Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged web based

Rss Feed Group items tagged

LINDA RANDOLPH

15 Free Tools for Web-based Collaboration - 1 views

  •  
    There are many free web-based tools for Web-based collaboration. These are valuable tools especially for distance learners or anyone needing to collaborate on a project with someone in a different geographical location.
Lisa Lowder

EBSCOhost: An Introduction and Guide to Enhancing Online Instruction with Web 2.0 Tool... - 0 views

  • hen direct contact with students in a traditional face-to-face classroom is not feasible, instructors must be innovative in content delivery and provide for students a sense of instructor presence. It has been suggested that the online instructor is the critical factor for a successful learning experience
    • Lisa Lowder
       
      This article is credible because it contains good information, it was published in a professional journal, and it contains good references and citations.
    • Lisa Lowder
       
      It also provides a list of web-based tools that can be used by online professors.
  •  
    This article explains how web-based tools can improve education for the online learner. It suggests that faculty plays a large role in educating online learners about the tools available, the tools they will be using, and how the tools are used. Examples of web-based tools are blogs, wikis, RSS feeds, video and photo sharing, avatars, microblogging, social bookmarking, and social media.
Lisa Lowder

EBSCOhost: An Introduction and Guide to Enhancing Online Instruction with Web 2.0 Tool... - 0 views

  • Web 2.0 tools offer ways to personalize classes and demonstrate instructional presence.
    • Lisa Lowder
       
      This article is a credible source. It is published in a professional journal which is peer reviewed. It includes good information and uses good sources. It also contains a glossary.
  •  
    This article explains how web-based tools can improve education for the online learner. It suggests that faculty plays a large role in educating online learners about the tools available, the tools they will be using, and how the tools are used. Examples of web-based tools are blogs, wikis, RSS feeds, video and photo sharing, avatars, microblogging, social bookmarking, and social media.
Lisa Lowder

EBSCOhost: A Comparison of Different Communication Tools for Distance Learning in Nucl... - 0 views

  • The purpose of this work is to explore distance learning related tools to determine if they can provide an enhanced learning environment for nuclear education. In this work, a set of tools are examined that can be used to augment or replace the traditional lecture method. These tools are Mediasite, Adobe Connect, Elluminate, and Camtasia. All four tools have recording capabilities that allow the students to experience the exchange of information in different ways.
    • Lisa Lowder
       
      This article is credible because it was published in a professional journal, it was written by faculty members who are identified appropriately, it has good use of citations and references, and it has good supporting charts and graphics.
  •  
    This article explains the use of web-based tools for online eduction of nuclear engineers, but the information is relevant to Full Sail students as well. In the article they evaluate several web based tools but the interesting thing is that in order for the students to use the tools effectively the teachers must be comfortable with the use of these tools.
Lisa Lowder

EBSCOhost: A Comparison of Different Communication Tools for Distance Learning in Nucl... - 0 views

  • general, the tools were found to be useful for mature students on the condition that the lecturer was comfortable with the tools and in some cases, adequate support from IT groups was provided. [ABSTRACT FROM AUTHOR]
    • Lisa Lowder
       
      This article is credible. While I am not interested in learning about nuclear education the fact that it is a distance education program featuring on line tools is relevant. This is a well written article from a professional journal. It is authored by professors and includes cited references.
  •  
    This article explains the use of web-based tools for online eduction of nuclear engineers, but the information is relevant to Full Sail students as well. In the article they evaluate several web based tools but the interesting thing is that in order for the students to use the tools effectively the teachers must be comfortable with the use of these tools.
Katrina Quick

12 Sites and web based tools that shined in 2012 - 0 views

    • Katrina Quick
       
      She placed her First and last name on the page, as well as the year published. 
    • Katrina Quick
       
      She has job listings, and different tools for looking for employment.
  •  
    These are web based tools of 2012. I believe this source to be credible because you can contact her by phone number and she lists a whole bunch of different sources that she got her info from. 
deborahnolan74

What is Wiki? Webopedia - 1 views

    • Nathan Pharris
       
      Great definition of both a wiki and blog.
  • (n.) A collaborative Web site comprises the perpetual collective work of many authors. Similar to a blog in structure and logic, a wiki allows anyone to edit, delete or modify content that has been placed on the Web site using a browser interface, including the work of previous authors.
    • Wilfredo Cruz
       
      Wiki defined
  • The term wiki refers to either the Web site or the software used to create the site.
  •  
    A wiki is a a web site that displays information, in which anyone can edit. In this article, the author compares a wiki to a blog.
  •  
    A collaborative Web site comprises the perpetual collective work of many authors.
  •  
    A collaborative Web site comprises the perpetual collective work of many authors.
Lisa Lowder

EBSCOhost: Promote Digital Citizenship through School-Based Social Networking - 0 views

  • In this article, the author discusses the school-based social network that Southwest Christian School in Fort Worth, Texas, USA, uses which lets teachers integrate social networking into their curricula while teaching students appropriate online etiquette
    • Lisa Lowder
       
      This article is credible because it is published in a professional journal and it is a first hand account from the creator of the school-based social network.
  •  
    This article describes a school based social network that allows teachers to help students learn and use proper online etiquette.
LINDA RANDOLPH

EBSCOhost: Creating/Developing/Using a Wiki Study Guide: Effects on Student Achievemen... - 0 views

  • he preservice teachers indicated that the creation of the wiki increased their knowledge as well as the presentations given by their peers, but the hands-on practice increased their knowledge the most
    • LINDA RANDOLPH
       
      Wiki's are gaining popularity in the world of education. This study demonstrates that.
  •  
    Wikis are gaining popularity in classrooms because of their many benefits. Despite these benefits, there is a shortage of empirical data regarding their effectiveness in increasing knowledge. This study examined (a) the effectiveness of creating/developing/using a wiki to increase knowledge of Web 2.0 tools for 103 preservice teachers.
Laura Lewis

EBSCOhost: Tapping Web-Based Tools. - 0 views

    • Laura Lewis
       
      web based tools
Laura Lewis

EBSCOhost: Web-based service tools arrive. - 0 views

    • Laura Lewis
       
      web based tools
Laura Lewis

EBSCOhost: Getting Up to Speed on the Information Highway: Integrating Web-based Resou... - 0 views

    • Laura Lewis
       
      WEB-BASED TOOLS
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Katrina Quick

37signals: Why is web-based software the smart choice? - 0 views

    • Katrina Quick
       
      Name brand companies are using 37signals tools. 
  •  
    I believe this is a credible source because a lot of name brand businesses run with their products. 
chris mackie

Malaysia Airlines Flight 370 search grows, pilots face scrutiny - CNN.com - 0 views

    • chris mackie
       
      1) Content - The content in this article is remarkably good. It seems fair and unbiased and is written as a serious post. It provides details on the facts and the mysterious circumstances surrounding the loss of this plane 2) Credibility - CNN by itself is a reliable source. But also they provide links to outside articles on the page to corroborate their posting of the story. 3) Critical Thinking - Based on the information in the article you can deduce a lot about the plane and the issues with the search. I helps you think by mentioning important details and providing links to search for more information. 4) Copyright - This page itself was copyrighted in 2014. This article itself was posted on Sun March 16th, 2014. Meaning that it was updated today. 5) Citation - This site cites its references and provides links to them for additional information. 6) Continuity - Because of CNN's informational network this site can be updated within hours if not minutes. This up to date information provides room for new information to enter the article. 7) Censorship - This is posted and maintained by CNN so there is most likely some degree of censorship. But the comments can be posted immediately. However, if your post is tagged as offensive they will remove it. 8) Connectivity - This site is vastly interconnected both with corresponding articles on CNN.com and outside articles. It's easy to use and Easy to navigate. 9) Comparability - This page can be compared to many other pages. In fact, this article is the center of many websites referencing its information for reposting. 10) - Context - The scope of this page in context is a little biased. It tries to hint at the fact that the plane could have been hijacked and focuses on that speculation only giving a slight reference that the Ministry of Transportation has said that they aren't pursuing it that way but are looking into all of the information on why it deviated. Web Page Evaluation: Cur
    • chris mackie
       
      1) Content - The content in this article is remarkably good. It seems fair and unbiased and is written as a serious post. It provides details on the facts and the mysterious circumstances surrounding the loss of this plane 2) Credibility - CNN by itself is a reliable source. But also they provide links to outside articles on the page to corroborate their posting of the story. 3) Critical Thinking - Based on the information in the article you can deduce a lot about the plane and the issues with the search. I helps you think by mentioning important details and providing links to search for more information. 4) Copyright - This page itself was copyrighted in 2014. This article itself was posted on Sun March 16th, 2014. Meaning that it was updated today. 5) Citation - This site cites its references and provides links to them for additional information. 6) Continuity - Because of CNN's informational network this site can be updated within hours if not minutes. This up to date information provides room for new information to enter the article. 7) Censorship - This is posted and maintained by CNN so there is most likely some degree of censorship. But the comments can be posted immediately. However, if your post is tagged as offensive they will remove it. 8) Connectivity - This site is vastly interconnected both with corresponding articles on CNN.com and outside articles. It's easy to use and Easy to navigate. 9) Comparability - This page can be compared to many other pages. In fact, this article is the center of many websites referencing its information for reposting. 10) - Context - The scope of this page in context is a little biased. It tries to hint at the fact that the plane could have been hijacked and focuses on that speculation only giving a slight reference that the Ministry of Transportation has said that they aren't pursuing it that way but are looking into all of the information on why it deviated. Web Page Evaluation: Cur
Katrina Quick

Who is She? - Karla Porter - 0 views

    • Katrina Quick
       
      This note is for her placing information on who she is. She is really professional. 
  •  
    This is actually for the other page 12 best web tools. 
Laura Lewis

EBSCOhost: Online in a Flash. - 0 views

    • Laura Lewis
       
      web based tools
Laura Lewis

EBSCOhost: Facebook, Friends, Freemiums, and Fundraising. - 0 views

    • Laura Lewis
       
      web based tools
david masterson

EBSCOhost: ETIQUETTE ONLINE: From NICE to NECESSARY. - 0 views

    • david masterson
       
      Different types of technology require difterent forms of etiquette [4]. Textmessaging via a mobile phone is difterent from instant messaging and worlds apart from the asynchronous experience of email. A short abrupt comment that is acceptable in instant messaging may not be in email where some people expect to be addressed by name. Emotional affordances, syntax, and semantics vary across technology, too. 1-urthermore, new technologies may challenge previously accepted norms. Who would have guessed that having a stranger edit one's fastidiously composed prose without first asking; permission would be acceptable?
    • david masterson
       
      Age differences in online behavior in nonacademic environments such as online shopping and purchasing (Sorce, Perotti & Widrick, 2005) or Web search (Grahame, Laberge, & Scialfa, 2004) have been often discussed in the literature, but only a small number of studies have been conducted to examine age differences in adult learners' online learning behavior in academic settings. Those studies revealed significant differences in online behavior due to age; however, it is difficult to conclude age-dependent online behavior based on the studies because of the contextual or missing definitions of "younger" and "older" used in the studies.
Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
1 - 20 of 38 Next ›
Showing 20 items per page