Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged 9

Rss Feed Group items tagged

2More

Benefits of Team Collaboration in the Cloud | Enterprise CIO Forum - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many time over for a website made for business management and up. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4, 5)The author is posted next to the article for copyright, and the article contains original information from the author, so no citation needed. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Benefit of remote access to internet collaboration and how it closes distances.
3More

Not Alone in the Field: Distance Collaboration via the Internet in a Focused Ethnography - 0 views

    • Lucas Pergler
       
      Evidence for how internet has closed gaps in collaboration efforts of distance, and also time.
    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by two PhD's. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4,5)Authors are printed at the start of the article and contains information under the creative commons attribution license, so no copyright/citation necessary. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)PDF verified viewable on IE, Chrome, Firefox. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Benefits of using internet collaboration for remote access from EBSCOhost
2More

Collaborate with Your Competitors-and Win - Harvard Business Review - 1 views

    • Lucas Pergler
       
      1)Article contains content of a serious nature that directly relates to my research. 2)Authors are all professors of business in their respective universities. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The authors are printed below the title of the article. 5)Citation is used throughout when necessary. 6)Already an older article, and will most likely not be updated, but information still relevant to my research. 7)Google search led me here which I do not believe was censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project
  •  
    Overview of how "competitive collaboration" can save money for both companies.
1More

EBSCOhost: An Evaluation of Internet Based CAD Collaboration Tools. - 0 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by a writer for well known technology publication. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printer under the article title for copyright. 5)Citation used throughout article when outside information used. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
2More

Average domestic airfare prices: Average domestic airfare rises 10% - Los Angeles Times - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a well known and respected newspaper. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title and has been writing for the publication for years. 5)Citation is not fully defined other than to mention a source throughout the article. 6, 7)The site is continually updated and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Average cost of flights to increase, and continue to increase. Without internet collaboration, company execs from nationwide must be flown in for important conferences.
2More

Online, Anonymity Breeds Contempt - NYTimes.com - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for the New York Times publication. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under title for copyright. 5)Citation through use of hyperlinks when used. 6)Parent site continually updated, but specific article is not. 7)Google search lead me here so I do not believe my results were filtered. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    One major effect of anonymity in online collaboration. Risk of anger and inappropriate dialogue when members believe there will be no repercussions due to their somewhat anonymous ID
2More

File Sizes for Kindle Books-The Text, the Images, and the Cover Image - 0 views

    • Lucas Pergler
       
      1,2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for getting answers from professionals in the appropriate field. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed under the title for copyright. 5)No citation is given aside from general name for source of information. 6,7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Details average size of ebook. Compared to physical print, this is much smaller. Most people's phones have 8GB+ of storage space which is much smaller than even the smallest physical book.
2More

EBSCOhost: Confidence IN THE CLOUD. - 3 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, created by a published author in a leading computer magazine. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed at the start of the article for copyright purposes. 5)Citations used when needed throughout article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Overview of benefits of storing data in the cloud.
1More

Public Telepresence Rooms « Tata - 0 views

    • Lucas Pergler
       
      1,2)Article is serious because it is information about the services provided by a company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4,5)No author listed as it is basic company info, meaning copyright belongs to the company. 6)Site will be continually updated as necessary by company in order to broadcast any changes in company poilicies/functions. 7)Google search found the site, and I do not believe it censored my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
1More

Cloud storage data risks and encryption | Naked Security - 0 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for internet security. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title for copyright. 5)Citation is not used aside from mentioning the company who stated the information in question. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
2More

EBSCOhost: Security Architecture of Cloud Computing. - 1 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by a PhD. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under the title and has a doctorate in the related field. 5)Citation printed at the end of the article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Overview of how cloud services try to maintain security.
2More

Collaboration Security - Cisco on Cisco - Cisco Systems - 1 views

    • Lucas Pergler
       
      1)Article contains content of a serious nature that directly relates to my research.. 2)No author mentioned, public statement by company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)No author posted, copyright belongs to company. 5)Information is created by company, no citation necessary. 6)Being a public statement from a well renowned company, updates will happen as relevant information changes. 7)Public company statement, so censor ship is probably only done if needed to protect company assets. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    From leading company in online collaboration tools, risk created by employees.
1More

10 Historical Events Affected by Social Media - 0 views

  • Hurricane Katrina, 9/11, Princess Diana's death — these three events might have played out differently had social media been as strong as it is now.
11More

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
2More

Wikis - Blackboard Help - 0 views

  • Wikis allow course members to contribute and modify one or more pages of course related materials,
  • create and edit pages quickly, while tracking changes and additions,
32More

The 25 Rules of Disinformation - The Vigilant Citizen - 1 views

    • ino moreno
       
      Interesting article!!!!!!
  • The Rules of Disinformation
  • 1. Hear no evil, see no evil, speak no evil.
  • ...29 more annotations...
  • 2. Become incredulous and indignant.
  • 3. Create rumor mongers.
  • 4. Use a straw man.
    • ino moreno
       
      seems like a "how to be evil" step by step!
  • Sidetrack opponents with name calling and ridicule.
  • 6. Hit and Run. I
  • 7. Question motives.
  • 8. Invoke authority.
  • 9. Play Dumb.
  • 10. Associate opponent charges with old news.
  • 11. Establish and rely upon fall-back positions.
  • 12. Enigmas have no solution.
  • 13. Alice in Wonderland Logic.
  • 14. Demand complete solutions.
  • 15. Fit the facts to alternate conclusions.
  • 16. Vanishing evidence and witnesses.
  • 17. Change the subject.
  • 18. Emotionalize, Antagonize, and Goad Opponents.
  • 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  • 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
  • 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
  • 22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
  • leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  • 23. Create bigger distractions.
  • 24. Silence critics.
  • sh. If you are a key holder of secrets or otherwise overly illuminated and you
  • think the heat is getting too hot, to avoid the issues, vacate the kitchen.
  • 25. Van
    • ino moreno
       
      WOW! what an interesting read!
31More

Nine Elements of Digital Citizenship - 3 views

    • yanika scotton
       
      1. Digital Access:   full electronic participation in society. 2. Digital Commerce:   electronic buying and selling of goods. 3. Digital Communication:   electronic exchange of information. 4. Digital Literacy:   process of teaching and learning about technology and the use of technology. 5. Digital Etiquette:   electronic standards of conduct or procedure. 6. Digital Law:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
    • Roberto Dunn
       
      one page, lots of useful information!
  • In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • ...22 more annotations...
  • Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
  • Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
  • We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
  • Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
  • It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
  • Digital law deals with the ethics of technology within a society.
  • Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
  • Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
  • Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.
  • Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
  • In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
    • gb malone
       
      digital security teaches us that we need protection at all times. ex{ virus protectionvirus protection
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
    • ino moreno
       
      Great notes guys!!:)
  • precautions
  • safety
  • safety
  • Digital Literacy:   process of teaching and learning about technology and the use of technology.
    • Katrina Quick
       
      to be taught, or to learn about technology and how to use it.
    • Nathan Pharris
       
      "Digital Citizenship" is refferenced in this passage. To be a "Digital Citizen" one must gain "electronic access."
  • Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
  • digital rights and supporting electronic access is the starting point of Digital Citizenship
    • Nathan Pharris
       
      Another example of what makes us a "Digital Citizen."
    • DeJuan Griggs
       
      An Example of the way you should conduct yourself in a digital environment 
  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • Gabrielle Yoder
       
      definition of digital citizenship
  •  
    Digital Citezenship
‹ Previous 21 - 37 of 37
Showing 20 items per page