Thursday, April 1, 2010
Sunday, March 28, 2010
Potential Schedule
Physical - Have All Information Processed. At least one Flyer Laid Out
Digital - Have Website Minus Flash Working
April 9th -
Physical - All Flyers Done, Rough Layout of Digest Mailer, Confirm Shirts for Production
Digital - Flash Gallery / Check Search in Progress. Have at least one catergory laid out and figure out Searching and Methods of Scrolling.
April 16th -
Physical - Shirts made, All Physical materials laid out and dummied. Finalize and produce.
Digital - DEBUG and REVISE
April 23rd- Everything is DUE!
Tuesday, March 2, 2010
How To Protect Yourself Content
It’s hard to know in this day and age. It’s wise not to be open with your information, but you can’t help but expose yourself to risks everyday.
Deter
Treat your trash and mail carefully
To thwart an identity thief who may pick through your trash or recycling bins to capture your personal information, always shred your charge receipts, copies of credit applications, insurance forms, physician statements, checks and bank statements, expired charge cards that you're discarding, and credit offers you get in the mail.
Be on guard when using the Internet
The Internet can give you access to information, entertainment, financial offers, and countless other services but at the same time, it can leave you vulnerable to online scammers, identity thieves and more.
Verify a source before sharing information
Don't give out personal information on the phone, through the mail, or on the Internet unless you've initiated the contact and are sure you know who you're dealing with. Identity thieves are clever, and may pose as representatives of banks, Internet service providers (ISPs), and even government agencies to get people to reveal their Social Security number, mother's maiden name, account numbers, and other identifying information.
Before you share any personal information, confirm that you are dealing with a legitimate organization. Check an organization's website by typing its URL in the address line, rather than cutting and pasting it. Many companies post scam alerts when their name is used improperly. Or call customer service using the number listed on your account statement or in the telephone book.
Detect
Stay alert for the signs of identity theft, like:
- accounts you didn't open and debts on your accounts that you can't explain.
- fraudulent or inaccurate information on your credit reports, including accounts and personal information, like your Social Security number, address(es), name or initials, and employers.
- failing to receive bills or other mail. Follow up with creditors if your bills don't arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.
- receiving credit cards that you didn't apply for.
- being denied credit, or being offered less favorable credit terms, like a high interest rate, for no apparent reason.
- getting calls or letters from debt collectors or businesses about merchandise or services you didn't buy.
How do you find out if your identity was stolen?
Unfortunately, many consumers learn they their identity has been stolen after some damage has been done.
- You may find out when bill collection agencies contact you for overdue debts debts you never incurred.
- You may find out when you apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan.
- You may find out when you get something in the mail about an apartment you never rented, a house you never bought, or a job you never held.
What personal information should I monitor regularly?
Early detection of a potential identity theft can make a big difference. Keep an eye out for any suspicious activity by routinely monitoring:
Your financial statements. Monitor your financial accounts and billing statements regularly, looking closely for charges you did not make.
Your credit reports. Credit reports contain information about you, including what accounts you have and how you pay your bills. The law requires each of the major nationwide consumer reporting agencies to provide you with a free copy of your credit report, at your request, once every 12 months. If an identity thief is opening credit accounts in your name, these accounts are likely to show up on your credit report. To find out, order a copy of your credit reports.
Once you get your reports, review them carefully. Look for inquiries from companies you haven't contacted, accounts you didn't open, and debts on your accounts that you can't explain. Check that information, like your Social Security number, address(es), name or initials, and employers are correct. If you find fraudulent or inaccurate information, get it removed.
Defend
What are the steps I should take if I'm a victim of identity theft?
If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of all correspondence.
1. Place a fraud alert on your credit reports, and review your credit reports.
Fraud alerts can help prevent an identity thief from opening any more accounts in your name. Contact the toll-free fraud number of any of the three consumer reporting companies below to place a fraud alert on your credit report. You only need to contact one of the three companies to place an alert. The company you call is required to contact the other two, which will place an alert on their versions of your report, too. If you do not receive a confirmation from a company, you should contact that company directly to place a fraud alert.
- TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
- Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241
- Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9532, Allen, TX 75013
Check that information, like your Social Security number, address(es), name or initials, and employers are correct. If you find fraudulent or inaccurate information, get it removed. See Correcting Fraudulent Information in Credit Reports to learn how. When you correct your credit report, use an Identity Theft Report with a cover letter explaining your request, to get the fastest and most complete results.
Continue to check your credit reports periodically, especially for the first year after you discover the identity theft, to make sure no new fraudulent activity has occurred.
2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently.
Call and speak with someone in the security or fraud department of each company. Follow up in writing, and include copies (NOT originals) of supporting documents. It's important to notify credit card companies and banks in writing. Send your letters by certified mail, return receipt requested, so you can document what the company received and when. Keep a file of your correspondence and enclosures.
When you open new accounts, use new Personal Identification Numbers (PINs) and passwords. Avoid using easily available information like your mother's maiden name, your birth date, the last four digits of your Social Security number or your phone number, or a series of consecutive numbers.
If the identity thief has made charges or debits on your accounts, or has fraudulently opened accounts, ask the company for the forms to dispute those transactions:
For charges and debits on existing accounts, ask the representative to send you the company's fraud dispute forms. If the company doesn't have special forms, use the sample letter to dispute the fraudulent charges or debits. In either case, write to the company at the address given for "billing inquiries," NOT the address for sending your payments.
For new unauthorized accounts, you can either file a dispute directly with the company or file a report with the police and provide a copy, called an “Identity Theft Report,” to the company.
If you want to file a dispute directly with the company, and do not want to file a report with the police, ask if the company accepts the FTC’s ID Theft Affidavit (PDF, 56 KB). If it does not, ask the representative to send you the company's fraud dispute forms.
However, filing a report with the police and then providing the company with an Identity Theft Report will give you greater protection. For example, if the company has already reported these unauthorized accounts or debts on your credit report, an Identity Theft Report will require them to stop reporting that fraudulent information. Use the cover letter to explain to the company the rights you have by using the Identity Theft Report. More information about getting and using an Identity Theft Report can be found here.
Once you have resolved your identity theft dispute with the company, ask for a letter stating that the company has closed the disputed accounts and has discharged the fraudulent debts. This letter is your best proof if errors relating to this account reappear on your credit report or you are contacted again about the fraudulent debt.
Tuesday, February 23, 2010
Phase 5 - Content Development
Collection, Statistics about ID Theft, The collection and simple stats about each check. (ie. The amount of money stolen)
Intro to the VoID
Often, you don't even know it's happened. You balance your check book and find 50 dollars missing, or perhaps you simply receive a call from your bank. Identity theft can happen without warning. Sean White made a life stealing from unsuspecting people. While he seemed like a nice guy, spending his life working to support his kids, he was, in fact, taking advantage of his position to collect checks from customers. The following collection are all the checks that Sean White collected, and a testament to how quickly and easily your information can be taken advantage of. Check fraud represents about 17% of identity theft.
Time Involved in Being a Victim
38-48% of victims find out about the identity theft within 3 months of it starting
9-18% of victims take 4 years or longer to discover that they are victims of identity theft
Victims spend from 3 to 5,840 hours repairing damage done by identity theft.
26-32% of victims spend a period of 4 to 6 months dealing with their case and 11-23% report dealing with their case for 7 months to a year.
Monetary Costs of Identity Theft
40% of business costs for individual cases of identity theft exceed $15,000. The Aberdeen Group has estimated that $221 billion a year is lost by businesses worldwide due to identity theft
Victims lose an average of $1,820 to $14, 340 in wages dealing with their cases
Victims spend an average of $851 to $1378 in expenses related to their case
Uses of Victim Information
More than one third of victims report that identity thieves committed cheque account fraud.
66% of victims' personal information is used to open a new credit account in their name
28% of victims' personal information is used to purchase cell phone service
12% of victims end up having warrants issued in their name for financial crimes committed by the identity thief
Imposter Characteristics and Relationships to the Victim
43% of victims believe they know the person who stole their identity
14-25% of victims believe the imposter is someone who is in a business that holds their personally identifying information
Tuesday, February 16, 2010
Sub Headings
Identity Protection
Identity Self Defense
An Examination of Fraud
A Lesson in Fraud
Tuesday, February 9, 2010
Monday, February 8, 2010
Development Process
Friday, January 29, 2010
Collection Synthesis
Our collector is one Sean White, a college drop out who is utilizing his job position at a few different locations to steal checks to further his own goals. Though he has dependents, he doesn't steal to make their lives better, only his own. His collection would be interesting to the people from whom he has stolen, the police, and other identity thieves.
Money generated by part-time job goes to his child support and drinking and gambling. Lacking the drive to pursue an actual career, Sean has turned to Check Fraud. He maintains a college student life style, living in a single person apartment, though he splurges on fancy appliances (car, speakers, computer)as he likes to own nice things. If not readily apparent, Sean is interested the get rich quick schemes. Often, he gambles and bets in an attempt to increase his income, though he rarely pays his debts, and having avoided the law so far, Sean has proven capable in avoiding the repercussions of his debt. Using his position at work, Sean is able to copy down information from voided checks, providing him with billing addresses, license numbers, signatures, and account information.
Our intent is to deal with the idea that a single common document can provide enough information to disrupt your life. A check is a unique document as it contains your bank information, your personal information, and even a small glimpse into your personal life. Does you check has a picture of a car on it? Is it blank? Personalization of checks suggest something about the person who owns the check. Still, checks are still an acceptable form of payment. People willing hand their checks over at stores, along with their license, providing potential thieves both the opportunity and the materials to steal.
Do we expect people to stop using checks? Certainly not. However, we simply wish to make people aware of the dangers of identity theft. The average number of hours victims spend repairing the damage caused by identity theft is 330 hours. Identity theft is on the rise, affecting almost 10 million victims in 2008. ID theft can happen to anyone, and it can come in all shapes and sizes. For example, your credit card digits could be stolen and used to make online purchases; a thief could impersonate you to open up a loan in your name; a felon could commit a crime and pretend to be you when caught; or someone could use your personal information to apply for a job. More than one third of victims report that identity thieves committed check account fraud.
Tuesday, January 26, 2010
Gender Roles in Collecting & Collecting vs. Consumption
I'm sure this reading would offend many a feminist and probably a few other people. I can't really say if I agree. Both of my grandfather's collected things. One had a collection of ships in bottles. Most of which he built himself. I'd say that this collection was less about owning them, than admiring them. The same can be said for the other grandfather, which had a collection of blueprints, engineering documents, and similar papers. Though their beauty was lost on a lot of people, my grandfather enjoyed their logical and aesthetic values.
Meanwhile, my mother collects everything, though in moderation. I was raised in a pack rat household, which is not to suggest that my life was ever harder due to the amount of stuff that had been collected, but rather, there was always excess of something available. I'm not sure why my mother collects. She has butterflies and insects, which is likely for the beauty, but also books, lots of books. We literally have a library at home. My mother has even Dewey Decimal'd the whole collection. But she hasn't read it all. Not even near 50%. Which leads me to believe she enjoys the idea of owning this knowledge. She is intrigued by the knowledge offered by the books, for sure, but the actual knowledge needn't ever be released from the pages because she owns the book know.
For similar reasons, she pursues our family tree, delving ever further into books and records most people have forgotten about to find some name, or marriage, or death. Of all of her collections, I find the family tree most intriguing and most fruitless. The knowledge gained by exploring our genealogy will be utterly useless in almost any regard I can think of (barring some GATTACA future where jobs and performance are based solely on your genes). I think the temptation of knowledge that only she can figure out is tempting in a way.
There is a lot to be said for the collection of books. It ties directly into the discussion of collection being tied to consumption. The ability to buy something and literally own it is definitely an attractive portion of collecting. It is possible to collect without purchasing something, such as pursuing butterflies, beetles, receipts, or grocery lists. But on the whole, our modern world seems to find such thing as creepy or some juvenile or perverse behavior. The standard has moved away from hobby pursuits to shopping pursuits. I'd say in this way, many people in the US suffer from this mind set. The ability to buy and own things allow people to pursue objects that serve no purpose other than to entertain themselves. Given people's general lack of time to have a personal life, money becomes the new exchange tool for your collection. At one point in time, pursuing your collection wasn't a monetarily pursuit, but one of a hobby or something to do in your free time. Given the paradigm shift focusing on the gathering of money in exchange for less personal time, it is a relatively simple matter that collecting would change as well.
That being said, I think the collect and consume approach takes something away from the collection. I can personally say that my personal collection is easily expandable, all I need is money to do so. But it's not nearly as interesting or exciting as finding or making something to expand my collection. This though also depends on your collection. My collection of watches isn't something that is likely to expand on my skill level or in any monetarily free way, since every watch requires money. But if my pursuits were more based on insects or stories, finding them myself would provide more meaning and detail to the collection than just purchasing something ever could.
Wednesday, January 20, 2010
Demographics
The three readings are all about people, how to categorize them, and then how to approach them (usually for reasons of marketing). The overlap between the three readings is entertaining because it talks all about how interconnected people are in different ways than before, and how impossible it is to standardize people. People continue to affect each other, effect the ways they interact with each other and finally, how they pursue their goals.
I find it intriguing that there is such a variety of opinions of all of these subjects. Not that I expected it to be cut and dry, but the fact that the organizations that it make it their business to try and categorize people fail to work together, and more importantly, cannot complete their job in an manner of finality. I realize that that is simply an effect of dealing with people, who on their own are often chaotic and unpredictable. I really enjoyed the discussion of video vs. book. vs. radio/podcast. It was a debate often held in the Computer Animation department and it is entertaining and insightful to listen to the opinions of different people over the same movies and books. The vastness of opinion is delightful and somewhat frightening. The ability to write a book, with a set idea in mind, and then find an entire portion of your fan base not only miss that idea, but come up with a completely tangential one is both infuriating and exciting. The idea that we as designers will be asked to design to try and appeal to a single demographic is a challenge that seems fun to meet, albeit difficult.
Community and Group Processes
There are plenty of pros and cons about working in groups. One advantage is being able to rely on another person to assist in the workload, to provide a different voice, ideas, and style. This is always excellent to provide a diverse project. However, on the downside, it is rare that people are able to completely agree on an idea. Projects get torn asunder as people disagree on methods, goals, and their importance. Artists, in particular, have trouble compromising. Another fear is style. Artists become used to a certain style and then suddenly, trying to merge to unique styles, or simple work in another style is difficult and usually unappreciated by the alternate party.
Friday, January 15, 2010
Readings
A collection is a group of items that are brought together to be preserved, usually related to each other through a theme, though why a collection exists is often unique to the collection.
Of the collections mentioned in the reading, there was a nature collection, a gem collection, a jewelry collection, a blue enamel collection, a ceramics collection, an art collection, and a book collection. There are more, pertaining to statues, animals, mutations and oddities, antiques, plants, shells, birds, coins, and stuffed animals.
Most of these people pursued their curiosities, and collected for a quest for knowledge, or for the pride of being the only person to own such a rare oddity. Some of the readings speak of the passion for collecting beyond what is healthy. An all consuming pursuit of life that gives them little pleasure, yet it consumes their lives. This passion, which use to be a rarity and mostly depended on the financial standing of the person in question, is now more and more common. Hoarders are more and more evident, as spoken about in the third collection. Hoarders often collect that which few others view as valuable. Broken odds and ends, receipts, tuna can labels, and so on.
The pursuit of defining and defying nature was the goal of scientific collection. It was an attempt to capture a view of all of nature, its oddities and its unique creations. It was not only a defiance of nature, but a pursuit of classism, showing off the ability to afford such a collection. Collecting was the pursuit of nobles, people of power and affluence. To show off such a collection was to show your money and power, and ability to have others collect for you.
Many people have collections nowadays, even if they don't necessarily see them as such. I have a pack rat tendency to hold on to old handouts and worksheets, figuring that they'll be useful at a later point, regardless of how long past the class I am. I still have my Physics notes and textbook, despite that class having occurred 8 years ago. I have a collection of photographs on my computer, both ones I've taken and ones that are of interest to me. I own a large collection of Magic The Gathering cards, and a collection of fantasy books, and D&D books. These are all things that interest me, and while they don't get used on a daily basis, the thought of getting rid of them seems wasteful.
Memory – Souvenirs from trips
Interest – Baseball Paraphernalia
Future Use – School handouts
Protective Nature – Antiques
Connect With a Time or Place – Photos/Video
Horde – Toys, Misc.
Intent to Steal Information - Credit Cards > Bank Accounts > Junk Paper \ Mail
My Brother's Cabinet of Curiosities - Snake head, snake skin, snake rattle, monkey's paw, alligator's claw, snake blood, dead insects, shrunken head, witch box, medical journal from 1870's on making zombies
Things People Collect
Technology – Cords, motherboards, cables
China Collectors – Plates, Glasses
Business Cards/Calling Cards
Obsessive Diet Recipes
Metal Collectors
Medal Collectors
Used Cigarettes
Art Collections
Lottery Tickets
Energy Drinks
Pocket Knives
Cat Lady/Man
Bottlecaps
Hot Sauce
Weapons
Knives
Liquor
Cards
Hair
Beer










