Hurricane Katrina, 9/11, Princess Diana's death — these three events might have played out differently had social media been as strong as it is now.
2More
3More
Not Alone in the Field: Distance Collaboration via the Internet in a Focused Ethnography - 0 views
-
-
-
1,2)PDF from EBSCOhost containing content of a serious nature, authored by two PhD's. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4,5)Authors are printed at the start of the article and contains information under the creative commons attribution license, so no copyright/citation necessary. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)PDF verified viewable on IE, Chrome, Firefox. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
Collaborate with Your Competitors-and Win - Harvard Business Review - 1 views
-
-
1)Article contains content of a serious nature that directly relates to my research. 2)Authors are all professors of business in their respective universities. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The authors are printed below the title of the article. 5)Citation is used throughout when necessary. 6)Already an older article, and will most likely not be updated, but information still relevant to my research. 7)Google search led me here which I do not believe was censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project
-
1More
EBSCOhost: An Evaluation of Internet Based CAD Collaboration Tools. - 0 views
-
-
1,2)PDF from EBSCOhost containing content of a serious nature, authored by a writer for well known technology publication. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printer under the article title for copyright. 5)Citation used throughout article when outside information used. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
Average domestic airfare prices: Average domestic airfare rises 10% - Los Angeles Times - 1 views
articles.latimes.com/...0620-travel-briefcase-20110620
Internet Internet Collaboration Online Collaboration DGL airfare prices
![](/images/link.gif)
-
-
1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a well known and respected newspaper. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title and has been writing for the publication for years. 5)Citation is not fully defined other than to mention a source throughout the article. 6, 7)The site is continually updated and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
Online, Anonymity Breeds Contempt - NYTimes.com - 1 views
www.nytimes.com/...30zhuo.html
Internet Internet Collaboration Online Collaboration DGL anonymity nytimes
![](/images/link.gif)
-
-
1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for the New York Times publication. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under title for copyright. 5)Citation through use of hyperlinks when used. 6)Parent site continually updated, but specific article is not. 7)Google search lead me here so I do not believe my results were filtered. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
File Sizes for Kindle Books-The Text, the Images, and the Cover Image - 0 views
webdesign.about.com/...kindle-file-sizes.htm
Internet ebscohost Internet Collaboration Online Collaboration file sizes text
![](/images/link.gif)
-
-
1,2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for getting answers from professionals in the appropriate field. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed under the title for copyright. 5)No citation is given aside from general name for source of information. 6,7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
EBSCOhost: Confidence IN THE CLOUD. - 3 views
web.ebscohost.com.oclc.fullsail.edu/...pdfviewer
Internet ebscohost Internet Collaboration Online Collaboration
![](/images/link.gif)
-
-
1,2)PDF from EBSCOhost containing content of a serious nature, created by a published author in a leading computer magazine. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed at the start of the article for copyright purposes. 5)Citations used when needed throughout article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
1More
Public Telepresence Rooms « Tata - 0 views
-
-
1,2)Article is serious because it is information about the services provided by a company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4,5)No author listed as it is basic company info, meaning copyright belongs to the company. 6)Site will be continually updated as necessary by company in order to broadcast any changes in company poilicies/functions. 7)Google search found the site, and I do not believe it censored my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
1More
Cloud storage data risks and encryption | Naked Security - 0 views
-
-
1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for internet security. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title for copyright. 5)Citation is not used aside from mentioning the company who stated the information in question. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
EBSCOhost: Security Architecture of Cloud Computing. - 1 views
web.ebscohost.com.oclc.fullsail.edu/...pdfviewer
Internet Internet Collaboration Online Collaboration DGL ebscohost security
![](/images/link.gif)
-
-
1,2)PDF from EBSCOhost containing content of a serious nature, authored by a PhD. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under the title and has a doctorate in the related field. 5)Citation printed at the end of the article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
Collaboration Security - Cisco on Cisco - Cisco Systems - 1 views
www.cisco.com/...collaboration_security.html
Internet Internet Collaboration Online Collaboration risks security DGL
![](/images/link.gif)
-
-
1)Article contains content of a serious nature that directly relates to my research.. 2)No author mentioned, public statement by company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)No author posted, copyright belongs to company. 5)Information is created by company, no citation necessary. 6)Being a public statement from a well renowned company, updates will happen as relevant information changes. 7)Public company statement, so censor ship is probably only done if needed to protect company assets. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
11More
CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views
-
1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
-
2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
-
3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
- ...7 more annotations...
-
4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
-
5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
-
6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
-
Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
-
If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
-
Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
-
What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
32More
The 25 Rules of Disinformation - The Vigilant Citizen - 1 views
-
- ...29 more annotations...
-
-
19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
-
20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
-
leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
-
31More
Nine Elements of Digital Citizenship - 3 views
-
-
1. Digital Access: full electronic participation in society. 2. Digital Commerce: electronic buying and selling of goods. 3. Digital Communication: electronic exchange of information. 4. Digital Literacy: process of teaching and learning about technology and the use of technology. 5. Digital Etiquette: electronic standards of conduct or procedure. 6. Digital Law: electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities: those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness: physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection): electronic precautions to guarantee safety.
-
-
-
In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
- ...22 more annotations...
-
Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
-
Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
-
We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
-
Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
-
It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
-
Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
-
Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
-
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world. With these rights also come responsibilities as well. Users must help define how the technology is to be used in an appropriate manner. In a digital society these two areas must work together for everyone to be productive.
-
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world. Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction. Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
-
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
-
We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
-
-
Digital Literacy: process of teaching and learning about technology and the use of technology.
-
-
Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
-
-
Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.
‹ Previous
21 - 37 of 37