You are on page 1of 11

Jason Sharp

IS 585
Assignment 3



1. Usability & QR Codes (15)

a. You are expected to purchase, set up, and organize a local area network in a public library. Explain
with examples any six principles of usability you would apply for completing the task. (12)

The following principles in bold have been gathered from the following sources:
http://www.usabilitybok.org/principles-for-usable-design
http://www.nngroup.com/articles/usability-101-introduction-to-usability/
IS 585 March 11 Class Lecture by Dr Potnis

Before purchasing the local network, determine whether the system is useful.
Example Questions to ask: To what degree will this system meet the needs of my organization?
Will this system remain useful if our organization grows and does it currently meet the data needs
of my organization now?
Determine whether the system is consistent with other systems and follows standard protocols.
Example Questions to ask: Am I following the standard protocols in setting up this system and
are these protocols consistent with other systems? If I leave this organization, will my successor
understand what I did?
Ensure that the system is easy to use
Example Questions to ask: Will it be easy for my employees or patrons to log into this local area
network or will they require additional help?
Provide clear communication on how to use the system
Example Questions to ask: What type of communication do I have available to provide to my
employees or patrons when they become confused. Do I have written explanations of how to
complete this process or will I need to show them in person?
Ensure that process is efficient
Example Questions to ask: Am I requiring more steps than are needed to log into this network?
Is there a way to make this process easier for everyone?
Create some form of error prevention to prevent accidental changes to the system
Example Questions to ask: Is it possible for the system to be accidently altered or destroyed
through a mistake by a coworker? Are there built in fail-safes such as passwords to keep people
from making changes and are there confirmation messages before instituting problematic actions?


b. Create and submit a QR code for a website of your choice. (3)

I have submitted a QR code for the ebook Divergent on the Memphis Public Library Overdrive system.
These QR codes will be placed on cards in our Young Adult Area to draw attention to our digital
collections and help patrons easily navigate to popular titles.





2. Mobile Learning (12)
a. What are the four key problems associated with mobile-Learning discussed in Mobile Learning using
Mobile Phones in Japan article? (4)

Technological Issues: Bandwidth, small keypads, small screens, high cost, limited storage and small
batteries are all a concern for mobile learning.
Content Design: The researchers found that it was difficult for teachers to provide the necessary content.
Collaborative study was difficult due to technological issues and text messaging was primarily used for
things like learning vocabulary and quizzes.
Uniqueness of Device: A mobile device is not a miniature computer, the size of the screen and the
keypad play a role in what type of content can be reasonably delivered.
Psychological Issues: Many learners expressed that they require a quiet place to learn and study which is
difficult to find on the two and half hour commutes may students engaged in.

b. Do you think the same problems are applicable to the US? If yes, why? If no, why not? (4)

Bandwidth issues are definitely a concern in many areas of the United States although some of the other
technological concerns may not be as big of an issue. Many mobile users are already accustomed to
smaller screens and keypads and if the content design is appropriate, this should not be as big of an issue
for many of todays learners. Battery length has also improved quite a bit in mobile phones and these
can be more easily charged at home where the studying will likely take place.

Content design is not as big of an issue in 2014 as it was in 2012 when this study was published as a
large number of mobile apps are available for various smartphones in the United States.

The uniqueness of the device is also not as big of a concern as many developers have created quality
mobile apps that do more than simply compress large websites.

Psychological issues may continue to be a concern in mLearning, but the United States may not face the
same types of issues. Lengthy commutes are not a concern for most students, but there may be concerns
about distractions emanating from their phones while trying to learn. If students are studying a lesson
and are tempted to play the latest game on their phone or are interrupted by constant texts from their
friends, it could be very difficult to stay focused.


c. Present any mobile-Learning application used by libraries in the US. Make sure to give screenshots
and list key features of the application. (4)

One very popular mLearning app used in the Memphis Public Library system is the app Goodreads.
This app is based on the popular social cataloging website although it does much more than simply
connect people to new books. This app can be used to scan titles using the camera function and add it to
a persons reading list, participants can connect with each other to discuss their favorite titles and
perhaps more importantly, engage in discussions on educational topics that interest them. A key element
of mLearning is the fact that users can learn at their own pace and personalize their education to their
own interests. Goodreads delivers this through these discussions; in the second screenshot I have
provided below, a group interested in software engineering are engaging in a book discussion on the 8
th

chapter of Dan McCrearys Making Sense of NoSQL. They have the opportunity to discuss this title, ask
questions and provide feedback at any time of their choosing. This is a fun way of promoting learning
opportunities for those may not otherwise seek them out and can done at the users convenience.


Key Features include:
UPC scanner and Book Identification Service
Personalized Book shelves and rating services
Progress Trackers
Free eBooks that can be read on the app
Groups where users can form bookclubs and hold discussions



App Home Page Book Discussion Product of UPC Scanner


3. Library 2.0 & Social Media (20)

a. Explain with examples six essential steps for transforming traditional libraries to Library 2.0. (12)

Step 1: Involve the library user in the design and implementation of library services. (example: use social
media and polling services to obtain constant feedback that can be used to improve existing services)

Step 2: Create a social media presence that provides consistent updates on existing and planned library
services/programs and use this platform as another way to obtain feedback (example: create a Facebook
account that details upcoming programs and closely monitor the comment sections).

Step 3: Evaluate current services based on the feedback acquired in the first two steps and institute new
programs or policies based on this feedback. (example: The Memphis Public Library system is now
developing a Teen Tech Center based on the feedback provided by teen patrons and the feedback that the
Chicago uMedia lab has received).

Step 4: Look at the services other local agencies are providing and what gaps exist in those services.
Determine whether these would be applicable to public libraries and create programs that could help fill
these gaps (example: The Memphis Public Library now hosts Homework Help Centers twice a week to
support students who are not receiving assistance through their school systems.)

Step 5: Update the existing OPAC to incorporate new Web 2.0 applications (for example the New York
Public Library allows users to rate and create reviews on their titles:
http://nypl.bibliocommons.com/item/show/19888262052907_allegiant)

Step 6: Support library customers in the long tail as opposed to just the library regulars. Seek out new
customers using varied programming and ensure that Ranganathans 2
nd
law Every Reader his (or her)
book holds true today (example: I provide extremely varied summer teen programming such as video
game design, teen investing/budgeting and manga book clubs in an effort to reach out to as many teens
as possible).

b. Illustrate any four Web 2.0 technologies that can be used in the library setting of your choice. (8)

1. Use social media such as Facebook and Twitter to keep users informed of programming
opportunities and to encourage discussion on the ways staff can improve the library (example: the
Memphis Public Library Facebook page: https://www.facebook.com/memphislibrary)
2. Publish podcasts on various topics such as career development information in the area or book
discussions (example: https://podcasts.memphis.edu/)
3. Publish a library blog that organizes staff book reviews and encourage users to participate in the
discussion (Example: http://memphisreads.blogspot.com/)
4. Use Skype to connect library patrons to famous authors and to encourage trivia competitions
among library branches (Example: http://www.memphislibrary.org/node/3513).



4. Software Security & Piracy (28)

a. Explain the following terms with examples.

i. Botnet (3)
A collection of infected computers (also known as bots or zombies) that receive instructions from a
central command. These bots typically operate without their owners knowledge and the botnet can be
used to perform DDoS attacks to hurt a competitors website or can be used to forward spam.

Example: Question Number 10 on this assignment is an excellent example of what results from a botnet.
I have also found an excellent video that demonstrates a sample DDoS attack using a botnet:
https://www.youtube.com/watch?v=zUqMc5QMc-E

Note: I did find mention of legal botnets, however the majority of the information I came across was
regarding the illegal botnets.

ii. Shrink-wrap license (3)
A shrink-wrap license is typically included with a boxed software purchase, it states that opening the
product constitutes an agreement from the purchaser to abide by the provided End User License
Agreement (EULA).

This can be problematic as the user typically does not know what the agreement entails until they
actually open the product to read the agreement.

My example is an amusing Dilbert comic poking fun at Shrink Wrap Licenses:


http://dilbert.com/strips/comic/1997-01-14/

iii. Malware (3)
Software designed to damage or disrupt a system.
Viruses and Trojans are considered to be forms of malware.

Example: Information on the malware that compromised the data of 70 million Target customers in late
2013.
http://www.wired.com/2014/01/target-malware-identified/

iv. Trojan (3)
Software that tricks users into thinking they are downloading useful software when it is in fact malware
that harms the computer. Trojans are also known for creating a backdoor into your system that allows
other users to access your computer.

Example: Most Trojans are harmful to the computer but some can be amusing and are designed as
practical jokes. I have linked an example of a Trojan that can cause the screen and makes the windows
move around although it was designed for Window 95/98 computers.
http://dark-e.com/archive/trojans/funny/index.shtml

v. Worm (3)
Worms are very similar to viruses in that they can spread from computer to computer, but unlike viruses
they do not require action from the user. Worms take control of a computer to spread themselves, using
large amounts of system memory and network speed to do so.

Example: There have been several notable worms released in the past two decades, although much of my
research found MyDoom to be one of the worst. This worm targeted PCs via email and one source I
found stated that it caused $38 billion dollars in damage:
http://wildammo.com/2010/10/12/10-most-destructive-computer-worms-and-viruses-ever/

vi. Quarantine (3)
When a users antivirus software locates an infected file, it will quarantine that file so that it cannot
continue to infect the computer or cause damage. Information on this quarantined file can be reviewed
by the user and can provide further detail on the file, such as where the file was downloaded, the level of
risk the file poses and the number of threat actions the file may have performed.

Example: A screenshot is included of Nortons quarantine security history.



Source: https://github.com/mapbox/tilemill/issues/1488


vii. Zombie (3)
A zombie is a single computer in a bot army that works without its owners knowledge to perform
various tasks set by the bot armys Central Command (such as performing DDoS attacks or forwarding
spam).

Example: I found a simple diagram on the website How Stuff Works that illustrates how a hacker takes
control of a zombie computer to send spam to his victims.


http://computer.howstuffworks.com/zombie-computer2.htm


b. See Issue: How Serious is Software Piracy? on page 170 of recommended text

i. Do you believe that software piracy is a serious issue? Why? (2)

Software piracy is a huge concern for the videogame industry. Several publishers and game developers
have been driven out of business due to rampant piracy and the publishers that remain attempt to curb
these attempts with anti-piracy measures that frequently harm honest buyers.

Sony had to develop and sell their own proprietary memory cards for their new portable gaming system
(PS Vita) after the rampant piracy issues from their Playstation Portable, these memory cards are
extremely expensive and the 32gb card still retails for $80. Likewise, the XboxOne was initially
designed to require that users have an active internet connection to check for copy protection and would
cease to play games if it could not complete this check. This was met by harsh criticism by those with a
stable internet connection although this idea is not new to PC gamers as some single player games (such
as the new Sim City and Diablo 3) will not play at all without an internet connection.

Software piracy harms everyone that intends to act honestly as many hackers have been able to
circumvent many of these copy protection methods within days or weeks and many have professed a
desire to continue supporting piracy as a retaliation against these efforts by publishers.

ii. Do you know any instances of software piracy? (2)

I have never pirated a video game, however I am familiar with the many options that are available those
who wish to do so. Many users of Sonys Playstation Portable system installed custom firmware on their
systems so that they could easily download and play games for free, the Nintendo DS had an R4 card
that could be loaded with games and most of the home console systems could have specialty software
installed that allowed users to download and burn their own DVDs that could be played on the system.
Torrent sites like Piratebay exist to share these files and there are thousands of other smaller websites in
existence.

iii. Do you think that most software pirates understand that they are doing something illegal? (2)

I believe that the majority of gamers that download software do so with the full knowledge of the legal
issues. Hacking and downloading a game is not as easy as downloading a song or movie and on the
forums I frequent, many users take pride in their piracy. Some claim that they pirate to ensure that the
product is worthwhile (effectively treating it as a free rental) and will purchase it if they like the product.
Others pirate to boycott notorious video game publishers such as Electronic Arts, although it isnt a true
boycott as they fully intend to play the game.

iv. Should software publishers try to adjust pricing for local markets? (1)

I do not think publishers should adjust pricing for local markets if they wish to curb piracy. Publishers
that adjust their pricing for local markets risk alienating their reputable consumers when they have to
increase prices to fight the loss of piracy. On one hand, increasing prices would help provide a better
return on investment and allow companies to stay in business, but on the other hand it may cause
consumers to turn to piracy or find other pieces of software (such as open source software). As
necessary as word processing software like Microsoft Word is to me in school, I would not pay hundreds
of dollars for it and if I was desperate enough and was not aware of other options, I may turn to piracy.

Adjusting pricing for local markets may also lead to consumer unfriendly practices like Region Locks on
hardware and software which does not benefit the consumer if that software is not released outside of a
region. I hacked the firmware of one of my video game systems when I learned that my region lock was
preventing me from playing an imported game that was never localized outside of Europe and it would
not have been hard to take that a step further and begin pirating after the groundwork was completed. I
chose not to pirate because I wanted to support the developers, but many of those that provided the
instructions on how to hack the system did not share those sentiments. Pricing for local markets makes
very little sense in a world as interconnected as ours as things can easily be imported or hacked as
needed.

5. Problem Solving (25)

1. After moving to a new office building, your company takes the opportunity to suggest that everyone
set up an ergonomic working environment in their new office. What are four possible ways that you can
set up an ergonomic work environment in your office? (4)

1. Adjust the office chair an appropriate height (dependent on the height of the seated person and
the size of the desk).
2. The top of the monitor should be at eye level or slightly lower
3. The viewing distance of the monitor should be 18-24 from where the person is seated.
4. Ensure that keyboards are at an appropriate height and distance on the desk and consider
purchasing a specialized ergonomic keyboard.

2. A message appears on your computer screen stating that your antivirus program detected an infected
file on your computer and is unable to move it to quarantine. What are your next three steps? (3)

1. Ensure that the antivirus software is updated to the newest version and is reputable.
2. Identify the infected file and determine if it can safely be deleted without causing harm to the
computer.
3. If the file can be safely removed, use a file manager to delete it or consider performing a
system restore if losing recent files is not a concern.

3. When you arrive to work each day, you frequently notice that your keyboard and mouse have been
moved from the location you left it in the previous day. In addition, your Web browsers history lists
sites that you have not visited. You suspect that someone uses your computer while you are out of the
office. What are three possible ways to prevent this? (3)

1. If your computer has its own login and password, ensure that you log out of your account each
evening. Change your password if necessary.
2. Check the web history for identifying information. This happened to me on my work computer
and I was able to locate the offenders email and facebook account.
3. Inform management of the offense or contact the offenders directly with a stern warning so that
they never have the desire to log onto your computer again.

4. While picking up a dropped item from the floor, you notice that the lights on your surge protector are
not illuminated. All the devices plugged into the surge protector appear to be functioning without issue,
but you are curious as to why the lights are off. What might be wrong? State three possible reasons. (3)

The surge protector may have become overloaded and might need to be reset or replaced. In
most surge protectors, there is a protective component called the Metal Oxide Varistor (or MOV)
that degrades over time and use, especially if the power that the surge protector needs to protect
itself from exceeds the recommended ratings. Power spikes (short durations) and power surges
(longer durations) can each cause a surge protector to fail and can be caused things like lightning
strikes, faulty wiring and surges of power when large pieces of equipment (such as ACs and
elevators) are turned on and off. Surge protectors that cannot be reset must be replaced to ensure
that electrical components do not become overloaded.


5. While installing the latest version of Microsoft Office, the installation program prompts you to enter
the product key. Once you finish entering the product key, you receive an error message stating that the
product key already is in use. What might be causing this? State two reasons. (2)

1. The product key may have already been used by another customer which can be accomplished
through online key generators or purchasing/shrink wrapping/returning products in a store.
2. Although less likely, I have heard stories of computer users that have downloaded the newest
version of MS Office and tried to use their old key (such as using 2010 for the new 2013
version). More likely, the key could have already been installed on an older computer by the
same user that expects to use the software on several computers without knowing that only one
license is available.

6. You are writing a research paper for your history class and have found a photo on the Web that you
would like to use. You are cautious about using photos on the Web because of copyright issues and
photos that have been altered digitally. How might you verify the validity of a photo on the Web? Give
two ways. (2)

1. Google image now allows users to search for information using images. This can provide
clues on where the image originally came from without having to determine how one should
describe the image.
2. Additionally, one could use search.creativecommons.org to determine whether the image is
able to be used.


7. To safeguard some of your important files from others, you decide to encrypt them. Upon attempting
to decrypt the files so that you can access them, however, you are unable to remember the correct
password. What are your next two steps? (2)

1. Search the tech forums of the software encryption software you used (or any related forums)
to see if there is another method of retrieving the files. I found one suggestion that involved
unplugging the CMOS battery and allowing the power to drain from it to reset the BIOS based
password, although this information should be evaluated first before it is put into action as
additional research will be required to ensure that users are not taking unnecessary or
inappropriate steps.

2. Purchase software such as Advanced EFS Data Recovery that will locate encrypted files and
their encryption keys.


8. You must remember multiple user names and passwords to access various computer resources within
your company. Each time your company introduces a new system, you must remember a new user name
and password, some of which you are unable to customize. Which two steps will you take to manage
your passwords? (2)

1. Password managers are freely available as downloads on a computer or phone. These can be
encrypted to ensure they are properly protected.
2. User names and passwords can also be printed out and locked in a safe, there are simple
codes that one can employ to ensure that those who obtain the information will not be able to
make use of them (such as removing every third T from the user names and passwords or
placing an inaccurate first letter in every password).

9. After recovering from a computer crash, you attempt to reinstall a program that was previously
installed. When you insert the installation media, begin the installation, and type the product key, you
receive an indication that you are unable to continue installing the software because you have installed it
the maximum number of allowable times. What are your next two steps? (2)

1. Determine whether the software will allow you to access an online account and deauthorize
the old computer. Although it does not let require product keys, Itunes media will only allow
five computers to be authorized at one time and older computers can be deauthorized after
logging into your account. Norton software allows something similar when it allows users to
use the remove license feature.
2. Customer support can provide activation via telephone for certain pieces of software (or
provide a new key if necessary) although this will likely require a proof of purchase. In an
interesting side note, some game publishers tried to institute this for certain videogames (like
EAs videogame Spore) and later had to patch out this requirement to allow unlimited installs
after receiving a huge backlash from consumers.

10. You have opened an e-mail message from your best friend stating that he has attached a photo from
his recent Caribbean vacation. You are unaware that your friend had taken a vacation, but you attempt to
open the photo anyway. After double-clicking the attachment, the photo does not open. You immediately
call your friend to ask for help, and he informs you that he did not send that e-mail message to you. What
might have happened? (1)

The friends email was likely infiltrated by a botnet that sent the message or it was otherwise
hacked. The file that opened was likely either a Trojan virus, a keylogger that is attempting to
log your usernames and passwords or is a file that is attempting to add you to the botnet. The
next course of action would be to run a virus scan (without logging into any new accounts) or
perform a system restore if necessary.

11. You are viewing the configuration for your wireless router, as well as the computers that are
connected to your wireless network. In addition to the two desktop computers and one notebook
computer in your house, you notice that another computer is connected to your wireless network. How
could this be? (1)

If the network is an open network, it should be closed ASAP as other local users have easy access
to your computer and network. Someone may have also hacked or somehow obtained your
password and it should be either changed or upgraded to something with a stronger encryption
type. It is also possible that another device (such as a mobile phone or tablet) may be connected
and not being considered in the users initial tally.

You might also like