Do product reviews really matter?

In the ever busy lives we live today, how often do we read a product review or comment before we buy it? I am one of THOSE people that will read the product reviews prior to buying something as simple as vitamins from my favorite Vitacost.com or something from Amazon or a new car. I especially pay attention to customer reviews for hotels. People are very vocal if they like or dislike their stay at a specific hotel. If a person is willing to take the time to write a review whether good or bad, I feel that it is worth reading. You can ask others buy word of mouth about a particular product but some of the smaller ticket items may require that level of time.

One of my favorite websites is http://www.vitacost.com/ to purchase anything from vitamins, sunscreen, shampoo, lotion or diet products. One of the things I love about this site is nearly every product will contact product reviews. I always go through and read them. They even have a blog that people can post/read for information.
It is a great way to collaborate with others about a product you wish to purchase. Customer reviews are effective in connecting a future buyer with a previous buyer on any given product that you would not normally encounter.

I even read customer reviews on http://www.amazon.com/ to aide in my purchase.

Overall, I believe that you can gain a certain level of data when reading a customer review to purchase a product.

EXAMPLE FROM AMAZON.COM
15 of 16 people found this review helpful:
5 our of 5 stars " Best briefcase I ever owned" May 23, 2010, by T. Boyce, (New Jersey)

EXAMPLE FROM VITACOST.COM:
Dynamics Health Vitamin C Liquid, 1,000 mg. -16 fl oz.
"Tastes great, not sour at all"

reference:

http://www.amazon.com/ retrieved 25 April, 2011
http://www.vitacost.com/ retrieved 25 April 2011

Kim Loucks

Let's Exercise!


Exercise and nutrition are the two most important factors to keep fit and healthy. There are so many people that have a misconception about what is healthy. It seems that everyone wants the easy way to burn fat. They want to cut corners and lose weight faster. The truth is there are no cutting corners when trying to be healthy and fit. The only way is the hard way. Once the basics are known, there are plenty of ways to make a specific nutrition plan to fit the body’s needs.

MyPyramid.gov has the right resources on the basics of nutrition. Sure, the food pyramid has changed often when we were kids, but that is because they are researching more than ever on the different food groups that our bodies need. Processed foods are considered bad, however, there are a few that are considered healthy. Milk is pasteurized to kill bacteria and homogenized to keep fat from separating. Frozen vegetables are processed to help preserve the vitamins and minerals and so they can be cooked all year round. It’s the canned foods that are high in sodium and fructose that are bad. Pastas that are made with refined white flour instead of whole grains are bad as well. Pre-packaged foods that are high in sodium or sugar are high in calories. The reasons these foods are so popular are because they are easy to make and convenient.

Treat your body like a car. A car needs to be fed with fuel in order to run. If there is no gas, then the car does not operate properly and will break down in the middle of the road. The same way can be perceived for the human body. The body needs food in order to have energy. If the body is taken care of the right way, then there is more energy to expend throughout the day. Instead of a diet, start eating healthy foods and get into that healthy lifestyle. There are diets out there that will help you lose weight fast and easy IF you follow them exactly. Then, you slowly start to go back to your old habits of eating junk food and becoming lazy of cooking.

Exercise comes along with eating healthy. You cannot just exercise and then eat whatever you want. Eventually, it will catch up to you and the minutes will become hours of burning all the calories you just ate. That is why exercise and the proper nutrition play hand in hand when keeping a fit and healthy body.

Let’s start today with a couple of easy exercises that anyone with two legs can accomplish:

· Take a brisk walk for 10 minutes outside and enjoy the fresh air

· Use the stairs instead of escalators or elevators at the mall

· Park the car at the very end of the parking lot and walk further (it’s always easier to find a spot)

· Walk the dog for 10-15 minutes around the neighborhood

· Hiking

Those are simple exercises that can get the blood circulating and oxygen flowing. Here is a harder workout that if you are an office worker and just want to step away from the desk for a bit will help get your mind to focus again. The best part, it only takes 5 minutes.

· 20 seconds of push-ups

· 20 seconds of sit-ups

· 20 seconds of squats

· 20 seconds of lunges

· 30 seconds of rest

· Repeat x 2

People might look at you weird but at least you got a small workout in for the day while they were eating their chips and drinking soda. It is never too late to start exercising or trying to eat healthy. That is a very big misconception. People tend to think if they have back problems or “exercise induced asthma” that this will affect their performance on exercise. A quick and easy way to fix that is to have the right mentality and research ways to begin an exercise program. Always, of course, talk to a physician before starting an exercise regime. Again it is never too late. Do your research and become a healthy and fit person today.

25 Years from now

It is fun to speculate on where technology is going to take us in the future. Do you ever wonder what the next 25 years will hold? Just think of the advancements in the last 5 years; the next 25 will bring awe-inspiring advancements in the way you live your life.
From purchasing items online, to nano technology that may be able to cure your cancer, imagination will be the only limit to the advancements in your life.
In the future, scientists speculate they will be able to cure disease using nanotechnology. They hypothesize about the future of treating diseases, instead of giving you a pill, or shot, they may inject you with nanobees.
Nanobees are less than 10 times the diameter of a red blood cell and are small enough to enter blood cells, but large enough to carry drugs that can be administered directly to the cell, or invading organism. This would greatly impact cancer patients. Instead of bombarding cancerous cells with radiation that will be harmful to the body, nanobees can be programmed to attack cancer cells, injected into the body, and scientists hope, destroy the cancer.
Another way technology will change your life is identification. If you ever saw the Tom Cruise movie Minority Report: you will notice, as he is walking down a street, advertisements are being beamed directly at him referring to him by name. John Anderton (the characters name) don’t forget the Aquafina; the ad says to him.
The ads were tailored to him due to retinal scanning. In the future some scientists theorize that you will be able to shop online, and traditional stores using only your eyes. Your whole life history, including bank accounts and credit cards will be connected to your unique retinal pattern.
Some envision a more Orwellian future, some of the more pessimistic among us argue; since Google records all of your activity special teams of police will sift through internet logs looking for criminal behavior. The digital age for some means more opportunity for big brother to keep an eye on you.
Will doctors inject nanobees in you, or will police drive down the street scanning everyone’s eyes in sight looking for offenders? Will you have a brain chip implanted that allows you to think of a topic, and learn what Google knows about it, as Larry Page, one of the founders of Google imagines?
No one knows for sure right now what the future holds; what is 100% certain is that there are amazing things that wait to be seen.

http://www.cancer.gov/aboutnci/servingpeople/cancer-research-progress/advances/nanobees
http://www.theregister.co.uk/2004/03/03/google_founder_dreams_of_google/

When North becomes “Northish”

I found an interesting article in the latest Flying magazine (May 2011) about magnetic north moving. While certainly not a critical event to most of us, I found it interesting that magnetic north continuously moves.Most surprising was the rate of movement, 40 miles per year.

Other than a tongue-in -cheek comment in my Discernment class about the author of the Scared Compass’reference to one’s moral compass always pointing north,
I hadn’t thought too much about north. What impact does the movement have on you? I guess it depends on who you believe. As a pilot I know the runways are numbered by their alignment with a compass heading, and you usually want to check you compass when lining up with a runway to make sure you have the correct runway and that you have your heading indicator reset to north. In one case in Tampa they actually renumbered their runways;non-impacting for most of us.

In another article about The role of Earth's magnetic field, things seem a little more dire.Apparently the earth’s poles flip every few thousand years and in between the strength of the fields can become weak,allowing dangerous rays to reach the earth; in this case possibly killing birds in Arkansas. Could humans be next? Not wanting to get on the conspiracy band wagon, I will leave that subject as an exercise for the reader as I contemplate the compass, heading indicator, and GPS as I take off on my next flight, holding my breath the poles don’t swap mid flight.

A Little Humility Makes All the Difference


Ever wanted to know how to get along with your spouse better, or confront a friend about something that offended you, without making things worse? We all have family and friends that get on our nerves from time to time, but what do we do when this happens? What many of us find ourselves doing is just trying to overlook the little things that bug us, but I'll be the first to say that this tactic does backfire, often leaving everyone involved a bit worse for wear. Life is tricky; there is no questioning that. What we really need is a bit of humility, even though it does fly in the face of just about everything that comes to us naturally as Americans.

I love being right! The problem is that I'm not always right and it can be hard accepting, never mind admitting it. Now, be honest. How much would you love to hear this from your loved one: "I just have to say, I'm sorry for the way I treated you. I was wrong but I didn't want to admit it. I love you too much to let anger or frustration remain between us. Can you forgive me?" It may not seem like it, but it feels really good to be the one saying it, too.

Since most of us would rather be told when we are doing something offensive or bothersome, why don't we do this for our friends and family? Here's what I am going to challenge myself with: to try and make the lives of those that I care about just a little bit better, even if I have to get my hands a little dirty in the process.

"Do nothing from selfishness or empty conceit, but with humility of mind regard one another as more important than yourselves; do not merely look out for your own personal interests, but also for the interests of others". Philippians 2:3-4 NASB

Mean People

We have all seen the t-shirt "Mean People Suck" and recently in my world there seems to be a rash of mean people! I thought it would be interesting to google "mean people" to see what was out there on the topic. I found numerous sites, but most of them were focused on how to handle mean people.

"Someone insults you (and your little dog, too). You can retaliate, whimper - or exercise your own vast power." Martha Beck



Why do people insist on being rude and mean and then look around and wonder why they have no friends and act like they are victims. In an article titled "Why People are Mean" by Martha Beck on http://www.oprah.com/ she states people are mean because they have been hurt and are afraid they will be hurt again. Although this doesn't excuse the behavior, it might mack us understand the situation a little better.

Here are three things you can do next time you find yourself in a situation with MEAN PEOPLE. http://www.howtohandlemeanpeoplewithoutstoopingtotheirmeantactics/.



  1. Kill them with kindness

  2. Act confident and unperturbed

  3. Avoidance when possible
I often find myself doing the very opposite of these, however, I think next time I find myself in a situation with MEAN PEOPLE I will try a new approach.

Food for Thought


If you haven’t already, join a CSA (Community Supported Agriculture) farm today and eat locally-grown, healthy, seasonal food, purchased from a farm right in your neighborhood. “The CSA concept which reconnects producers with consumers and empowers members to ‘vote with their dollars’ for ecologically sound local agriculture.”(Garnham, 2009) Sustainable farms and ranches provide obvious and not so obvious benefits to communities and society at large. My perception of CSA’s provides social and economic backbone of many rural communities and by pledging support this equals a win situation for farmers and consumers in supporting a sustainable economy.
We ought to know where our food comes from and feel connected to the land. CSA creates a direct connection between the people who will be eating the food and the people who are growing it. Many consumers are still pursuing convenience, large quantity, without enjoying a healthy meal and should be forced to reevaluate choices and find new ways to buy food in an affordable, sustainable, and environmentally friendly manner.
LocalHarvest.org states with over “140 farms in Maine and 6,200 CSA” shares it is even more important to continue to support local food and agriculture. To find farmer’s markets, CSA’s and other sources of sustainably grown food in your area LocalHarvest.org makes it simple!
What I find interesting is that each CSA is unique; they have each succeeded by thoughtfully adapting their growing methods and crops to their own specific region, farm, and markets. While not all CSA farms are certified organic, but many are and all of the farmers are thinking outside the box and forgoing the standard commodity of chemical agriculture systems.
Participating in a CSA benefits my family because we are eager in educating ourselves about local Maine agriculture and keeping food dollars close to home in supporting local food production. Additional benefits vary however some of the CSA farms in Maine encourages visitors to take advantage of onsite activities during their harvest season including barn and field tours, nature trails, viewing farm animals, farm raised products and demonstrations.

References
Garnham, P. (2009). Community Supported Agriculture. Horticulture. Vol. 107 Issue 1, p14. 1p. Retrieved
Database: Academic Search Premier

www.localharvest.org

The last self-help book you need isn’t a book it’s this blog

There are over 70,000 self-help books on Amazon. The bulk of these “helpful” books are categorized under: Personal Transformation, Motivational, and Success. I ask “what has happened to us, as a people that would propel such a market, are we really lost?”



A 2009 article on Forbes contains data from Marketdata Enterprises which apparently tracks such useful information. “Americans spent $11 billion in 2008 on self-improvement books, CDs, seminars, coaching and stress-management programs” (http://tinyurl.com/np7wvl). I too can be considered among the masses that have rifled through the self-improvement section at a Barnes and Noble. But why, we are stressed - sure, we want more out of life - okay, we want more money and more friends – yes of course. So, if we are too fat it’s not the doctor we listen to, it’s Jullian Michaels. If we don’t have personal or professional relationships that’s okay too because we have Dale Carnegie and the books and seminars that go along with “Win(ning) friends and influencing people.”

Winning friends and influencing people? Are you serious?

Why is this, the self-help blog that will end your quest for the next book or seminar? Because it’s time to grow up and stand on your own. You want to better yourself?




My two “sense” in four bullet points:

• Read philosophy even if you can’t stand it.
• Drink tea even if you can’t stomach it.
• Exercise and eat wisely.
• Play nice with each other – it can be a mean world out there.

Do the tough things you would rather not do - this is what life is all about. To live is to win and to lose. The key should be to strive for the middle ground between suffering and happiness.
Don’t look for hope in a book its something you carry within yourself everywhere you go –pause for affect - awe.


References:
Linder, Melanie. (2009). What people are still willing to pay for. Retrieved from http://www.forbes.com/2009/01/15/self-help-industry-ent-sales-cx_ml_0115selfhelp.html

Are you Safe using Online Dating Services?

Are you Safe using Online Dating Services?


Many people are resorting to online dating to find their “soul mate”. These individuals assume their information and personal security is safe when they meet and go on a date with someone from the dating site. Recently, a woman, later revealed as Carole Markin, was attacked and raped by a man she had met on an online dating site, “Match.com.” Markin claims she was sexually assaulted by a man she had met on the website. After the second date the man, identified as Alan Wurtzel, followed Markin to her home where he proceeded directly to the bathroom then returned and attacked her. Unknown to Markin, Wurtzel is a convicted sex offender who in 2000 publicly advertised a “room for rent” scam. When interested individuals arrived at the rented location, Wurtzul proceeded to grope the victims or masturbate in front of them. Wurtzel was convicted of six counts of sexual battery, received six years’ probation, one year in jail, and a mandatory sex offender registry. Additionally, Wurtzel victimized a female officer during an undercover investigation.


So, we ask, “why are registered sex offenders being allowed to participate in online dating services?” Markin's attorney, Mark Webb stated that, “the suspect (Wurtzel) has a history involving sexual assault cases that should have been caught by Match.com.”(ABC News U.S.,2011) The woman is not suing for money, but rather to ensure dating services will monitor people more carefully before posting individual profiles. I believe these sites should monitor their site and clientele more carefully.

Conversely, maybe more responsibility needs to lie with the individual as one should take responsibility for one’s own well being?

Yes, if we rely on other to keep us safe we are living in a fantasy world. It is each individual’s responsibility to ensure they are not allowing themselves to get into situations where they are endangering themselves or are unfamiliar with their own surroundings. Further, why would anyone allow an individual into their home on a second date with a person they met in an online environment? We need to be aware of our surroundings and the people we are dealing with. The sex offender registry is free on the world-wide-web and can be used to determine who the sexual predators are in a given area, so maybe those planning on using internet dating sites should do a little research before going out with an individual – or only meet them in a public location.

If Wurtzel had not had a previous record of being a sexual predator and still committed this act of violence would the unknown lady still have sued Match.com? My thought is, probably. Some people in today’s society look for any reason to sue. They don’t want to take responsibility for their actions and would rather put the blame on others. In the case of using a dating site, are individuals to complacent? Do they have a responsibility to keep themselves safe? Yes.

To answer the question “Are you Safe with Online Dating?” I would have to say, NO as society no longer gives us the freedom to trust others. We now live in a society where it behooves us to verify information and to not trust anyone until we have validated that trust in a manner we feel is conducive to keeping ourselves safe.




References:
ABC News U.S. (2011). Woman sues Match.com over sex assault. Retrieved from http://abcnews.go.com/US/woman-sues-match-sex-assault/story?id=13378401

About.com. (2011). Single parents: Match.com lawsuit reinforces the importance of safe dating practices – both online and in real life. Retrieved from http://singleparents.about.com/b/2011/04/19/match-com-lawsuit-reinforces-the-importance-of-safe-dating-practices-both-online-and-in-real-life.htm

Ripoff Report. (2011). Complain review: Alan Paul Wurtzel. Retrieved from http://www.ripoffreport.com/sex-offenders/alan-paul-wurtzel/alan-paul-wurtzel-la-city-atto-64w43.htm

Gay, M. (2011). Alan Wurtzel news: Woman suing Match.com speaks out about alleged lawsuit. Aol News. 2011 April 19, p. 1. Retrieved from http://www.aolnews.com/tag/alan%20wurtzel/

Designing a Blog Post

Designing a Blog Post

The purpose of a blog is to form an opinion or thought about a subject that is of particular interest to someone. A purpose can be about why it is important to write about a topic. The purpose of my first blog was to inform the audience that the internet is not just a safe place especially when terrorists and hackers are involved. I was attempting to open the minds of the audience to look at the internet and the amount of information that can be easily accessible. The audience, a target audience, is who you want to focus on, because they will be your readers and commentators. Once you analyze and interpret the audiences’ wants and needs, you are able to start gathering the information. You want to leave the audience questioning for further research and leave them pondering. Writing needs to have both a purpose and an audience. Furthermore, writers need to advertise and sell their product which in this case, would be the blog article.

Reference

No Author. (2011) “Writing Guide: Purpose”. Retrieved From http://writing.colostate.edu/index.cfm

How $afe is your personal information?

How Safe is YOUR personal information? Protecting personal information today has become part of the "norm" for every day lives. (Or at least it should be.) There is a certain level of privacy we all give up each and every day with any of our online activities. Social networking for instance seems to have taken the place of personal meetings, having coffee with a friend, house parties and social gatherings of many sorts. With the click of a button you can determine what hundreds of friends and family members are doing each day; vacations are shared, births, deaths, marriages and ex-loves.

Americans value free expression but with it comes the risk of revealing personal information intentionally or unintentionally.
The article I have selected is "The role of security within social network. (Social News & Products).

Sites such as Face book are continuing to make changes to "secure" personal information to the extent that it is intended for but I feel that it is absolutely the users responsibility to be cognizant of their information first and foremost. I feel that as quickly as someone comes up with a new security measure, there is another individual coming up with a way to break into it. At the end of the day, it is still up to the end user to protect their information. Face book is a prime example of displaying seemingly harmless information that others can use to prey upon you. The next time you consider updating your profile or status consider the following:

  • What can someone else do with this information?

  • Who would you NOT want to read your post?

  • How could you communicate this information differently?

Protect yourself, set profiles to private view only, limit personal information to people you know and only accept a friend request from someone you actually know well. (not your friend from summer camp when you were 10). It is a good idea to change your passwords and make them unique in nature. These are a few of the tactics I use to protect myself on the Internet.


While communicating online is a fast and easy way to connect with many, be aware of the risks involved if you are not cognizant and aware.


Reference:

The role of security within social networks. (March 2011) Software World, 42, 2. p25(1). Retrieved April 10, 2011, from general One File via Gale: security in social networking

Back to Our Roots by Talking Face to Face... Kind of

Eric Sheninger, the principal of a New Jersey high school, has this to say about Skype: "Teachers can easily use Skype to bring experts into the classroom, take virtual field trips, or collaborate with other schools in real time."

We've been seeing it in science fiction movies for decades, and finally we have caught up with our imaginations. Video calling is here! It is the next leap in telecommunication. I personally am way more excited about this development than I was for both e-mail and text messaging combined. The crazy thing is that in this year alone, there will likely be over 13 million people on video calls with more that eleven times that in just four years.

Of course there will continue to be video calling from desktops and laptops alike. What has me chomping at the bit is the likelihood that we will all be making these kinds of calls on our cell phones and tablets in the next year or so, and we will even be able to make video calls through some new TVs. I don't know about you, but I am starting a budget so that I can afford these new tech toys.

While this is exciting for me to think of the difference in our everyday communicating, the real benefit is seen in the classrooms as Principal Eric Sheninger stated. The possibilities this affords the education system are staggering. I can only imagine how much more effective having a class make a video call with a WWII veteran or an accomplished surgeon would be than just reading a text book. Video calling will also be an invaluable tool to those who are hearing impaired. Since video conference-calling is in beta testing right now, those with hearing impairments will soon be able to have a live phone conversation with someone who doesn't know sign language. All they would need to do is conference in someone who can do translation.

Since the dawn of man, we have always communicated face to face. Seeing how someone expresses themselves physically when they talk, as well as seeing the way they respond, is the only way to get everything out of a conversation. Now we can have this experience in spite of the fact that many miles separate us.

Check out these sites:

http://www.skype.com/intl/en-us/features/allfeatures/video-call/ for some of the video calling options.

http://www.fring.com/default.php for video calling and video conference calling on cell phones.

References

Jon, S. (n.d). Skype broadens its reach. USA Today. Retrieved from EBSCOhost..

Sheninger, E. (2011). Skype!. Educational Leadership, 68(5), 55. Retrieved from EBSCOhost.

Professional/Unprofessional Media and the Effect on Military

Professional/Unprofessional Media and the Effects on the Military

The article I have chosen to write about is called the “Online Journalism and the War in Cyberspace: A Comparison between U.S. and International Newspapers” written by Daniela V. Dimitrova and Matt Neznanski. The article discusses how the 2003 War in Iraq started a new phenomenon between cyberspace communication and the media. The World Wide Web became the power source for news coverage from around the world. Anyone with internet access could obtain the news about the war, including terrorists. The article examines how the war was covered in the United States and other international countries. I will also discuss how terrorists can sabotage the internet.

“Surveys conducted before the turn of the 21st century indicated that 82% of Internet users checked newspaper Web pages, second only to email usage in reasons given for using the World Wide Web (Strupp, 1999). A more recent study indicated that news remains among the most popular Internet activities (Lin, Salwen, Garrison, & Driscoll, 2005).”

These two facts are quite interesting because I am going to discuss why the media can have a boundless effect on the military. The media can cover any topic and to make news interesting, they will stretch the truth to get more page views from the readers. The World Wide Web makes it easy to post an article that was most likely recycled from the original story. In doing so, this makes it more accessible to the public because it is quick and almost effortless to accomplish. This can be fixed by adding hyper links to the original story so that it is more credible. The military is being affected by the media. The people who have access to the internet can easily alter the original story. The internet is free access to anyone who owns and knows how to work a computer. Any kind of news whether it’s about what is going on with the war in Iraq or the earthquakes in Japan, can be reported by anyone who knows how to shoot a camera or write a story.

Terrorists Make Way with the Media

The media is also being used by terrorists to try and “scare” their targeted groups. In doing, so they will use such websites such as YouTube, LiveLeak, and Google Earth (to visually locate their targets). If the news gets into the wrong hands, disaster can occur. As technology grows, the cheaper it is to buy the old technology (machines) and use those for terrorist attacks. The internet is the new “information environment” where technologies are available if you have the right equipment. Terrorists are no longer using professional media to gain the world’s attention; they are using sites such as YouTube to record their latest development. They can upload and edit their video versions. Not only are terrorist using these sites, but so are the professional media. Communication technology becomes mature when it becomes available to the general public; when it is affordable, when the information is portable, and lastly if it is available in different countries and not just developed countries (Dauber, C. 2009).


References

Dauber, C. (2009) “YOUTUBE WAR: FIGHTING IN A WORLD OF CAMERAS IN EVERY CELL PHONE AND PHOTOSHOP ON EVERY COMPUTER” Retrieved from http://www.au.af.mil/au/awc/awcgate/ssi/youtubewar_dauber.pdf

Dimitrova, D & Neznanski, M. (2006) “Online Journalism and theWar in Cyberspace: A Comparison Between U.S. and International Newspapers” Retrieved from http://web.ebscohost.com.dml.regis.edu/ehost/pdfviewer/pdfviewer?vid=10&hid=11&sid=a1558d95-f05b-4a8d-a9ef-86cd35b6df1c%40sessionmgr11

Salwen, M. B., Garrison, B., & Driscoll, P. D. (2005). Online news credibility. In M. B. Salwen, B. Garrison, & P. D. Driscoll (Eds.), Online News and the Public. Mahwah, N.J.: Lawrence Erlbaum Associates, Publishers.

Strupp, J. (1999). Welcomed visitors: E&P study shows newspaper Web sites busier than ever,but still learning the ropes. Editor & Publisher, 132(27), 22–27.

Data Breach


"Despite negative repercussions in terms of cost outlay and reputation diminshment, many companies that experience a breach do not take appropriate steps to prevent future incidents," Larry Ponemon

As technology capability increases so does the chance of data breaches. In the past three days I have personally received two notifications that a potential data breach has occurred with my personal data. One instance from my employer and one from Walgreens, both are very large companies with high tech IT departments. The article Data Breach Remendation Lags, from the Communications News, 00103632, Jul 2007, Vol. 44, Issue 7 discussed that breaches happen to many companies, while most breaches can be prevented with an encryption device for workstations and PDAs, it is the way the companies respond to the breaches that is surprising.

In a survey by the Ponemon Institute Institute they found that a data breach can cost the organization money in loss of customers, legal fees, fines and even a decline in stock values. About half of the breaches came from stolen equipment while the other half came from employee negligence. Even though organizations have experienced data breaches, 46% failed to implement encryption technology and 42% stated their IT security budget will remain the same in the upcoming year. Encryption is on the rise in many organizations. My company has recently instituted a new encryption device, although a data breach has been expected the occurrence of the issue is rare.

Many states are adding regulations to inform customer or employees if a data breach has occurred but is that enough? Communications Plans are critical to informing customers of a compromise.

Not only is it the responsibility of the organization to protect customer data but it is also their responsibility to have a plan in place to handle data breaches prior to a suspected compromise. Art Samansky and Eric Samansky of The Samansky Group states, "Speedy, full and accurate disclosure greatly outweighs waiting for a possible intrusion to be discovered outside the organization." The communication plan should include the appropriate actions the customers need to take.

In today's age of technology and the risk it includes, all organizations should have to follow federal, state, as well as, individual regulations to protect our personal data.

Reference

Communications News, 00203632, Jul2007, Vol 44, Issue 7, (p6) Data Breach Remediation Lags. Retrieved from EBSCOhost. Potential for Customer Data Breach Requires a Communications Plan Review. By: Samansky, Art, Samansky, Eric, Public Relations Quarterly, 003337000, Summer2005, Vol 50, Issue 2. Retrieved from EBSCOhost.

Advanced Persistent Threats

Your involvement in espionage




"APT Becomes Security Acronym of the Year – Heard of "APTs" (advanced persistent threats) yet? You will in 2011” according to WatchGuard Technologies of Seattle Washington (Chris McKie, 2010) in their Top 10 Security Predictions for 2011they list it as number 10. As they state in their prediction, “there is no single, standard definition” (Chris McKie, 2010) but they have several things in common. They are a form of virus or malware, but as you might guess they are very advanced. They also are very targeted, well sponsored, well engineered, and are designed not to be found. Their role in life is to take control of a system, hide, steal information, and send it home, but with a twist. They need your help to get started, and once started their logic helps them from being eradicated if found.

So how did you get involved in the act of espionage? They need your help to overcome their first obstacle, getting inside a network. As Monty McDougal poinst out in his Redefining 21st Century Network Defense (McDougal, 2009), historically network security has been based on what could be called medieval castle technologies. Security professionals build a castle with strong walls, a strong door, and a moat to keep the bad guys out. But as in the days of castles, people and things leave the castle without anyone paying much attention. In today’s world it is information leaving. All the bad guys need is a ride into the castle. They then set up camp and take over.


One way the bad guys get your help is by playing on your lack of security awareness. One of the most successful attacks was achieved by the bad guys dropping infected thumb drives in the parking lot of a large corporation. A lot of people found them and thought “what a good deal”. Free is not always a good price. A good deal of the “hitching a ride” work depends on social engineering. Have you ever gotten emails from someone, even people you knew, with imbedded urls? Maybe it might be a good idea to check with the sender before clicking on that link. Ever think of taking you personal P.C. to work to just get a quick copy of something? Maybe not such a good idea. One useful method of protection is to question everything. When you come across those “that’s strange” moments, stop and think about what you are about to do, or what you just did.




References



C. Banerjee, S. K. (2010). Research on Software Security Awareness: Problems and Prospects. ACM SIGSOFT Software Engineering Notes Volume 35 Number 5 , 5.


Chris McKie. (2010, 10 23). WatchGuard Unveils Top 10 Security Predictions for 2011. Retrieved 4 5, 2011, from Watch Guard: http://www.watchguard.com/news/press-releases/wg481.asp

McDougal, M. (2009). Castle Warrior: Redefining 21st Century Network Defense. 6th Annual Cyber Security and Information Intelligence Research Workshop (p. 16). New York: ACM.

She's a Social Shopper

“One of the big mistakes companies make is assuming women are all about the warm and fuzzy, and they’re not,” says Mari Barletta, author of Marketing To Women (Luscombe, 2010., p.60).

Marketing has become more creative with online strategies and tactics aimed directly at a lucrative woman’s market. Time Magazine reports that among other factors, the increase of woman's spending power has provided insight as to why corporations are directing their attentions toward capturing the woman’s market by using strategies considered gender effective advertising. Corporations have been incorporating best practice business models which have helped create and execute marketing plans that target women. Online marketing toward women have aided in an understanding of how and why women reach different brand purchase decisions then men. “Women control $7trillion in consumer and business spending and are the primary purchasers of consumer electronic equipment.” (http://tinyurl.com/3knb2hm).”

According to a recent study by BlogHer and Compass Partner, “more than 35% of all women in the U.S ages 18 to 75 participate in the blogosphere at least once a week. Of those women who are online any amount of time, 53% read blogs, 37% post comments to blogs and 28% write or update blogs (http://tinyurl.com/3cb3sds).”

The survey also asked BlogHer readers and writers what appeals to them in online advertising and the results showed that women were 40% more likely to click on an ad vs. BlogHer readers at 29%. Still, their reasons for doing so were almost exactly the same: “to learn more about a product or service (79% writers/81% readers), to get a free product or service (52%/48%), to get a discount on a product or service (49%/52%) and because the brand advertised was one they knew and trusted (46%/48%) (http://tinyurl.com/3cb3sds).”

The Time Magazine article also mentioned of more than “500 million people on Facebook, women do 62% of the sharing (Luscombe, 2010., p.60).” There seems to be a consensus that the future of social media will be geared towards women. Marketing budgets are being spent trying to acquire a female user will go a lot further than on a male user. On the other side of the spectrum women find online social sites like Facebook and Twitter as a type of atmosphere to use as a weapon in their advantage by sharing their consumer stories which sometimes is the unfortunate stories. In 2008 Johnson and Johnson had put in motion a Motrin campaign with mother strolling baby in carriage and dealing with headache. Women had put together a web video stating “it totally makes me look like an official mom”. “Overnight they formed a group which gave Johnson & Johnson a public backlash as emotions escalated and the company apologized and canceled the advertisement.

It seems that women are seeking information that will help them, not make things more complicated for them. I actually did come across and article that discussed how women seek out tools, tips and stories that will share information that will lessen their daily burdens. The article also stated “If you have something that will help them make their regular tasks a bit easier, chance are they will take the time to read your post (http://tinyurl.com/ycd2c9l).”

One example with regards to marketing toward women in travel is the way online transactions compare. Studies have suggested men typically book the first hotel room found within a price range while women use more comprehensive decision process such as looking at secondary options such as spa, a gym, nearest attractions, and pictures of rooms are also important. The end result the hotel gets the sale, however booking the hotel room of the woman’s choice the hotel generates a repeat customer based on applicable extras.

Whether marketing to women online, television, or other media markets it comes down to how effectively the corporations communicate to women about products, services and ideas.

References

Luscombe, B. (2010). The Rise of the Sheconomy. Time, 176(21), 58-61. Retrieved from EBSCOhost.

Bulik, B. (2008). Study Shows Blogging Now “Mainstream” Among Women. Retrieved from

http://adage.com/article/digital/study-shows-blogging-mainstream-women/127354/

http://tinyurl.com/3cb3sds

Wegert, T. (2006). Marketing to Women: More Than a Media Buy. Retrieved from

http://www.clickz.com/clickz/column/1706185/marketing-women-more-than-media-buy

http://tinyurl.com/3knb2hm

Borow. B. (2010). Girls Guide To. Retrieved from www.mashable.com http://tinyurl.com/ycd2c9l

Don’t worry activism isn’t changing, it’s getting better!

When Noorin Ladhani refers to social media “as a tool for change rather than the tool that will change the world, the power and possibility of social media far exceed the tools of generations past” (Ladhani, 2011., p.57).  On its face it is a rebuttal of an essay by Malcolm Gladwell’s on the effectiveness of social media used in activism offers keen insight.  
While Gladwell promotes the notion that social media acts as a hollow tool for activism that is ineffectual in comparison to a passionate
“grassroots” movement.  I would argue on behalf of Ladhani’s stance that social media used as a means to inform, mobilize and promote (activism) is a revolutionary method that upgrades the more traditional means of activism.
Activism v2.0:
·         Using social media we can coordinate group gatherings or ‘flash mobs’
o   Strengths in quickly assembling organized numbers of people
·         Using social media we can warn other participants of actions to prevent a group event
o   Real time updates can enable a group to adjust to action against it
·         Using social media we can quickly get a message to people not directly involved but still interested in our involvement
o   Enlist support from the media and others around the world
These upgrades to traditional activism don’t take away its spirit but make group demonstrations better by getting the word out when traditional forms of communication are not available or are too slow to react.  Ladhani’s comment on the effectiveness of bloggers over media crews further proves the theory that “the best updates came from new reporters and bloggers not limited by cameras” (Ladhani, 2011., p.57).
“The nation’s most influential advocacy groups…NRA, AARP, MoveOn.org, have embraced social media to reach, organize…their supporters”  *(http://tinyurl.com/6eksejt).  There is no turning back.  The internet can and will be used as a complement to effective activism of all types.  Large, traditional organizations have found value in social media just as its effectiveness can be seen in the streets of Egypt.  This versatile tool has become instrumental to so many so quickly.

References
Ladhani, N. (2011). The Organizing Impact of Social Networking. Social Policy, 40(4), 57.
                Retrieved from EBSCOhost.

*Lawrence, D.  (2010).  How Political Activists are making the Most of Social Media.  Retrieved
                                     from http://www.forbes.com/2010/07/15/social-media-social-activism-facebook-twitter-leadership-citizenship-burson.html


What effect does Social Computing have on Society?


Social computing is a fast emerging popular system of communication. At one time there seemed to be a generational gap, but today it seems that regardless of age, young or old, communication through some form of social communication seems to be the norm. "In a 2006, Forrester Research found that although social computing is in infancy societal changes are being witnessed, as individuals increasingly take cues from one another, in additional to traditional sources of authority such as corporations media, political institutions and religions." (Vannov & Palvia. 2010 p. 10).

Blogs. e-Bay-esque, Websites, Web-based forums such as MySpace.com, text messaging, instant messaging and Facebook are extremely popular in today's society. Interestingly enough there was no mention of Facebook.com in the 2010 article listed above. Facebook.com is one of the largest social networking sites in existance worldwide. Brad Stone, a publisher for the New York Times stated that Facebook "is signing up nearly a million new members a day, and now more than 70 percent of the service's members live overseas, in countries like Italy, the Czech Republic and Indonesia." Even government agencies have found the necessity of Facebook and many now allow employees to network through Facebook at work as a means to bring employees and the outside world together. Additionally, many agencies have gone so far as to create corporate Facebook pages. The Veterans Administration and the military recently opened the Facebook realm as a means to allow employees/members to find information they may otherwise find too cumbersome to locate.

There may be a downside to the increased acceptance of social computing as the government has issued fears that "planned Internet threatens GPS" (Tessler, J., 2011 B5). This may seem silly at first glance however reading further into the article one begins to understand these fears. The threat is the new "ultra fast wireless Internet networks". "The problem stems from a recent government decision to let a Virginia company called LightSquared build a nationwide broadband network using airwaves next to those used for GPS". "One of the biggest risks is to the GPS navigation systems used by about 40 percent of commercial and private planes." (Tessler, J. 2011 p.B5). But is this truly a threat or is it similar to the scare tactics used when cell phones first became popular? Many remember signs stating "No Cell Phone Area" for hospitals, and electronic devices are still required to be turned off in an aircraft. However, hospitals now realize that cell phones do not interfere with pacemakers, defibrillators, or other lifesaving equipment and no longer require the ban. There is no proof that a cell phone will ignite fuel when filling ones gas tanks, and many cell phones abroad aircraft with no adverse effects to the planes navigation systems. So, we then have to research and determine for ourselves real from perceived threats.

There is no doubt that social computing is going to continue to grow and the new generation is very electronic literate, children as young as five years old are using texting, instant messaging, and social networking. This generation is going to use social computing and will likely invent and develop new computing techniques in the future.





References:

Vannoy, S.A. & Palva, P. (2010). The social influence model of technology adoption. Communications of the ACM, 2010 June, Vol. 53(6). Retrieved from the Regis University Library.

Stone, B. (2009). Is facebook growing up too fast? New York Times. Retrieved from http://www.nytimes.com/2009/03/29/technology/internet/29face.html?pagewanted=1&_r=1

Tessler, J. (2011). Planned internet threatens GPS. Associated Press: Wyoming Tribune Eagle, 2011, April 7, p.B5. Cheyenne: Wyoming Tribune Eagle

Social Networking has many different facets

Instead of being limited to our general geographic area to exchange ideas, collaborate on projects, or communicate, we can speak instantly to anyone who has access to the internet, anywhere in the world. Think about an average conversation you may have had recently; did someone mention facebook, skype, twitter, or any of the other social networking sites? Our everyday interaction with each other has changed because of the popularity of these sites. If you have a facebook account, how many invitations have you gotten for parties, or other events? For instance, my wifes reunion invitations were issued only via facebook, myspace, and twitter. On classmates.com, or mylife.com, you can post your profile, and reconnect with people from your past. How many people have you found on social networking sites from your past that you thought you would never see again? It is common for people to contact you who you hadn't seen for years, all of this thanks to social networking sites.

Social networking sites can also be a tool in your professional life. With an account on linkedin, it is possible to connect with other account holders that are in the same industry as you, or other industries. Account holders can search for new employment opportunities, network with clients, and prospective clients, and stay up to date with changes in your industry. Hundreds of sales are made every day via linkedin, and it is perfectly acceptable to due research about a potential employee on linkedin. Indeed, linkedin and sites like it are making business cheaper, more efficient, sleeker, and global.

Employers also are using these sites to gain information about prospective employees; there is even a company, Yasani.com that searches social networking sites for employers. I believe we all remember the young staffer for Barack Obama's '08 presidential bid who posted a picture of him self holding a cutout of Hillary Clinton. While this did not damage his career, it very well could have. The lesson here is loud and clear; if your friends can see something, your boss probably can also.

There are other downsides to social networking sites. Sites such as twitter, myspace and facebook encourage you to share photos of yourself, and other personal information. Criminals have taken notice of this invitation, and have used sites as the ones mentioned earlier to commit crime. It is possible for criminals to look at various accounts that you have and build their own profile of you, for burglary, identity theft, or other criminal purposes. When using these sites, one must be aware of this, and act accordingly. Children may be at the most risk; with children being so trusting many of them, if not warned properly, may come into contact with people that you would never allow them to associate with. It is imperative to use social networking sites cautiously, and be aware of the dangers that are out there.

When used correctly social networking sites are an amazing thing. It is possible for families to see, and speak to each other instead of writing letters, or talking on the phone. They are useful for employees to find a job, and employers to research employees, and it is possible to find and communicate with people from your past. The main thought one must take away when deciding which, and if to join one of these sites is safety. When done in a cautious manner, social networking site will change your life in many ways.



Moses