I have decided to write my paper on the Ray Rice incident. I want to bring out the fact how women took a stand, as well as just in general how It went viral and how it is still on going.
Cover girl came out with a "game face" which had girls blackening one eye and wearing it to a game to stand against abuse.
Wednesday, October 22, 2014
Tuesday, October 7, 2014
How I want to Learn
I want to learn by being involved in the learning. I like activities, which are hands-on and
find that I learn best by doing. I like
being able to use and apply the skills I learn in real life situations. My preference is non-structured, spontaneous
presentations. Reading a book and
lectures are not things I really enjoy. I need lectures to grab my attention. I
have difficulty with routine and structured presentations. A minimal amount of
lectures is fine. Technology helps me
learn from power points, games, and videos. Having visual aid is when I learn
best. Having fun as in interacting with the teacher and being involved as a
class. I feel when the class is involved and we can all connect I not only
learn from the prospective of my teacher I learn from the perspective of my
peers. I learn better when I hear opinions from my classmates not just the
opinion of my teacher.
I want to learn in an atmosphere that is relaxed,
spontaneous, animated, active, humorous, interactive, and friendly. I appreciate supportive attention and
feedback. It is important that the
teacher values and respects my feelings. This is the way I want to learn.
Wednesday, October 1, 2014
How Your Identity is Stolen
Javelin Strategy & Research, reports that in 2012 identity fraud incidents increased by more than one million victims and fraudsters stole nearly $21 billion, the highest amount since 2009. The study found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 seconds.
- Open new credit card accounts in your name
- Hacking into a bank, credit union or credit card company database (data breach)
- Stealing bank or credit card statements from your mail
- Stealing your Personal Identity Number (PIN) at an ATM, gas station or grocery store
- Cloning credit card information at restaurants and bars where you swipe your credit and debit cards or hand them to servers who process the charge behind closed doors
- Theft of information from retailers, which may be low-tech, like grabbing a day's receipts, or high-tech, as when a hacker breaks into a store's customer rewards program database
- Dumpster diving - the act of going into people's garbage for pre-approved credit card offers, bank statements or other discarded material that may contain personal information
- Phishing - when a scammer sends an e-mail that appears to come from your bank or another legitimate company, asking you for personal information, such as your credit card or Social Security number
- Phishing scams may also be conducted by telephone, with an unknown caller claiming to represent your bank or credit card issuer
- Employees at an auto dealership or mortgage lender who steal consumer's personal data in order to access credit histories for identity theft purposes
https://www.javelinstrategy.com/news/1387/92/More-Than-12-Million-Identity-Fraud-Victims-in-2012-According-to-Latest-Javelin-Strategy-Research-Report/d,pressRoomDetail
You may already be aware of these common methods that criminals use:
Subscribe to:
Comments (Atom)