Looking for something?

Sunday, November 14, 2010

Reflection: Tips For a Better Blog

As a blogger and wanting a blog to be effective yet also exceptionable there are few points to take in consideration. First off, though there is no exact set blogging ethics, it is good to follow some as thumb of rule in order to save oneself from perils. Among some guiding principles includes referencing and crediting source or information gathered from other sources (Blood, 2002; Tan, 2007). In addition, one must remember to write with prudence as whatever that is published will be for the whole world to see (Tan, 2007; Ng, 2007).

In terms of blog design, one can adopt Kress and van Leeuwen (1998) theory of element layout, which is information value, salience and framing. MacDonald (2008) state a few pointers on effective blog design for instance modifying the blog template to make it look creative, include categories and search engines to facilitate navigation on the blog.


REFERENCES:

Blood, R 2002, Weblog Ethics, Rebecca’s pocket, viewed 12 November 2010, <http://www.rebeccablood.net/handbook/excerpts/weblog_ethics.html>.

Kress, G & Van Leeuwen, T 1998, ‘Front pages: (the critical) analysis of newspaper layout’, in Approaches to media discourse, eds A Bell & Peter G, Blackwell, Oxford, pp. 186-219.

MacDonald, A 2008, Effective Blog Design Tips for Successful Blogging, Blogging Tips, viewed 12 November 2010, <http://www.bloggingtips.com/2008/04/03/effective-blog-design-tips-for-successful-blogging/>.

Ng, D 2007, Blog Etiquette: The Rules are Quite Simple, viewed 11 November 2010, <http://www.bloggingtips.com/2007/11/25/blog-etiquette-the-rules-are-quite-simple/>.

Tan, ZM 2007, Blogging etiquette: For Bloggers and Readers, viewed 11 November 2010, <http://www.suite101.com/content/blogging-etiquette-a22222>.


Twitter Safe? Think again

Just when we thought that Facebook was the ‘in thing’, a one of a kind, micro-blogging service, Twitter came about. Twitter (Dunlap & Lowenthal 2009, p. 130) communication between users to through answers to a simple question, ‘What are you doing?’. Consequently, users can update its followers with simple messages called ‘tweets’ that are like ‘I’m at McDonald’s now with Jerome and Kate’ or informing and sharing news like ‘Oh no! Limewire is no more!’. According to Twitter (2010) website, there are about 175 million registered users and there are 95 million tweets tweeted daily. In comparison to blogs, using Twitter to disseminate information is faster and more immediate because unlike blogs, Twitter lets you post things within the 140 words count limit. Thus, updates are short and can be posted in an instant. Blogs on the other hand, are normally longer in content and therefore is not as immediate.

However, like many other online social sites, Twitter is also exposed to fraudulence of identity accounts. A case for example was the surface of Dalai Lama’s Twitter account which turned out to be a fake (Owens, 2009). Owens also reports that the fake account apparently managed to collect almost 20,000 followers and representatives of Dalai Lama were only notified about the issue two days later.

Dalai Lama on Twitter? Source: www.thefirstpost.uk

Theft Identity is something that is common especially in the United States. Identity Theft Statistics (2010) reports that are more than 30 million victims of theft identity in the past 5 years. Within a year, at least 10 million Americans falls victim to theft Identity (Identity Theft Statistics, 2009). Even celebrities and renowned people are not safe from theft identity. As mentioned before was the case of Dalai Lama. But on top of that are other many high profile cases, like lead singer of Paramore, Hayley Williams had her account hacked and a nude picture of her posted up. Besides that, Britney Spears also unfortunately had her account broken into and a defamatory tweet regarding her privates was posted. So moral of the story is that one must be wary about that no online social networking site is safe from theft identity.

Hayley Williams after the incident. Source: www.zeitgeistyreport.com

Britney defamed. Source: www.techcrunch.com


REFERENCES:

About Twitter 2010, Twitter, viewed 11 November 2010, <http://twitter.com/about>.

Dunlap, JC & Lowenthal, PR, ‘Tweeting the Night Away: Using Twitter to Enhance Social Presence’, Journal of Information Systems Education, vol. 20, no. 2, pp. 129-135.

Identity Theft Statistics 2009, Spam Laws, viewed 11 November 2010, <http://www.spamlaws.com/id-theft-statistics.html>.

Identity Theft Statistics 2010, Credit Reports, viewed 11 November 2010, <http://www.creditreport.com/identitytheft/facts/statistics.aspx>.


Owens, S 2009, 'How Celebrity Imposters Hurt Twitter's Credibility', Media Shift, 20 February viewed 11 November 2010, <http://www.pbs.org/mediashift/2009/02/how-celebrity-imposters-hurt-twitters-credibility051.html>.


Saturday, November 13, 2010

Watch What You Say

Source: www.deeppencil.com

The New Straits Time (2010) reports a Malaysian blogger by the name of Aduka Taruna, who offended many people with his derogatory remark on the passing of the sultan of Johor was taken into custody. Taruna whose controversial post received more than 1000 comments of which were mostly comments expressing discontent to the point that he was threatened and was reported to authorities for drastic measure to taken against him. However, Taruna removed his post and made a public apology for his deed but even despite his effort, his apology was taken to be also offensive. The blogger now is he hiding after receiving death threats and according to Bernama, the Malaysian Communications and Multimedia Commission (MCMC) will investigate and probe the case.

Aduka Taruna, apprehended. Source: lifeplu.wordpress.com

There’s nothing wrong in owning a blog and anyone who has one has are entitled exercise their freedom of speech but one must be careful what is said as it can destroy. As Wack (1995) cited Blackstone (1830), who affirmed, in regards to press freedom, that an individual indisputable right speak publicly their thoughts but warns against those who mentions anything seditious and out of line will have to be ready to face the music. They are of course certain rules or guidelines if you will, that will work for the advantage of both readers and bloggers.

There are many of these ‘guidelines’ or ‘ethics’ and after seeing a going through a few by different authors, I realized some of them shares something in common and I have summarize them together. Firstly, it is always important to take into consideration that before posting anything up, a blogger must understand that whatever is posted up, will be visible and available for the whole world to see and that personal rants will about someone will not make your blog favourable (Ng, 2007; Tan, 2007). The Multimedia Super Corridor (MSC) provides a guarantee of no censorship of the Internet under the 10-pont Multimedia Bill of Guarantees (George, 2005). In spite of that, it does not mean that we can just blatantly say whatever is on our mind. This is where sensibility and common sense comes in. Like Taruna, who is an adult should know better than to speak blasphemy and worst to a honourable person who passed. A quote by Lord Chesterfield, a British Statesman in the late 16th Century sums up the importance of speaking with prudence saying,

"There is nothing that people bear more impatiently, or forgive less, than contempt: and an injury is much sooner forgotten than an insult."




REFERENCES:

George, C 2005, ‘The Internet's Political Impact and The Penetration/Participation Paradox in Malaysia and Singapore’, Media, Culture & Society, vol. 27, no. 6, pp. 903–920.

Lord Chesterfield 2010, BrainyQuote, viewed 11 November 2010, .

Ng, D 2007, Blog Etiquette: The Rules are Quite Simple, viewed 11 November 2010, <http://www.bloggingtips.com/2007/11/25/blog-etiquette-the-rules-are-quite-simple/>.

Shadiqe, J 2010, ‘Blogger held over insulting posting’, New Straits Times, 26 January, viewed 11 November 2010, <http://yquake.nst.com.my/Current_News/NST/articles/12eiss/Article/index_html>.

Tan, ZM 2007, Blogging etiquette: For Bloggers and Readers, viewed 11 November 2010, <http://www.suite101.com/content/blogging-etiquette-a22222>.

Wacks, R 1995, Privacy and Press Freedom, Blackstone, London.


The Rise of E-books

With all the new technologies booming here and there, some things that are considered cultural and traditional are forced to transform to keep up with this fast paced world. A case in point is books. Books have been around for a very long time since the Egyptians came out with the papyrus roll (Britannica Online, 2010).

An ABC (2010) broadcast reports on the how the market for virtual books is seen an upturn in the past year caused by the recent launch of Amazon’s Kindle Book and to top it off, Apple’s Ipad. The report included various figures in publishing world and technology: Steve Jobs (Apple Computers), Stephen Page (Faber and Faber) and Michael Tamblyn (Kobo e-Books). Among some of the things discussed in the report was the advantages of e-books has over traditional books. In addition, the discussion included how book publishers who opposed e-books are now looking into making their books digital and also the how the current book catalogues only satisfy the American market.

What exactly is an E-book? Larson (2010) describes it as ‘a digital reading device stores hundreds of books, newspapers, magazines, and blogs; allows for quick look-up of information through its built-in diction- ary, Wikipedia, or internal search capabilities; and offers customizable settings to suit each unique reader.’ Examples of e-book devices include Amazon Kindle, Sony Reader and just recently, Apple’s iPad.


Sony Reader. Source: www.engadget.com

Amazon Rekindle. Source: www.sync-blog.com

I believe that e-books will slowly replace our books. Like how music tapes players like Sony’s WALKMAN was superseded by Apple’s revolutionary music player, the iPod that can hold thousands of music in MP3 format. So it would not be a surprise if that trend occurs with books. Considering the younger generation brought up in a world whereby communication is no more linear but a combination of many; texts, graphics, images, sounds and videos. Thus, not only will e-book replace the physicality of reading a book but the essence of the content. Armstrong (2008) talks about how e-books can allow the incorporation video clips and text and simple communication with the author.

Moreover, e-books saves space as you only need one device to contain collections of books purchased and e-book eliminates the hassle to go out and buy books when it one can browse through hundreds of book without having to go anywhere and purchase it immediately. As one of the satisfied owner of e-book in the report by ABC (2010) stated, ‘It's like having a book shop in the palm of your hands.’


Apple's iPad and preview of its e-book function. Source: www.topmediatool.com



REFERENCES:

Armstrong, C 2008, ‘Books in a virtual world : The evolution of the e-book and its lexicon’, Journal of Librarianship and Information Science, vol. 40, no. 3, pp. 193-206.

Books 2010, Encyclopædia Britannica Online, viewed 11 November 2010, <http://www.britannica.com/EBchecked/topic/73295/book>.

Cornwall, D 2010, ‘E-books popularity on the rise’, The 7.30 Report, Australian Broadcasting Corporation, viewed 11 November 2010, <http://www.abc.net.au/7.30/content/2010/s2849989.htm>.

Larson, LC 2010, ‘Digital Readers: The Next Chapter in E-Book Reading and Response’, Reading Teacher, vol. 64 no. 1, pp 15-22.


Privacy, Our Responsibility

In a ABC (2010) news article, it reports how the popular social networking site, Facebook confessed to breaching privacy of their users through its application. There are applications in Facebook that disseminates information about the user to advertising companies. The information includes not just the Facebook user’s names but also to the extent of the names of the user’s friends and is used create a comprehensive database so that the people can be tracked online.

I believe that every individual who join Facebook or any other online social networking sites, understand that your personal information is required after all that is a nature of social sites. As Taraszow et. al (2010), stated, ‘nobody is really forced to join social networking sites (SNS), create a profile and reveal personal information…’.Taraszow et. al (2010) also adds that Facebook encourages users to post their contact details, personal interest, work and educational background. The choice to reveal personal information however lies solely on the individual and that most individuals are aware of the consequences of revealing personal data but are just ignorant.

Benhard et. al ( 2009) reveals how other studies conducted on social networking have found that users who claim they understand and prudent towards privacy prove otherwise with their actual steps taken to protect their personal information. A case in point, that we can explore this duplicity is accepting friend request on Facebook. Benhard et. al (2009)further explains in their study where they found that despite subjects in their studies assert understanding and benefit of privacy settings, they still accept ‘friends’ they barely know and thus have a large group of these ‘friends’ which has access to their personal data. This deliberate ‘ignorance’ can be seen in how despite, permission to access personal information request from application in Facebook, people still just click away in agreement without understanding their action. Jones & Soltren (2005) in their study discovered that 347 out of their 390 respondents had never read Facebook’s Privacy Policy.

Example of permission request from Facebook applications. Source: im.about.com

Another example of a permission request. Source: www.erictric.com


Kirkpatrick (2010) in his report, quote Mark Zuckerberg the founder of Facebook, who said that people nowadays are more comfortable with sharing information with the public and that it is a social norm that has evolved over time. There is some truth in that as it is an innate desire for people to want to connect. However that desire has seemed to render our judgement poor about privacy. Boyd (2008) state that privacy is a right and to exist it should be safeguarded structurally and socially. Ultimately, it is an individual’s responsibility to find out policies of the social sites and their choice to reveal or allow access to their personal information.



REFERENCES:

ABC 2010, ‘Facebook admits privacy breach’, 19 October, viewed 10 November 2010, <http://www.abc.net.au/news/stories/2010/10/19/3042594.htm>.

Bernhard, D, Lovejoy, JP, Horn, AK & Hughes, BN 2009, ‘Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences’, Journal of Computer-Mediated Communication, vol. 15, no. 1, pp. 83-108.

Boyd, D 2008, ‘Facebook's Privacy Trainwreck : Exposure, Invasion, and Social Convergence’, Convergence: The International Journal of Research into New Media Technologies, vol. 14, no. 1, pp. 13-20.

Jones, H & Soltren, JH 2005, Facebook: Threats to Privacy, Massachusetts Institute of Technology, viewed 9 November 2010, <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.112.3154&rep=rep1&type=pdf>.

Kirkpatrick, M 2010, ‘Facebook's Zuckerberg Says The Age of Privacy is Over’, ReadWriteWeb 9 January, viewed 9 November 2010, <http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php>.

Taraszow, T, Aristodemou, E, Shitta, G, Laouris, Y & Arsoy, A 2010, Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook™ profiles as an example’, International Journal of Media & Cultural Politics, vol. 6, no. 1, pp. 81-101.




Friday, October 1, 2010

The Media Evolution

Before, information was always in printed form, be it newspapers, magazines or books. But now, with the introduction of Internet to our lives, information takes on an evolution too; now readily and easily access digitally. We can see this with newspapers, magazines or radio stations having a website to cater those goes online more would rather retrieve news online. In contrast to printed documents, new media is a major leap in how information is presented. Walsh (2006) describe it as ‘multimodal texts’ whereby there is an incorporation of different modes: images, music, moving images and either written or verbal communication. These other elements add flair to what we read and interpret, making it more interactive and fun.

Sites such as Youtube and Twitter, redefines the way information and news are retrieved. Here, Naughton (2006) states that our generation where Internet plays a dominant role are influenced by ‘pull’ technology. Instead of just being a passive audience and absorb information fed to us, we now do the opposite; we seek for information we want. The Guardian (2010) reports how blogs were resorted by journalists when their newspapers were ceased. In addition, British parties are looking into using Facebook, Twitter and Youtube to aid their political campaigns since the success of Barack Obama’s online strategy. Sifry (2010) concludes that the Internet, if not monitored will gain precedence in election campaigns. The Internet is a favourable as it is fast, has mass audience, diverse and rich in networking. (Naughton, 2006).


[247 words]


References:

Naughton J 2006, Blogging and the emerging media ecosystem, Reuters Institute for the Study of Journalism, viewed 30 September 2010, <http://reutersinstitute.politics.ox.ac.uk/fileadmin/documents/discussion/blogging.pdf>.

Sifry, ML 2010, How the Internet is Changing Politics in Great Britain, TechPresident, viewed 30 September 2010, <http://techpresident.com/blog-entry/how-internet-changing-politics-great-britain>.

The Internet and Politics: Revolution.com 2010, The Guardian, viewed 30 September 2010, <http://www.guardian.co.uk/world/2010/jan/04/iran-politics-blogging-internet>.

Walsh, M 2006, ‘The 'textual shift': Examining the reading process with print, visual and multimodal texts’, Australian Journal of Language and Literacy, vol. 29, no. 1, pp. 24 – 37.


Welcome to the Blogginghood

Our world is built upon layers of communities. It is inherent to the way we humans interact and socialize. Community gives us a sense of belonging and identity. So it is of no surprise the existence of a blogging community. There is no exact definition of what blogging community is. However, the word ‘community’ according to TheFreeDictionary (2010), means ‘a group of people having common interests’; ‘similarity or identity’. Owyang (2007) describes it as “Online communities are bodies of people joined together by a common interest”. Thus, we can deduce that a blogging community is where people interact and share the same interest in blogging and blogs.

A blogging community is created is when you have constant viewers. According to Wordiq (2010), constant commenters of a blog are described to be the blog’s community.
In order to get a blog to have constant commenters, it is important to have the blog recognized. This can be achieved by viewing other blogs of interest and leave a comment (eHow, 2010). By doing the former, it will eventually lead other viewers or bloggers to notice and follow your blog. Of course other methods would involve utilizing ‘tags’. Tags are brief description or labels to assist in searching for information (NZherald, 2006; Flickr, 2010).

An illustration of a blogging community is Jeff Ooi’s blog. In his blog, not only does he allows comment boxes for interaction but allows viewers to use social networking sites to such Facebook, a microblog; Twitter, a social news website; Digg and Really Simple Syndication (RSS) feeds. These tools allow viewers to circulate and share his post. Consequently, this enlarges his 'community' of followers to his blog.


[276 words]


Reference:

NikkiS n.d, How to build a blogging community, eHow, viewed 29 September 2010, <http://www.ehow.com/how_2152382_build-blogging-community.html>.

What are tags? 2006, New Zealand Herald, viewed 28 September 2010, <http://www.nzherald.co.nz/site-information-help/news/article.cfm?c_id=500827&objectid=10414474>.

What are tags? 2010, Flickr, viewed 28 September 2010, <http://www.flickr.com/help/tags/>.