Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged u s

Rss Feed Group items tagged

ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Jon Lawson

eCO, Electronic Copyright Information - U.S. Copyright Office - - 5 views

  •  
    This is the U.S. Copyright Office's web portal to pre-register, register and submit for copyright. I have used this for musical works and lyrical work for songwriters and artists. Easy to use navigation and explanation of terms. A great one stop shop to begin the process of copyrighting your material. This is a department of the Library of Congress. 
  •  
    Thank you for sharing this information, Jon. It's great to hear that you found the process to be easy to understand and navigate. The site and the online process definitely simplifies things.
Jon Lawson

Office of the U.S. Intellectual Property Enforcement Coordinator | The White House - 2 views

  •  
    This is the site for the IPEC. A regulatory and enforcement branch of the U.S. government that investigates intellectual property claims, violations and infringements. It also establishes regulations to protect and secure intellectual property through changing technologies and methods globally.
Joseph Rhodes II

FIGHTING THE FIRST SALE DOCTRINE: STRATEGIES FOR A STRUGGLING FILM INDUSTRY...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Article discusses the strategies for copyright lawmakers.
    • Joseph Rhodes II
       
      8 During the 112th Congress,  the House and Senate considered two competing measures, the Stop  Online Piracy Act ("SOPA")29 and the Protect IP Act of 2011 ("PIPA").30  SOPA and PIPA were designed to target foreign websites that engage in  copyright violations.31 The bills would allow the Justice Department to seek  court orders requiring U.S. websites to block access to foreign sites offering  pirated material, and would allow copyright owners to seek court orders  preventing such sites from receiving payment services from the U.S.32
    • Joseph Rhodes II
       
      8 During the 112th Congress,  the House and Senate considered two competing measures, the Stop  Online Piracy Act ("SOPA")29 and the Protect IP Act of 2011 ("PIPA").30  SOPA and PIPA were designed to target foreign websites that engage in  copyright violations.31 The bills would allow the Justice Department to seek  court orders requiring U.S. websites to block access to foreign sites offering  pirated material, and would allow copyright owners to seek court orders  preventing such sites from receiving payment services from the U.S.32
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 14 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 83 Good The article displays different ways the film industry is struggling.
Joey Martinez

Digital Native - 0 views

  • where people are defined by the technological culture which they're familiar with.
  • Prensky defines digital natives as those born into an innate "new culture"
  • digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.
  • ...3 more annotations...
    • Laura Lewis
       
      definition of both digital natives and digital immigrants.
  • while the
    • Joey Martinez
       
      A person born into the digital world.
  •  
    Digital Native:  A person born into an innate "new culture" while the digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.  http://edition.cnn.com/2012/12/04/business/digital-native-prensky/   Marc Prensky U.S. Author Digital Native:  A digital native is an individual who was born after the widespread adoption of digital technology. http://www.techopedia.com/definition/28094/digital-native  
  •  
    Digital Native:  A person born into an innate "new culture" while the digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.  http://edition.cnn.com/2012/12/04/business/digital-native-prensky/   Marc Prensky U.S. Author
Joey Martinez

Copyright - 0 views

  • A copyright protects the form of expression of a creator against copying. Literary, dramatic, musical and artistic works are included within the protection of U.S. copyright law. The USPTO does not register copyrights, the copyright office does.
  •  
    A copyright protects the form of expression of a creator against copying. Literary, dramatic, musical and artistic works are included within the protection of U.S. copyright law. The USPTO does not register copyrights, the copyright office does.
Jose Nieves

U.S. Copyright Office - Copyright in General (FAQ) - 0 views

  • Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works.
  • protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
Stefanie Robinson

Comcast agrees to buy Time Warner Cable for $45 billion - Feb. 13, 2014 - 0 views

  • February 13, 2014: 3:09 PM ET
  • rification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
  • By Brian Stelter 
  • ...9 more annotations...
  • Comcast said Thursday it had agreed to buy Time Warner Cable for $45 billion in a deal that would combine the two biggest cable companies in the United States.
  • © 2014 Cable News Network. A Time Warner Company. All Rights Reserved
    • Stefanie Robinson
       
      copyright to Cable New Network/time warner
  • elated: Weather Channel's cable fight is the tip of the iceberg
    • Stefanie Robinson
       
      Citation..more research
  • Related: Customers say deal is evil
    • Stefanie Robinson
       
      Citation/more research, public opinion. reference copyright owned by TW too
    • Stefanie Robinson
       
      Connectivity. works in all my browsers...busy site 4k share in two days
    • Stefanie Robinson
       
      Navigation links to fb, twit, linkedin & email
  • Clarification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
    • Stefanie Robinson
       
      content...reference earlier version
    • Stefanie Robinson
       
      All links in the article under same ownership TW
    • Stefanie Robinson
       
      Continuity site is free and constantly maintain per time stamp of content.
  • This isn't about TV anymore -- it's about controlling a fatter, more intelligent pipe for multiple services that emanate from it," including broadband Internet, phone and home security monitoring, said Tim Hanlon, the founder of the Vertere Group, an investment advisory firm that focuses on media and technology.
    • Stefanie Robinson
       
      Context commentary
Joseph Rhodes II

INTERNATIONAL IDENTITY THEFT: HOW THE INTERNET REVOLUTIONIZED IDENTITY THEF...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Regardless of this evidence showing that Rohn possessed many different forms of false identification, the court reversed Rohn's conviction because the government was unable to show that Rohn "knowingly possess[ed] with intent to use unlawfully or transfer unlawfully five or more identification documents"^'' as required by 18 U.S.C. § 1028(a)(3).^^ Note 2: n unlawful use because Rohn had not demonstrated a lawful one."^^ The court stated that the government tried to convict Rohn under a statute that Congress did not write, and that because the government did not technically meet all elements of the statute, the conviction had to be overturned. Thus, even though the government had charged an individual who had obviously stolen and used many different identities, the government was unable to convict this individual based on the technical language in the statute. Note 3: The U.S. Supreme Court agreed with the Petitioner, holding that the government must prove that a defendant knew that the "means of identification" he or she unlawfully transferred, possessed, or used did, in fact, belong to another person.'**^  Note 4: Thus, because the government could not prove that the petitioner technically knew that the identification numbers belonged to other people, the Supreme Court reversed the aggravated identity theft charges.'*'
David Bell

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
ino moreno

My Networked Life: Internet Connections and Social Connections | KBZ - 0 views

    • ino moreno
       
      with a bit of reading, the article is not bad!
  • While she is on the road, Alisa is able to keep up with her assignments online. Her laptop is always on hand so she can quickly see what work she needs to do. Her computer also lets her stay connected to friends and her host families, who have become more like real family.
  • Internet is so important to Alisa because it allows her to stay in touch with people from her travels.
  • ...2 more annotations...
  • Social media in China is different than in other countries due to the special political situation and economic environment. China has social networks that are the equivalent of Facebook and Twitter, but in this country they are used in slightly different ways. “People in the U.S. use Twitter more like casual talking,” says Hanwen. “In China people use social media more to share formal news.”
    • ino moreno
       
      interesting to see how different in the world we really are. hmmmm what is going on america???
Jose Nieves

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
Tad Collinsworth

U.S. Copyright Office - Definitions (FAQ) - 0 views

  •  
    copyright
Ken Lehman

Boston Marathon Bombings Raise Social Media Etiquette Questions - ABC News - 2 views

shared by Ken Lehman on 23 Jan 14 - No Cached
DGL Diigo liked it
  • but really a lot of it is about making judgment calls and good choices, particularly when feelings are running so strong. I'd just apply some discretion."
  • Sylvie Barak, who lives and works in Silicon Valley, is one of those people who used discretion. While she wanted to share something about her excitement about Israel's Independence Day, she held off. "I thought about my audience right now and I knew it was mostly people in the U.S. at that time," Barak told ABC News. "I thought it wasn't appropriate to force that on people right now and I held back."
Jason Loper

How to Become a Game Designer | Schools.com - 0 views

  • You’ve been called a “gamer” for as long as you can remember, so you might as well make a career out of it, right? Well, it might all sound like fun and games, but game design has evolved from the days of scribbling a great idea on the back of a napkin into an elaborate process involving a  specialists trained in a variety of disciplines who collaborate and sometimes work long hours to create great computer or video games replete with state-of-the-art animation and visual effects. According to the U.S. Bureau of Labor Statistics, 59 percent of multimedia artists and animators, which includes computer and video game designers, are self-employed, often working from home but also in offices. It goes without saying that it is helpful to possess artistic ability and talent, but people lacking in those areas may compensate with robust technical and computer skills, preferred by some employers. Likewise, those who do not have strong computer skills may make up for it through demonstrable artistic talent. The demand for more realistic video games continues to increase, but growth may be tempered by companies hiring lower-paid animators overseas, and by stiff competition as large numbers of game designers enter the field. Individuals interested in pursuing this career may benefit from a solid blend of education, hands-on experience, and a combination of artistic and technical skills. Learn more about working in the field of game design, i.e., what game designers do, how to become a game designer, career paths, and career outlook, in the following infographic. Sources: Career Skills, GameDegree.comNew Reports Forecast Global Video Game Industry Will Reach $82 Billion By 2017, Forbes, July 2012So You Wanna Be a: Game Designer, GameSpot For a complete list of sources, please view the infographic.
caprisunshine

Google Crisis Map - 0 views

    • caprisunshine
       
      Google is known as one of the most credible search engines and google maps is so credible that it is used by the U.S. government
  •  
    Google's Crisis Map combines information from the National Hurricane Center, American Red Cross and other trusted sources. It offers details about the storm's current and forecasted locations, emergency shelter locations, live webcam feeds, public safety alerts, traffic conditions and a wealth of other vital information.
andrew marte

What does it mean to be a digital native? - CNN.com - 0 views

  • digital native," a term coined by U.S. author Marc Prensky in 2001
  • Prensky defines digital natives as those born into an innate "new culture"
andrew marte

CNN - Does technology make the grade? - August 3, 1998 - 0 views

  • schools are rising to the challenge of bringing technology into the classroom and trying to figure out what to do with it once it's there. In
  • his brave new high-tech world, art teachers can take students on a digital trip to the Louvre in Paris for a look at the Mona Lis
  • musicians can compose symphonies on a computer keyboard
  • ...10 more annotations...
  • science classes can access up-to-the-minute NASA data for a project.
  • the school district wanted entire classes to be able to use the computers at one time
  • t invested in laptops, which are easily shared among classes on the same floor.
  • more computers means fewer kids sharing each one--an average of 7.3 students per computer in 1996­97, compared with 19.2 students per terminal just five years earlier, according to Market Data Retr
  • The system delivers information where and when it's needed, and we get the most value for the dollars spent,"
  • Many believe schools like Red Hook's are the future of education.
  • et hooked up to the Internet by 2001.
  • In the 1996-97 school year, 6.3 million computers were used for instruction in U.S. public schools, a whopping 186-percent increase from just five years earlier, according to the most recent figures from Market Data Retrieval, which surveys schools on technology use.
  • teachers use a remote control to access video, satellite, cable and laser- disc technology from the school district's media distribution center without leaving their students.
  • 78 percent of public schools had at least one computer hooked up to the Internet, as did 27 percent of classrooms, up from only 3 percent of classrooms in 1994,
deborahnolan74

Computers and Classrooms: The Status of Technology in U.S. Schools Policy Information R... - 0 views

  •  
    Statistics show that growing numbers for technology growing in schools.
1 - 20 of 20
Showing 20 items per page