Blogs

Facebook research data found

I have done some searching online for tutorials to use for an example for our facebook paper. I was able to find a tutorial for ITAP that seems to be a good example for what we need to use and I can use the template for our project and just adjust it to make it fit for facebook.

I also found a tutorial on the Purdue Library site. I can use some of this information also and make it fit our paper.

I will search for some more articles for the older age segments and professionals who use facebook to stay in touch with co workers and old school mates.

Eric Koestner

 

  

Week 2 : Music Group Individual Update

This week, I researched one of main problem about illegal download music and found how many American uses digital music player like MP3 player. I obtain document from PEW INTERNET & AMERICAN LIFE PROJECT, and found out that more than 22 million American adults own iPods or MP3 players. I researched it, because it tells us changing method of listening music. Not many people using CD player anymore and this is one of the reasons why people need to download mp3 file from website or internet. However there are not many website offers to download music legally. Relating to this subject, I researched ‘itunes’ and ‘Rapsody’ which are providing legal mp3 music file.

After I research, I wrote paper about problem and solution due to illegal download music.

 

PEW INTERNET & AMERICAN LIFE PROJECT:  attached

MySpace Group Individual Work

For the white paper assignment, I did even more investigating and research into MySpace's problems with child predators.  My group made a final decision on our three solution proposals to MySpace.  I will primarily work on our idea to form a partnership with Myspace and the To Catch a Predator volunteer group Perverted Justice.  Perverted Justice works to filter into chat rooms and social networking sites to find pedophiles seeking underage females on the internet.  By creating a partnership between Perverted Justice and MySpace, volunteers will more easily be able to spot suspect users and a sense of paranoia will be instilled in criminals using MySpace.  I've started to form this research into my white paper section.  In addition, I've looked into Youtube videos and demonstrations for us to use to enhance our in-class presentation.

my contribution

This week I spent two hours sorting through many more articles on the section of our project, about how professionals use Facebook.  I found four more articles which I printed off and read through.  I then underlined important information that I will include in the white paper.

week 2 update

This week, I've been researching on minors using facebook and children predators on facebook as well. I have found few resources that I might be able to use, but some of them don't look very relialble. also I am looking for the relationship between the older users and younger users on facebook. I have also conducted a survey that will be used as our groups data. I am still researching for more informations from more reliable sources.

Weekly Blog 1: Research

I have been researching articles on LexisNexis about possible ways to deter shipping fraud through ebay.  I have found a few good sources, but nothing extremely straight forward.  I have come up with a few ideas of my own in order to make sure that the item that is shipped is the right one as well as, making sure it goes to the right place. 

Individual Work on White Paper Project

Today I visited the site Wired.com to research information on how sexual predators may be caught in social networking sites by using existing databases that the government uses. Here, registered sex offenders are compared to names, nicknames, aliases and last names in social networking sites to prevent them from sexually assaulting minors...

the specific URL is...

http://www.wired.com/science/discoveries/news/2006/10/71976

Individual Research for White Paper Blog 2

 

Week of 10/6/2008-10/10/2008

Our group all worked together to come up with possible solutions for our white paper.  We were able to come up with three solid solutions to the Facebook problem.  We met on Thursday night to collaborate all of our research so we were able to write the memo. 

I found a lot of information about recruiters from different companies using Facebook possibly as a factor of recruiting.  About 20% of companies say they use the social network when recruiting for new job candidates.       

Individual B(log)

This week my group members and I came in with 2 potential solution ideas to class on Wednesday. From that our goal was to choose 3 of them to ultimately write our white paper about.

My two potential solutions were to use a fraud management software/service available from another company or to form a security task force within eBay. Ultimately, we chose the fraud management software idea as a solution, and Ricardo molded the task force idea into a unique separate solution.

For Friday (10/17), we are to have completed the rough drafts of the solutions and the summary. I completed mine earlier today, and I focused on an article about a new fraud management software that will be available in the future. The article is actually dated 10/16/2008, so it is very timely and current. I also used the website of the company that is featured in the article, iovation, for more specifics about how their system works.

www.iovation.com

iovation; iovation Partners with ID Insight to Provide Comprehensive Solution to Combat Online Fraud
AnonymousComputer Business Week.  Atlanta:Oct 16, 2008.  p. 87 

This weekend is the bulk of my contribution of the paper, as I will be writing the summary after all portions have been emailed to me, so I have a writing-filled weekend to look forward to. :)

Personal Blog Entry, White Paper Project, Week 2

After meeting on class last Friday, we created our work schedule and decided that each one of us would research on two possible solutions for our topic of "E-Commerce Fraud". I researched before going on Fall Break and found two solutions that I thought were very interesting. One of them consisted in companies specializing in E-commerce fraud to engage in a series of policies before accepting possible clients. The following websites explain that solution:

http://www.codeproject.com/KB/IP/Credit_Card_Fraud_Prevent.aspx

http://technology.inc.com/security/articles/200808/fraud.html

I also found examples of big cases were e-commerce fraud existed as part of my research for background history on E-commerce and E-commerce fraud. 

http://www.ecommercetimes.com/story/6723.html

http://www.cnn.com/2003/TECH/internet/03/26/ebay.fraud.ap/

http://www.msnbc.msn.com/id/3078461/

http://www.tvhistory.tv/ebayfraud.htm

On Wednesday, I wrote my first draft on one of the solutions that me and my group chose. Tonight, Thursday, i will write about background information and history of E-commerce, and send it to the members of my group. Since I am not going to be here for class tomorrow because I am going to Guatemala, we decided that both of them would write the introduction and conclusion based on what the three of us wrote and we would meet again Monday.