Tag Archives: EID100

Image Manipulation: From its history to its effects on society

Images play a major role in our lives. We are bombarded with advertisements on a daily basis as we ride the subway, read a magazine, watch TV and surf the internet. While it is a well-known fact that almost all digital images have been photoshopped before being published, their distortion still creates an unrealistic ideal standard. For our final project we began by mapping the history of image manipulation and its many uses, both positive and negative. We have investigated the negative effects image manipulation can have on today’s youth, and also presented a few pro-active campaigns, aimed to increase positive self-image. 

Group: Shelley Haines & James Burns

Audience: Students in Toronto who are in the last few years of high school. They are accustomed to using social media, but they do not know how to get the most out of it, nor do they know about many of the challenges or security issues that we have learned about in class.

Our final project: http://www.pinterest.com/eid1002014/image-manipulation/


Lightbeam: Uncovering third-party interactions

Lightbeam is a Firefox add-on that allows you see the third party sites that you interact with while you are on the web in real-time. In addition, Lightbeam reports  your relationship with these sites as well.  Today, I downloaded the app and monitored my activity. After just 20 minutes surfing online, Lightbeam shows revealed that while I only visited 12 sites, I was connected with 98 third-party sites!


As you browse the web, you are being tracked through “cookies” – which are essentially tiny bits of data that are stored onto your computer while you browse. When you return to the website, the cookies are sent back to the server to notify the website of your return and previous activity. In some respects, cookies can make your browsing more efficient, as it tailors relevant information based on your experience. However, the reduction in security through shared personal information is an obvious downside to cookies. As you have a private conversation, pay your bills and shop, third parties continue to collect your information – and it’s perfectly legal. Whenever you sign up for an account online you are agreeing to their term and conditions to allow the website and external sources to collect and share your information!

Find out who is watching you:


Final Project: Photo and Video Manipulation

For our final project we will be exploring the topic of photo and video manipulation. We will start by breaking down the image to its most basic form: the sign – that is, what the image stands for and the meaning we give it. For instance, the word rose stands for a prickly plant with petals and leaves. A few meanings we give to roses are love and romance. While this meaning is arbitrary, it is also culturally dependant. We will then discuss photo manipulation software, and finally, the negative effects these manipulations can have on our idealizations of our appearance. See our presentation below for more information on our final video.


Google Syntax: tips for getting the most out of your search


    1. How would you search for an exact word or phrase?
      “french press”
      Enclose the  word or phrase in double quotations to search for a specific string of words.
    2. How would you search for something on a specific site?
      bohemian site: http://style-files.com
      To search for specific text on a site enter your search content followed by “site: _____”
    3. How would you correctly search for a definition?
      define: debonaire
      Enter “define:” followed by the word you would like defined.
    4. How would you search for a specific product available within a specific price range?
      Cards Against Humanity $15..$25
      Separate numbers with two periods (..) to find results within a specific range, such as price, date and measurement. Use only one number with two periods to indicate a minimum or maximum, ex., “camera ..$500”.
    5. How would you search for a specific filetype?
      filetype:epub eat pray love
      Enter “filetype:” followed by a file type to search for matching keywords within that specific file type.
    6. How would you include or ignore words in your search?
      cloud -apple
      Use a minus sign (-)  before a word to exclude it from your search.
    7. How would you find related pages
      Use “related:” before a URL to search for websites with related content.
    8. How would you find a topic, searching all available synonyms of a word?
      home ~decor
      Use the “~” symbol before a word to find pages with the exact word, or words with the same meaning.
    9. How would you find the time in another country?
      time Italy
      Enter “time” followed by a country or city to generate the local time for that place.
    10. How would you find out how many Egyptian pounds you get for $20 Canadian dollars?
      20CAD in Egyptian Pounds
      Enter the  starting currency amount followed by “in” and then the desired currency. 


Mind Your Digital Manners


What is digital etiquette? First of all, what is etiquette? It’s a set of rules and codes that govern our social behavior. Etiquette reminds us to respect our elders, say “please” and “thank you”, and keep our elbows off the dinner table. More recently, our lives revolve around technology and the Internet. Digital etiquette takes the manners and politeness we’re accustomed to in other areas of life and applies them to the online world. In this post, I’ll outline some of the major doctrines of digital etiquette.

 If you wouldn’t say it to their face, you probably shouldn’t say it online.

You should think of your online persona as a mirror image of your offline persona – the way you conduct yourself in person should be the same way you conduct yourself behind your computer screen. Far too often, commenters online take advantage of the anonymity of the Internet and post harmful comments without having to own up to the repercussions. Unfortunately, the online outcomes of name calling and deriding hurt just as much.

Private isn’t private in cyber-space. 

It’s not enough to “private” a post or share only with your friends, because with enough money, computer knowledge, or government power, any information you post can be uncovered and shared. Before you post, ask yourself if your over-protective father or grandmother would approve. With 300 million photos uploaded to Facebook in a single day, your embarrassing photo could easily end up saved to someone’s desktop and shared with thousands of others. In other words, the hopes of removing all traces of your photo are slim.

Digital etiquette is evolving as fast as technology. Just as the on-the-street-call is no longer considered “faux pas”, condolence text messages will soon lose their shock value and become the expected response. Regardless, it’s best to stay ahead of the curve and avoid being caught with your elbows on the computer desk.

For more information on social media best practices: http://blog.laptopmag.com/put-down-the-phone-the-rules-of-digital-etiquette