You are on page 1of 125

THE IMPACT OF COMPUTING ON SOCIETY, SECURITY AND PSYCHOLOGY

Extended Project Qualification OZGUR MEHMET

10

11

12

13

14

15

INSERT PAGE 15

16

PROJECT OVERVIEW

17

THE IMPACT OF COMPUTING ON SOCIETY, SECURITY AND PSYCHOLOGY


This overview contains 3 highlight topics and 11 sub topics. Each topic and subtopic will be clearly titled on the final written report. Superscript used in this project applies to primary sources only.

Topic Number 1a 1b 1c 2a 2b 2c 2d

Topic Computing in Society The uses of computing in the modern world

Subtopic
Uses of computers in the workplace. The advantages of computing. The disadvantages of computing. Addictions to computers and the internet. Addictions to cyberpornography. Personality types in cyberspace. Cyberbullying.

Content
Exploring the uses of computers in the workplace and how it has improved our workflow. Identifying the advantages and disadvantages of computing in society. Exploring the negative psychological effects of computing. Identifying how we have become addicted to computers and the Internet. Reviewing serious psychological effects of cyberpornography. Exploring the online shopping world and how it will have an impact on your psychology. The effects of Cyberbullying on computer users. Exploring the threats to computer systems and how we are affected. Identifying the risks and resolutions. Reviewing the use of stolen data and known cases of security breaches.

Period Reviewed

Cyberpsychology The effects of computing on human psychology

3a 3b 3c

Computer Security The security risks of computing

Potential threats to computer systems. Identifying risks. Use of stolen data.

All sources can be found on the Bibliography document. When adding sources, it is important to retain information on where the extract was retrieved. This final submission will be presented in the following structure:

Section Number
1 2 3

Section Title
Log Book Planning and Organisation Written report

No. Of pages
38 52

Tick as completed

4 5 6

Summaries on written report Bibliography Evaluation of project TOTAL NUMBER OF PAGES

32 2 1 125

All documents have been compiled and are attached as expected. Some information has been removed in order to comply with applicable legislation discussed in the evaluation.

Deceleration
Signed: I confirm that I have produced the attached work without assistance other than that which is acceptable under the scheme of assessment (AQA).

18

CONTENTS
Page Number 21-25 26 27 28-30 31-34 35-37 38 40-56 57 58-69 70-81 82 83-87 88-91 92-110 111-113 114-115 116-117 118-125 Content Planning (P20 38) Initial Ideas Presentation Time and Content Management Sheet Time and Content Management Sheet End of project review Initial Planning Sheet Project Plan Updated Planning Work Performance Chart Written Report (39 91) Computing in Society Supporting Evidence Checklist Sources Consulted for Section including Supporting Documents Reference Sheet Cyberpsychology Supporting Evidence Checklist Sources Consulted for Section including Supporting Documents Reference Sheet Computer Security Evaluations, Conclusion and Presentation (92-125) End of Project Presentation Conclusions and Evaluation Bibliography Poem Cyberbully Video Production and Web Development Log End of Project

19

PLANNING

20

29/03/2013'

COMPUTING IN MODERN SOCIETY


OZGUR MEHMET

DISCLAIMER
The content herein complies with the Data Protection Act. Names and other personal details used have been authorised by the entity. Confidentiality reports can be found with the presenter.

1'

21

29/03/2013'

What I am studying
Computing IT Psychology EPQ Based on these subjects, I aim to merge all topics and

subtopics into one research study.


The study will observe how Computers are used in

Modern Society and the study will be separated into 5 separate topics.

Topics
Computing in Modern Society this part of the project will

investigate the uses of Computing in society today and the effect it has had on the everyday workings of the world. This part of the project will be divided into 3 sub-topics. Computing and Psychology this part of the project will investigate the effect of Computing on our Psychology and will be divided into 3 sub-topics. Computer Security this part of the project will investigate security systems and Computing and will be divided into 3 subtopics. Music, Psychology and Computing this part of the project will be an insight into how Music is influencing our Psychology and how Computers are making this possible. Social Networking and Politics this is the final part of the project and will investigate the effects social networking has had on the political sector.

2'

22

29/03/2013'

Structure
The project will consist of one final continuous prose

essay and one 60 minute documentary. The documentary will be carefully planned so each section is completed before starting the next section. Once the documentary is complete, each section of the documentary will be carefully reviewed

Progress so far
I have managed to contact the people from my contact

listing (last slide). I am now in the process of booking individual sessions with each participant. I have researched the Psychology aspects of Human adaptation to changes in Society. I have documented this and will integrate the content in the project when appropriate. I have began the production and started recording some elements of the documentary.

3'

23

29/03/2013'

Summary of tasks outstanding


I need to complete my contact listing for each sector so I

can tick the sector contact checklist. This will help plan the next part of the project. I need to start writing subject statements that will provided to the presenter.

Difficulties
Confidentiality The content being dealt with is personal

information and confidentiality is priority whilst completing this project. This is proving difficult to manage. Planning with Sectors The interviews being arranged are with the strategic department of each company.

4'

24

29/03/2013'

Easy Task
Project Planning the project is linear, each stage is

followed by the next corresponding stage, this is important to increase work rate. Information Collection because I am studying the subjects relevant to this research, information collection is relatively easy. Production & Editing I am working alongside an established firm. They are contributing to the production and this is helping me manage all sub-topics effectively.

Contact Listing
Dr. Rajiv Goel, General

Practitioner (MSc, MBBS) Dr. Kayleigh Smith, Clinical Psychologist (MBBS, PHD) Ms. Shinaz Kajee, Administrator Mr. Yilmaz Ozyigit, Journalist & Businessman Prof. Harold Nueman, Professor in Psychology and Neurology (PHD, MSc, MBBS, CHD)

Sector Contacts Include: Medical Social Care Academics Architecture Media Transport Social Services (Civil)

5'

25

26

Time Management and Content Attachment As Of February 2013


This sheet should be used to manage tasks, assign dates and summarise performance. All entries should be completed. This is not a project plan. Y Yes, N No, P - Pending

Topic Number Computing in Society

Date

Topic

Task (sub-topic)

Reviewed

Summarised

Cyberpsychology

1a 1b 1c 1d 2a 2b 2c 2d 2e 3a 3b 3c Computer security
Uses of computers in the workplace. The advantages of computing. The disadvantages of computing. Emerging technologies. Addictions to computers and the internet. Addictions to cyberpornography. Personality types in cyberspace. eCommerce and online shopping. Cyberbullying Potential threats to computer systems. Identifying risks. Uses of stolen data.

Y Y Y Y Y Y Y Y Y Y Y Y

Y Y Y Y Y Y Y Y Y Y Y Y

Completed (In written report) Y Y Y Y Y Y Y Y Y Y Y Y

27

Time Management and Content Attachment As Of October 2012


This sheet should be used to manage tasks, assign dates and summarise performance. All entries should be completed. This is not a project plan. Y Yes, N No, P - Pending

Topic Number Computing in Society

Date

Topic

Task (sub-topic)

Reviewed

Summarised

Cyberpsychology

1a 1b 1c 1d 2a 2b 2c 2d 2e 3a 3b 3c 3d Computer security Music, Psychology & Computing


Uses of computers in the workplace. The advantages of computing. The disadvantages of computing. Emerging technologies. Addictions to computers and the internet. Addictions to cyberpornography. Personality types in cyberspace. ECommerce and online shopping. Cyberbullying Potential threats to computer systems. Identifying risks. Uses of stolen data. Known cases of security breaches and the impact on the online community. Solutions to prevent security breaches. Music production on a computer. Frequency manipulation and the effect on human behaviour. Music and the effect on emotional state.

Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N N

Y Y N Y N N N Y Y Y Y Y Y

Completed (In written report) Y P P P P P P P P P P P P P P P P

3e 4a 4b 4c

EPQ

OZGUR MEHMET

28

! ! ! Extended Project Documentation (Initial Planning)

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
1

EPQ

OZGUR MEHMET

29
Unit Production
Sector Research Yilmaz Ozyigit Editor Ozgur Mehmet Scripting Ozgur Mehmet

Unit Research Ozgur Mehmet

Sector Studies & Participants


Academics Sir George Monoux College (Student) Sevilay Karakas (Student) Hamzah Zahid (Teacher) Sarah Benee (Head Of Faculty) Glenn Avotins Houndsfield Primary School (Student) TBA (Teacher) TBA (Head teacher) TBA Policing & Security Edmonton Police Station (Commissioner) TBA (Financial Coordinator) TBA Social Care Cypriot Elderly & Disabled Group (Manager) John Constantinou (Supervisor) Hulya Ozyigit (Administration) Susie Constantinou

Healthcare The Riverside Practice (GP) Dr Rishi Aggrawal (Nurse) Ms Loulla Fadiel (Receptionist) Ms Shanaz Kajee (Psychologist) Dr Leticia Cestari

Transportation Arriva (Senior Coordinator) TBA (Financial Coordinator) TBA Enfield Gazette (Director) TBA (Columnist) TBA Metro (Director) TBA (Columnist) TBA

Media Londra Gazettesi (Director) Yilmaz Ozyigit

Architecture & CAD REMOVED FROM PROJECT

Economics & Politics (MP) Andy Love (Businessman/Journalist) Yilmaz Ozyigit (Graduate/Socialist) Ayse Asim (MBE) Susie Constantinou

REMOVED FROM PROJECT

EPQ

OZGUR MEHMET

Sections for Production


Subject One How has Computing enabled society to advance? Has Computing had an affect on our Psychology? Subject Two Has Computing affected the way we work?

30
How has advancements in Computing affected our security systems? How is music being produced using computers? How have we adapted to technological advancements? Has Computing opened up a never-ending series of national/international fraud cases? Does music have an effect on our Psychology?
3

Topic Computing in Society

Psychology and Computing

Computer Security & Intelligence

Music, Psychology & Computing

Subject Three How has Computing improved our understanding of the sectors? Will the future of Computing be beneficial to society but detrimental to our Psychology? Has Social Security/Intelligence been affected by advancements in Computing? Are computers being used to manipulate music to influence behaviour?

Project Planning (The Impact of Computing on Society, Security and Psychology)


This is the final project plan and should be included with the final report. All planning is updated as tasks are assigned/completed.

31
TERM 1 Task
Using mind map, summarise content and topics and write short brief on project aims and objectives.

Week beginning 10/09/2012

Activity Induction What constitutes a project?

Deadline 17/09/2012

Dynamic Planning

Completed YES

Developing ideas for project. Mind mapping ideas and merging preferred topics. Initial summaries for project ideas.

17/09/2012
Review sources that may be relevant to project. Evaluate content and complete write-up. Understand how to evaluate a website.

Research Skills Website evaluation

24/09/2012

Evaluate website content and establish context. Is it relevant to study? How useful is the content?

YES

24/09/2012
Review content provided; identify literacy level and improve for final entries.

ONGOING

Preliminary research Reading skills (literacy activities)

To improve overall literacy. Integrate improvements for final submission. Extract/copy existing project material and use as guidance.

ONGOING

01/10/2012
Review previous projects and extract useful information. Using information, plan and assess project.

Previous Projects Assessment Exercise

08/10/2012

YES

08/10/2012

Time management Note Taking

15/10/2012

YES

Take notes from presentation. Using notes, type a short brief on how time will be managed. Devise contingency plan.

Using notes, type brief and devise project plan and contingency plan. Devise a project event plan (for interviews, conferences) Devise a project log.

15/10/2012

On-going Planning and Project contribution

Following project plan: update project and being write up.

ONGOING

Check plans and make sure data is up-to-date.

ONGOING

END OF TERM 1 CHECK CONTIGENCY, PROJECT LOG AND PROJECT EVENT PLAN FOR MORE INFORMATION.

TERM 2 Task
Collect research. Numerical data should be sorted. All questionnaires should be planned. Ethics should be consulted. No tasks assigned. Using planning document and time log begin to design questionnaires and collect research. All data should be recorded. Using guidance sheets, improve sample of written report.

32
Activity Research, Numeracy, Questionnaires, Statistics and Ethics Deadline 12/11/2012 Dynamic Planning Completed YES Academic Language Vocabulary Building & Literacy

Week beginning 05/11/2012

12/11/2012

19/11/2012

YES

19/11/2012
No tasks assigned

Advanced Grammar Writing Skills & Literacy

ONGOING TASK EXTERNAL

To improve overall literacy. Use advanced grammar where appropriate. Improve own writing based on the examples.

ONGOING TASK EXTERNAL

26/11/2012
Analyse all materials for grammatical errors and spelling errors.

Critical Thinking Text Analysis

03/12/2012

YES

03/12/2012
Take notes from presentation. Make notes on plagiarism and basic skills for Photoshop.

Plagiarism/Photoshop

10/12/2012

No dynamic planning notable.

YES

10/12/2012
Start collecting all sources and merging into a bibliography.

Bibliography

ONGOING TILL END OF PROJECT No Deadline Notable.

Use the Harvard Referencing System. Based on feedback, make changes on content over break.

ONGOING TILL END OF PROJECT NA

17/12/2012

Mid-Project Review Assessing Progress and Adjusting Action Planning

Produce draft report to present. Request feedback.

END OF TERM 2 CHECK CONTIGENCY, PROJECT LOG AND PROJECT EVENT PLAN FOR MORE INFORMATION.

TERM 3

33
Activity Report Writing
No dynamic planning notable. Complete final draft of report and hand in for feedback. Being merging all sources to prepare planning and evaluation section.

Week beginning ONGOING TILL END OF PROJECT YES

Task

Deadline

Dynamic Planning

Completed

07/01/2013

14/01/2013
Using bibliography, begin referencing.

Referencing

28/01/2013

Use Harvard Referencing System understand how it is used and why it is used.

YES

28/01/2013
Check all AOs and see if marks have been missed. Change content to match AOs.

Re-visit AOs

04/02/2013

YES
If marks have been missed, add content to meet requirements. Make changes to suit AOs.

04/02/2013
Take notes from presentation.

Advanced Word Training

11/02/2013

No dynamic planning notable.

YES

11/02/2013
No tasks assigned.

Visit - Writing

No Deadline Notable.

Use the Harvard Referencing System.

NA

END OF TERM 3 CHECK CONTIGENCY, PROJECT LOG AND PROJECT EVENT PLAN FOR MORE INFORMATION.

TERM 4

34
Activity Effective Presentations
Take notes on how to deliver an effective presentation. Using the notes, plan presentation carefully pay particular attention to interactivity.

Week beginning 04/03/2013 YES

Task

Deadline

Dynamic Planning

Completed

25/02/2013

04/03/2013
No tasks assigned.

Mock Presentations

28/01/2013

No dynamic planning notable.

YES

11/03/2013
No tasks assigned.

Presentations

04/02/2013

No dynamic planning notable.

YES

18/03/2013
Continued.

Presentations

11/02/2013

Continued.

YES

25/03/2013
End of Project Handed In.

BREAK UP 27/03/2013

No Deadline Notable.

End of Project Awaiting Result

NA

END OF PROJECT.

EPQ

OZGUR MEHMET

35

! ! ! Extended Project Documentation (Updated Planning)

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
1

EPQ

OZGUR MEHMET

! !
Unit Production
Sector Research Yilmaz Ozyigit Editor Ozgur Mehmet Scripting Ozgur Mehmet

36
Sector Studies & Participants
Academics Sir George Monoux College (Student) Sevilay Karakas (Student) Hamzah Zahid (Teacher) Sarah Benee (Head Of ICT) Glenn Avotins Houndsfield Primary School (Student) TBA (Teacher) TBA (Head teacher) TBA Policing & Security Edmonton Police Station (Commissioner) TBA (Financial Coordinator) TBA Social Care Cypriot Elderly & Disabled Group (Manager) John Constantinou (Supervisor) Hulya Ozyigit (Administration) Susie Constantinou Media Londra Gazettesi (Director) Yilmaz Ozyigit Architecture & CAD REMOVED FROM PROJECT Economics & Politics (MP) Andy Love (Businessman/Journalist) Yilmaz Ozyigit (Graduate/Socialist) Ayse Asim (MBE) Susie Constantinou Enfield Gazette (Director) TBA (Columnist) TBA Metro (Director) TBA (Columnist) TBA 2

Unit Research Ozgur Mehmet

Healthcare The Riverside Practice (GP) Dr Rishi Aggrawal (Nurse) Ms Loulla Fadiel (Receptionist) Ms Shanaz Kajee (Psychologist) Dr Leticia Cestari

Transportation Arriva (Senior Coordinator) TBA (Financial Coordinator) TBA

REMOVED FROM PROJECT

EPQ

OZGUR MEHMET

37
Sections for Production
Subject One How have computers changed the way we work? Subject Three What is the future of computing? Have computers encouraged antisocial behaviour? Have computers contributed to rising crime rates? THIS CONTENT HAS BEEN UPDATED. Subject Two Have computers helped perform tasks more efficiently in the workplace? How have computers influenced behaviour in society? How are computers used to con the system? Will computers become detrimental to our psychological wellbeing? Will advancements in computer technology become a problem with society and crime?
3

Topic Computing in Society

Psychology and Computing

Computer Security & Intelligence

Workflow Performance Chart (Project Management)



This chart represents expected progress against actual progress. If actual days are lower than expected days this indicates under-performance.

38
Number"of"Days"(Actual)" Ini+al"Planning" Research" Popula+ng"Content" Finalisa+ons" Evalua+on"
Expected days for time management are based on estimates. Actual days are recorded after content has been completed. All data has been processed and recorded before estimates have been suggested. This chart is not an accurate representation of the project workflow and is for reference purposes only.

160"

140"

120"

100"

80"

Number"of"Days"(Expected)"

60"

40"

20"

0"

WRITTEN REPORT COMPUTING IN SOCIETY

39

The Impact of Computing on Society, Security and Psychology


By Ozgur Mehmet The issue of the impact of computing on our social life, our leisure life, our finances, our psychology and general day-to-day living is a controversial one. Some individuals feel that the contribution of technology has made a positive impact in modern life and that technology helps improve our overall quality of life. Others see that the contribution of technology has negatively impacted modern life and that technology is a force that has escaped from human control. The aim of my project is to research and document how we have adapted to these advancements, and to investigate how technology has improved our lives, influenced our behavior, affected our perception of society and collectively developed the digital age.

Computing in Society
Society nowadays has become a lot more liberated in many different aspects. As time has progressed, society has striven hard to make living easier and more convenient. With the invention of modern technology, society has embraced these things with open arms almost to the point of not being able to live without these gadgets and exaggerated as it may sound, it is a fact that some people cannot live without one of these electronic tools. The pace of development and change has accelerated exponentially since the beginning of th the 20 century and continue today, affecting many aspects of daily modern life. From large mainframes that crunch numbers and help with scientific research, to your home desktop or laptop, computers are used by most industries and people. Primarily, the reduced initial costs of purchasing a computer or device has made the market accessible to almost everyone regardless of his or her income. Being accessible, people now have up to 5 computers or devices in their homes as standard. (Statistic: conducted by Kelkoo, 2012 worldwide). People are more connected to each other than ever before, and a large part of that is related to the popularity of mobile communication devices (mobile phones). Allowing for instant communication, mobile phones have changed the way people do business or even meet up with friends. With third and forth generation mobile phones, these devices allow you to access the Internet, play games and even record and edit movies. But how do all these advancements affect general computing in society with ecological validity? The primary purpose of this section of the report is to observe the uses of computers in society. No evaluations are present here. Uses of computers in the workplace It is no surprise that computers are utilized in the workplace. The nature of computing enables a smooth, organized and constructive workflow reducing errors, maximizing profits and maintaining and managing expenses. Computers enable organizations to setup sophisticated networks that run the business and categorize all records/sales/invoices/entries (dependent on the nature of the business) in a way that only a computer could process. Because computers work linearly, provided the computer is told to carry out the correct task with valid instructions, there will never be any mistakes and this is valuable for any workplace. Academic establishments have utilized computer technologies in a way that enables them to monitor student progress, perform registrations, mark and assess work using local networks, contact parents via dedicated links and even export mass data about the establishment and the performance of each department. Other establishments such as hospitals have also taken advantages of these advancements. Hospitals are now linked to a private network that enables the exchange of patient records including their history, family records and other associated entries.

40


This has proven incredibly effective, especially where emergency patients are unconscious and a record of their health is required. Doctors and surgeons can now type the name of the individual and call up all associated records which reduces the risk of misdiagnosis (in some cases), complications linked with allergies and other factors of the nature. Academic Establishments Its no secret that academic establishments have become more and more reliant on computers to perform day-to-day tasks. Teachers now use presentation software to teach a class, use local networks to carry out registers, enter exam data into software packages for auditing and share files online to enable students to complete assignments. I visited 8 colleges (which I cannot name for confidentiality reasons) and reviewed their systems. I interviewed the heads of faculty on their thoughts on the systems and where they need to improve and asked students how they feel about the infrastructures. I summarized and reviewed two colleges. College one made use of all available technologies, whilst College two only has basic technologies as standard. College One (East London) No. of students: 2000
1

The college has a campus area network, which enables mass file transfers over a network whilst maintaining the processing power required to manage the network. This type of network was relatively old and student were complaining about system halts when using a workstation, corrupt data when they would assess their documents and constant errors preventing them from completing the tasks. The college also used a network register that allows teachers to take a register in class and update this on the colleges central servers, which in turn would be assigned to each corresponding student record. Students suggested it would be better swipe cards (radiofrequency identifications cards) could be used to automatically register them as some students noticed they were being marked absent went they were late and some even when they were present. The implementation of such system would reduce these errors.
One IT technician proposed a RFID over PPPOE system explained below: (Radio Frequency Identification over a Point-to-Point Protocol via Ethernet)

Ozgur Mehmet 9/3/13 17:16 Comment [1]: Overview 201201

These data values will be assigned to the matched record. P = Present, C = Cancelled, L = Late, O = Other

RFID CARD
RFID card belongs to student.

RFID READER

RFID reader decodes tag assigned to card.

CVS verifies the card and matches the tag to a record.

Central Verification Server (CVS)

Identity Verified

If identity is approved, record is prepared.

Identity Invalid

If identity is invalid, entry is not permitted.

Registration Software Client (running on CVS)

The registration software writes a data value on the matched record.

Based on the matched record, the time of the lesson will be taken away from the time registered and an L value will be assigned.

41

Synchronized to MIS

This value is synchronized with the student record on the Management Information System.


This system would prove incredibly effective with both staff and students as it reduces the deviation tasks during the lesson when completing a register and it gives student peace of mind in the knowledge that incorrect data will not be assigned. This college also had a virtual learning environment that enabled students to access the colleges private network and access their course materials. Using this application, teachers could assign tasks and students could complete the work in their own time at home. The availability of this technology has drastically improved the overall attitude of working from home. Students are comforted in the knowledge that the work can be found in one place and that the supporting material is relevant to their course. One male student (who has chosen to remain anonymous) expressed his thoughts : Whilst such systems are proving useful with students and staff, I feel that individual queries/questions are being ignored and this is a limiting factor when it comes to expanding our knowledge on a topic or course. Some teachers have been programmed to explain that all relevant materials can be found online and have forgot how to interact with their students. One male teacher (who has chosen to remain anonymous) commented on this view : This student clearly has issues with his/her teacher. To my knowledge, all teachers in this college are dedicated to improving or enhancing their students knowledge either by means of online content or dedicated support. This student must also bare in mind that his/her teacher has limited time to deal with individual queries and whilst he/she may seem like they are ignoring individual queries, they may just be overloaded with work. Its unfair to blame the introduction of computer technologies and this is most certainly not a factor. The principal of the college summarized the points : I feel it is incredibly important to maintain a high level of education and if students feel their teachers are ignoring them because of these technologies, they should make formal complaints to their student union so this can be discussed. If students do not express their concerns, theres only so much we can do. I asked a principal from another college on his views on this topic : I can understand where the student is coming from. Since these technologies have been implemented, we have adapted to them and utilized them as a replacement for primary learning. This has collectively contributed to a more laid-back approach to teaching and learning respectively. Students feel they are completing the tasks adequately and are proud that they are finishing their work. Teachers are assigning the work but not reviewing the completed entries. Whilst the idea of virtual learning is a very intuitive concept, there is room for improvement. Additionally, the college has an email exchange system whereby all students and staff could contact each other, arrange meetings, review schedules and assign tasks. Despite the advanced functionality, only one of the fifteen services was used. Mostly the staff of the college utilized the email system. Collaborative working was evident and surprisingly students were being discussed and personal information was being exchanged. I distributed questionnaires to 40 students and of them 40 asked 5 for a detailed statement on how the email services were being used. 78% of students described the system as Flawed and pointless and additional comments 6 included : Teachers spend more time discussing students than they did actually teaching.
Ozgur Mehmet 9/3/13 17:17 Comment [6]: Questionnaire 201302 Ozgur Mehmet 9/3/13 17:17 Comment [5]: Event 201301
5 4 3 2

Ozgur Mehmet 9/3/13 17:17 Comment [2]: Event 201202

Ozgur Mehmet 9/3/13 17:17 Comment [3]: Event 201203

Ozgur Mehmet 9/3/13 17:17 Comment [4]: Event 201204

42


The detailed statements were conducted independently and each student was assigned using a random sampling method to reduce any extraneous variables or demand characteristics. Despite the independent conduction, the context of each statement was almost identical and it seemed that most students were aware of the poor integration of the system. One 7 statement read : The purpose of an email exchange system is to provide a medium for students and teachers to contact each other outside college hours or during free periods. However, with our college, it seems that posting your message on a social network would get more attention compared with a message emailed to a teacher. Youll be lucky to receive a reply and if you do, it would almost always refer to using the colleges virtual learning environment to resolve the issue and thats all providing you can actually find the teacher you want to contact. Teachers were not on the address book and you had to guess what their email would be based on their initials. Whilst the college did not have an automated register system, the college did utilize RFID technology in order to gain entry to the college. Some students were concerned that in the wrong hands, the data on these cards could be decoded and use to make other forms of identification baring in mind the front of the cards had their full name, photo and date of birth. The college made use of all available technologies, but it seemed that these were not being utilized to the maximum potential. Additionally, many there are many concerns that these technologies have collectively contributed to the deterioration of basic communication and workflow within the college. College Two (North London) No. of students: 1200
8

Ozgur Mehmet 9/3/13 17:17 Comment [7]: Event 201303

The college has a campus area network. The primary purpose of the network is to take registers for each class, provide email services for students and teachers, enable students to work with computers using the available labs and so teachers can upload resources on to the colleges VLE (virtual learning environment). The VLE is externally hosted and managed. The work completed by students on site is saved and stored offsite by an external provider. Students were happy with the network maintenance and usage of the available technologies and felt that these were enough to fulfill most tasks. Students reported that they had no issues with communication when emailing their teachers and all contacts were on the global address book. The updated network model was proposed in 2009 and since this upgrade; both students and staff noticed a significant change with regards to the overall attitude of learning and availability of course resources. The initial network was configured as shown:

Ozgur Mehmet 29/3/13 16:14 Comment [8]: Overview 201304

Lab 1

Network Printer

Network printer was limited to a 25MB spool. Data exceeding this would be corrupt.

Lab 2

Server Lab 3

43


The model proposed and implemented in 2009:
INTERNET / DSL

LAB 1 ND1 ND3

BUILDING 1

BUILDING 3

ND2 LAB 2

LAB 3

BUILDING 2

ND4 LAB 4

The updated network model intended to improve the overall performance of the network and fix any issues that students and staff reported. A new lab was introduced in building 2 and this was asynchronously merged into the network model. Each lab is independently connected to the server rather than relying on a relay packet system where performance is dependent on previous relay route. Example: problem with previous network model. If systems in Lab 1 were experiencing errors or faults, this would ultimately affects Labs 2 and 3. Each lab in the route relies on the previous node in the chain. Both students and teachers noticed a significant change with the system response times and general workflow when using a computer. Minor updates to the network registration allowed teachers to batch process registers and grouped any missed, upcoming or current registers on their dashboard. The email exchange network was updated so students could setup appointments with teachers and also enabled mobile synchronization so students with smartphones could connect to the server and set tasks and events. One female student (Jules Cardwell) expressed her views on the system : Since the system updates, the overall workflow of using the system to complete our assignments has dramatically improved and the enhanced functionality of the email exchange network has allowed us to manage our assignments and email our teachers when we have completed them. Its notable that whilst only minor adjustments have been performed, it has made a good network, perfect. One male teacher (Harlow Maim) gave his views : The IT department has really hit the nail on the head. Ive been here for 5 years and Ive never any issues with the systems. They are well maintained and the functionality available is more than enough to perform tasks adequately. Since these updates, the network has over-performed and this has enabled us to work closer with our students and ultimately contribute to a better learning environment.
Ozgur Mehmet 9/3/13 17:18 Comment [10]: Event 201306
10 9

Ozgur Mehmet 9/3/13 17:17 Comment [9]: Event 201305

44


The representative for the college summarized the points : Here at (COLLEGE NAME REMOVED FOR CONFIDENTIALITY REASONS) our students opinions are valuable; we listen and honor their suggestions and are always there to improve their community and we appreciate that well implemented resources will help our students excel in their learning. The changes to the network are minimal, but we dont want to overcomplicate a situation and we are happy to hear positive feedback from both our students and staff commenting on these changes. I distributed questionnaires to 60 students asking them how they feel about these changes as well as encouraging them to write additional comments. 95% of the students said the updates to the system have drastically improved our workflow and the college has honored our suggestions. The system updates were performed outside of college hours and were fully functional when used. Additional comments included: Its clear to see that the college cares for us and they review our suggestions and devised strategic plans to deal with our suggestions. Simplicity has been taken into account and new technologies have not been introduced because they are not required. The college has noted a 46% rise in computer usage and 36% rise in email interaction and communications usage.
Ozgur Mehmet 9/3/13 17:20 Comment [13]: Event 201309 Ozgur Mehmet 9/3/13 17:20 Comment [12]: Questionnaire 201308 Ozgur Mehmet 9/3/13 17:19 Comment [11]: Event 201307
11

45


Health Care (Hospitals) Overview The importance of computers in medicine is growing and spreading rapidly. Today, computers, along with Internet technology are being introduced into hospitals to enhance the performance of the medical facilities that are dispensed as well as being utilized to research illnesses and analyse DNA and genetics. Software engineers and system analysts are adapting to the needs of this industry and have helped develop popular medical management systems used as a database containing patient records, employee records and other relevant information. These management information systems have been around for about 15 years but have become increasingly popular due to the engineering of such applications as well as the versatility. Clinical and administrative medical staff use computers to handle enormous volumes of data regarding patients, ailments, prescriptions, medications, medical billing details, etc. This data is input into a national database containing patient health and medical records and are commonly referred to as Electronic Medical/Health Records (EMR and EHR). These databases are operated by a set of computers and servers, and come in handy during medical alerts and emergencies. The concept of EHR is a bit broader than the EMR, as the database is accessible from different clinics and hospitals. Medical practitioners can retrieve a patients medical history from any hospital without contacting their general practitioner. Health care professionals use computers to analyse tests. These are medical procedures where specified components of the human body are scanned. Tests can range from something as simple as a blood test to something as complex as a CT-scan (using in neuroimaging). This process is often referred to as a medical imagery. In order to increase the precision of such procedures, computers have been adopted and integrated into the testing equipment. Ultrasound and MRI (magnetic resonance imaging) are the best examples where computers have been adopted, in order to make the process faster and precise. Because of these advancements, we are now able to diagnose illnesses or complications quicker than ever before and proceed to treatment before the conditions deteriorate. Furthermore, professionals use computers to examine and monitor patients. In many cases, nurses, doctors and surgeons use sophisticated computer aided equipment to treat their patients. Such systems and procedures include, bone scan procedure, prenatal ultrasound imaging, blood glucose monitors, advanced endoscopy which is used during surgery and blood pressure monitors. Access to some of these devices at reduced costs has encouraged patients to purchase their own so they can monitor their health without seeing their GP. There are significant advantages of using computers in hospitals. The importance of computers in hospitals has also increased drastically due to the fact that the procedures have to be speedy to cater to a larger population and the medical services have to be more precise. Tests and medical examinations can now be carried out with precision, medical data can be transferred and shared over a network to reduce waiting times, diagnosing a patient is becoming quicker and easier and medical history records are now logged on an electronic database. Analysis (This analysis maybe detected as plagiarism in review software) A study conducted by a government body observed how Mr. John Martin utilized computers and network technologies in a hospital. This study was lengthily, so I have summarized notable usage into paragraphs: Mr. John Martin arrives at the hospital to see his patients. He will examine the records of their vital signs of life and decide if anyone is well enough to leave the Intensive Care Wards and to return to the normal wards. He will then decide upon his operating list for the day, as all neurosurgery operative patients need intensive care post operatively. This is in the day to day running of a busy hospital department.

46


Mr Martin explains how he will use all the advantages that ICT can give him in the care of his patients. Mr Martin will use ICT in numerous different forms as he gathers the information needed to help his patient and to ensure that he cares for them to the best of his ability. Mr Martin shared some insight into how patient records are recorded. At present, patient records are transcripted manually and these records are then held in the Medical Records Department. A computer is then used to manage the list of appointments for clinics that go on daily at the busy hospital. Waiting lists are produced for each clinic and the names of the patients on the list are then processed so that their notes are delivered to the correct clinic ready for the days work. The notes can include a record of previous visits, previous consultations and diagnoses and include also results from tests. Mr Martin explained how records are shared between hospitals. To communicate information between hospitals for example from Bronglais Hospital in Aberystwyth to Morriston Hospital in Swansea, a closed network is used. This allows x-rays and scans to be sent by a doctor to a specialist for them to share their opinion. This gives the doctor a second opinion by a specialist in that field. The closed nature of the network ensures the confidentiality of the sent material. All hospitals in Wales are linked together and there is also a gateway to English hospital. Mr Martin explained how The area of Intensive Care and Treatment is one with the use of ICT at its core. He explains how Patients can be admitted after trauma (e.g. an accident such as car crash or industrial incident) or post operatively where they may have undergone major surgery. Mr Martin extends his explanations Some patients are also referred when an illness or condition escalates in seriousness. Mr Martin explains how an MRI functions. The Magnetic Resonance Imaging Scanner is a radiology technique that uses magnetism, radio waves and a computer to produce images of the body structure. A huge circular magnet is in the tube that surrounds the patient. When the magnet is switched on, the detection of change in magnet resonance is picked up by radio waves and this change can be modelled using computer to produce an image. The possibilities of computers uses in the medical field are endless, facilitating medical help to hospitals and clinics all across the globe and as new technologies are invented, the industry will take advantage of these developments to further enhance the functionalities.

47


Retail Today we are at the point where new functionality is enhancing the way goods are sold to us. With the introduction of computer systems, retailers utilize every technology available to improve sales, market brands and contact customers. Computers, which have had an impact on nearly every economic sector, are especially prevalent in retail where their effect is visible at each level of the retail organization. Online Sales: One of the most significant impacts of computers in the field of retail sales is the phenomenon of online sales. Most major retailers have a website that allow customers to browse their products online and make the purchase without ever having to leave their homes. Retailers can now rent warehouses, store inventory, setup a product database, migrate the data to a website, open a merchant account and begin trading online and this becoming the norm for most customers. If items are out of stock, the customer can back-order the products and they will be delivered when the item arrives in their warehouse. Retailers also benefit from international sales; customers can order goods from the UK for delivery in their country. Statistic (conducted by Kelkoo): In 2012, Americans in the United States spent $180 billion online with over half the collective sales coming from clothing and online department stores. Statistic: (conducted by Kelkoo): In 2011, sales in the United Kingdom exceeded 60 billion with approximately 65% of sales coming from clothing and fashion stores. Marketing: Notably, retailers have felt the impact of computers when it comes to marketing. In addition to radio, television adverts and print, retailers can use targeted marketing services to promote their goods and services through banner ads hosted on participating websites and email promotions using newsletter systems. This has engaged and sustained the interests of customers. With email communication management systems, retailers can send sales reminders or issue special discounts codes reducing the costs of contacting customers directly through phone or postal mail. Inventory management: With retail comes inventory. Inventory management systems (based on management information systems) allow retailers to control their inventories in order to succeed in business. This is especially important where overheads are concerned, too much overhead means the businesses money is tied up in unsold products, too little means there might be problems meeting customer demand. Inventory management systems (IMS) can be as simple or complex as required. These solutions are usually bespoke to the businesses needs and allow retailers to track inventory levels over time and ensure the right quantity of a product is always in stock. With JIT (just in time) integration components, the IMS can notify the retailer that the stock is low on one product and automatically process another order from the suppliers to reduce waiting times.
Ozgur Mehmet 9/3/13 17:33 Comment [14]: Statistics

48


Finances, payroll and accounting: Like other organizations, retailers can feel the impact of computers when they take advantage of the application solutions available that simplify their payroll and accounting tasks. Accounting software packages streamlines the process of keeping accurate record for tax and auditing purposes as well as personal business assessments. Specialist functionality included with most accounting packages can even reduce the amount of money a retailer spends on an outside accountant; provided the information input is valid, an accurate output can be processed and this can be used to automate taxes, summarize charges and carry out other advance financial tasks. Some accounting packages (usually incurring hefty fees) allows managers or directors of a retail store to update records online from anywhere in the world and this has significantly changed the payroll information is processed, information such as the hours worked and salary changes can be updated instantaneously without being on premises. These changes are globalized on the system automatically.

49


Public Transport Communication technologies and management systems are crucial tools today in the public transport sector. With over 8,000,000 citizens in London of which approximately 3,000,000 are daily public transport users (statistics by Google Public Data, 2012), without sophisticated data management systems, public transport would be flawed. Oyster cards (contactless card technology) Since the introduction of Oyster cards in 2003, over 43 million oyster cards have been issued and more than 80% of all journeys on public transport were made using the card (statistic by: Transport for London as of June 2012). A standard oyster card is based on the MIFARE 1K radio frequency identification card or RFIDC and is the most commonly used RFIDC in public transport and some entry authorization systems. The card is a hard-wired logical smartcard meaning it has limited computing power and is designed for one primary purpose. The card technologies may come across complex, but are pretty self explanatory if broken down into stages: Model of oyster card technologies:
Ozgur Mehmet 26/3/13 15:30 Comment [15]: Statistic

Ozgur Mehmet 26/3/13 15:30 Comment [16]: Statistic

Blank oyster card is pre-programmed as a read-only smartcard. The card is assigned a unique identifier.

New MIFARE 1K RFIDC (Branded as Oyster Card)

Unique Number:

1304560289026612

Customer purchases the Oyster Card.

The customer decides to make a top-up or subscription purchase. The oyster card is placed on the reader and a transaction takes place.

THE OYSTER CARD ITSELF REMAINS UNCHANGED; THE PURCHASE IS ASSOCIATED WITH THE OYSTER CARD NUMBER.

Unique Number:

1304560289026612

The purchase is assigned to the matching unique number and is stored on the Transport for Londons private network.

When the Oyster card is used on public transport, the unique number is queried and verified with the server. If credit is available, the card is approved.

50


In 2008, Transport for London revealed the ZIP photo cards used by younger people aged 18 years and under who qualify for free travel. Individuals aged between 0-16 qualify provided they are British citizens whilst 16-18 years olds need to be in full time education. These cards are also based on the same MIFARE 1K RFIDC technology as the standard Oyster cards but do have additional attributes assigned such as expiry dates and boundary limitations. The ZIP photo cards are ethically questionable. When a person or student applies for this type of travel card, there information is shared with the Police and stored on record for future reference and whilst the information commissioners have made several statements claiming that the data collected is archived but is never accessed, there have been over 229 cases where data was analyzed and used to track a person who committed a crime (statistic conducted by the Guardian, 2006). Additionally, there are huge concerns with regards to security and misuse. Whilst the MIFARE RFIDCs are encrypted (a process where data is converted in cipher text), the cryptography and encryption attributes of the cards is dangerously insecure: Cryptography and Encryption explained (advanced): The process of encrypting data is one that most people are now familiar with. Data that is sensitive or that contains personal/confidential information can be encrypted. If for example you have a word document that contains financial information of your assets and liabilities, it is likely youll want to encrypt this document and this would be done by assigning a password. The process is universally linked but varies based on the complexity of the encryption system and level of encryption needed. The level of encryption refers to the number of bits of the key varying from 16 to 4096 bits. The MIFARE RFIDC is based on a 48 bit key architecture stored on a 1024 byte card. To simplify this information, what this means is that each card has a capacity of 1KB (thats a th 1000 of a megabyte) and is secured with a 48 bit key. The higher the key, the more secure the card. The cause for concern is not unjustifiable. A 48-bit key can be decoded in minutes provided the individual is experienced enough and has prior knowledge of decoding and reverse engineering. Using an RFID reader, laptop computer and a backpack, a hacker can walk around a busy underground station and walk past commuters scanning their oyster cards. This data is stored on a laptop computer hidden in a backpack. Using blank RFID cards that have been modified to enable writing privileges, the hacker retrieves the data stolen from the commuters and is able to write a new card with identical data, which can be used, on the London transport network. There have been successful security exploits of the Oyster card, which have been concealed by Transport for London to reduce the fear factor in commuters. In 2008, the digital security research group of Radboud University in the Netherlands revealed that a successful reverse engineering exploit had been performed on the MIFARE 1K RFIDC (what the Oyster is based on). The introduction of the Oyster card has helped develop the transport network and has made travel easier but there a many concerns about the ethics and security of these developments that need to be addressed.
Ozgur Mehmet 26/3/13 15:31 Comment [17]: Statistic

51


Timetables and travel updates The transport network has a real-time update log that monitors the progress of a journey whether it is a bus, train or tram. These updates are presented to us at bus stops and stations around London and tell us when a bus, train or tram is due and where it is terminating. In 2012, Transport for London launched their Live Buses service for mobile phones so commuters could use their smartphones to determine when their bus, train or tram is due. For those who did not have smartphones, a text-messaging medium was deployed where the commuter could text the bus stop code to 87287. An automated response would then be generated with live updates. TFL continues to improve the service and hopes to introduce mobile payment platforms in 2015 so commuters can use their phones to trace a journey as well pay for it on their mobile phone. Contactless payments In 2013, TFL authorized contracts with Barclaycard to introduce contactless payments. Commuters can now pay for their journey using a contactless Barclaycard credit card. This would be charged at the normal Oyster card rate of 1.30 per journey but does not qualify for subscription services (i.e. weekly or monthly travel cards) and has no cap (so can exceed the maximum daily fare). TFL have reported that they will be making changes to the service within the next four weeks to rectify theses issues. Collectively, the public transport network utilizes computers just as much as any other sector but has different needs and provides different functions. Whilst the technologies may not be perfect, they are stable and utilizable and are fit for purpose.

52


The Advantages Of Computing - Summary Be it office, home or school, the computer has become an indispensible device. Computers operated by an individual with no specific needs are more commonly referred to as a Personal Computer or PC and these devices have become ever-increasingly popular with home as well as business users because of the functionalities available. Documentation and Lingual Qualities: One can write more effectively by means of a computer. A computer allows the user to create documents, edit, print, and store them so that they can be retrieved later. Using the tools built into the software package, the user can review the document and check for any spelling or grammar errors, change the formatting (look) of the document, check definitions of words that the use maybe unfamiliar with and even research a topic the user maybe writing a report on. It is also notable that typing is much faster than writing, deadlines can be met quicker and information can be shared faster than ever before. The World Wide Web: The World Wide Web is one of the most notable aspects of computing. Using a computer, one can remain connected to the world through the Internet. The Internet should not be confused with the WWW. The Internet is a network of inter-linked computers over a large geographical area whereas the WWW is a huge database of online resources accessed via the Internet. Electronic mailing (or email) is a method of communication. It is estimated that there are over 3.2 billion active emails globally (statistics by Kelkoo, 2011) and approximately 144 billion emails are sent and received every day. Social networking sites have become hugely popular especially with younger audiences as approximately 68% of registered social network users are between the ages of 10 and 25 (statistics by Kelkoo, 2012). Social networking sites such as Facebook and Twitter are examples of communicators via the Internet and are utilised by families, friends, colleagues and so on to share photos, discuss topics and for general communication purposes. Other resources contributing largely to Internet usage include Online Gaming with an estimated 2.5 billion players online, ranging from arcade games to MMORPGs (massively multiplayer online role-playing games) (statistics by Google Public Data, 2011). Moreover, the WWW is the worlds largest database of information, with access to over 910 trillion entries and counting (statistics by Google Public Data, 2012). This information is available at hand to anyone whos searching for it, is free and in most cases allows users to contribute to the content without credentials. Academics & Education: With the introduction of computer technologies, Educational facilities have benefited in many different aspects not limited to learning development. As demonstrated in part one of this report, colleges have made use of the technologies to help manage student attendance, limit student access, share learning resources online and teach in class. Computer systems can also be used to store documents, present classes using PowerPoint and a projector, interact with students using SMART tools (developed by SMART / SMART board technology). Online Shopping and eCommerce: The Internet has opened so many routes to success in commercial markets. With online shopping, buying and selling is a fast, simple and secure procedure and anyone with Internet access and a debit/credit card can take advantage of these technologies. Suppliers have a wider range of products, which you may not find in store and are usually sold at discounted rates. Furthermore, there are no theoretical geographical locations when it comes down to online trading; manufacturers, suppliers and retailers can sell goods centrally and dispatch them internationally if customers are prepared to pay taxes and duties. Online trading is available 24 hours a day, 7 days a week. Orders are received and processed during the business opening hours with most online shops dispatching the items the same day for next day delivery. For the owners and operators of these online technologies, there are no hefty upfront costs to begin trading and maintenance costs are minimal. Other advantages of online shopping include open accessibility for those with limited mobility.

53


Social Networking and Other Network Communications: Web applications such as Facebook and Twitter are bringing every kind of social group together in one place. Social networking is still in early development stages and we will see some major enhancements within the next 5 years. The most notable benefit of social networking is the provision of free access to online communication services. Users everywhere can access social networks and contact other users via the Internet virtually free of charge provided an Internet connection is available. Businesses build credibility using social networking sites by keeping in contact with their customers via social networking sites. Businesses definitely can gain the customers' confidence if they can connect to them on both a personal and professional level. Despite increased workload, the collective benefits outweigh the drawbacks and its always a great idea for businesses to take advantage of these communication applications. Advanced Software for Enhanced Functionality: Application packages designed for graphics, video, music, finance and business enable users to complete advanced projects using the functions and features of the software package. Developers utilize advanced software packages to create or edit material with the purpose of publishing or distributing the contents. SDKs or software development kits (usually coded by manufacturers such as Apple and Microsoft) are pre-packaged software development tools used by developers who would like to take full advantage of the available functions of the corresponding operating system. However, in spite of the many advantages of computers, there are some disadvantages that cannot be ignored. Arguably, these disadvantages outclass the advantages because of the potential long-term effects. The Disadvantages of Computing Summary Computers have made it possible for individuals to work independently on projects or tasks without the need to work collaboratively with others. Because of this, basic communication and interaction skills are deteriorating and computers are beginning to change the way we work, socialize and interact. Additionally, there are many other aspects contributing to the disadvantages of computing. Ambiguity (Loss of Context): Computers cannot truly represent information that is presented through the screen. For example, the context of an email maybe interpreted differently by different individuals and the essence of the subject can become ambiguous. This can be a huge problem, especially where an emotion or expression is trying to be expressed. Additionally, basic communication has deteriorated as a result of online communications. Efforts in Academics: When computers and other technological tools are used constantly, students develop a dependence upon these tools. It is now common for students to research their topics online and use this information in their work presenting it as their own. As a result, students have become heavily reliant on the information available online and are beginning to lose basic reading and navigation skills. Additionally, the amount of information available on a topic is endless and ever changing, because of this, workload productivity has decreased. Health Risks: Prolonged use of computers can affect ones physical and mental health. If a workstation is not ergonomically designed, the user can suffer from injuries such as RSI (repetitive strain injury) and blood clots in the leg, more commonly referred to as DVT (deep vein thrombosis). Other health risks include neck strain, eyestrain, persistent headaches and migraines. There are also mental health risks of computer usage including addictions to computers and the Internet, addictions to cyber pornography and cyber gambling and addictions to online gaming, all of which severely affect the state-of-the-mine of the individual.

54


Costs: The initial costs of computer equipment (and other peripherals) are high, and this is an issue for individuals with financial priorities. Computers are decreasing in cost and they are more affordable today than ever before but the issue of financial status and availability still affects the market share and accessibility. Varying Computer Literacy in Academics: Computers present an added challenge to educators because teachers must deal with students of varying computer literacy levels. Some students attend classes with prior knowledge of computers and computer packages and are able to complete tasks assigned with ease whereas other students have no prior experience. It is difficult for teachers to deal with this vast difference and ensure that they provide students who need assistance with that assistance while not requiring capable students to slow their academic progress and wait. Psychological Risks Cyberpsychology: The psychological and sociological impacts of computer usage are huge. Individuals are becoming increasingly dependent on computers to help manage their lives, complete their work and to socialise. While time spent using a computer can be hugely productive, compulsive Internet and Computer use can interfere with daily life, work, and relationships. Individuals are becoming addicted to computers and the Internet and this is having a major impact on their state-of-mind and reality.

55

END OF SECTION
PRIMARY SOURCES AND SUPPORTING DOCUMENTS REVIEW SHEET All supporting documents used for this section should be included.

56


PRIMARY SOURCES (SUPPORTING EVIDENCE) CHECKLIST DO NOT INCLUDE SECONDARY SOURCES These will be included at the end of the project in the Bibliography Type of Primary Source Overview Event Event Event Event Questionnaire Event Overview Event Event Event Referenced Yes ( ) 2 Yes ( ) 3 Yes ( ) 4 Yes ( ) 5 Yes ( ) 6 Yes ( ) 7 Yes ( ) 8 Yes ( ) 9 Yes ( ) 10 Yes ( ) 11 Yes ( )
1

Reference Number (if applicable) 201201 201202 201203 201204 201301 201302 201303 201304 201305 201306 201307

Details/Description

All events are logged on the Project Event Plan.

57

SUPPORTING EVIDENCE
for Section 1 Computing in Society
Some documents have been scanned.

58

201201

College Overview Sheet Reference Only


College Name: Unique Reference Number: Project Reference: Date of report: Contributing to: Waltham Forest College 130456 College A 15/12/2012 Topic 1 No. Of student enrolled (FT): Type of provider: Project Event Entry No: Conducted by: Subtopic Number: 2466
(represented as 2500)

Further Education 201201 Ozgur Mehmet 1A

Type of Network

Facilities

Campus Area Network (LAN)

ICT labs College VLE Email exchange network Network storage Network registration

Network Structure:

LAB 1

LAB 2

LAB 5

BUILDING 2

LAB 6

BUILDING 1

INTERNET / DSL

BUILDING 3

LAB 3

LAB 4

ND1

ND2

ND3

Network Identity Representation Lab 1 Lab 2 Lab 3 30 computers 60 computers 10 computers 2 printers 4 printers 3 printers Network Device One (ND1) SAN (Storage Area Network Device)

Lab 4 20 computers 1 printer

Lab 5 15 computers 1 printer

Lab 6 80 computers 5 printers

Network Device Two (ND2) Email Exchange Server / VLE (Web Server)

Network Device Three (ND3) Print Server

59

201202

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: Whilst such systems are proving useful with students and staff, I feel that individual queries/questions are being ignored and this is a limiting factor when it comes to expanding our knowledge on a topic or course. Some teachers have been programmed to explain that all relevant materials can be found online and have forgot how to interact with their students. 201202 Participant has chosen to remain anonymous Male Student

60

201203

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: This student clearly has issues with his/her teacher. To my knowledge, all teachers in this college are dedicated to improving or enhancing their students knowledge either by means of online content or dedicated support. This student must also bare in mind that his/her teacher has limited time to deal with individual queries and whilst he/she may seem like they are ignoring individual queries, they may just be overloaded with work. Its unfair to blame the introduction of computer technologies and this is most certainly not a factor. 201203 Participant has chosen to remain anonymous Male Teacher

61

201204

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: I feel it is incredibly important to maintain a high level of education and if students feel their teachers are ignoring them because of these technologies, they should make formal complaints to their student union so this can be discussed. If students do not express their concerns, theres only so much we can do. 201204 Participant has chosen to remain anonymous Male Principalship

62

201301

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: I can understand where the student is coming from. Since these technologies have been implemented, we have adapted to them and utilized them as a replacement for primary learning. This has collectively contributed to a more laid-back approach to teaching and learning respectively. Students feel they are completing the tasks adequately and are proud that they are finishing their work. Teachers are assigning the work but not reviewing the completed entries. Whilst the idea of virtual learning is a very intuitive concept, there is room for improvement. 201301 Participant has chosen to remain anonymous Male Principalship

63

201302

Project Event Entry Number: 201302

!
Questionnaire results for COLLEGE A
Original questionnaires were collected, analysed and destroyed in accordance with the project guidelines.

Questionnaire provided:
1. How do you feel about the email exchange system in this college? a) Its very well managed and utilized. b) The system is well managed, but some facilities are not utilized to the fullest potential. c) The facilities are available but they are not utilized. d) The facilities are available but are not required. e) The facilities are not required and no management plan is notable.

Questionnaire also encouraged participants to write additional comments on their thoughts on the system.

Questionnaire results:
No. Of Participants No. Of Questions No. Of Participants providing additional comments 28 C 2 (5%) D 10 (25%) No. Of Participants asked to complete detailed statement 5 E 24 (60%)

40 A 1 (2.5%)

1 B 3 (7.5%)

64

201303

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: The purpose of an email exchange system is to provide a medium for students and teachers to contact each other outside college hours or during free periods. However, with our college, it seems that posting your message on a social network would get more attention compared with a message emailed to a teacher. Youll be lucky to receive a reply and if you do, it would almost always refer to using the colleges virtual learning environment to resolve the issue and thats all providing you can actually find the teacher you want to contact. Teachers were not on the address book and you had to guess what their email would be based on their initials. 201303 Participant has chosen to remain anonymous Male Student

65

201304

College Overview Sheet Reference Only


College Name: Unique Reference Number: Project Reference: Date of report: Contributing to: Woodhouse College 130427 College B 13/01/2013 Topic 1 No. Of student enrolled (FT): Type of provider: Project Event Entry No: Conducted by: Subtopic Number: 1231
(represented as 1200)

Further Education 201304 Ozgur Mehmet 1A

Type of Network

Facilities

Campus Area Network (LAN)

ICT labs Externally managed & hosted VLE Email exchange network Externally managed network storage Network registration

Network structure:

INTERNET / DSL

LAB 1 ND1 ND3

BUILDING 1

BUILDING 3

ND2 LAB 2

LAB 3

BUILDING 2

ND4 LAB 4

Network Identity Representation Lab 1 Lab 2 10 computers 40 computers 1 shared network 2 shared network printer printer Network Device One (ND1) Network Printer Network Device Two (ND2) Network Printer

Lab 3 50 computers 2 shared network printers Network Device Three (ND3) Email Exchange Server

Lab 4 10 computers1 shared network printer

Network Device Four (ND4) Global Network Printer

66

201305

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: Since the system updates, the overall workflow of using the system to complete our assignments has dramatically improved and the enhanced functionality of the email exchange network has allowed us to manage our assignments and email our teachers when we have completed them. Its notable that whilst only minor adjustments have been performed, it has made a good network, perfect. 201305 Jules Cardwell Female Student

67

201306

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: The IT department has really hit the nail on the head. Ive been here for 5 years and Ive never any issues with the systems. They are well maintained and the functionality available is more than enough to perform tasks adequately. Since these updates, the network has over-performed and this has enabled us to work closer with our students and ultimately contribute to a better learning environment. 201306 Harlow Maim Male Student

68

201307

Project Event Entry (Commentary / Reference) Project Event Entry Number: Name of Entry / Participant: Gender of Participant (if applicable): Participant Purpose (if applicable): Statement: Here at Woodhouse College, our students opinions are valuable; we listen and honor their suggestions and are always there to improve their community and we appreciate that well implemented resources will help our students excel in their learning. The changes to the network are minimal, but we dont want to overcomplicate a situation and we are happy to hear positive feedback from both our students and staff commenting on these changes. 201307 Participant has chosen to remain anonymous. Male Representative

69

WRITTEN REPORT CYBERPSYCHOLOGY

70

Cyberpsychology
The developing field of Cyberpsychology encompasses all psychological phenomena that are associated with or affected by computers, the Internet and emerging technology and whilst time spent browsing online or using computers can be hugely p3roductive, compulsive Internet or computer use can interfere with our daily lives, our work and our relationships. Addictions to Computers and the Internet The Internet provides a constant, ever-changing source of information and entertainment and it can be accessed from most smartphones, tablets, laptops and computers. Each individuals Internet use differs. Some may need to use the Internet extensively for their work whilst others may rely heavily on social networking to keep in touch with distant family and friends. Extensive periods of Internet or computer usage only become a problem when it absorbs too much of your time. As a result, some individuals begin to neglect their relationships, their work, their academics and other important things in their lives. Case studies have observed how individuals have turned to the Internet in order to manage unpleasant feelings such as stress, depression and anxiety. By losing yourself online, you can temporarily nullify these feelings. However, as the individual becomes conditioned, in order to alleviate their feelings, they begin to use the Internet extensively to reduce their negativity. Internet addictions are unique and differ from other addictions in that they involve interactions with other individuals via a computer system and as a result, individuals who are struggling with Internet addiction may feel as if they are benefitting from being online and from spending extensive periods in chat rooms, reading emails or playing games. Case Study: Lisa, 41 Lisa, a divorcee in her late 40s with no children of her own began spending more and more time online after her divorce. As a natural introvert, Lisa found the innovation of the Internet particularly suitable to the way she liked to interact with other individuals. Lisas social interactions online were quite wide and she had made many online friends despite having no friends in real space. As Lisa began to use the Internet for longer periods, she did not see anything wrong with this until she discovered that someone she considered a friend had deceived her about his or her true identity. As a result, Lisa became severely depressed, but despite her depressive state and the knowledge that continuing to use the Internet would make her feel worse, she could not seem to stop herself form going into the same chat room her deceptive friend was in. Lisa eventually decided it was time to talk to a counselor about her Internet addictions and about her inability to discontinue Internet use despite wanting to do so. Her counselor Ronnie began by asking her how she felt her social life flourished as a result of spending time online. Progressively, her gently questioned her about how much time she spent online and what other activities she engaged in, aside from the Internet. Lisa did not engage in any other activities apart from the Internet. Ronnie pointed out that Lisa seemed to have very little social interactions outside of the Internet and he challenged Lisa to discover other activities she could turn to in order to supplement the time she spent online. To begin this challenge, he asked Lisa to come up with a list of things she would like to do in place of going online. As Lisa attended her therapy sessions, she soon began to understand that just because she felt the impulse to go online, she didnt have to act on this impulse. In replacement, she th learned about many different types of activities and by her 6 session began taking a gourmet cooking class. She learned that she was a good cook. Lisa also began dating after over 10 years of being alone. As time progressed, Lisa was spending almost no time online and more time out enjoying herself with friends in real space.

71


This case study observed Lisa and her compulsive behavior when using the Internet. After her divorce, she began using the Internet to manage her depression and stress and as a result became addicted. After recognizing her addiction, she consulted a professional who was able to discuss her addictions with her and gently encourage her to replace these impulses with other activities. Eventually, Lisa recovered and spent almost no time online. Case Study: Greg, 23 Greg, a young man in his early 20s loved to play online games. He had recently enrolled in university to study History, but as soon as he discovered World of Warcraft, Greg began missing classes and he started failing his semester. Instead of studying, Greg decided to defer from university and get a basic job so he could spend all his spare time online and despite making his parents unhappy and making family get-togethers uncomfortable, he continued to play the game. As Greg played for longer periods, he found that he preferred to play the game rather than see his family or friends. Eventually, he stopped going to family gatherings and ignored most social invitations. Greg was soon playing his game late into the night and was on average surviving on just less than 2 hours of sleep each night. As Greg reached his 24 birthday, he realized that he had not been on a date in almost three years. Greg was always exhausted from lack of sleep and was already on his second warning at work. He hardly saw his family and rarely spoke to friends. Greg began feeling guilty for neglecting his family and was starting to recognize the negative impact of his gaming addictions. As a result, Greg tried to cut down the number of hours that he spent playing his game but despite his efforts, instead of being able to play his game less, he found himself feeling anxious and depressed until he eventually gave in to the impulse. Progressively, Greg found himself preoccupied with playing World of Warcraft and he eventually lost his job because he was constantly late and missed entire shifts. With no income, Greg found himself unable to pay his rent or his utilities. Without ever intending to, he found himself cut off from his favorite game and from his online friends. Greg became aggressive and on several occasions, attacked his mother and brother. Gregs family urged him to seek professional help. He eventually accepted he was an addict and consulted a psychologist. On Gregs first visit to his psychologist Steve, he was surprised to discover that Steve was quite willing to listen to him and let him tell his story, instead of moralizing about how selfish rd his behavior was. After his 3 session, Steve challenged Greg to make a list of what was great about World of Warcraft and where he could find those qualities in alternative activities. As Greg progressed through the therapy sessions, he found that Steve was very compassionate and understanding. He was even willing to play the game to understand what Greg found appealing about it. Steve continually challenged Gregs sense of the word and constantly reminded him that the world was bigger than World of Warcraft. Steve even pointed out that maybe one of the reasons Greg was not dating regularly was because the girls he dated were afraid to compete against a game that was always present. After several sessions and several weeks of thinking over this particular point, Greg had to admit that if the roles were reversed, he wouldnt put up with the behavior either. Once Greg made that admission, he began to re-examine the amount of time he invested in the game whilst questioning the reasons to why he plays it. Greg realized that the reason he was so attached to the game was because he didnt know how to relate to over people very well, he lacked confidence and found it very difficult to sustain a conversation. He discussed this with Steve who offered to help teach him better social skills and how to deal with uncomfortable feelings of anxiety that slowly drew him to playing the game instead of dealing with the social situations he found difficult. As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations. Greg made a full recovery 2 months after the end of his therapy sessions. He re-enrolled at university and was working part-time once again.
th

72


This case study observed Greg and his gaming addiction. Greg enrolled at university to study History but as soon as he discovered World of Warcraft, he began missing classes and failing his semester. Eventually, Greg decided to defer from university and get a basic job so he could spend his spare time online. He stopped going to family gatherings and ignored most th social invitations. As he reached his 24 birthday, he realized he had not been on a date in almost three years. He hardly saw his family and rarely spoke to friends. He began to feel guilty for neglecting others around him and decided to cut down the number of hours he spent playing his game. Despite his efforts, he found himself feeling anxious and depressed until he gave into the impulse. Greg lost his job as a result because he was missing entire shifts and was constantly late. He was unemployed and was disconnected from his favorite game without ever intending to. Greg started to become aggressive and on several occasions, attacked his mother and brother. His family urged him to seek professional help until he finally accepted he was an addict. Greg was referred to psychologist, Steve who would help him conquer his addiction. Steve began by asking Greg about his story and gently challenged Greg to make a list of what was great about World of Warcraft. He would then ask Greg where he could find those qualities in alternative activities. As his sessions progressed, Steve noted that Greg maybe afraid to approach social situations and this gaming addiction was a result of this lack of confidence. Steve offered to help teach him better social skills and how to deal with uncomfortable feelings of anxiety. As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations. 2 months after the end of his therapy, he reenrolled at university and was working part-time. He no longer played the game. Analysis of Case Studies In both of these case studies, the individuals go through intra-psychic stages: Alter behaviour due to outlining issues Experiencing the addiction Realization of the addiction Identifying the causes of the addiction Rectifying the addiction These intra-psychic stages differ between individuals dependent on their personality type, their gender and their cultural differences. Other variations include aggressiveness, susceptibility to compulsion and individuals with limited cognitive development. Research has shown that individuals susceptible to depression, stress or anxiety will become addicted to the Internet in order to alleviate these negative feelings. However, individuals who are affected by these negative feelings are unaware that whilst these feelings maybe temporarily alleviated, repeating this behavior can seriously affect their psychological health. In the first case study, Lisa was single, had no children and her divorce was still affecting he mental state. Lisa outlined this research in her experience; she admitted to using the Internet to help her manage her negative feelings and in one instance, the case study explains how she was deceived online and as a result became severely depressed, but despite her depressive state, she continued to engage with the person who deceived her in the first place. The behavior becomes compulsive and despite Lisas awareness of her mental state, she has conditioned herself into believing that by using the Internet, it will alleviate her negative thoughts. Lisa eventually decided it was time to talk to a counselor about her Internet addictions and about her inability to discontinue Internet use despite wanting to do so. As Lisa attended her therapy sessions, she soon began to understand that just because she felt the impulse to go online, she didnt have to act on this impulse. Similarly in the second case study, Greg was a young, single man who deferred university to invest his time in playing an online game. He eventually lost his job and had no social life outside of the virtual world. Greg was depressed and at times became very aggressive towards his family because his compulsions were deeply programmed and this may have had long term effects on his learning development and perception of reality. Greg eventually accepted he was an addict and consulted a psychologist. As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations.

73


Links to Dissociative Identity Disorder Dissociative identify disorder is characterized by at least two distinct and relatively enduring identities or dissociated personality states primarily responsible for altering or controlling a persons behavior. Research shows the disorder is characterized by identity fragmentation rather than a proliferation of separate personalities and because of this has been more recently associated with Internet compulsions and linked to personality types in cyberspace. When the individual is under the control of one identity, they are usually unable to remember some of the events that occurred while other personalities were in control. The variation in the identities may exhibit differences in speech, mannerisms, attitudes, thoughts and gender orientation. In some severe cases, the variation may even differ in physical properties such as allergies, right-or-left handedness, or the need for prescription glasses. Case Study: Bradley, 16 Bradley, 16 a secondary school student was diagnosed with dissociative identity disorder in 2011. Bradley was bullied at school and was often assaulted and abused by other students because of his financial status and his living situations. At 10 years old, Bradleys parents were killed in a car incident and Bradley was taken into care. Up to the age of 10, Bradleys cognitive development was healthy. He was a high achiever and was preparing for secondary school. When his parents died, Bradley became desensitized. He would not interact with anyone around him and at times refused to eat. He became increasingly aggressive and was eventually admitted to a mental health institute. The link between the addiction to the Internet, personality types in cyberspace and dissociative identity disorder were very recent and because of the lack of research, psychologists found it difficult to understand why Bradley developed two personalities. His first personality was aggressive and suicidal. On several attempts, Bradley tried to kill himself and was incredibly aggressive towards anyone that tried to discourage him. Psychologists were forced to use drugs to relax Bradley and put him into induced comas. Consultants were concerned for Bradleys health and quality of living and advised doctors to encourage Bradley through communication instead of administering Sodium thiopental, a drug used to induce comas. As the psychologists became familiar with Bradleys behaviour, they noticed he was using social networks on his laptop and one of the psychologists suggested that Bradley maybe being bullied online and as a result has developed this personality as a defense mechanism to cope with the stress and depression. Psychologists decided to block access to the social network Bradley was accessing. Bradley became incredibly violent, he was disconnected from what seemed a compulsion and as a result inflicted his aggression on the staff at the institute. Bradleys frustration and anger eased moments after he had an outburst. At this stage, he was using search engines to find other chatrooms to interact with individuals online and he eventually stumbled across a private chat network. This chatroom was dedicated to teenagers with issues in their lives. Individuals were incredibly friendly towards each other and enjoyed sharing their feelings via a medium where emotions could not be interpretted. Psychologists noticed that Bradleys behaviour began to change. He was happy and very friendly. His attitudes and thoughts were positive and his communication excelled. Psychologists were convinced that this was Bradleys true identity, but nonetheless a variant in the personalities. When psychologists asked Bradley about his outbursts, his suicidal thoughts and his aggressive behaviour, he was completely indenial and had no knowledge of ever acting in this manner. The consultant psychologist suggested that the reason Bradleys personalities varied so much was because he found it difficult to separate the virtual world from the real world. In the virtual world, Bradley was not judged for his weaknesses and he was able to express his feelings without becoming frustrated. In the real world, when Bradley would try to express his feelings, people would laugh, ignore and in some cases abuse him. As a result, Bradleys personality in the virtual world reflects into the real world if he is satisfied with the response he receives. Bradley is still receiving treatment for his condition but is beginning to make some improvement.

74


Personality types in Cyberspace The psychological features of any online environment will shape how the person or group will behave in those realms. The primary dependence of these features will always be determined by how they interact with the characterisitcs of those people or groups in those enviroments. Cyberspace is a psychological extension of the individual's intra psychic world. It is the one medium that can stimulate the processes of projection and transference that can alter the sensory experiences and can even in some cases create a dream-like state of mind. Cyberspace has the power to influence the emotions of the individual, change their perceptions of topics and has in many cases altered their behaviour. Whilst over 50 known personality types have been identified, only a selection applies to cyberspace. Personality Type A Passive-Aggressive Personality Passive aggressive behaviour takes many forms but is generally described as a non-verbal aggression that manifests in negative behaviour. This type of personality is popular online as there is no exchange of verbal communication. Passive-aggressive personalities tend to write indirect messages on social networks with the intent of the person who it is directed at to read it. Passive aggression is when the behaviour is more persistent and repeats periodically. Examples of Passive-aggressive personality in Cyberspace: In the picture below, a tenant has added their letting agency as a friend on a social network. Their tenant has then accepted their request and has posted a message on their wall saying, Thanks for adding us. The tenant has responded sarcastically and has replied saying, No problem I did it because youre useless and ignore my texts and emails so I thought I would try this. Fix our shower its been broke since we moved in.

This behaviour would be considered passive-aggressive in cyberspace. The tenant is expressing his or her frustration sarcastically on a medium where everyone can see the conversation. The tenant has not been aggressive towards the letting agency but is simply highlighting the evasive problems and issues. Passive aggressive characteristics can include but are not limited to: Non-communication: Where there is clearly something problematic to discuss. Avoiding/Ignoring: When you are angry and you feel you cannot speak calmly. Evading problems and issues. Procrastinating: Putting off important tasks for less important ones. Obstruction: Deliberately stalling an event or process of change. Fear of Competition: Avoiding a situation where one party will be seen as better at something. Ambiguity: Being cryptic, unclear and/or not fully engaging in conversations.

75


Personality Type B Dissociative Identity Disorder Dissociative identify disorder is characterized by at least two distinct and relatively enduring identities or dissociated personality states primarily responsible for altering or controlling a persons behavior. Refer to page 73. Personality Type C ICD10 Type The ICD10 type personality is most commonly linked with pedophilia and online predators. The ICD10 defines paedophilia as "a sexual preference for children, boys or girls or both, usually of pre-pubertal or early pubertal age". This type of personality develops online as a result of the psychiatric disorder possessed by paedophiles. Because of the Deindividuation properties of the virtual world, online predators are safeguarded and their true identity can always be masked. The personality type is a developmental behaviour and is not encouraged by computers or the Internet. Case Study: Jennifer, 13 th On the 12 of February 1999, Jennifer was raped by an online predator. Jennifer used to go online a lot with her friend Kate. Together, they would explore the Internet, meeting people from all over the world. In January 1999, Jennifer met a man named Gary, aged 21. Jennifer spoke to him frequently and exchanged emails for about two weeks and eventually decided to give him her number. Gary called Jennifer on several occasions in what seemed to be completely innocent conversations. He asked Kate (Jennifers friend) for her address so he could send Jennifer flowers. Kate gave Gary the address and was very careful not to ruin the surprise by telling Jennifer. In February 1999, Jennifer and Kate returned home from school and spent the remainder of their day online. Whilst browsing online, there was a knock at the door. Jennifer opened the door and was surprised to see Gary and another male. Jennifer knew better than to let them come inside, so she talked with them out on the porch. Jennifer went inside whilst Kate was left speaking to Gary and his friend. Gary asked Kate if he could use the bathroom whilst she walked off with Garys friend. As Jennifer was browsing online, Gary came up behind her and started kissing her. Jennifer explained that she was not threatened by this behavior even though she didnt really want to do it. Gary then pushed Jennifer down onto the bed and kept kissing her. Jennifer started to feel uncomfortable and on several occasions attempted to push Gary off. Gary became forceful. He started tugging at Jennifers trousers and Jennifer exclaimed No. Gary held Jennifers wrists down and kept kissing her neck telling her Shed like it and he knew that she wanted it, wanted him. Jennifer describes her experience from this point on as hazy. She remembered saying No over and over again and remembered screaming and trying to get away from him. Gary responded by saying Stop being a tease. Jennifer stopped screaming and moving after Gary whispered in her ear saying The more you move and scream, the better it feels. From this point on, Jennifer described her recall as distorted. She remembers clearing herself up after Gary had ended his attack and quietly got dressed. Gary began discussing wild life and the wonders of the jungle as if nothing happened. He waited for Jennifer to get dressed and walked out of the bedroom after her. As they walked outside, Kate and Garys friend were back. Gary said they had to go and Jennifer walked inside. Jennifer remembers shutting the door and falling to the ground where she started crying. Kate asked her what happened but Jennifer couldnt tell her. Jennifer decided to take a shower. She scrubbed herself and cried. She was in pain and was bleeding, torn and bruised below. End of Case Study Gary exhibited the personality type C (ICD10). He had a sexual preference for females of early pubertal age. He was forceful and gained sexual pleasure when his victim struggled.

76


The use of social networks made this attack easy for Gary. He was able to target a young and vulnerable girl of his preference and contact her via a medium that was undetectable. He was also able to use the Internet to locate Jennifer and plan his attack. Some websites dedicated to online predators are setup for the use of paedophilias and online stalkers. Though illegal, these websites are maintained by other sexual predators and are virtually undetectable on search engines. Only visitors with direct URL access can view these communities. They are dedicated forums that share information about victims online and also include the victims age, gender, photo and location. These websites also include fantasy stories, child pornography and victim locator tools. Some of the websites also include a public chat room for people to discuss their experiences whilst raping their victim. The psychology behind these communities is incredibly difficult to interpret. With the Internet becoming more and more powerful, the wrong information is becoming easier to access in the wrong hands and psychologists argue that these personality types will become increasingly common amongst specific groups. Whilst computers and the Internet may not be primarily responsible for encouraging such behaviour, the resources and media on the Internet might be. Addictions to Cyberpornography (Cybersex) Cybersexual addiction has become a specific sub-type of Internet addiction. The Internet provides a medium, which spares qualities including its relative anonymity and ease of access. The Internet makes it possible to browse in the privacy of your own home and engage in fantasies impossible in reality. Compulsively spending hours on the Internet viewing pornography or engaging in other cybersex activities can adversely affect real-life relationships, career, emotional health and personality type. The developing importance and role of the Internet in everyday life has an interesting side effect, that of an increase in cyber-sex addiction. Case Study: Mike, 24 (all names and identifying information except for age have been changed) Mike, a 24 year old single man living with his girlfriend Dora of four years revealed that he had an unhealthy sexual desire for teenage girls. Mike admitted that whilst he was not acting out his sexual desire, he was secretly spending between 3 and 8 hours per week hunting images of young girls on the Internet. Concerned for his psychological health, Mike requested treatment to help him cure his sexual interest. He acknowledged the fact that his compulsion had hurt his relationship and his sex life. Mike is extremely ambivalent about his relationship with Dora but has never discussed his interests openly with her. He generally had been avoiding sexual contact with Dora and had reduced the number of activities and outside interests he participated in. Mike stated that his moods had been more depressed and he declared his worry that his compulsion would be revealed. Mike felt guilty, ashamed and preoccupied. Case Study: George, 49 (all names and identifying information except for age have been changed) George, a 49-year-old married man with a two-year-old boy has had a history of addictive behavior traits. A recovering alcoholic and smoker, George was also addicted to cyber-porn. Four years ago, George was successfully treated for these addictions. He was appointed inpatient, outpatient and group psychotherapy. George is a writer and has taught English at a variety of local colleges. After three years of recovery from alcohol, cigarettes and cyber-porn addiction, George relapsed following his redundancy at work in an administration change. Although he had not begun drinking, he was spending large chunks of time watching pornography. George eventually decided to seek treatment as he became more agitated, depressed and ashamed.

77


Case Study: Frank, 38 (all names and identifying information except for age have been changed) Frank is 38 years old. He is married with two children. His wife Beth requested consultation regarding Franks behavior and her marital situation. Beth discovered Frank had been visiting numerous porn sites on his computer. Beth confronted Frank on several occasions but Frank reacted in defense, was outraged and accused Beth of violating his privacy. Frank refused any suggestive treatment. Whilst Beth was not aware of how much time Frank spent viewing porn sites, she was aware of the particular sites he visits. Beth decided to look through the content and was shocked and disgusted at the graphic images, some of which involved gaysexual relations. Beth has been concerned for a long time about their diminishing sex life. The emotional disconnection she felt confused and scared her. Beth began to question Franks behavior and what this porn viewing suggested about his sexuality and the future of their relationship. The compulsion to view pornographic images on the Internet is a crucial aspect of the presenting problem in each of these case studies. The common link is that the individual is spending extensive periods of time chasing sexual images on the easily, available and often free porn sites on the Internet. The individual is eventually motivated to seek treatment when their behavior begins to significantly affect his or her mood, functioning and/or relationship. Mental anguish, dismay, shame, anxiety and depression accompany this addiction as well as the loss of control over their addictions. Additionally, there are powerful feelings of shock, loss, fear and worry on the part of the spouse who discovers their partners prediction. This ultimately poses a significant threat to the relationship. Psychologists have suggested there are deeper causative factors, which form the foundations of this addiction. Kendler et al. 2010 suggested that a history of sexual abuse or pre-mature entry into sexuality would be one of the notable factors. The individual becomes fixated at the age to which they were initiated into sex and as a result, they would be attracted to individuals of the same age as they were when the abuse occurred. Kendler et al noted that in most case studies, the individual have a greater than expected frequency of bi-polar disorder. Additionally, psychologists have also suggested that once the addiction has been discovered, it leads to an issue in the relationship. Typically, the emotional connected becomes disrupted between partners leading to a reduction in sexual contact and intimacy. Rather than directly attending to the addiction, individuals escape into the easily available and non-demanding world of cyber-sex and self-stimulation. As a result, the viewing becomes compulsive, instantly gratifying and soothing for anxiety states. Compulsively viewing pornography appears to replicate recognizable behavior patterns, similar to other addictions. Carnes, 1999 suggested this involves acting out a pattern of outof-control sexual behavior (e.g. compulsive masturbation, persistent viewing of pornography, etc.) Severe mood changes can relate to the sexual activity. The addict experiences severe consequences due to sexual behaviors and the inability to stop, despite these consequences. The consequences can include the loss of a partner, severe martial or relationship problems, suicidal obsessions and regular exposure to STDs.

78


Cyberbullying The Internet always remains open to malicious use and Cyberbullying is one of many issues where physical, emotional and psychological health is a cause for concern. Cyberbullying is when an individual is tormented, threatened, embarrassed or otherwise targeted by another individual using the Internet, interactive and digital technologies or a mobile phone. Whilst Cyberbullying may not be considered as a major problem, it accounts for more than 5400 yearly deaths in the US alone (Statistic by Bullying Statistics, 2011). Sexual exploitation or luring by a sexual predator are all forms of Cyberbullying. The term does not necessarily refer to superiority or influence to intimidate someone nor is it limited to children and while the behavior is identified by the same definition when practiced by adults, the distinction in the age groups sometimes refers to the abuse as cyberstalking or cyberharassment if and when perpetrated by adults towards other adults. Cyberstalkers tend to perform tactics in public forums, social media or on Internet information sites. The stalkers primary intentions are to threaten the victims earning, employment, reputation or safety. Notable behaviors may include encouraging others to harass the victim and many stalkers try to damage the reputation to turn others against the victim. Case Study: Tyler Clementi, 18 Tyler Clementi aged 18 freshmen at Rutgers University committed suicide after his roommate used a webcam to spy on a same-sex encounter. His roommate tweeted about Clementis behaviour and watched the footage with a hall mate. The hall mate was not charged with the death of Clementi, but rather whether or not he had the intent to intimidate and invade Clementis privacy. Case Study: Megan Meier, 13 Megan Meier aged 13 started to message a boy she had never met on MySpace. The comments posted by the identity and account name of Josh Evans started out acting as though he was interested in Megan. Josh Evans eventually turned aggressive and malicious. These comments were made public and other classmates could read and comment on them. In February 2004, Megan hung herself in her closet. After investigation, the user Josh Evans was created by a parent of Meiers classmates. Case Study: Allyissa Borum, 14 Allyissa Borum aged 14 was involved in a pushing incident at a high school in Tuskegee, Ala. The incident carried over into cyberspace after school. Allyissa received death threats later that day on her Facebook account from the others girls involved. Allyissa was bullied online and at school for 2 months until she hung herself in the gymnasium. Case Study: Ryan Halligan, 13 Ryan Halligan a student aged 13 from Vermont first experienced bullying in fifth grade because of his poor physical condition. By the time Ryan made it to seventh grade, he was begging his parents to home school him. His parents decided to contact the school in an attempt to resolve the issues. Principal-ship and teachers explained that boys at school started rumours that he Ryan was gay and the matter had been dealt with internally. Over the summer, Ryan worked on establishing a relationship with a popular girl from his school over the Internet. As Ryan returned for his eighth grade year, he approached his girlfriend. She told him publically he was a loser and everything she said online was a lie. The girl forwarded all messages over to a friend where they laughed at Ryans expense. Humiliated and depressed, Ryan took his own life before his fourteenth birthday. In each instance, the victim has suffered a great deal of stress, embarrassment and pain and has as an alleviating response committed suicide. Psychologists suggest there are several reasons why attackers Cyberbully.

79


Deindividuated The concept of Deindividuation is generally thought of as the losing of self-awareness in groups. Attackers maybe comforted in the knowledge that they are safeguarded online and are able to exchange hate messages over a medium where context and understanding is nullified. Motivated by anger, revenge, frustration and entertainment Some attackers might Cyberbully in response to their anger or frustration with the victim. Some might do it for the entertainment because they are bored and have too much time on their hands. Racial profiling Some attackers might Cyberbully because they have a specific issue with cultural group, race or ethnicity. This is generally not the case but is a huge issue where social networking is concerned. The solutions and responses to each type of Cyberbullying incident differ. There is no generalisation where Cyberbullying is concerned but the behaviour traits have similarities to the common schoolyard bully.

80

END OF SECTION
PRIMARY SOURCES AND SUPPORTING DOCUMENTS REVIEW SHEET All supporting documents used for this section should be included.

81


PRIMARY SOURCES (SUPPORTING EVIDENCE) CHECKLIST DO NOT INCLUDE SECONDARY SOURCES These will be included at the end of the project in the Bibliography Type of Primary Source Email Email Referenced Yes ( ) 16 Yes ( )
15

Reference Number (if applicable) NA NA

Details/Description
All events are logged on the Project Event Plan.

82


3/29/13 Interview with Dr. Leticia Cestari (Dictated Notes)

Reply

Reply All

Forward

Chat

Interview with Dr. Leticia Cestari (Dictated Notes)


OZGUR MEHMET
06 December 2012 14:52

To: Cc: Attachments:

hulya.mehmet@nhs.net ozgur.mehmet@inspirerecords.co.uk Dr Leticia Cestari - Inte~1.docx(20 KB ) [Open in Browser]

This message was sent with High importance.

Dear Ms Mehmet, Thank you for approving my interview with Dr. Leticia Cestari. I would like to thank her for he detailed and very informative statement which will be used in accordance with the project guidelines and confidentiality report filed by Dr. Cestari. Please find her dictated interview attached. I will be keeping you updated with any progress and look forward to presenting the completed project. Best Regards Ozgur Mehmet Upper 6th (20113828)

83 https://am2prd0210.outlook.com/owa/?ae=Item&a=Open&t=IPM.Note&id=RgAAAAAKnQaTDr6yRY1Aq%2bNk%2fV9KBwDlum3hPodLRp%2bxSridEa

1/1


TRANSCRIPT DR LETICIA CESTARI (CLINICAL PSYCHOLOGIST; BSC, MA, DOCCLINPSY) 15 (1623 WORDS) This is a transcript. In terms of computers encouraging antisocial behaviour I really dont think thats the case, I think antisocial behaviour is something that predates computers, its something that will always be present in our society independent of our technological advances, I think the way in which antisocial behaviour is demonstrated and occurs nowadays has adapted and changed with our technological means, by which now we have different ways where people do behave in an unsocial manner for instance in social networks and also through hacking and a number of crimes that can be committed online and with the help of a computer. I dont think the computers themselves are to blame, I think human nature remains as always prone to a range of behaviours and antisocial behaviour is one of them. I think it has changed the kinds of things that people do and how often and we do have quicker access to things, I dont think it has encouraged the behaviour itself, its always been there. I think computers have on the other hand influenced behaviour in society, mainly because its a tool and we learned how to use it and we have changed the ways that we communicate with people, we have adapted our skill set so we can actually use computers whereas before not everyone would be that interested in technology nowadays its impossible to live and work without the use of computers. It has changed our behaviour particularly in the ways, not necessarily just computers but I think its the availability of things particularly with the use of the internet and third and fourth generation mobile phones that make the ways we communicate and behave to one another very different particularly with regards to human interaction and communication, for instance again through social networks people now interact a lot less face to face, they all interact via a medium; their mobile phones or the computers, which in the past perhaps used to be the telephone but was very limited now its a lot wider the access we have to things that were very difficult in the past, its made a lot easier through technology, in that way it has influenced behaviour because for instance now we dont use maps as much, we all use Google maps or GPS so we dont really learn how to locate ourselves and pay attention to certain things, for instance what is happening outside, you have your own little GPS in your mobile phone that you use to locate yourselves so you dont pay attention so much to whats happening outside, also things that you might have wished or that you might have done in person you dont do so much anymore, you might break up other the telephone or over mobile phones or through email, so that has changed and the way we have become a little less close and intimate but on the other hand it has facilitated contact with people whom it would have been very hard to do so previously for example through Skype if you have voice and video over internet protocol which has helped families contact loves from very far away so in that sense it has also changed the way we behave. Thinking about how much further computers will influence and change our behaviour and whether thats something detrimental is a very difficult question to answer because computers become detrimental to our psychological wellbeing in as much as we allow that to happen. I think if someone is very anxious they might check their emails quite a lot, they might use the internet to search for things and they may start stalking someone online for instance, but its not the computers themselves that is actually causing that kind of behaviour, its the person him or herself who is very anxious, who is perhaps a little distributed as well. The computer makes it easier to do searches on things than they would have been in the past so in a way they make things more accessible, you can start stalking someone online, you can get access to their emails, you can get access to a lot of things that you would have otherwise had to do in person, the people still use to stalk people before computers started. In terms of being detrimental to our psychological wellbeing, they are detrimental in the sense that if everything becomes about having a computer and your life is limited to that but again its not the technology itself, its not the computer itself that causes that detrimental effect, its the use we make of it that can be detrimental, so it goes down to the person really and how they make use of it. One of the main detrimental things that I think in terms of our psychological development is that we become very dependent of computers and the possibility of not having one feels quite limiting and I think it prevents us from learning to do certain things that we would have been perfectly able to do in the past without computers. One thing that is quite interesting and it will probably have quite a significant impact, whether its detrimental or not I dont know, is how we develop

84


and how our brain develops particularly now being its very easy to access technologies like screens that you can touch and use very intuitively, that children and toddlers are starting to use which before with the use of the keypad was not something that children had a lot of access to whereas now it has become increasingly easier to, I think that will have a cognitive impact in how we function, its hard to predict whether it will be detrimental or not but it certainly will influence the way we develop we will not learn things like, Ill go back to the maps because its quite an important thing, its quite a skill to be able to locate yourself and pay attention to whats around you and you lose that if you dont have an electronic device with you, how will you find where you are, you become less able. Also just thinking, nowadays people dont really think a lot, if some is late for a meeting you dont try to work out why they are late, youll call them to find out what it is or email them so you dont develop the capacity to tolerate, not knowing what is happening also thinking on your feet without your devise to actually try to work out what is happening. A lot of things can be affected by our use of computers; I dont think its necessarily the computers themselves causing the issues, its how we make use of the resources, and there are areas that are also affected in a very positive manner with computers, I believe, I dont really know a lot about music but it does enable a lot of people to produce their own music without the need of studios and that has really created quite a big creative revolution and makes things a lot more accessible in the past and music can be changed and it can be produced in ways that I cant even imagine using a computer, in a way that is a lot cheaper than it used to be in the past, so computers can be used to change music and music absolutely does change and affect our state of mind, theres a lot of research on how our mental states are affected by music; classic music, but not all classic music has the same effect, some classic music can be quite scary if you listening to it, but just the music itself, just the sound can induce a certain state of mind, you feel a bit anxious and expectant when you here the roll of drums you know something is going to happen, it creates, even if you cant see anything just hearing that creates an expectation, if you here very calming, soothing music, again even if you cant see anything it does induce a state of calmness and similarly with music that is more aggressive it induces that kind of feeling as well, and computers facilitate the development of music and the production of music in different ways so absolutely computers can change music and music does affect our state of mind. The way in which music influences our emotions is actually quite a primitive manner, you think about drums and how listening to the drums, its so close to our own heartbeat, the sound waves affect us in a very preconscious way so its not a level we are completely aware of, it does affect the way we are experiencing a situation, it can generate more stressful feelings depending on the music, film producers know this extremely well, if you see a thriller and you switch off the soundtrack and just have the dialogue, it really isnt as scary, but the music is used to create the sense of suspense on whats going to happen next, without it, just the visual cues dont induce the same effect, its incredibly important so computers can contribute to this to how the way in which music affects our emotions by making it a lot easier and more accessible for people in general to do it, everyone can do it, if you have a laptop you can do it, so its not something that requires a lot of working people, one person can do it, you dont need a whole orchestra, you can do it at home and have a studio, and you can change sounds which you cant do with musical instruments of the voice, so theres a lot of to be seen in that area.

85


TRANSCRIPT DR RISHI AGGWAGAL (GENERAL PRACTIONER; BSC, MA, MBBS) 16 (1331 WORDS) This is a transcript. I think that its a difficult question to answer but I think that to a certain degree they have provided antisocial behaviour and the reason I think that is because essentially there are I think many new stories and this may be thats whats influencing all of us in any case but there are many new stories and many reports of technology having been involved in antisocial behaviour, I think the biggest example of thats is last years riots so in 2011 as long as I have got this year right, but in 2011 seeing the mass riots across London and across the country I think that shows you at an extreme level what can happen with the use of technology, at that point in time and the understanding from the majority of us was that, things like mobiles phones were being used for people to communicate with, so in essence you could use blackberry messaging to contact someone you wanted at a particular place if they knew that there was something to steal or there was violence or crimes to be committed then it could done through the use of mobile phones, so thats a kind of extreme end, then you have links towards that which are things like Facebook, again people being able to put information and say, well this is the place where we can meet to do particular crimes, maybe the intention was ever there to commit a certain crime but certainly the gang mentality kicked into place last year and thats what London felt, and thats what the country felt. In terms of things like Twitter its not something ofay with which is strange because Ive grown up in a generation where I consider myself computer savvy but something like Twitter I havent really got my head around, how to use it well, how to communicate with people and how it can be used to do more than send a message to someone or a group of people so it might allow you to say well this is whats happening, but does it necessarily allow you the ability to go and message a group of people and say this is where we would like to meet. From my own personal experience if I return back to the question and has it encouraged antisocial behaviour, I think most people would consider me as a doctor, as someone being at the top end of society for politeness and manners and I grew up in an area, I grew up in East London where by you would, you grew up with people who were part of gangs on a regular basis and were constantly around you and your peers and friends at that point in time were part of gangs, you didnt have a choice because it was either that, you either knew them or you didnt and you face social isolation, do I think the computer was involved in that, well we use to go to arcades, we use to play on the arcade machines, we use to play a game called street fighter but did it influence negative behaviour in me, my parents thought so, but actually I thought it was a break when this was 20 years ago, I thought this was a break and I thought it had a positive influence on me because it made me more than just someone who was a geek, someone who just did there book work and you have to understand at that point in time, computers were just coming in so it was a different world, we never had Google but Ive grown up with Google so I dont think it was a negative influence on me personally, but I can see how it can be because if it takes you away from your work hard enough and well enough you wont be able to do the things that allow you to integrate into society and do the positive and good things you can do in society, but I also think if we turn away from the negative side and look at the positive aspects, we use Google now on PCs and on computers we use on a daily basis to try decide in essence about what kind of decisions to make for patients you know theres a lot to be about using Wikipedia to make decisions for patients but I think given that Wikipedia is probably the best encyclopaedia on the planet, it is influenced by millions of people making decisions about what should be written inside it, I think that it is a useful resource and you can sometime find things in there proven in medical journals they will influence your decisions about doing things I have no qualms in saying that, even to the patient Ill say lets find information about this, a particular case that I know nothing about because its either rare or its something thats not come across my table in my 10 years of medicine and you know youll learn things and I think it can have a very positive impact on society in that way, it can also have a positive impact our daily lives, I think weve changed as society by we will say I dont know this piece of information, lets Google it and you Google it and you find the information instantaneously you get an answer to this question. 50 years ago you couldnt do that, you just lived without the answer or youd have to find the person, you could say well there is a struggle to find that answer 50 years, I dont think thats actually the

86


case I think sometimes its better to get just the answer and struggle about the things that are more important rather than struggling to get the answer. I think overall, I consider that it has in part created antisocial behaviour but the people also create antisocial behaviour and its a group of bad people using technology, for example in the riots, they are innately bad and I dont think it influences them enough to force them to commit crime because youve got technology in front of you, youve got computers in front of you, so I think that would be my summarise answer, but there isnt an easy answer to this. I think the answer to this question is that they possibly already have, they already have influence our psychological wellbeing because it stops us from doing other certain tasks in our day and that might mean that we spend 8-12 hours day just sitting in front of a computer screen, reading things, going through things on the computer, not interacting with anybody and that, when your stuck in your own little world and your doing things by yourself can be sometimes soul destroying, its like doing a project, its like doing homework and your sitting there just in front of a screen, no one else to interact with just the screen, so I think its already affected our psyches in a way and our wellbeing but in the future I think there is this balance and were trying to learn with the computer age how to, how do we manage something as big as the computer era and its influencing our daily lives and I think were just getting to grips with it and its exploded and its exploding at the time that were trying to manage it so I dont think weve got to a point where we have the ability to be able to control it so that we can understand its influence upon us and how we can control its influence upon us in that scenario, so I think its already, like I said, its already probably controlling our psychological wellbeing and Im not entirely sure whether it will still do that in the future and thats what my answer would be to that, I dont think theres a very simple answer to it.

87

WRITTEN REPORT COMPUTER SECURITY

88

Computer Security
Security is a concern for any establishment using computers or the Internet. By law, any establishment using computers that collectively contributes to their workflow must have policies enforced that users abide by so all systems are used suitably. It is difficult to avoid security systems when using computers and the Internet especially where sensitive information is distributed. Schools for example would be expected by law to store all student records on-site with no remote access whilst online shopping stores would be expected to employ encryption so sensitive information such as credit card numbers and customer details can only be interpreted by the receiving system. Potential threats to Computer systems The nature of computer crime has changed significantly over the last 10 years. As technologies have adapted and developed security has deteriorated. Professionals who breech security systems are understanding configurations better than ever before. A common view of computer security is that the threat comes from a vast group of malicious hackers with the primary focus of breaking system security for political, economical, religious or personal gain purposes. Though there are physical and technical measures to prevent malicious attacks such as guards, locks, firewalls, gates, passwords and filters, hackers can now break each level stage by stage and gain access to sensitive information. There is a pledge of malicious threats in the virtual world, some notably more damaging than others. Spyware and Trojan threats are the most common in society today because of there simplicity and threat level. Hackers can program malicious code to carry out tasks that can disseminate data from the attacked system to host computers setup primarily to retrieve such data. There have been hundreds of cases of security breeches. However, computer experts have highlighted that there are ten most-notable hacking statistics in computer history. PlayStation Network (2011) In April 2011, the Sony PSN (or PlayStation Network) had to shut down for a brief period after an estimated 77 million user accounts were compromised. Credit card numbers, addresses, names, contact numbers and usage data was thought to have been stolen during the hack. Intellectual Property Stolen (2008) In February 2008, an estimated $1 trillion dollars worth of intellectual property was stolen due to hackers gaining access to confidential data stored on enterprise systems. The FBI Deface (2012) After the US state passed laws for SOPA (against the unauthorized sharing of copyright material) hacking group Anonymous defaced the FBI website as well as the US government website in retaliation. These computer threats will continue to affect the virtual world and as technologies become more and more advanced, the threats will become more dangerous.

89


Identifying risks Computer threats can be easily identified and system administrations should regularly check their networks for malicious activity and unauthorized access to secured content. However, different threats entail different identities. Web Development Website threats are very different to software (application based) threats. Websites are coded in web applicant programming such as HTML (the hypertext markup language), CSS (the cascading style sheet) and PHP/SQL or in some cases ASP. Defacement of Websites and identifying the risks System administrators can scan their web code for vulnerabilities in strings that can be injected. Injection is a form of malicious attack whereby a UNION method is used to access the web database. A UNION method selects all possible tables within a database and locates the parent field. If a SQL injection is successful, the hacker can gain access to the central database. They can then extract sensitive information or user credentials to gain further access to other resources. This risk can be identified every easily. System administrators should begin by enforcing basic firewalls at the least on their server blocking all access to ports outside of the allowed range. Additionally, IP based approval services should be enabled so only specified access to a unique IP address is granted. The system administrator can then check to see if their website is vulnerable by visiting their website and adding an apostrophe followed by a space followed by UNION SELECT ALL. If the website is vulnerable, the server will return with an error usually followed by a defacement of the template/design of the website. Software Based Threats Software based threats can be distributed via third-party software packages or can be downloaded as primary source files. The malicious code is installed on the system and alters the registry editor. The registry editor is a series of strings that specifies a data value for a given operating system. When the registry is modified, it may cause the system to become unstable. Antivirus and automated malicious scanning tools can detect malicious changes to the registry as well as malicious code on the system. Modified Software Files In some cases, malicious code is implemented into re-releases of trusted software boosting improve performance. Users would be fooled and would download this update containing malicious code unknowingly. The severity of the threat however is somewhat low. Most packages are precompiled with adware, a form of malicious code that allows adverts to display on your computer without authorization. Hardware Based Threats These types of threats are becoming increasingly more dangerous due to the nature of the attack. A hardware-based threat attacks the hardware ID (the identifier) of the device and manipulates the functions. This causes the device to malfunction and the hardware can then be modified using command line based utilities.

90


Use of stolen data Data can be stolen from many different sources but popularly retrieved from the Internet. Data shared over the Internet is never secure unless adequate encryption is assigned. Encryption is a process where data sent over a network is scrambled so if the connection is intercepted, the data cannot be read. However, encryption is not a proofing system and can be bypassed if the hacker is skilled enough. Data can be retrieved in three ways. Each method increases in difficulty and requires a higher skill level. Brute Force Method This method is the easiest out of the three because it requires not technical skill and relies on forcing entry to a system from an imported word list. Brute force methods are in most cases unsuccessful because of the increasing standards required for passwords. The brute-force generator will try each possible combination from the word list against the system your attacking. If an attack is successful, you maybe able to access private databases containing personal details, credit card details and more. Phishing Method This method requires basic to intermediate web development skills and relies on deception and vulnerability. A programmer will imitate the look of a company website and upload it on their own server. The programmer would then purchase a domain name and forward this to vulnerable customers/clients who use the company in an attempt to retrieve user accounts, passwords and other data. URL masking is now being deployed to fool the individual that they are on the official website. For example, the customer may have clicked a link to visit: www.pcworldd.co.uk, where the programmer has added an additional d to deceive the individual. The programmer can then integrate cookie based scripts that change the URL to www.pcworld.co.uk on the computer their using, fooling them into believing they are on the official website. Reverse Engineering Method This method requires advanced understanding and determination. The process is lengthy and hackers would only spend time reverse engineering if there were huge financial benefits. The hacker would analyze the website or server and find backdoors into the system. If a vulnerable backdoor (port) is found, the hacker will reverse engineer the system so the algorithms output information on a specified database. The most common form of reverse engineering (though no malicious) is the jailbreak for Apple devices. If data retrieval were successful from any of the methods above, hackers would usually sell these details to companies for profit, or distribute the information online on underground hacker forum sites. In most cases, the hacking groups are part of organised crime. Financial analysts would be privately employed to advice the operators of the criminal groups on how, when and where to use these details. These threats are generally coded and practiced to cause damage or disruption to financial systems, computers and/or companies, organizations and services. It is notable that if hackers would like to gain entry to a system, whilst security may increase the time of gaining access, if persistent, they will. Computers work in binary where data is either null or present (0 or 1) and will always be compromised. New emerging security technologies still in development such as Read only encryption hope to prevent these security breeches but security experts say that hackers will always find a method around their innovations.

91

END OF PROJECT PRESENTATION

92

17/04/2013(

The Impact of Computing on Society, Psychology and Security.


By Ozgur Mehmet

The purpose?
I wanted to investigate:
The uses of computers in the workplace. The advantages and disadvantages of computing. The psychological effects of computing. The security risks of computing.

1(

93

17/04/2013(

Background
I am a Web Developer and I cant get enough of Psychology. I am studying: ICT, Psychology, Computing and EPQ. I am applying for Computer Science at University. I plan to complete a MSc and PHD in the field of Cyberpsychology. I aspire to qualify as a Computer Forensic and a Security Architect.

In depth
My project was very detailed and consisted of 3 major topics made up of 13 sub topics. All relevant to Computing, but:
Investigate different areas:
Psychology Security Usage in Society

2(

94

17/04/2013(

Today
Ill be covering 4 sub-topics and showing you 2 videos. One video:
A short film on Cyberbullying demonstrating:
How computers can be used to produce content. The influence of music and imagery on Psychology. Produced in open format open to interpretation. Not conceptually-heavy. The second video is a short clip of my documentary.

Documentary?
The documentary was too long to present and had been delayed considerably due to legalities with relevance to Data Protection. Will be published this year.

3(

95

17/04/2013(

META-ANALYSIS?
Consider my research as a Meta-Analysis. Collects existing research, merges this into one piece of research. Thoughts, opinions and evaluations are given. Research is produced. Must contain PRIMARY and SECONDARY sources.

Advantages
Of Computing

4(

96

17/04/2013(

The WWW
Not to be confused with the Internet. Notable:
Access to Information Communication Medium Online Shopping (eCommerce)

Access To Information
Did you know?
There are over 910 trillion entries on the WWW. (statistic by Google Public Data, 2012) - Unlimited information. - Free / No Money. - Updated every second. What would we have done years ago when these resources were not available?

5(

97

17/04/2013(

Communication Medium
Did you know?
There are over 144 billion emails sent everyday. (statistic by Kelkoo, 2011) - Free / No Money. - Providing a channel for communication. - Connect with old friends and family, as well as work colleagues. - Share photos, videos and memories.

Online Shopping (eCommerce)


Did you know?
In 2011, online sales exceed 60 Billion with over 65% of sales from Clothing and Online Fashion. (statistic by Kelkoo, 2011). - - - - - - Accessibility Cheaper Competitiveness between companies Worldwide sales Ease of use / Convenience Out-of-stock goods?

6(

98

17/04/2013(

Disadvantages
Of Computing

Physical Health
Did you know?
RSI or Repetitive Strain Injury has increased 560% since 1996 (statistic by NHS Choices, 2012). Experts suggest this is linked to keyboard usage. - Eye strain. - Neck pains. - Obesity.

7(

99

17/04/2013(

Deteriorating Psychology
Did you know?
In 2011, over 3,450 patients in the United Kingdom were diagnosed with Dissociative Identity Disorder which is linked with Cyberbullying. (statistics by NHS Choices, 2011). - Research and Content Analysis. - Encourages anti-social behavior? Dr Leticia Cestari - Prolonged psychological effects: Addiction Increase of loneliness and depression Chronic stress

Costs?
Did you know?
In 1977, computers were machines built for onepurpose (usually word processing) and cost around 5000. - - - - Initial costs? Maintenance. Accessibility. Globalization.

8(

100

17/04/2013(

Cyberbullying
Simplified.

Increase In Violent Suicides


In 2012, over 320 online sites encouraging young people to kill themselves were shut down; their operators were arrested, statistics by Kelkoo, 2012. Since 1999, there have been over 9000 known cases of violent suicide due to Cyberbullying: of them, approximately 80% were encouraged to kill themselves.

9(

101

17/04/2013(

Possible link to DID


DID or Dissociative Identity Disorder is where one cannot fully identify themselves. It is commonly linked with individuals who are Cyber bullied but interestingly, does not affect those who are bullied at home or school. Psychologists have noted that the individual develops two identities; one true identity and one false. In some extreme cases, these identities have merged to program the individual. This is how individuals are encouraged to kill themselves.

Addictions to the Internet


Why and How?

10(

102

17/04/2013(

Addicted
Internet Addiction is now a recognized mental deficiency. Internet Addiction Disorder (or IAD): Online activities which, if done in person, would normally be considered troublesome, such as compulsive gambling, or shopping, are sometimes called net compulsions. It is suggested that between 5-10% of all web users are web dependent statistic by Harvard University, 2011.

Endless.
With addiction comes a long list of possibilities:
Cybersex addiction Cyber relationship addiction Net compulsions Information overload too much information leading to lower work productivity Online shopping addictions!

11(

103

17/04/2013(

Security Breeches: Case Studies


Simplified.

Gareth Crosskey
19 year-old McDonald's employee hacked into the Facebook account of Justin Bieber's girlfriend Selena Gomez by posing as the actress' step-father/ manager to persuade Facebook staff to change the password to the account. After accessing and copying her private emails he contacted celeb magazines offering to reveal information about her.

12(

104

17/04/2013(

Dale Trever
Primary Care Trust data manager accessed confidential female NHS patient medical records. Guilty plea. Sentenced to six months imprisonment, suspended for two years.

The Nigerian Scam 419


Perhaps the most notable: Check your documents.

13(

105

17/04/2013(

Summary & Evaluations


Skills, Evaluations and Summaries

Identified: Skills Acquired & Developed

Research Skills
Interviews Questionnaires Dictation and Summarizing

Creative Skills
Music Production Video Editing and Production Graphic Design for Informative Graphics (Infographics)

14(

106

17/04/2013(

Identified: Skills Acquired & Developed

Management Skills
Time Management Project Logging and Planning Use of Computers to manage content and events

Risk Assessment Skills


Analyzing, understanding and enforcing relevant laws. Contingency Planning Plan B

Identified: Skills Acquired & Developed

Web Development Skills


Presenting lengthily information on a website. Building a website for purpose from scratch. Merging data contents into one platform.

15(

107

17/04/2013(

SUMMARY
I have enjoyed conducting this research and have learnt so much about the uses of Computers, the benefits, the drawbacks as well as the predominately Negative Psychological Aspects of Computing. I have particularly enjoyed interviewing experts. Notable: Music & Video Production despite lack of concept.

EVALUATION
GOOD: Time management where theory was relevant. The skills acquired and developed. The insight into complex topics from experts. The time scaling based on management. Balance between examinations.

16(

108

17/04/2013(

SECOND CHANCE?
I would concentrate on ONE topic and research the topic in-depth. Why? The project was too detailed and took a long time to complete. I would plan the project from an alternative point of view As if I was someone reviewing the project.

GRILLING SESSION: QUESTIONS?


Feel free to ask me any questions about the project contents or planning and I will answer to the best of my ability.

17(

109

17/04/2013(

FOR MORE INFORMATION, VISIT:


http://www.ozgurmehmet.co.uk/epq

THANK YOU.
Wishing You The Best Of Luck For Your Future.

18(

110

CONCLUSION, EVALUATION AND BIBLIOGRAPHY

111


Conclusions SUMMARISE WHOLE PROJECT ON ONE PAGE

112


Evaluation

113


Bibliography Counselling-directory.org.uk (2011) What is Passive Aggressive Behaviour?. [online] Available at: http://www.counselling-directory.org.uk/counsellor-articles/what-is-passiveaggressive-behaviour [Accessed: 16 Feb 2013]. Counsellingsydney.com.au (2000) Internet Addictions: A Case Study of Counselling Therapy. [online] Available at: http://www.counsellingsydney.com.au/addiction/internet/case-study [Accessed: 15 Feb 2013]. Cyberbullying.ua.edu (2013) Cyberbullying Resource Blog Archive Case Studies. [online] Available at: http://cyberbullying.ua.edu/index.php/casestudies/ [Accessed: 01 Feb 2013]. eHow (2008) The Disadvantages of Computers in Education. [online] Available at: http://www.ehow.com/list_6562938_disadvantages-computers-education.html [Accessed: 08 Feb 2013]. Endthesilencecampaign.org (1999) Survivor Stories | End the Silence Campaign. [online] Available at: http://www.endthesilencecampaign.org/stories/survivor-stories/ [Accessed: 08 Mar 2013]. Essaydepot.com (2010) Essay on Impact of Computer on Health EssayDepot.com. [online] Available at: http://www.essaydepot.com/doc/27642/Impact-Of-Computer-On-Health [Accessed: 13 Feb 2013]. Hartman, D. (1970) The Computer's Impact on Retail. [online] Available at: http://www.ehow.com/info_8050562_computers-impact-retail.html [Accessed: 05 Mar 2013]. Healthy Place (1994) What is Dissociative Identity Disorder (DID)?. [online] Available at: http://www.healthyplace.com/abuse/dissociative-identity-disorder/what-is-dissociative-identitydisorder/ [Accessed: 06 Feb 2013]. Helpguide.org (2012) Internet and Computer Addiction: Signs, Symptoms, and Treatment. [online] Available at: http://www.helpguide.org/mental/internet_cybersex_addiction.htm [Accessed: 01 Mar 2013]. Nami.org (2010) NAMI | Dissociative Identity Disorder (formerly Multiple Personality Disorder). [online] Available at: http://www.nami.org/Template.cfm?Section=Helpline&Template=/ContentManagement/Conte ntDisplay.cfm&ContentID=20562 [Accessed: 01 Feb 2013]. Nerve.com (2012) Miss Information | Nerve.com. [online] Available at: http://www.nerve.com/advice/miss-information/miss-information-222 [Accessed: 05 Feb 2013]. News.bbc.co.uk (2012) BBC NEWS | Technology | Cyber bullying case sentence due. [online] Available at: http://news.bbc.co.uk/1/hi/8127533.stm [Accessed: 09 Feb 2013]. Passiveaggressivenotes.com (2012) PassiveAggressiveNotes.com - Part 21. [online] Available at: http://www.passiveaggressivenotes.com/page/21/ [Accessed: 09 Jan 2013]. Psychologytoday.com (2008) Internet Sex Addiction: Case Studies and Treatment. [online] Available at: http://www.psychologytoday.com/blog/mindful-sex/200808/internet-sexaddiction-case-studies-and-treatment [Accessed: 18 Mar 2013]. Scholasticus, K. (2013) Uses of Computers in Hospitals. [online] Available at: http://www.buzzle.com/articles/uses-of-computers-in-hospitals.html [Accessed: 09 Mar 2013].

114


Scribd.com (2003) Final Use Computer in Hospital and Community. [online] Available at: http://www.scribd.com/doc/94641165/Final-Use-Computer-in-Hospital-and-Community [Accessed: 12 Mar 2013]. Scribd.com (2012) Application of Computers in Medical Field. [online] Available at: http://www.scribd.com/doc/77704806/Application-of-Computers-in-Medical-Field [Accessed: 05 Mar 2013]. Sis.umd.edu (n.d.) Cyberpsychology and the World. [online] Available at: http://www.sis.umd.edu/bin/soc?term=201201&crs=PSYC [Accessed: 05 Mar 2013]. Sites.google.com (n.d.) Real life examples of Cyber-bullying - Cease Cyber-bullying. [online] Available at: https://sites.google.com/a/cypanthers.org/cease-cyber-bullying/real-lifeexamples-of-cyber-bullying [Accessed: 10 Feb 2013]. Stopcyberbullying.org (n.d.) STOP cyberbullying: What is cyberbullying, exactly?. [online] Available at: http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html [Accessed: 10 Feb 2013]. Suler, J. (1994) The Psychology of Cyberspace - Online Continuing Education Articles. [online] Available at: http://truecenterpoint.com/ce/essentials2.html [Accessed: 23 Jan 2013]. Users.rider.edu (1998) Psychology of Cyberspace - Personality Types in Cyberspace. [online] Available at: http://users.rider.edu/~suler/psycyber/persontypes.html [Accessed: 19 Jan 2013]. Wikipedia (2011) Cyberbullying - Wikipedia, the free encyclopedia. [online] Available at: http://en.wikipedia.org/wiki/Cyberbullying [Accessed: 28 Mar 2013]. Wikipedia (2011) Cyberpsychology - Wikipedia, the free encyclopedia. [online] Available at: http://en.wikipedia.org/wiki/Cyberpsychology [Accessed: 13 Feb 2013]. Wikipedia (2012) Personality psychology - Wikipedia, the free encyclopedia. [online] Available at: http://en.wikipedia.org/wiki/Personality_psychology [Accessed: 21 Jan 2013]. Wikipedia (1980) Pedophilia - Wikipedia, the free encyclopedia. [online] Available at: http://en.wikipedia.org/wiki/Pedophilia [Accessed: 14 Mar 2013]. End of Bibliography

115

THE POEM SOCIALLY CONNECTED


Written by Ozgur Mehmet

116


This poem was written for the short film Socially Connected which can be found online at www.ozgurmehmet.co.uk/epq. It was written by Ozgur Mehmet and inspired by the short film project To This Day. The acrostic poem spells AGAINST CYBERBULLYING MAKE CHANGES. A wise man once said Go run the day All else the day will run you I can tell you the day ran me once Not too long ago, I was 17 So fragile, so delicate Too young to value myself Computers influencing emotions? You lose all sense of reality Behind a screen where Events take place you cant control Reminding you of your insecurities, securing the Belief your worthless Unreachable, Undeniable Live your lives free they say? Live your life well they say? You should live your life and fight for it they say? Im not convinced No morals on the sending end Good intentions? Nothing but cruelty My intent was escapism A dream encapsulated in reality Kill myself, end this dream End this dream now Cyberbully How meaningless in some eyes A death that has no motive No explanation Generally accepted Eventually neglected Socially connected

117

VIDEO PRODUCTION & WEB DEVELOPMENT SCREENSHOTS

Annotations in this section are kept minimal. This is not the primary focus of the project. For all supporting documentaiton, visit: wwww.ozgurmehmet.co.uk/epq.

118

This is the NLE (non-linear editing system) that was used in post production on the short film Socially Connected. The features and functions of this application allow users to edit productions fast and with precision. Other advanced features such as gamma and exposure correction, coloring, FXLS (effects lozenge system) and optic measure allows the user to finalise the production.

Here, a selected clips properties appears on the right. The options highlighted with a blue square are active on this clip. The effect Letterbox creates a black border on the top and bottom of the clip to create a wider aspect ratio, a process used in most professional productions. The color correction has been specified, please check the next screenshot. The transform settings allow the user to change the size, position and anchor of a video clip. If for example I would like to scale the video size down, I would reduce the percentage value of the Scale property.

119

The color panel allows the user to make changes to the shadows, midtones and highlights of a video clip. Changes to this panel can dramatically improve the aesthetics and feel of a video clip. Whilst no changes were made on the color adjustment in this clip, saturation and exposure was adjusted. Saturation This refers to the color information of the video clip. In this case, the global exposure was reduced to create a black and white effect. Adjusting specific elements of the exposure (such as the highlights) will affect different parts of the video clip. Exposure This refers to the light information of the video clip. In this case, the reduced the shadow exposure to create a rich black colour and increased the highlight exposure to bring out specific features of the actors face.

120

This wide screenshot shows the working environment. On the top left is the Event Browser where imported videos clips can be selected and previewed. When a video clip has been previewed and the editor approves of the clip, the can drag this into the central bottom Timeline area. The timeline area is where the edit occurs. The clip can be manipulated to affect the color, style, feel, speed and/or effect. The timeline consists of all the project elements including sound, video, text and effect and transitions.

This screenshot represents text integration in Final Cut Pro. Text can be added and edited to match the feel and style of the video production. In this case, a ultralight font has been selected to highlight the word delicate. The parameters on the right can be changed to alter the colour, size, style and alignment of the text.

121

The theme was designed for the purpose of presenting information clearly with highlight headings. I decided to design a dynamic framework which allows changes to be made to the layout of the theme without having to re-code. I designed a project logo (in the top left hand corner) on Photoshop and exported this as an portable network graphic file with transparency layers. I felt it was appropriate to have the menu static so I added the menu beside the logo (visual identifier).

This is the java mainframe that is programmed to create elements. Elements in this case was a supersize slider that changes every 7000ms (or 7 seconds). This code specifies a 7 second per slide parameter with no hyperlinks.

122

I decided to use web fonts for my website so individuals that do not have the font installed on their system would not be affected. This document is a CSS file (or a cascasing style sheet). It is used to alter the layout of the website as well as assign colour values, alignment values and variable values.

Screenshot of the short film page where viewers can watch Socially Connected

123

Visit www.ozgurmehmet.co.uk/epq
Containing all supporting documents, final written report, research, references and more.

124

END OF PROJECT

For more information visit: www.ozgurmehmet.co.uk/epq

125

You might also like