Wednesday, January 23, 2013

Blog Six

The Human Rights Campaign uses their blog effectively to advertise their ongoing fundraisers, upcoming events, and current social and political developments relevant to the cause.  The blog is visually appealing, easily navigable, and updated in real time--all of which keep the blog current and attract readers that will return and spend lengthy amounts of time perusing the blog.

The blog also features links to other parts of the HRC website as well as external websites and news sources.  The blog features most recent posts on the front page, and includes a breakdown by topic along the side.
HRC blog content is varied and well-written, and the design of the blog is well developed.

Tuesday, January 15, 2013


Blog Five

"Find two examples of ineffective websites.  What makes these sites ineffective?"

Working within the clinical research industry—where budgets are small and internet technology is lagging—I have into contact with an abundance of ineffective websites.  Two such websites are: http://website.scrclinic.net/ and http://www.swclinicaltrials.com/

The SC Clinical website is ineffective both in design and content.  The branding is inconsistent, the graphics and template layout are outdated, and the content is inappropriate for the target audience.  Additionally, content has been stagnant and the interface is not user friendly.  Finding the website proves to be another hurdle as the URL does not appear in search results, even when the business name is typed in completely.

The S&W website is more of a landing page than a true website.  The design is amateurish and the content is generic.  The website consists of a homepage with links to several text-heavy sub pages. 

Both of these websites are designed to target potential patients, provide information on current clinical trials, and prompt visitors to enter their information to be contacted regarding enrolling in trials.  However, the outdated and unapproachable design of these websites does not engage users, does not provide the necessary information, and does not prompt users to return or spend much time on the sites.

Blog Four

"Give an example of diffusion of Internet technology."

My family illustrates the diffusion of internet technology across generations.  Typically, younger generations are quicker to embrace new technologies.  This holds true in my family as my sister and I have been the first to embrace mobile technology, followed by my mother. My grandmother, on the other hand, is just now beginning to use the internet on her laptop.

My family also exemplifies the diffusion of internet technologies across geographic and socioeconomic groups.  My mother, sister, and I sponsor children in various countries across the globe.  Generally, the countries in which the sponsored children live are countries where the internet penetration rate is lower than that of the United States.  However, over the years we have seen that the organizations through which we sponsor these children are bringing internet technologies into previously unconnected areas.  Although the diffusion is not nearly as complete as it is within the United States, we have witnessed a clear progressed toward increased internet diffusion.

Blog Three

"Give an example of an online problem.  Are there any policies that can reduce the problem?"

One social problem which has arisen out of the popularity of the internet is the issue of identity theft.  As consumers turn to the internet to facilitate many financial transactions, the amount of data available and vulnerable to theft increases.  Individuals and companies with access to personal information such as social security numbers, bank account numbers, addresses, and other identifying information are able to manipulate the system in order to gain access to private information.

Addressing this problem and protecting consumer data has proven difficult, as law enforcement and individual companies struggle to keep pace with “hackers” attempting to gain illegal access to such data.   More stringent legislation, more enforcement of existing laws, and better virtual protection—coupled with increased consumer awareness—will help reduce the amount of data vulnerable to theft, ultimately protecting online consumers.

Blog Two

"Discuss one important event in Internet history since 2000."

As internet usage continues to permeate throughout society, internet history is becoming inextricable from the course of human history. Events generated within the “cyberverse” produce ripples throughout the physical universe, and many “real life” historical events are influenced y happenings and developments within the virtual sphere.

The recent riots and revolution in Egypt evidence how the internet can influence the trajectory of historical events.  Much of the organization and execution of the revolution in Egypt (where the people of the country took to the streets to demand social change) was dependent upon the internet.  Revolutionaries used the internet to disseminate information, inspire followers, and share their struggle with the world.  It could be argued that without the internet, the riots and gatherings which attracted thousands may have been largely unattended due to lack of publicity and knowledge.

The recent history of Egypt is thus directly connected to the recent developments of the internet, namely social media and the specific sites through which revolutionaries were able to connect with one another and with the general public.

Blog One

"How do you use the internet?  How does your internet use compare to some other person in your family?"


My internet usage is best divided categorically by intent: for pleasure/leisure or for work/school.  Although the nature of my usage varies by intent and motivation, the frequency and amount of my usage is equally divided between pleasure and work.  I would certainly describe myself as a heavy internet user, as I generally spend at least 5 hours online each day.  My internet usage for pleasure is primarily consumptive, yet my internet usage for work involves more production.

Compared to other members of my family, I am one of—if not the—heaviest user.  Interestingly enough, my mother possess more advanced and more abundant technology than I, but her usage is more restricted to e-mail, social media, and viewing/uploading personal photos and videos.  My mother is more technologically advanced than many professionals her age, as her profession requires her to interact with technological advances as they apply to students with special needs.  (For example, I neither own nor have ever used an iPad, yet my mother owns one and uses it in a professional capacity to help autistic children communicate.)
Ultimately, although I spend a greater amount of time online, there are some aspects in which my mother is more adept and advanced than I in terms of internet usage.