Wednesday, October 22, 2014

Game face!

I have decided to write my paper on the Ray Rice incident. I want to bring out the fact how women took a stand, as well as just in general how It went viral and how it is still on going.

Cover girl came out with a "game face" which had girls blackening one eye and wearing it to a game to stand against abuse.

Tuesday, October 7, 2014

How I want to Learn

         I want to learn by being involved in the learning.  I like activities, which are hands-on and find that I learn best by doing.  I like being able to use and apply the skills I learn in real life situations.  My preference is non-structured, spontaneous presentations.  Reading a book and lectures are not things I really enjoy. I need lectures to grab my attention. I have difficulty with routine and structured presentations. A minimal amount of lectures is fine.  Technology helps me learn from power points, games, and videos. Having visual aid is when I learn best. Having fun as in interacting with the teacher and being involved as a class. I feel when the class is involved and we can all connect I not only learn from the prospective of my teacher I learn from the perspective of my peers. I learn better when I hear opinions from my classmates not just the opinion of my teacher.

         I want to learn in an atmosphere that is relaxed, spontaneous, animated, active, humorous, interactive, and friendly.  I appreciate supportive attention and feedback.  It is important that the teacher values and respects my feelings. This is the way I want to learn.

Wednesday, October 1, 2014

How Your Identity is Stolen


Javelin Strategy & Research, reports that in 2012 identity fraud incidents increased by more than one million victims and fraudsters stole nearly $21 billion, the highest amount since 2009. The study found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 seconds.
  • Open new credit card accounts in your name
  • Hacking into a bank, credit union or credit card company database (data breach)
  • Stealing bank or credit card statements from your mail
  • Stealing your Personal Identity Number (PIN) at an ATM, gas station or grocery store
  • Cloning credit card information at restaurants and bars where you swipe your credit and debit cards or hand them to servers who process the charge behind closed doors
  • Theft of information from retailers, which may be low-tech, like grabbing a day's receipts, or high-tech, as when a hacker breaks into a store's customer rewards program database
  • Dumpster diving - the act of going into people's garbage for pre-approved credit card offers, bank statements or other discarded material that may contain personal information
  • Phishing - when a scammer sends an e-mail that appears to come from your bank or another legitimate company, asking you for personal information, such as your credit card or Social Security number
  • Phishing scams may also be conducted by telephone, with an unknown caller claiming to represent your bank or credit card issuer
  • Employees at an auto dealership or mortgage lender who steal consumer's personal data in order to access credit histories for identity theft purposes

https://www.javelinstrategy.com/news/1387/92/More-Than-12-Million-Identity-Fraud-Victims-in-2012-According-to-Latest-Javelin-Strategy-Research-Report/d,pressRoomDetail

You may already be aware of these common methods that criminals use: