Skip to main content

Home/ Groups/ DGL RJC Group
1More

The Prism - The New Yorker - 0 views

  •  
    As a matter of historical analysis, the relationship between secrecy and privacy can be stated in an axiom: the defense of privacy follows, and never precedes, the emergence of new technologies for the exposure of secrets. In other words, the case for privacy always comes too late. The horse is out of the barn. The post office has opened your mail. Your photograph is on Facebook. Google already knows that, notwithstanding your demographic, you hate kale.
1More

Kids, the Internet, and the End of Privacy: The Greatest Generation Gap Since Rock and ... - 0 views

  •  
    It's been a long time since there was a true generation gap, perhaps 50 years-you have to go back to the early years of rock and roll, when old people still talked about "jungle rhythms." Everything associated with that music and its greasy, shaggy culture felt baffling and divisive, from the crude slang to the dirty thoughts it was rumored to trigger in little girls. That musical divide has all but disappeared. But in the past ten years, a new set of values has sneaked in to take its place, erecting another barrier between young and old. And as it did in the fifties, the older generation has responded with a disgusted, dismissive squawk. It goes something like this:
1More

The death of privacy | World news | The Guardian - 0 views

  •  
    We, the public, have looked on, at first horrified, then cynical, then bored by the revelations, by the well-meaning but seemingly useless protests. But what is the personal and psychological impact of this loss of privacy? What legal protection is afforded to those wishing to defend themselves against intrusion? Is it too late to stem the tide now that scenes from science fiction have become part of the fabric of our everyday world?
1More

Netiquette: Rules of Behavior on the Internet | Education.com - 0 views

  •  
    The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules. The summary of email rules in the information below is based on published sources such as Shea's (2004) online book, Netiquette.
1More

BBC - WebWise - What is netiquette? - 0 views

  •  
    The word netiquette is a combination of 'net' (from internet) and 'etiquette'. It means respecting other users' views and displaying common courtesy when posting your views to online discussion groups.
1More

WV Geo-spatial Data Policy - 0 views

  •  
    Spacial Data policy information from the Department of Transportation.
1More

GPS.gov: Survey & Mapping Applications - 0 views

  •  
    Learning more about the different applications of Geo-spacial data and technology.
1More

GNSS Systems - 0 views

  •  
    Geo-Technology equipments.
1More

Geographic Information Systems as an Integrating Technology - 0 views

  •  
    From the University of Colorado.
1More

A BRIEF HISTORY AND PROBABLE FUTURE OF GEOTECHNOLOGY - 0 views

  •  
    A brief history about geo technology.
1More

Academic Integrity | Student's Guide to Academic Integrity - 0 views

  •  
    Academic integrity, importance and definition.
1More

What is Academic Integrity? | Academic Integrity at MIT - 0 views

  •  
    Academic Integrity MIT
1More

Teaching and Learning with Technology | Defining Plagiarism and Academic Integrity - 0 views

  •  
    main terms, things to look for.
1More

Introduction - Academic Integrity at Princeton University - 0 views

  •  
    Academic Integrity Princeton
1More

Academic Integrity and Plagiarism - 0 views

  •  
    Academic Integrity Illinois
1More

Viral Video Cell-Phone Scare - CSI - 0 views

  •  
    In June 2009 a new urban legend was born-that the power generated by cell phones can cook popcorn. A series of videos on YouTube appeared to show four users popping a table full of corn kernels simply by pointing their ringing phones at them. The implication for the casual observer was clear: if cell phones emit enough radiation to pop corn, imagine what they are doing to your brain!
1More

http://copyright.gov/history/lore/2004/feb04-lore.pdf - 0 views

  •  
    Coca Cola Copyright Label
1More

http://www.suffolk.es/documents/jhtl_book_reviews/samuels.pdf - 0 views

  •  
    The Illustrated Story of Copyright
1More

A & M RECORDS, INC. v. Napster, Inc., 239 F. 3d 1004 - Court of Appeals, 9th Circuit 20... - 0 views

  •  
    Napster against the world...almost. To me this is one of the most fascinating stories in the last twenty years. How Napster disrupted the music distribution business and their impact on copyright laws.
1More

U.S. Copyright Office - Copyright Law: Chapter 1 - 0 views

  •  
    . Subject matter of copyright: In general28 (a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Works of authorship include the following categories: (1) literary works; (2) musical works, including any accompanying words; (3) dramatic works, including any accompanying music; (4) pantomimes and choreographic works; (5) pictorial, graphic, and sculptural works; (6) motion pictures and other audiovisual works; (7) sound recordings; and (8) architectural works.
« First ‹ Previous 61 - 80 of 123 Next › Last »
Showing 20 items per page