Page content Site navigation

Creative Hive - blogs

Display Posts:
Please select a month
Please select a year
The articles below have been posted by members of Creative Hive

Bookmark and Share   

Digital Identity and Data Capture

By: Zeyad

Digital Identity and Data Capture

What is Digital Identity?

Digital identity is online or networked identity which is obtained by a user, organisation or an electronic device; security and privacy is very hard to control. Digital identity can have different characteristics:

·        Username and password

·        Online transactions

·        D.O.B

·        Medical History

A digital identity will be linked to another identifier such as, email address, URL this is because identity theft is widespread over the web. Authentication and validation measures is vital to ensure network security in public and private sectors. (Technopedia 2015)

In lecture 4 we discussed how data is increasingly converging, there are a lot of different apps that suggest you to log in to Facebook to share details like; your location. Facebook stores a lot of our information and we need to be more careful because anyone can read this information. An example of this is “Pizza Palace” (https://www.aclu.org/technology-and-liberty/ordering-pizza-2015) this example is great because it shows concerning security of data.

Working in small groups we discussed how often we register an account on the web, we also drew a digital footprint of every network we subscribed to, this showed high activity.

The video explains the control of digital identity and explains the down side of social media. What we share online can affect us some way, employers can get hold of this information and you may lose your job having shared something inappropriate.

But there are ways for to be safe when using digital media, you can encrypt your data online so everything is secure, using tools such as encrypting cloud data, advanced Facebook safety, mobile app safety and many more aspects that can help being secure. (Tranberg and Heuer, 2012)

It is very important that you are aware of the dangers online and understand how to deal with these problems so you don’t give personal information away.

Data Capture Technology

Data capture is getting data from the people and to input it to the computer system. The traditional type of data capture is the keyboard to input data and now alternative methods for data capture technology are; Chips, QR Codes, Speech recognition, Electronic data interchange and there are more data capture technology. All these have their uses but have limitations too. (Whiteley, n.d.)

The above data capture technology examples are what we discussed in lecture 5. Chips are cards such as credit/debit cards which are now smart cards with a computer chip. An example is the London transport oyster card, we can use chips to pay securely and quickly. QR codes is scanning for information through an app on a mobile device.

 

Mobile devices can be used to scan a QR code to find information, this is simple and effective. Speech recognition where the computer listens to the voice input, an example is “Siri” which is used in iPhone and can recognise voice inputs and can reply to the user. EDI is an electronic transfer from one computer system to another, an example is the customer’s bank account submitted electronically to the retail bank account.

On screen displays is another technology, examples such as; travel information on train stations, airports and motorways give information to the user. All of the examples above are data capture technology; all different methods that can benefit us as it makes it easy to get information quickly.

 

 

 

 

Bibliography

1.      Techopedia.com, (2015). C Janssen, What is a Digital Identity? - Definition from Techopedia. [online] Available at: http://www.techopedia.com/definition/23915/digital-identity [Accessed 4 Mar. 2015].

2.      Tranberg, P. and Heuer, S. (2012). Fake it. Berlingske. Chapter 13

3.      Whiteley, D. (n.d.). An introduction to information systems. P.g. 135

4.      Whatisaqrcode.co.uk, (2015). What is a QR Code?. [online] Available at: http://www.whatisaqrcode.co.uk/ [Accessed 4 Mar. 2015].

1425513992-qrphotos.png

Make a commentAppreciate this

Who owns the internet?

Who owns the internet?

By: ZeenatPatel

Who owns the internet? Obama’s attack over technology

In week 4 of my studies in Principles of System Development the questions was asked, ‘who owns the internet?’ Questions like these always end up as a debate. Nobody really knows but the human nature always just assumes and thinks the country that’s known for technology invented the Internet. The first thing that comes to mind is America, but is that really the case?

Several people will agree with America owning the internet. A friend of mine said ‘why not? They are the clever clogs and Americans have got technology where it is now’ however, another friend said ‘America always take the credit for everything and they happen to own everything’. This is a strong debate as America do own the most popular sites, such as Facebook, Yahoo and Google which gets used by millions on a daily basis.

I read an article online ‘Obama attacks over Europe over technology protectionism’ where Obama says quite a lot, he literally says they have created it and perfected it. He said in an interview We have owned the internet. Our companies have created it, expanded it, perfected it in ways that they can’t compete. And oftentimes what is portrayed as high-minded positions on issues sometimes is just designed to carve out some of their commercial interests,” So the internet is owned by the Americans then what is with the rivalry with Europe. America do own many sites that millions use but the EU does not agree with the statement Obama gave. America may have perfected the internet but it does not mean they own it. “This point — that regulations are only there to shelter our companies — is out of line,” said a European Commission spokesperson. 

Something that many people will not know Google have been targeted in the region by an EU competition in to the Search Company, and also Google was threatened legal action by the Privacy Watchdogs. The question is why was google threatened? Or over what were they threatened over? Its implementation of the continent’s new “right to be forgotten” law, is the reason why.

Mr Obama also said “In defence of Google and Facebook sometimes the European response here is more commercially driven than anything else,” What does that mean? Is the EU doing that to get some attention from the public? The media? Businesses? No one seems to have an answer so you go with what you’re happy with. In the entire article Mr Obama makes some comments and also, some European comments were also mentioned. Although one thing caught my eye, how Google and Facebook declined to comment. To me that doesn’t seem so unusual, if they did make any comments it may affect themselves and their site. I personally think it was the most sensible thing to do to stay out of politics!

Fairly the debate can go on and on but there will be no answer but just comebacks back and forth from Obama to Europe, everyone will always have their own opinions.

 

Bibliography –

http://www.ft.com/cms/s/0/41d968d6-b5d2-11e4-b58d-00144feab7de.html?siteedition=uk#axzz3TRtWYZBW

Make a commentAppreciate this

Website I came across.

By: natasha_fulton

http://www.digitalcameraworld.com/2015/03/01/9-creative-photo-ideas-try-march-2015/

9 creative photo ideas to try in March.



(Image taken from digital camera world website)
 

Make a commentAppreciate this

Web Ethics, Identity and Privacy.

By: Zahid Tapas

In week 4 we covered topics which nearly every person around the globe can relate too, Web ethics, identity and privacy. Let me start by explaining what I mean by ethics. The oxford dictionaries definition of the word ethics is the moral principles that govern a person’s behaviour or the conducting of an activity (Oxford Dictionary 2015). Web ethics is all about moral principles and a person’s behaviour whilst they are online and using the web. Identity and privacy link well together as they are both about information about a person and how secure it is.
In the lecture we started with a question which was both simple and complex. Who owns the internet? Some people say no one owns the internet, it is an experience which is enjoyed by all no matter where they are in the world and the President of the United States has come out in various newspaper articles trying to claim ownership over the internet. My view is one which is very simple, the internet is owned by the people, as if it wasn’t for the people using the internet there would be no internet. Mr Obama is doing what he does best, claiming ownership over things which do not belong to him or his country.

This leads me onto the topic of web ethics, identity and privacy. What is acceptable on the web; what is not acceptable on the web? People use the internet for various reasons that mean everyone will have different views on ethical practice. A large number of personal data which contribute to a person’s identity is being stored online and more information is being added daily. Does this lead to privacy concerns? Yes, but do people realise how dangerous having excess data about them on the web can be? I don’t think they do. One example of this is the iPhones finger print scanner. Reports in the media suggest that Apple are in partnership with the NSA and are leaking sensitive and private data about people including their fingerprint to them which is a breach of privacy (CNN 2013).
However we cannot just blame organisations for internet fraud and the lack of privacy. We have to take blame too, whilst I was sat in lecture I was asked how many times I read the terms and conditions of a website and truthfully I can’t think of a time where I have read them, so now I ask you, do you ever read the terms and condition of a website? Do you know what they can and cannot do with your data? Are you making yourself vulnerable to ID theft or fraud?

Over 221,000 confirmed frauds were identified during 2013. Higher than fraud levels recorded in 2008 and 2010. Identity crimes where fraudsters use a person’s identity data to impersonate them (identity fraud) or hijack an individual’s existing account still accounted for over 60% of all frauds. (Cifas 2014).
So, the internet is owned by the people, not everyone likes to be ethical when they are on the internet and be more aware of the data you are submitting to the internet, have you read the terms and conditions?

 

 

 

 

Bibliography
1. Oxford Dictionary, Ethics – definition of ethics [Online], Available from - http://www.oxforddictionaries.com/definition/english/ethics
2. CNN, How secure is your iPhone 5s fingerprint? [Online], Available from- http://edition.cnn.com/2013/09/12/tech/mobile/iphone-fingerprint-privacy/
3. Cifas, Cifas – fraud trends 2013 [Online], Available from - https://www.cifas.org.uk/twentythirteen_fraudtrends

Make a commentAppreciate this

Blog 1 - Week 4 & 5

By: BTB535

Week 4 Lecture

In week 4 our lecture was based on ethics, identity and privacy. One of the first activities we had undertaken was to discuss in pairs about what kind of behaviour to expect from people when you communicate with them on a social network. When we had discussed this my partner and I both agreed that we would be expecting the same type of behaviour when communicating to the person face to face, however we both realised in some circumstances this is not the case, and this is what would lead to the problem that social media sites currently have which is cyberbullying. 

What we looked at next was "Who owns the internet". I believe the internet is owned by the users, there are debates which say the Americans own the internet and others who say the EU however as all users have the ability to create internet pages so I don't feel as if the internet is controlled by just one country. 

We also talked about our Digital Identity. Our digital identities are very spread out as we do not realise how much our digital identity spreads over time. I personally did not realise until we had the activity of making our digital footprint, this showed how many sites I had signed up to etc. and I personally did not realise how big it was. When we discussed this we started to realise how easy it is to give our details up when signing up to a site. This lead on to privacy for example when ordering online you are inserting your details and this is all getting added to a database. Everyone is on a database whether it be through your passport or other forms of Id such as a licence. The UK holds almost 10 million DNA sample, which is the world's biggest database (Gene Watch) and from this we discussed whether the information belongs to you. I believe the information does belong to you until you give it away, for example giving your personal details away on a website in order to purchase something. 

Week 5 Lecture

In week 5 we discuess Data Capture technology such as Chips, QR codes, Speech recognition and Electronic Data Interchange. I personally as a user of some of this Data Capture Technology was very interested in this part of the topic, for example speech recognition on iPhone is very handy when busy as the phone captures what I say and writes it down for me, however it does have it limits, which we were discussing such as you need to communicate correctly and in an understanding manner when talking to insure it picks up what you are saying.

However I do not use a debit card with chips in for it to be a touch and go. This is a very handy tall and can be used everyday however i think the negative to this is that people can lose the cards and they can fall into the wrong hands and this can allow other people to take advantage and use the smart card.

We also covered Electoronic Information Services and how they are run, looking into the computer systems which are used for them to run. Electronic information services are used for many different things for example travel it helps show Bus, Train and Flight times of departures and arrivals. We looked into in all 5 parts which are Hardware, Software, Datebases, Telecommunications and Networks. To end the Lecture we were in groups and discussed the systems which are needed in order to gain the information.

References

GeneWatch UK. Retrieved 3rd March 2015 - http://www.genewatch.org/sub-539478 

 

Make a commentAppreciate this

Blog 1 - Weeks 4 & 5

Blog 1 - Weeks 4 & 5

By: gustavoreguero

Week 4 – Lecture

On our 4th week of Principles of System Development, the lecture were focused on Ethics in relation to the WWW, Digital ID, Privacy and Fraud and Digital Footprints.

The lecturer first discussed with us if we expect people to have moral principles and/or act according to some rules of behaviour on the web and if the expectations are met. We were also given a question to work in pairs about what kind of behaviour we expect from those we communicate with and whether they have the same behaviour on real life situations and online situations. I personally believe that we all must show respect and act morally, however the idea of morals might be different for some, which can lead to cyberbullying on social networks.
After, we moved to the following question: Who owns the internet? – We discussed this topic briefly. Some say that the Internet is American, some say it belongs to EU. I expressed my opinion saying that I think that the Internet does not belong to anyone, it belongs to everybody. Websites can be stored on servers anywhere in the world, which can also be hosted by anyone.
Next, the topic was about our Digital I-dentity and that data is increasingly converging. It was discussed how many forms we fill in to create different accounts to access different apps and websites, and that all of this information is stored and difficult to control. A question asked by the lecturer, raised on us awareness about how easily we give information up about ourselves by not reading the Terms and Conditions (T&Cs) properly and agreeing with it. This links to the next topic: Fraud and Privacy.
Every citizen has your information stored on databases. For example, NHS, passport, driving license, social network, TV license and so on. In UK, almost 10 million DNA samples are held (GeneWatch UK). Some people are concerned with their privacy, and some argue that the information about them is their own property. On class, I argued that it is ours until we give it away willingly.
Those with privacy concerns are not overreacting on my opinion. Once the information is there, anyone can see it. According to CIFAS (2014), fraud levels decreased in 2013 by 11% compared with the same period in 2012. However, it is still higher than the levels recorded in 2008 and 2010. In 2013, over 221,075 fraud cases recorded by CIFAS, 108,554 of them were Identity Fraud, which include cases of false identity and identity theft. After some discussion on the topic, we moved to the last part of the lecture: Digital Footprints.
The class was given an exercise to right down everything we have an account with and then compare with each other to see the accounts we don’t have in common.  

 

Week 5 – Lecture

During the lecture of the 5th week, the topics discussed were Data Capture, Computer Systems and Management Information, with some group work followed by feedback.

The first topic was data capture technologies and the alternative methods to input data in some form rather than using a keyboard. The alternatives discussed were Chips (a microchip on a card or an RFDI chip), QR codes, Speech recognition and Electronic Data Interchange (EDI). Chips are the most common method between these, as the majority of people use credit and debit cards to make payments. Also, the contactless technology on the RFID chips is becoming more popular each day, argued by some students to save time when you are in a rush.  Quick Response codes (QR codes) are a type of two-dimensional barcode that can be read using smartphones and dedicated QR reading devices, that link directly to text, emails, websites, phone numbers and etc. Speech recognition, loved and hated by many. I personally think that this technology doesn’t work well most of the time, not being able to understand what you say, especially on crowded places. However, it is very helpful for those who have some type of disability, it also very helpful in cars, where people can’t use their phones but has to make a call or something.  We also talked about the electronic information services, which are used for information displays and how it helps with travel information at train stations, motorways and airports.

Computer systems has five parts: Hardware, Software, Database, Telecommunications and Networks, which are configured to collect, manipulate, store and process data into information. After discussing briefly each point in question, we moved to management information. What is basically the way you manage the data collected by a computer system to enhance decision making. Decision making has 3 levels:

http://tutor2u.net/business/images/decisionmaking_intro.gif( tutor2u)

It was also discussed the formats in which management information can be reported, formats such as: Analysis report, Key Target Report, Ad-hoc report and Graphical presentation. We conclude the topic by moving to a group exercise, which we had to consider different forms of transportation in the local region and identify the corresponding types of public information, also try to identify the number and type of computer systems that are needed to run these systems. The session was finished with the groups presenting their respective answers in front of the class.

 

 

 

Reference List

  1.      GeneWatch Uk. The UK Police National DNA Database. Retrieved 4th March, 2015, from http://www.genewatch.org/sub-539478
  2.      CIFAS, 2014. Fraud Trends 2013. Retrieved 4th March, 2015, from https://www.cifas.org.uk/twentythirteen_fraudtrends
  3.       tutor2u. Oraganisation - Decision-making in business. Retrieved 4th March, 2015, from http://tutor2u.net/business/organisation/decisionmaking.htm

Make a commentAppreciate this (2 People appreciate this)

Blog 1 - Week 4 & 5

By: bradcounsel

Bradley Counsel                                

Blog 1 – Weeks 4 & 5

 

Lecture (Week 4)

During week 4 ethics, identity and privacy are the main topics of the lecture which were discussed. We were given a few activities and questions in which we could confer  in our pairs to come up with an overall conclusion about what we expected the rules of behaviour to be when on the web and whether these certain expectations had been met and whether they were the same as in real life situations.  For example when you are talking to somebody on Facebook or a social networking site would you expect them to talk to you the same as they would when confronted face to face.  I expressed my opinion on this subject stating that on the web I would still expect someone to communicate with me in the same way however this is not always the case as social media has led to things such as cyber bullying. We discussed this topic in further detail then moved on to the next topic about our digital identity and thought about how many times most people actually give away their personal details and how easily we give these away to sign up for an account without even reading the terms and conditions of the actual website. Then finally we had a conversation about privacy and how every single person has some sort of file on database for example passport or driving license, not only this the UK also holds almost 10 million DNA samples, which is the world’s largest database (GeneWatch Uk). We discussed this briefly as well as the number of identity frauds in which CIFAS recorded and concluded this by moving on to the topic of our digital footprint and making a list of all the things we use regularly which we have given our information to such as social networking sites, electronic purchases and various others.

Lecture (Week 5)

In the week 5 lecture we talked about the topics data capture, computer systems and management information. First we discussed the different types of data capture technology which is available for example such as chips, QR codes, speech recognition and electronic data then conferred about their uses and which limitations these have also, whether we thought that these things were helpful.  Personally I don’t tend to use any of these features as I don’t find them useful however different people may have more of a use for these certain items. I often find that things like speech recognition technology does not work as well as it should and often cannot understand what you are telling it to, with it only being able to understand a variety of demands which means you need to make sure you communicate by saying the correct things. The next thing we talked about was electronic information services and how they are helpful for example travel information for train departure and arrival times.  We discussed these few things in a bit more detail then moved on to a group activity in which we conferred together about the different forms of transportation in the area and the type of computer systems which are needed to run these certain systems which we then presented in front of the whole class.

Reference List

1.       GeneWatch Uk.  Retrieved 3rd March 2015 from http://www.genewatch.org/sub-539478

Make a commentAppreciate this (1 person appreciates this)

BLOG TEST 2

By: freenia91

THIS IS A TEST BLOG!!!!!

Make a commentAppreciate this

Assessment 1 - Blog 1

By: Mohannad

Lecture

In week four, we had an introduction to principles of systems development lecture. We learnt the difference between IT and IS. For IT, I have learnt about technological infrastructure (i.e. PCs, laptops, mobile devices and specialist devices). For IS, I have learnt many things for example, the nature and architecture of ISs, how the IS is crucial to organisation, security and resilience of the system, design and development of the systems and also impact on society. We had a conversation in seminar about how can we define enterprise 2.0 for example how does it impact on our daily life and what are the positives and negatives. We had a discussion about ethics and WWW. Ethics are a system of moral principles and “application of ethical values to business behaviour. Ethics is relevant both to the conduct of individuals and to the conduct of the organisation as a whole. Ethics goes beyond the legal requirements for a company and is, therefore, about discretionary decisions and behaviour guided by values”. (Institute of Business Ethics, 2012).

We had a conversation about who owns the internet, some students said the Americans and some said the Europeans. For myself, I said the Americans because the internet headquarters is located in America. We have talked about ID fraud, e.g. how the fraudsters can use your details bank account, obtain credit card and obtain genuine documents such as passport and driving license. We did an individual task about our digital footprint, with some apps that we use in our life in it (such as YouTube, facebook, twitter, WhatsApp and Vibar).  

In week 5, we had an introduction about computer systems, for example understanding the relationships of systems to the WWW. We had a discussion about data capture technology for example; RFID chip provides a unique identifier for that object - just as a bar code or magnetic strip must be scanned to get the information; the RFID device must be scanned to retrieve the identifying information.

We also talked about how Speech recognition has the ability to identify spoken words and phrases to identify a person or to convert their speech to text. We also had a conversation about data capture for example due consideration of the origins of the documents(s) that need to be captured must happen, to see if the documents are available in their original electronic format which, has the potential to massively increase data capture accuracy and remove the need for printing and scanning. We had a discussion about EDI. “Electronic Data Interchange is the computer-to-computer exchange of business documents in a standard electronic format between business partners”. (EDI Basics, 2015).  Also, we talked about the five important parts such as hardware, software, database, telecommunications and networks of a computer system. Together they are configured to collect, manipulate, store, and process data into information. We discussed the difference between internet and intranet. The Internet provides a variety of information and communication facilities around the world. An Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.

 

Reference List

 

·         Institute of Business Ethics. (2012). Frequently Asked Questions. What is business ethics? Retrieved from http://www.ibe.org.uk/frequently-asked-questions/3#faq273.

·         EDI Basics. (2015). Frequently Asked Questions. What is EDI? Retrieved from http://www.edibasics.co.uk/what-is-edi/.
 

Make a commentAppreciate this

Week 4 & 5 Lectures

By: emmanuel.ade

Lecture Week 4 Lecture 

Topics covered includes Web Ethics, Identity and Privacy. We was to discuss and conclude amongst our peers what we expect from those we communicate with and proprietors of the social network i.e. Facebook, I would expect the person I communicate with talk to me as they would face to face.  my opinion is that I will like the person I speak to on the web to speak in the same manner as when talking face to face. As cyberbullying has had an impact over the years I wouldn’t like the person I interact with online to be like the people that partake ethics like this.  

We learnt of Digital identity and how it's difficult to control when all our details are stored in a database where third party company and hackers can gain access, an example of what happens in this case is showed in a video clip, (Pizza Palace,Scary Pizza, 2009).   

We moved on to privacy briefly discussing how every citizen in the United kingdom had a file on databases including NHS, Driving License and Passports as the UK holds almost 10 million DNA samples making it the worlds biggest database, (Genewatch). The CIFAS recorded 111,505 frauds activity within 6 months, this includes Credit Card and now communication product such as smart phones and iPads are being targeted for Identity fraud. Furthermore we all have digital footprints which increases when we log on. on a A4 paper we list all our digital footprint i.e. Facebook, Netflix and others, we was to conclude what would we do if online information we thought was private became public. My opinion was to report the issue to the administrator or cyber security to resolve the issue. Facebook to launch social network for cyber security experts  

  

Lecture Week 5 Lecture 

We covered Computer system this includes; Data capture, Computer System and Management Information. Data capture is an alternative way of inputting data without the use of a keyboard.  

Chips (microchip on card or an RFID chip), I use this technology to pay when I purchase in store, it speeds up paying method and reduces queue.   

QR codes found on billboard, I don’t find this technology useful as an app download is required to scan the code to open websites. I would rather type the website myself because its faster.   

In our peers we confer on Speech Recognition, it allows you to dictate command to a device and it carries out the action, this can be very fast and helpful when running or driving you can dictate command to your phone without paying attention to it. Speech recognition has limitation; lack of effectiveness, it doesn’t always understand accents and there are errors when dictating commands it doesn’t function well. I personally don't use this technology I think it’s a waste of time unless perfected. We discussed the EDI Technology which allows customers to input data and receive satisfactory data, example being the electronic information system i.e. travel information at train stations, motorways or airports, EDI technology gives accurate data we conclude as peers we all use this technology. I personally use this when traveling to check arrival times for trains or busses, I find it very accurate. Lastly we did a group exercise on transportation in out local area and identify the number and type of computer system that are needed to run this system.  

 

Reference 

  • Acluvideos 15 Jan 2009 Scary Pizza Pizza Palace {online} Assessed on 03/03/2015 

 

 

 

 

Make a commentAppreciate this

Sample Blog

By: freenia91

This is a sample blog, to check the linkage.

Make a commentAppreciate this (5 People appreciate this)

CV - Natasha Parsons

By: natashaparsons

NATASHA PARSONS CV            

Education:

2013 – Present:        The University of Salford
                                    BA (Hons) Photography

 

2012 – 2013:                        University for the Creative Arts, Epsom           

                                    UAL Foundation Diploma in Art and Design (Distinction)

 

2005 – 2012:            Nonsuch High School for Girls, Cheam


Grades for A-Level Exams:
Drama (B), English Literature (C), Fine Art (A)

 

                                    Grades for GCSE Exams:   

                                    Maths (A), English Language (A), English Literature (A*), Physics (B), Chemistry (C), Biology (B), Religious Studies (B), History (B), Spanish (B), Drama (A), IT (B), Art (A), Photography (A*)

 

 

Employment:

 

2014 – Present:        Customer Advisor at Schuh, Market Street, Manchester.
Whilst working at Schuh, I have developed great time keeping skills due to working in a fast paced environment. I have enhanced my ability to manage personal tasks and effectively meet deadlines and individual targets. I have also demonstrated skills of teamwork and flexibility whilst working at Schuh due to covering my colleague’s shifts and helping others if necessary.  

 

2011 – 2013:            Customer Advisor for the Decorative department at B&Q in Sutton.

                                    During my time at B&Q I developed a variety of skills such as decision-making and problem solving. I am able to identify options, evaluate them and choose the most appropriate course of action along with identifying and using an appropriate method or technique to arrive at a solution. I also have a wide range of product knowledge along with leadership skills such as dividing tasks up amongst my colleagues and being able to motivate others.

 

2010 – 2011:            Waitress at Post Restaurant, Banstead.

From October 2010 until it’s closure in April 2011 I worked at Post where I learnt the importance of uniform and presentation. I also demonstrated and developed skills in oral communication, which enabled me to give information and explain details effectively.

                                   

Summer 2010:          Tinies Childcare and House of Flowers, Sutton.
During the summer of 2010 I was employed by Tinies Childcare based in Sutton, and House of Flowers in Carshalton Beeches. For Tinies Childcare my duties were office based, including setting up databases and inputting information, whereas at House of Flowers I was involved in more creative work such as window dressing, flower arranging, and helping designing the logo for the florist itself.

 

Work Experience:

 

October 2010:           During October half term in 2010 I did a weeks work experience with the Graphic Design Company, Omnicolour. I was introduced to the industry, the contemporary art world, and the concept of creating work for clients and events.

I was able to learn about different types of large format printing, types of software and assisted Graphic Designers essentially create work.

 

Summer 2010:          During the Summer of 2010, I did 2 weeks work experience at my primary school, Seaton House School for Girls. I worked alongside the teaching staff, participated in activities, helped plan lessons and really got an understanding of the level of thought and organization that has to go into children’s education.

Interests:

 

Student Rep:              I have been a student rep since September 2014 for my course. I discuss issues that classmates have with the course and address these problems with members of staff so that changes are made, and the quality of education is guaranteed.

 

Volunteering:             In June 2011 I volunteered at the Surrey Youth Games held at Surrey Sports Park. The children who were participating had a range of disabilities such as Autism and Down syndrome.

 

                                    In 2012, I travelled to Costa Rica with an organization called Outlook Expeditions. Previously to the trip, I had to raise money, which I did by washing cars, bake sales, cleaning jobs etc to contribute to the budget for the group for the entirety of the trip. Whilst in Costa Rica, I helped build a school, worked with children, trekked through the rainforest and helped rescue turtles.

 

Stagecoach:                From the age of six, I was a weekend student at Stagecoach Performing Arts School. I regularly performed at Fairfield Halls, NEC Birmingham and Her Majesty’s Theatre, London.

 

Photography Skills:

 

Postproduction skills

Studio experience

 

 

Make a commentAppreciate this (3 People appreciate this)

Nice to meet you!

By: Nuttersons

Hello Creative Hive,

 

We're Nuttersons - a young, ambitious digital creative agency based in the heart of Manchester.

We are constantly recruiting graphic designers, illustrators, videographers, social media managers, developers and loads of other creative heads to keep our company thriving.

 

Please don't hestitate to get in touch with us or find out more about our opportunities at www.nuttersons.co.uk/adventure

 

 

Make a commentAppreciate this (6 People appreciate this)

Lay the first online stone with a smashing website from Logo Design Best

By: davidwatsons

Your online business position depends on how good or bad your website is. Everything revolves around how you have portrayed your business in the online market; how you have set your business apart from your competitors in astonishing ways; how you applied and implemented strategic techniques to do it all in style and fashion? Your website speaks about your business; therefore it solely depends on you if you are setting a positive or a negative business impression on the potential and current customers.

Your first online impression counts too so make it valuable and worthy enough to create a positive and favorable impression on your target customers. Save your business face and set a promising brand identity with a professionally creative, astonishingly outstanding and top-quality website. Do not make hurried and rushed decisions and invest on free website builder because such software doesn’t give you a promising professional website. Save your time and cost with professional website design and development team of none other than Logo Design Best.

Today the business environment calls for a competitive and strategic technique from every business step you take. Therefore, make wise decisions and do not lose your online business foundation before building it up. Give your website a convincing, valuable, promising, credible and interactive website so that you set a promising business image in the very first impression. If not till now, then it is high time you must lay the first stone for your business online growth and success with a smashing website which is not promised by any free website builder but the professional team of Logo Design Best. Call NOW on the TOLL FREE number 1-888-311-0256 or visit the website

Make a commentAppreciate this (7 People appreciate this)

How does photography influence our view of the world

How does photography influence our view of the world

By: helenburtphoto

 

This essay will discuss how photography influences our view of the world in relation to documentary photography. I will be concentrating on two photographers who document life in prison, Edmund Clark and Richard Ross. ‘Still Life: Killing Time’ is a series of work by Clark taken at Kingston Prison in Portsmouth which for eight years, was home to twenty-five elderly men serving life for murder, rape, child sex offences and other offences of violence (Brook, 2009). ‘Juvenile In Justice’ by Ross documents the “treatment of American juveniles housed by law in facilities that treat, confine, punish, assist and occasionally harm them.” (Ross, 2013, para. 1)

 

My experience studying and shooting documentary photography has led me to believe that the genre’s central focus is exploration and exposure. Producing a photographic account of a specific way of life allows an artist to venture out of their comfort zone in order to provoke a reaction and make a positive change. “Documentary photography is rightly thought of as an art when it manages to aesthetically transform the human evils it depicts into valuable meaning.” (Friday, 2000, p.358) It is necessary to have a purpose and passion for change behind each image. A camera can be used as a tool to aid understanding of and gain access to a culture unknown. Wells (2013) explains how “the activity of framing, of rendering the world pictorial, becomes a method of avoiding direct engagement with that which might be unsettling, whether sublime aspects of the natural world or encounters with cultural otherness.” I disagree this statement, as it is not possible to stay hidden behind a camera; a relationship is always formed between the photographer and subject. Both Ross and Clark have been left with strong emotional attachments to the people, situations and environments that were involved with their shooting.

 

Photographer and professor Richard Ross documented over three hundred juvenile detention facilities in thirty states across the United States over a five year period. (Fritz & Brown, 2012, para. 1) The resulting publication, ‘Juvenile In Justice’ exposes the flawed ideology on child punishment in the United States and has been used as an aid to change national policy. Ross explains the importance of negotiation and connections in order to gain access into such highly guarded institutions.  In an interview with Penn State University, Ross also reveals how he builds relationships with his subjects:

 

“I have discovered that the best way to get access to a kid is to sit on the floor of an eight by ten cell and spend half an hour with the kid above me, so that they have the authority and the power to realise that I am not the tall, old, white guy who is giving them instructions.” (2012)

 

Each photograph in the book has a story and each story provokes a strong emotional reaction.

 

­­Brook describes how the image above shows dorm room six of the Hale Ho’omalu Juvenile Hall in Honolulu, Hawaii. This boy who has been in and out of foster care all his life, committed residential burglary in seventh grade and has since repeatedly violated with petty actions like missing meetings or truancy. His father was deported to the Philippines and his mother is a drug-user. The only person who visits him is his YMCA drug counsellor (2013).

 

Ross has photographed this subject with the intention of portraying his situation as unjust. The image is taken from a high angle and almost mimics a CCTV still, which aids the viewer’s understanding in that this is a highly controlled environment. The shot has been cleverly framed; the windows have been cropped to highlight the separation from the outside world. The graffiti on the empty beds tell a story of immense boredom and isolation. This is unnatural for a viewer to witness as normality expects a child to be surrounded by a loving family or materials to aid learning and development.

 

Ross holds a strong view that the United States has created a set of procedures that criminalise, demonise and incarcerate juveniles when the majority of them are being normal teenagers. A lot of the children featured in the series have emotional and mental health needs that are not being addressed or come from poverty or unsupervised homes (2012). Everyone is the way they are for a reason, these youths are perceived to be horrendous and demonic when often it has not been taken into account what they have had to endure in their past.

 

Brook explains how the photograph above documents the Orientation Training Phase (OTP), part of Youth Offender System Facility in Pueblo, Colorado. OTP performs intake and assessment of convicted children and it operates like a boot camp. All of the children here have juvenile sentences with adult sentences hanging, meaning that if they fail in the eyes of the authority they will have to serve their adult sentence (2013).

 

As all the subjects were minors, it was protocol for their faces to be blurred, however Ross had a deeper reason for obscuring their identities: “I wanted to generalise, so that it was not just a caricature of that kid. You could see about the age of the kid, the gender, the race but you could empathise and you could relate more to all the times we screwed up when we were teenagers.” (Ross, 2012)

 

The use of colour in this photograph is effective; yellow is often used to symbolise warning which reflects the possible consequences if these juveniles fail to impress the authorities. Ross has positioned the officer in the foreground to represent his authority and power; the children are pushed behind as they have their rights and freedom stolen from them. The footprints work by creating an aesthetically pleasing pattern but also demonstrate the regimentation within the facility.

 

“Photographs furnish evidence. Something we hear about, but doubt, seems proven when we’re shown a photograph of it.” (Sontag, 1978, p. 5) Ross is trying to give evidence as to who these children are in order to allow policy makers to make an influential change. He describes how he is already making progress as a sentence subcommittee have used his images as part of a discussion on federal legislation to prevent pre-trial juveniles from being housed with kids who have committed serious crimes. “While awareness is certainly great, we are turning the gallery into a laboratory for social change.” (Ross, 2013, para. 7)

 

Edmund Clark traces ideas of shared humanity, otherness and unseen experience through landscape, architecture and the documents, possessions and environments of subjects of political tension (Biography, 2013). ‘Still Life: Killing Time’ contains photographs of twenty-six elderly life prisoners who inhabit HMP Kingston in Portsmouth.

 

Unlike Ross, I do not believe that Clark intended for his viewers to feel compassion for his subjects, neither do I think he produced a body of work in order to provoke a change in prison policy. “I am not seeking to evoke sympathy for the prisoners who are, it must be remembered, guilty of some terrible crimes, but I am seeking to evoke the nature of their experiences.” (Clark, 2010)

 

The work was originally going to be a set of portraits of the prisoners but the more Clark worked in the environment, the more he became interested in the spaces around them (2010). I enjoy most, the photographs of the personal spaces within the prison; they talk about state of mind and the idea of disorder within an ordered environment.

 

The image above shows the power of text within a frame as a tool to set context; without the instructions, this photograph would have much less of an impact. As a viewer we must assume that this particular prisoner has dementia; a syndrome that causes a loss of cognitive ability. The necessity for directions on going to the toilet causes us to believe that this man is having to deal with dementia alone, I cannot help but think that this is totally immoral, if a prisoner has reached the latter stages of dementia they should be entitled to some degree of nursing care.

 

“Looking at the spaces in the prison, I could see that there was an awful lot that spoke about time. In a prison situation that means the passage of your tariff. Also, given the nature of these people – very old men – maybe how much time they had left.” (Clark, 2010)

 

These photographs work as documents of the environment itself but also evoke something deeper about the experience of being in prison. They combine large format, colour documentary photography with still life painting. Clark (2010) describes how as he looked at the environment around the prison, he was reminded of the symbolism of still life painting, particularly Dutch, seventeenth century Vanitas painting where organization of objects evoke a deeper meaning. For Vanitas painting, it tended to be about the transits of earthly life in relation to God and the transits of earthly pleasures in relation to the divine pleasures. Clark emulated this technique by conveying messages through symbols. The flower in this image represents life and the card signifies love and relationships. Clark has been able to humanize the prisoner and has made the situation relatable to his audience. At the same time, this is quite obviously an art work; Clark has used lines of the window and blind to create a dynamic and ordered composition. The frames within the frame tease the viewer with a glimpse of freedom and normality.

 

Ross and Clark approached similar subject matters in totally different ways; Ross documented juveniles in detention facilities in the hope that it would reveal the problems with the system and start a revolution in prison policy. Clark however, learnt as he went along, taking inspiration from his surroundings to tell a story of the constrictions of space and time. Personally, I prefer the work of Ross; it has a purpose and the potential to change the world’s attitude towards child discipline.

 

Documentary photographic practice is put under a lot of scrutiny for portraying a false, biased world; “photography, it seems, is experiencing a prolonged crisis concerning not just its role of depicting the world around us – through portraiture, reportage or documentary – but its form and its function, its very meaning.” (O’Hagan, 2012) Although some works should be rightly questioned, this generalisation devalues the inspirational projects done by photographers like Ross and Clark. Photography is an art form that is able to heavily influence our view of the world for good and for bad, but will always be important as a component in aiding our understanding of different cultures and experiences. “Images have extraordinary powers to determine our demands upon reality and are themselves coveted substitutes for first-hand experience become indispensable to the health of the economy, the stability of the polity, and the pursuit of private happiness.” (Sontag, 1978, p. 153)

 

 

 

 

 

Reference List

 

Aspex Gallery (Producer). (2010). Still Life Killing Time – Edmund Clark [webcast]. Retrieved from http://vimeo.com/14422273

 

Brook, P. (2009) Still Life: Killing Time by Edmund Clark. Retrieved 23 December, 2013, from http://prisonphotography.org/2009/04/20/still-life-killing-time-by-edmund-clark/

 

Brook, P. (2013). Pop-up criminal record expungement clinic for juveniles in Philadelphia art gallery. Retrieved 23 December, 2013, from http://prisonphotography.org/tag/juvenile-in-justice/

 

Clark, E. (2013). Biography. Retrieved 23 December, 2013, from http://www.edmundclark.com/biography/

 

Davies, H. (2010). Edmund Clark: Still Life Killing Time. Retrieved 23 December, 2013, from http://www.somethinkblue.com/article_detail.php?article_id=211

 

Friday, J. (2000). Demonic curiosity and the aesthetics of documentary photography. British Journal of Aesthetics, 40(3), 358.

 

Fritz, M. & Brown, A. (2012, 2 February). Juvenile education: inside a confined world. PBS NewsHour. Retrieved from http://www.pbs.org/newshour/updates/american-graduate/jan-june12/richardross_02-02.html

 

Juvenile In Justice. (2013). What we do. Retrieved 23 December, 2013, from http://www.juvenile-in-justice.com/about-2

 

O’Hagan, S. (2012, 16 November). Photography: an ever-evolving art form. The Guardian. Retrieved from http://www.theguardian.com/artanddesign/2012/nov/16/sean-ohagan-photography-art-form

 

Penn State University (Producer). (2012). Richard Ross: Juvenile In Justice [webcast]. Conversations from Penn State. Retrieved from http://www.youtube.com/watch?v=vVnVNdHuOuU

 

Sontag, S. (1978). On Photography. London: Penguin Books Ltd

 

Wells, L. (2013). We Were There. In T. Stylianou-Lambert (Ed.), Tourists Who Shoot (pp. 7). Nicosia: Armida Publications Ltd.

 

1423495991-d1.jpg 1423496021-d3.jpg 1423496031-d4.jpg

Make a commentAppreciate this (7 People appreciate this)

My journey in photography

My journey in photography

By: jzphotography

My journey with photography has begun when I got my first film camera when I was a kid, I had the camera with me everywhere, photographing everything I seen and liked.

Make a commentAppreciate this (8 People appreciate this)

Logo Design Best Website Maker Team Guarantees an Effective Online Presence

Logo Design Best Website Maker Team Guarantees an Effective Online Presence

By: adamssmiths

Website is an all-rounder marketing tool for every business for it fulfils multi-purposes for the company. For instance, it gives out information about the company and its brands to the audience as understandable and compelling content. Another key purpose it serves: it attracts the visitors with business-relevant and audience-oriented theme and design. Website also has a role of delivering the call-to-action with such technique, convincing style and persuasiveness that the random visitor pays regular visits to the site and also becomes a customer to the company.

Everything mentioned above is possible with the professional, experienced and industry experts: the website maker team of Logo Design Best. For an effective website you need the technique and the creativity to serve the multi-purpose through one single website and that also without giving it a monotonous look, boring feel and non-engaging content and theme. The professional team effectively and efficiently digs through your business, target audience, brands and competitors to design just the right website for an effective and successful online presence.

Grab the opportunity to outshine your business in this competitive marketing environment with the website maker to design for you an amazing and smashing website, also with cost-effective and pocket-friendly offers. So, wait no more! Give your business a head start and a mega boost NOW. Call 0800-011-2191 or Local 0203 519 3540 TODAY to give your business the online look and feel it is worthy of!

Make a commentAppreciate this (8 People appreciate this)

Best 10 hours video

By: gustavoreguero

Make a commentAppreciate this (11 People appreciate this)

NEWYORK

NEWYORK

By: Ryan

NEWYORK

 

 

Make a commentAppreciate this (9 People appreciate this)

Music Video

By: soniahamied

Make a commentAppreciate this (9 People appreciate this)