Archive by Author | jjjvdmeulen

Dislike the “dislike” button

downloadEverybody knows the Facebook and (almost) everybody in the western world has a Facebook account. Everybody uses Facebook in a different way, to keep in touch with friends, to share photo’s, to peak at the lives of others and so on, but the main idea is simple “strengthen how people relate to each other” (Mark Zukerberg, 2015).

For the people who know and use Facebook probably the most known Facebook icon is the “like” button. Facebook made a statement this week that there working on a “dislike” button on the social media site. According to Mark Zukerberg the

quote “dislike” button is made because there was so many requests for it. According to Andrea Forte, Professor and expert in social and participatory media, “it will mainly be used to express mild disapproval, or to express solidarity when someone posts about a negative event like a death or a loss” (BBC, 2015). This is also what Mark Zukerberg think, but a lot of people, like Jennifer Guinyard, a social worker, think that the “dislike” button is going to be used in a negative way and that Facebook is promoting conflicts i.e. to Bully people.

According to Marcel Becker, professor ethics at the Radboud university thinks that the permissiveness disappears. People need to explain why they post something online. This is not the type of medium Facebook is and wants to be, he thinks.

Myself I agree with the statement of Ms Guinyard. I think that the advantages of the “dislike” button don’t are bigger than the advantages of the button. Bullying online is becoming a serious issue nowadays, with the controlling of online content becoming harder and harder for parents the amount of bullying online keeps increasing (Childline, 2015).

What do you think, does the “dislike” button is going to be used for its intended purpose, to pay respect to others or comment on some negative post which you dislike, or is it going to be used for bullying and other online conflicts?

http://time.com/4035551/facebook-dislike-button-zuckerberg/

http://prosperosworld.com/mark-zukerbergs-ipo-letter-describing-facebooks-purpose-values-social-mission/2012/

http://www.bbc.com/news/technology-34264624

http://qz.com/503361/facebooks-dislike-button-is-going-to-be-a-disaster/

http://www.trouw.nl/tr/nl/5133/Media-technologie/article/detail/4143698/2015/09/16/Met-een-dislike-button-verdwijnt-de-vrijblijvendheid.dhtml

https://www.dosomething.org/facts/11-facts-about-cyber-bullying

https://www.childline.org.uk/Explore/Bullying/Pages/online-bullying.aspx

The new traffic dangers: car hacking

vehicle_hacking

It started as an trend in luxury the luxury car business but nowadays more and more cars don’t have an key anymore. The door isn’t opened and closed by a key anymore and the engine doesn’t starts with a key but with a button. The technology transformation in the car industry is taking on a next level. More and more cars of every class are equipped with new technology, a technology very popular in the automotive industry is internet. But is internet technology safe?

“When a car is connected to the internet it becomes a computer on wheels” and computers can be hacked. There are numerous of examples of cars getting hacked and some of them led to dangerous situations on the road. Hackers for example hacked a JEEP on the highway. The car was doing 70 mph when others shut it down. They could control a lot of systems in the car like the air control system, wipers etc (Wired, 2015).

Because the systems that use internet are more and more integrated with the other systems, hacking a car becomes a real treat. Cars and trucks are important for our everyday life, they supply stores and deliver packages, bring people to work, a lot of people are dependent on their car. This makes cars and trucks interesting for hackers.

To protect cars against the treat of hackers they need a system that is updated frequently like a computer system, this way the system can be protected against newly discovered flaws in the system. The system with the internet access needs to be separated from essential functions like acceleration, breaks and the lights, or the communication between the systems needs to be controlled and minimized. The manufacturer needs to secure each software component so that access to all system at once is impossible.

Besides the steps that can be taken by manufacturers within the car, outside the car some manufacturers like Tesla are also trying to identify problems before they exist. Tesla launches the “Bug Bounty” program. Via this program they ask hackers to find the weak spots or flaws in the system before others do.

Not everybody agrees with the treat of car hacking, some people think the treat is exaggerated, but I think it is a real issue and the automotive industry should pay attention to the cyber security of cars.

http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

http://techcrunch.com/2015/09/12/to-protect-cars-from-cyber-attacks-a-call-for-action/

http://www.vice.com/video/how-to-hack-a-car

http://www.forbes.com/sites/dougnewcomb/2015/02/09/60-minutes-joins-car-hacking-hype/

http://www.forbes.com/sites/thomasbrewster/2015/06/04/tesla-1000-bug-bounty-but-no-cars/