Can there be another ME out there?


Identity theft is becoming an increasingly common problem in the United Kingdom, as fraudsters discover more and more ways to get hold of the information which is required to steal someone’s identity.

Identity theft rarely involves the unauthorised taking of a victim’s personal possessions, however it does involve the perpetrator of the crime taking the victim’s personal information and then using this in an unauthorised way for their own personal gain.

So, if before the Internet era the most awful thing somebody could steal from a person was the wallet with some money, ID and another bunch of random stuff, now it is more damaging to steal one’s identity. This means personal information about cards, passwords and the ability of becoming somebody else in the online community.

Identity thieves can also use your identity when they commit other crimes, such as entering (or exiting) a country illegally, trafficking drugs, smuggling other substances, committing cyber crimes, laundering money and much more. In fact, they can use your identity to commit almost any crime imaginable in your name.

Some techniques that people use in identity theft are:

  • Recovering personal data from dismissed or returned IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized
  • Using public records about individual citizens, published in official registers such as electoral rolls
  • Stealing bank or credit cards, identification cards, passports, authentication tokens
  • Common-knowledge questioning schemes that offer account verification and compromise: “What’s your mother’s maiden name?”, “what was your first car model?”, or “What was your first pet’s name?”, etc.
  • Using ‘contactless’ credit card readers to acquire data wirelessly from RFID-enabled passports
  • Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware
  • Hacking computer networks, systems and databases to obtain personal data, often in large quantities
  • Using false pretences to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretexting)
  • Guessing Social Security numbers by using information found on Internet social networks such as Facebook or Twitter
  • Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites.
  • Befriending strangers on social networks and taking advantage of their trust until private information is given.

Most of these problems are a result of low privacy settings on social media platforms and surfing websites that are not trustworthy.

By the time you realise that someone out there is buying things, obtaining a credit from a bank or committing crimes in your name, there is so little left to be done.

Protect your accounts! Better safe than sorry!


Do I really have to pay for it?


iTunes is a media player, media library, online radio broadcaster, and mobile device management application developed by Apple Inc. It is used to play, download, and organize digital audio and video (as well as other types of media available on the iTunes Store) on personal computers running the OS X and Microsoft Windows operating systems. The iTunes Store is also available on the iPhone, iPad, and iPod Touch. In the iTunes Store, users can purchase and download music, music videos, television shows, audiobooks, podcasts, movies, and movie rentals in some countries, and ringtones, available on the iPhone and iPod Touch.

In June 2010, Apple changed the general privacy policy for the iTunes Store saying that it will gather real-time data on users aged 13 and over. The adjusted document declares that Apple has the right to share this information with third parties that deliver certain services such as advertising and promotion services. In the UK in August 2014 the Internet went mad when the High Court has overturned copyright legislation to make the transferring of copyright works from one medium to another illegal – one of the main traditional uses of iTunes. This was stipulated by TorrentFreack.

The government legalised copying for private use in 2014, a practice most thought was already legal. This meant copying of music from a CD to an MP3 player – something that is not only possible on iTunes but, at least when it first appeared, was its principal function along with buying from the platform. “As this is a complex area of law, the Government is carefully considering the implications of the ruling and the available options, before deciding any future course of action,” a government spokesperson said.

The reality was that iTunes was never illegal and the law was misinterpreted. But I strongly believe that iTunes is one of the best platforms to buy music and media files without breaking the copyright laws and also not stealing them from the internet.

Cinderella should Google herself and Prince Charming!


Did you ever Google yourself before this assignment? Because I did. In the last 3 or 4 years a lot has changed regarding what comes up when I search for my name online. When I was in middle school and even in high school the things that came up were the school I have attended and the teachers that I have along with some of my grades and the results of my final exams in the 8th grade. After those, there was a web page from my high school that said that I was in the student council representing my class. A few pages in, my Facebook page would appear even though I use a slightly modified first name.

Now, when I have Googled myself, the first thing that came up was my London address, my results from high school, my account on Academia and after that my Facebook page. A few pages in, Facebook is still the only social media that comes up out of 10 or more that I have. I still use a slightly modified first name because that is how everyone calls me. Even though my Facebook profile comes up, people can’t see anything that I post. The reason why my social media is so hidden and secure is because I am really, really good at finding out information about other people online. Some of my friends will come to me and ask to search for someone and find out where they work, live or how much they earn. In the past few years I have mastered online “stalking” and I am aware how much information people give away. That is why when I turned 18 (I always had my real age on every social media) and all of the platforms offered me the chance to change my privacy settings and make everything public or more public than they were, I did not change a thing. Only my friends can see what I post and where I go and I always keep track of my social media image.

I guess Googling people all the time has its advantages, right?

Google+ needs some love, too


Google+ (or Google Plus) is an interest-based social network that is owned and operated by Google Inc.

The service, Google’s fourth foray into social networking, experienced strong growth in its initial years, although usage statistics have varied, depending on how the service is defined. Three Google executives have overseen the product, which has undergone substantial changes leading to a redesign in November 2015.

Google+ user base was roughly 60% male and 25% female as of November 2013, and 15% “other” or unknown. Early adopters of Google in mid-2011 were mostly male (71.24%), and the dominant age bracket (35%) was between 25 and 34. An August 2011 survey estimated that 13% of U.S. adults had joined Google+.

This all sounds great in theory and in the presentation, right? Unfortunately, that is not meanwhile-on-google-plushow the majority of the Internet perceives this platform. There are many jokes about Google+ and how nobody uses it and that it is a completely useless knock-off or replica of Facebook.

One of the biggest controversies that Google Plus had started on November 6, 2013. YouTube, Google’s popular video hosting site began requiring that commenting on its videos be done via a Google+ account. YouTube said that their new commenting system featured improved tools for moderation, and comments would no longer be shown chronologically, but would be featured according to “relevance” and popularity, determined by the commenters’ community engagement, reputation, and up-votes for a particular comment. Some YouTube commenters and content creators complained that the Google+ requirement that users use their real name created online privacy and security concerns.

On July 27, 2015, it was announced that the integration with Google+ would be discontinued and that in terms of Google+ integration, YouTube would revert to its previous state, requiring only a Google Account to use all the features, such as uploading videos and posting comments.

Apart from that and the false image that nobody uses Google+, there are 418 million users active (December 2015) and a lot of campaigns and public figures that have an account such as: U.S. President Barack Obama, NASA, Steven Spielberg, The Black Eyed Peas, Tyra Banks, and Paris Hilton.

So what do you think? Do you have a Google+ account that you use? And if not, would you create one?



Where does the Internet think we should eat tonight?


Yelp is an American multinational corporation headquartered in San Francisco, California. It develops, hosts and markets and the Yelp mobile app, which publish crowd-sourced reviews about local businesses, as well as the online reservation service SeatMe and online food-delivery service Eat24. The company also trains small businesses in how to respond to reviews, hosts social events for reviewers, and provides data about businesses, including health inspection scores. But this is not why it is so popular in the US and growing day by day in the UK; the real reason is because users give honest reviews about the restaurants they eat at. This has been for almost a year now the trust-worthiest source when it comes to choosing a restaurant. Users share their experience and their thoughts about the food and the service. Although there is no way to prove that people that write the reviews are actual customers, people still believe the reviews.

I think this business revolves the most on the users as they provide content such as ratings, reviews and opinions. There are top 10s made for bars, restaurants and cafe that update everyday according to the new ratings.

So, would you trust a site where users give their opinion about places to eat? Or do you still rely on your friends for this?

Radio from all parts of the world




Internet radio is also called web radio, net radio, streaming radio, e-radio, online radio, webcasting and I consider this an example of convergence between the old media and the new one. This is an audio service transmitted via the Internet. Broadcasting on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means.

Internet radio involves streaming media, presenting listeners with a continuous stream of audio that typically cannot be paused or replayed, much like traditional broadcast media. I find this a disadvantage for consumers because they have the same experience as the traditional radio. On the opposing side, it is much easier to listen to radio on a computer than having a separate device for that. I believe that transitioning from regular streaming to an online one is an attempt to save the radio business. Over the last 5 to 7 years people only listen to radio when they are in a car, almost never at home, so internet radio is a more accessible way to listen to radio programmes and music.

Moreover, the biggest advantage of Internet radio is the fact that traditional radio transmitters are limited to around 100 miles or so, but webcasting has no geographic limits. Whereas currently, depending on the location, people may be able to tune in to about 50 stations, by utilising the web, this has effectively increased and it grants access to a vast broadcast spectrum, covering the entire planet. Internet radio is delivering more programming and more choices than ever before in the history of broadcasting! Internet radio is also distinct from podcasting, which involves downloading rather than streaming.



Why and how to: track audience

I think the aim of the module is to prepare students for the future and how a working day in their lives will be like. Also, I believe that media courses are developing year by year in order to fit with the newest technology that appears everyday. Fore example, a few years ago, media courses were based only on traditional form of media such as newspapers, magazines or any form of print, TV and radio. But a lot has changed since then and people rely more on more on social media sites and platform to get their daily “dose of news”. Even if this means serious news or more entertaining ones, the vast majority of people have switched of to social media, thus making it the most influential power in the media.

Because of this, I believe that it is highly important to monitor all activity on social media. Even if we try to start our own page or we are hired to take care of a social media profile, having a subscription to a site that will monitor all the activity is a helpful way to customize the content in order to attract more viewers. The information given is really handy to track all activity and how users engage with the content provided. One of these tools is called which offers a one month free trail to help users decide if this is something worth investing in and then 3 types of monthly plans suitable for single companies and ones that own more than one page on social media.