much less intimidating.

Teachers benefit from online educating as well. Teachers report that time spent with students online compared to students in face-to-face classrooms is nearly cut in half (Thomas). Education online is less expensive for students and teachers alike, when it comes to gas money, and ware and tear on their cars. It also reduces the paper load by way of email. there are significant savings for institutions of learning when classes are not held on the physical campus. Because there are no geographic barries to online learning; colleges earn extra income by charging extra fees to students who do not live near the institutions. Students also have the option to take several courses at once and complete a degree program in less time.

Some concerns about the disadvantages of online learning are: you can miss out on some dynamics of learning in the classroom and the traditional "real life" college experience of the student-teacher relationship and the face-to-face interaction between fellow classmates. Other disadvantages include the opportunities to participate in the many clubs, sports, social events, and community service activity offered to students on campus. aslo where it is generally obvious if a student is having trouble understanding in a face-to-face classroom setting, it is not always obvious in online classes and some students get lose and you may not be able to reach them in time.

Online courses offer students and teachers the flexability to tend to family and work obligations, although online learning requires increased self-disapline, self motivation and time management skills.

http://www.worldwidelearn.com/education-article/benefits-ot-online-learning.htm
http://www.essortment.com/family/onlineacademic_sgkj.htm
http://www.worldwidelearn.com/education-advisor/question/online-campus-programs.php
http://www.teachingcollegeenglish.com/2009/03/09/online-education-benefits-everyone/
Protect Yourself from Identity Theft

There are many ways that your identity can be stolen from you. The way that is becoming more frequently is through the computer or internet. Most casual PC users are unaware of how dangerous the Internet can be. Without the proper knowledge and protection, you could be just a few simple keystrokes and clicks away from having your identity stolen. Here are some tips for preventing online identity theft.

• Use anti-spyware and anti-virus software.

• Be wary of online shopping sites. Only shop at sites that you trust and are secure. See FTC - Online Shopping for more information.

• Don't get baited by phishers.

• Encrypt your wireless internet connection.

• Erase your hard drive if you ever sell or give away your computer.


I-Jacking

I-Jacking is a term I had never heard of before I research to do this blog. This is when someone steals your whole computer from you while you aren’t looking. Happens more than people think especially since most people take their laptops with them to the coffee shop or a restaurant. One minute you are typing away and the next someone is running off with your laptop and all your information. To stay safe, watch what you are doing on your laptop and your surroundings.


3 Steps to Protect Your Identity

Many places that have information on Identity Theft all said the same thing: Deter, Detect and Defend. Deter means to minimize your risk of having your information stolen. Everyone needs to detect identity theft. Check your bank accounts, credit card accounts, etc at least once a month. Defend yourself if your identity is stolen. You need to make sure you freeze ALL your credit cards, bank accounts and everything else that you have that they can take ahold of once they have your identity.

Reference

Consumer - Avoid ID Theft



Identity Theft Prevention


Identity Theft Prevention
By: Eric Perez
COM215XP40
Professor Janet Evans
Week 6 Blog Assignments
June 10, 2009

“14 million people were victims of identity theft between 2001 and 2003 and as of 2007 there were 9.9 million victims in one year” (Ward, 2009). Identity theft, which it is also known as “I-Jacking,” is a crime in which an imposter obtains key pieces of personal information in order to impersonate another individual (Whatisit, 2009). Identity theft can occur by shoulder surfing, stealing information from mail or other personal belongings, or ever hacking into databases (Ward, 2009). Identity thieves can obtain credit cards in your name, drain your bank account, apply for loans, make large purchases, etc. As we continue to face hard economic times, every person must take precaution with their personal information.
We should follow the following prevention techniques:
1. Only carry the identification information and the number of credit or debit cards that we actually need (Creditsourceonline, 2009);
2. Keep personal information in a secure area of the home (Creditsourceonline,
2009);
3. Guard our Social Security number and do not carry it (Creditsourceonline,
2009);
4. Check your credit report (Creditsourceonline, 2009);
5. Shred all of your documents (Creditsourceonline, 2009);
6. Make copies of the contents of your wallet (Creditsourceonline, 2009);
7. Be cautious on the phone (Ward, 2009). Someone could be listening or be
pretending to be someone they are not;
8. Protect and limit access to your computers (Ward, 2009);
9. Be aware of the Internet (Ward, 2009). It is not safe;
10. Look into getting a identity theft prevention plan (Ward, 2009).

All of these techniques will help prevent the possibility of identity theft. I know a lot of people think that it is too time consuming or will it will never happen to them, but if you are not prepared, the time it takes to repair the damage and get your life back will be more time consuming than preventing it. The first way to identify if you have become a victim is if there are debt collectors calling that you don't recognize the bill, receiving credit cards you haven't requested, or receiving other information about things you did not purchase. If you become the victim of identity theft, you should follow these tips:
1. Freeze all three credit reports, which include Equifax, Experian, and TransUnion (Privacy Rights Clearinghouse, 2009);
2. Make a police report;
3. Alert the Federal Trade Commission (Privacy Rights Clearinghouse, 2009);
4. Contact any creditors that the thief opened accounts with by telephone and in writing (Privacy Rights Clearinghouse, 2009);
5. Contact your creditors and financial institution;
6. Open all new accounts and obtain new credit and debit cards (Privacy Rights Clearinghouse, 2009);
7. Contact the Social Security department;
8. Alert the U.S. Department of State, Passport Services if you have a passport (Privacy Rights Clearinghouse, 2009);
9. Seek legal help; and
10. Keep good records and don't give in (Privacy Rights Clearinghouse, 2009).
Most of all, one must be aware, be educated, and always check your information. You may not think it could happen to you, but it can once or twice. You must always keep your information close to you and know everything that is going on. It is difficult to predict how long the effects will linger if you are a victim (Federal Trade Commission, 2009). If you are a victim, you should check your credit reports every three months for the first year and every year there after (Federal Trade Commission, 2009). Everyone should check their credit reports every year to ensure that no one has stolen their identity. As long as you are aware, you can protect yourself from identity theft.

References:

Credit Source Online, (2009). Ways to prevent identity theft. Retrieved June 5, 2009, Web site:
http://www.creditsourceonline.com/ways-to-prevent-identity-theft.html

Federal Trade Commission, (2009). About identity theft. Retrieved June 10, 2009, Web site:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

Privacy Rights Clearinghouse, (2009). Fact Sheet. Retrieved June 10, 2009, Web site:
http://www.privacyrights.org/fs/fs17a.htm

Ward, S. (2009). 10 ways to prevent identity theft. Retrieved June 5, 2009, Web site:
http://sbinfocanada.about.com/od/insurancelegalissues/a/identitytheft_2.htm

Whatisit, (2009). Identity theft definition. Retrieved June 5, 2009, Web site:
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci801871,00.html

Nationalism Behind the Monitor

With the invention of cyber communication, came high hopes of a connected, forward thinking web that is free from nationalism. As Nicholas Negroponte once famously hoped, “ [Thanks to the Internet] there will be no more room for nationalism than there is for smallpox.” These high hopes made the cyber world seem far away and different from the one we live in, almost fantasy like. The fact is that the people who live in the real world are the people in the cyber world as well. Opinions do not change in front of a monitor and perhaps ideas are amplified due to the anonymity that the web provides.
In an article, Evgeny Morozov provides examples of rampant nationalism on the Internet today. Wikipedia often finds itself the host of wars, “Greeks, Brits,and Americans tussled over [Jennifer] Aniston; Serbs, Austrians, and Croatians battled for Tesla the inventor; and Koreans and Chinese fought over soy milk.” While these arguments are very trivial, they do make a wall in communication. Larger arguments have also taken place, such as the geographic dispute over the Sea of Japan and Macedonia. International arguments like these led Wikipedia to add special policies to their site. In famous Internet wars there is also the blogging arguments between Pakistanis and Indians over Kashmir or the Korean accusations over Japan’s history of imperialism. These arguments became very heated and very real, much unlike Negroponts's vision of a communication system that made nationalist tempers ease.
Like the real world, the Internet is not all bad. There is a lot of positive communication between different nations occurring as well. The fact is, when we sit down at our computers, we do not change. People will say what they really mean on the Internet and sometimes this means being a Nationalist. Simply stated, the message will not change until the people do.

Source: http://web.ebscohost.com.dml.regis.edu/ehost/pdf?vid=4&hid=108&sid=5e1f990b-c263-49b0-a6dc-0e8dd368867d%40sessionmgr108#db=aph&AN=36617574

Why are listening skills so important?

“Listening is the most advising skill but also the most neglected communication skill” [3]. While all of us have had instruction in reading, writing, and speaking, few have had any formal instruction in listening. It is a vital communication skill, yet it is always being taken for granted that people are actually listening and understanding. “Both listening and speaking are crucial elements in any communication” [1]. While both are important each one has its place, and we need to devote due consideration to the two. Unfortunately, we all know which one most of us prefer and concentrate on the most. Copley stated, “Listening would be a lot more fun if you could talk while you were doing it” [2]. I think that statement speaks for itself.

Preparation Phases

Preparing to listen is an important aspect. Preparation consists of three phases long-term, mid-term, and short-term. To improve listening skills for long-term you must listen to difficult material and probably most important build vocabulary. Some skills to challenge your listening skills include:

1. Listen to various debates.
2. View material that requires concentration.
3. Try to answer questions on reality television shows.

Building vocabulary not only builds your reading and conversational skill but enhances your listening skills. The more words you master the better listener you will become. Mid-term preparation for listening requires doing a background study before your listening begins. This could include an advance look at a hard copy of an agenda or research topic before hand. Short-term preparation would be an immediate readiness to listen. When the facilitator starts to speak I am ready to open up my ears. I am always in the “spring-loaded position to listen”.

When listening to a facilitator or engaging in a conversation you should not be thinking of others things, but should be evaluating and organizing the person’s words. One way to achieve this is by taking notes. Some use of color-coding, perhaps one color during class or while in a meeting and another for enhancement and clarification after class [5]. If you sit passively, like a wet noodle, expecting to soak up knowledge, you are only half listening. To listen, you have to react by making your mind work. It’s kind of like a computer that begins to process data. By using this strategy causes you to think ahead and anticipate what’s next.

A Possible Weakness

Daydreaming is the biggest downfall as I am sure it is the most common for many people. Typically, when some person or thing is mentioned it triggers an association in ones mind and off you go into the daydreamer’s nightmare. When we return to realty and begin listening, again we may find that the third point is being discussed and have no clue what happened to the first and second. Some reasons for daydreaming are:
1. Stressful atmosphere at home or school.2. Wants to escape an unpleasant situation faced with.
3. Preoccupied in thoughts - physically present but mentally absent.

Final Thought

“Listening is a gift and a skill that can be learned with some dedication” [4]. By preparing yourself and using creative listening techniques this can be accomplished. It doesn’t cost a great deal of money, if any, yet it is priceless to the person whom you are listening to. After all, we are all human and must learn the gift of listening.

Sources:

[1]. Center for Excellence in Academic Advising. http://www.psu.edu/dus/cfe/actvlstn.htm

[2]. Copley. (2005, 2nd Edition). Adult Learning, page 35
[3]. Copley. (2005, 2nd Edition). Adult Learning, page 36
[4]. Copley. (2005, 2nd Edition). Adult Learning, page 123[5]. Listening Effectively-How to Become an Effective Listener. http://www.au.af.mil/au/awc/awcgate/kline-listen/b10ch5.htm

Government: A Help or a Hinder?

Does government involvement infringe upon our civil liberties?

By: Carmen Mendoza

The purpose of this blog is to question whether or not government’s involvement in the "war on terrorism" ever crosses the line between protection and infringement upon civil liberties.
"The big threat to America is the way we react to terrorism by throwing away what everybody values about our country - a commitment to human rights. America is a great nation because we are a good nation. When we stop being a good nation, we stop being great." Bobby Kennedy, O Magazine, Feb.2007

Where we stand today
I have often pondered where our nation has taken us since the attacks of 911. Our world, as we knew it, changed that very day. Security lines in airports, weapon laws and even taboo words to say in the general public’s earshot have all been reorganized. New laws, new restrictions and new policies have all changed the way that Americans now live their day to day lives.
Since 9/11, many new technologies have been designed to catch terrorists before they strike. Phone records, bank accounts and credit card activity have all been made accessible to monitoring thanks to technology.


The Facts
Recently, I was educated on something called the MATRIX. Since 2001 the Department of Homeland Security has been creating a database and database searching techniques to allow the viewing of millions of citizen’s records at once to determine if they have a link to terrorism. With the fastest online resources that we have at our fingertips, information is being passed from person to person with lightening speed. To me, this poses the question:
"Does this activity violate our basic human rights to privacy?
To me, I feel that although we do hold very basic human rights, sometimes these need to be altered or morphed to look out for the best interest of all people. In order to maintain a safe nation, we all need to be a little less sensitive to our own personal needs and try to look above ourselves and try to realize that we all have a responsibility to promote a united front in terrorism.


Where to go from here?
"Terrorism has become the systematic weapon of war that knows no borders or seldom has a face." Jacques Chirac, Speech. Sep.24, 1986
I feel that we live in a world of computers. Our online communication has become so involved, that people can do business with someone without ever having to meet them face to face. All of the unknowns that lie between who people really are, and what they type on the keyboard can hold many questionable acts. The quote above makes reference to no faces, and this is so true. Our face is hidden behind a computer screen and our online personalities reign supreme. Let’s help give a name to those hidden faces by allowing some probing into our digital, computerized world.

Or is this really the answer?

References:
"Technology and Crime." Electronic America. John W. Weier. Information Plus Reference Series. Detroit: Gale, 2007. pages 47-62.

Cell Phones have they put us in danger!

Cell Phones have they put us in danger!
I think most of us today can say we have a cell phone. Bad or good, we have and we use them. In this writers house we both have them and only use them. We have given up on a home phone as that is no longer an extra expense we need. We were spending up to 40 dollars for something no longer used.

Is it time for change: A study done at Harvard University would say yes. They would find that it was four times greater to have a crash while on the phone. They are able to produce data that shows 12,000 serious injuries and 2,600 deaths have accrued while on the phone and driving. Some have gone as far as sending letters to governors and state legislative leader urging them to ban cell phone use in automobiles. Today the National Safety Council would like the same “a ban on phone in cars and move them back in the home”.

So where are we: California would use a study that show in 2005 that 5,699 teens died between the age of 16 and 20 in car accidents. However, they all did not die from phone usage as that was not one of the data collect at that time. But it was enough for California Governor Arnold Schwarzenegger to sign a bill into law? The bill would make it illegal for anyone to use their cell phone while driving unless they have a hands free device. It did not stop there; as it would go on to ban all cell phones with or without, hands free device for anyone under the age of 18. So why is Colorado not there yet?

Colorado new rules: The State now has in placed that if you are under the age of 18, you cannot use a cell phone with or without hands free. An addition to that no one well be allowed to text while driving. The part this writer, does not understand is that unless you are caught doing something else that is ticket able you cannot be pulled over. Somehow, it not as bad as being drunk or speeding which are both something that you can be pulled over for. The signing of bill HB1094 was done up in Fort Collins as a token I am guessing by Gov. Bill Ritter. It was the home of 9-year-old Erica Forney, who died by a texting driver.

I know that, I have had my moment when I have caught myself talking on the phone and driving 10 to 15 miles under the speed limit. I took only once were I caught myself texting and almost ran into a car that had stopped about 20 feet ahead of me. I get it!

Ref:
· SAFETY GROUP SEEKS BAN ON CELL PHONE USE FOR ALL DRIVERS;
Source:Rock Products; Apr2009 Cement Americas, Vol. 112, p12-12, 1/3p

· Consumer Reports; Feb2003, Vol. 68 Issue 2, p24, 1p, 2 color
· Cell Phones + Teen Drivers = Danger?Current Events; 10/8/2007, Vol. 107 Issue 5, p7-7, 1p
· Hang up and drive! Source: American City & County; Oct2007, Vol. 122 Issue 10, p12- 12,1/4p
· http://www.ghsa.org/html/stateinfo/laws/cellphone_laws.html
· http://handsfreeinfo.com/colorado-cell-phone-laws-legislation

COM215XP40_Blog Topic: Microfinance and Social Justice

Must You Have A Payback In Order To Pay It Forward?

by Jeannie Reynard

The purpose of this blog is to introduce readers to the value of microfinance.


A Compelling Vision

“The vision of microfinance is simple and compelling. Small loans—often less than $200—are extended to low-income households to initiate or strengthen entrepreneurial activities, thus helping them access the means to build wealth and advance out of poverty” Michael Schubert (Journal of the American Planning Association, 2002).

Poor clients, many in under-developed countries, find normal routes to loans closed for lack of collateral. Their savings (if they have savings) do not support entrepreneurial activities. Thanks to the structure of microfinance, many of those clients are able to access funding. Lenders opt to donate or finance these small loans for a variety of reasons. Some include the desire to make profit on a risky venture, while others do so for altruistic desires for social justice.

A Personal Motivation

This writer once received a small cash input from a dear friend. Unfortunately, the friend died before pay back, so pay forward was the only available option. In this particular case, “paying forward” amounted to a $25.00 investment for a group of young mothers in Mali. As one of thirteen investments, these small donations allow the group to purchase up community cereal grains, take them to market for sale at a profit, and reinvest (after costs) into the next purchase. At the end of the six-month loan term, each investor will receive back exactly $25.00 return on their investment, maybe. The risks are numerous, including macro-economic variables such as political upheaval, currency devaluation, or war. Perhaps the venture will fail for the reasons that many new entrepreneurs fail. There seems to be little measurable gain in the lender’s efforts, but the internal satisfaction is really beyond measure.

A Possibility

Global poverty levels dwarf these miniscule efforts to affect poverty and social welfare programs. Yet, millions are collected in support of the effort, and impact as many individuals and small groups as possible, in part as an effort to offer hope and possibility to these lucky few who reach upward and make the commitment to eke out a living. Repeat loans offer additional incentive beyond the desire to repay the loans and fulfill the obligations to lenders.

A Method of Measurement

How one measures the success of these microfinance programs is the subject of Mark Schreiner’s 2002 paper, “Aspects of Outreach: A Framework for the Discussion of the Social Benefits of Microfinance” (http://www.microfinance.com/). Schreiner offers a framework for comparison, providing insight into the short-term and long-term ramifications of the program benefits and costs. He suggests that any discussion of outreach utilize the following six measures of success:

• worth to clients
• cost to clients
• depth
• breadth
• length
• scope

An Opportunity for Dialog and Outreach

Whether microfinance is a sustainable option in the long-term and whether the benefits outweigh the costs are the subjects of much debate and analysis. If you are interested in researching the subject further, (http://www.microfinance.com/) offers several articles regarding methods for weighing and managing the risks of microfinance. Many websites offer the opportunity to lend, including http://www.kiva.org/, a non-profit organization that also ranks by risk those entrepreneurs and lending organizations involved in countries around the globe.

Microfinance fills the void for many who would otherwise have little opportunity to strive for even a meager sustenance. “Whether it is a small loan to a farmer in Guatemala to buy seeds in order to maximize benefit from a large irrigation project or credit extended to a group of West African seamstresses to buy new sewing machines, a system needs to be in place to raise capital, deliver loans, and manage repayments” (Journal of the American Planning Association, Spring 2004, Vol. 70, No, 2).


Kiva - Loans that change lives. 04 June 2009 (http://www.kiva.org/).

Microfinance and Microenterprise: Ways to Help the PoorAccumulate Resources. Director: Mark Schreiner. 07 June 2009 (http://www.microfinance.com/).

Schreiner, Mark. "A Framework for the Discussion of the Social Benefits of Microfinance." 5 Sept. 2001. RePEc. Society for Economic Dynamics. Dept of Economics, University of Connecticut, Storrs. 4 June 2009 (http://ideas.repec.org/p/wpa/wuwpdc/0109003.html).

"The Triangle of Microfinance: Financial Sustainability, Outreach, and Impact/Replicating Microfinance in the United States (Book)." Rev. of TRIANGLE of Microfinance: Financial Sustainability, Outreach & Impact, The (Book) by Michael Schubert. Journal of the American Planning Association Spring 2004: 230-31. Academic Search Premier. Ebsco. Regis University, Denver. 4 June 2009 (http://web.ebscohost.com.dml.regis.edu/ehost/detail?vid=1&hid=103&sid=558eb219-b7ff-452f-8a77-4affa874b151%40sessionmgr109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aph&AN=13229658).

Digital Distractions in the Workplace

"Information Overload: We Have Met the Enemy and He is Us," authored by Basex analysts Jonathan B. Spira and David M. Goldes and released Dec. 19, claims that interruptions from phone calls, e-mails and instant messages eat up 28 percent of a knowledge worker's work day, resulting in 28 billion hours of lost productivity a year.

The employer

Just how big of a number is 28 Billion? Consider that there are 8760 hours in one year and if you lived to be 75 years old that equals 657,000 hours. That is just a small fraction of that 28 Billion hours lost each year. Think about how many times a day you are interrupted by an email, instant message or phone call. How many of those are really work related?

The employee

What about the things you do online that are not work related? Online shopping, reading a newspaper online, playing an online game, instant messaging with family or friends; all of these take time away from your work and cost your employer money. Would you steal a computer from your employer? I hope the answer is no, but when you spend time online doing personal things unrelated to business you are stealing from your employer. What about the ethical issue of being paid for personal activities? If you were the employer would you be willing to pay your employees for these activities? Maybe you are dissatisfied with your work or employer and feel that this is time that is owed to you.

There are so many different digital distractions that often times it seems like nothing gets accomplished. There are many articles about personal use of the corporate/work internet, see this article on Power Slackers. Of course there are always two sides to every story. Here is an article on how a little slacking can increase productivity.

How do you view your online activity while at work? Does it make you more productive? Do you feel like you are stealing from your employer? Or is this a perk of the position? Are you reading this while at work? Let’s hope you are at least on your lunch break.

1. Communication Overload Makes Office Workers SAD. June 3, 2004 pNAPR Newswire. , p.NA. Retrieved May 31, 2009, from Academic OneFile via Gale:http://find.galegroup.com/itx/infomark.do?&contentSet=IAC-Documents&type=retrieve&tabID=T004&prodId=AONE&docId=A117618658&source=gale&userGroupName=regis&version=1.0
2. Garrett, R., & Danziger, J. (2008, 2008 Annual Meeting). Gratification and Disaffection: Understanding Personal Internet Use During Work. Conference Papers -- International Communication Association, Retrieved May 31, 2009, from Communication & Mass Media Complete database.
http://search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=36956520&site=ehost-live