Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology.
15More
Digital Citizenship - 1 views
-
Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately.
- ...2 more annotations...
-
-
Digital citizenship is the norms of appropriate, responsible technology use.
-
-
Digital Citizenship definition. A very important tool/resource for adults, children & edecation
-
Digital Citizenship definition: The norms of appropriate responsible technology use
-
-
digital citizenship definition explaind. However thru digital citizenship we learn that we must be responsible and not miss use tehnology
-
-
-
-
"Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use."
- ...1 more comment...
-
"Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use."
-
This is a website helping define the issues of appropriate technology use. It provides a framework of nine elements for users to better understand the issues.
-
This is a website helping define the issues of appropriate technology use. It provides a framework of nine elements for users to better understand the issues.
2More
Westboro Baptist Church founder Fred Phelps Sr. 'on the edge of death' - NY Daily News - 0 views
-
-
1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
-
-
-
1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
-
2More
Malware - 0 views
-
“Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
7More
What Is Digital Identity? - 1 views
-
Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
-
-
the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships.
- ...1 more annotation...
-
Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
-
3. Digital Identity: A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity: he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm
-
Digital Identity: A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity
2More
Massive open online course - Wikipedia, the free encyclopedia - 0 views
-
A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course
-
"A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course"
16More
Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views
-
-
concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
-
, we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
- ...12 more annotations...
-
For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
-
-
simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
-
andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
-
Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
-
the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
-
In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
-
-
Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
-
For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
-
Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
-
1More
shared by Cameron Browne on 03 Dec 13
- No Cached
What is collaboration? definition and meaning - 0 views
www.businessdictionary.com/...collaboration.html
collaboration definition DGL DGL Vocabulary digital literacy research Vocabulary
![](/images/link.gif)
4More
Database Definition - 1 views
-
A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.
-
A database can generally be looked at as being a collection of records, each of which contains one or more fields (i.e., pieces of data) about some entity (i.e., object), such as a person, organization, city, product, work of art, recipe, chemical, or sequence of DNA.
-
Typically, a database has a schema, which is a description of the model, including the types of entities that are in it and the relationships among them.
31More
Nine Elements of Digital Citizenship - 3 views
-
-
1. Digital Access: full electronic participation in society. 2. Digital Commerce: electronic buying and selling of goods. 3. Digital Communication: electronic exchange of information. 4. Digital Literacy: process of teaching and learning about technology and the use of technology. 5. Digital Etiquette: electronic standards of conduct or procedure. 6. Digital Law: electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities: those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness: physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection): electronic precautions to guarantee safety.
-
-
-
In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
- ...22 more annotations...
-
Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
-
Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
-
We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
-
Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
-
It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
-
Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
-
Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
-
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world. With these rights also come responsibilities as well. Users must help define how the technology is to be used in an appropriate manner. In a digital society these two areas must work together for everyone to be productive.
-
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world. Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction. Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
-
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
-
We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
-
-
Digital Literacy: process of teaching and learning about technology and the use of technology.
-
-
Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
-
-
Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.
2More
How the N.S.A. Cracked the Web - The New Yorker - 0 views
-
It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
-
It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
5More
Digital identity - Wikipedia, the free encyclopedia - 0 views
-
evails in the domains of cyberspace, and is defined as a set of data that uniquely describes a person or a thing (sometimes referred to as subject or entity) and contains information about the subject's relationships to other entities
-
- ...2 more annotations...
-
Digital identity fundamentally requires digital identifiers—strings or tokens that are unique within a given scope (globally or locally within a specific domain, community, directory, application, etc.). Identifiers are the key used by the parties to an identification relationship to agree on the entity being represented. Identifiers may be classified as omnidirectional and unidirectiona
-
Despite the fact that there are many authentication systems and digital identifiers that try to address these problems, there is still a need for a unified and verified identification system.
4More
Digital citizen - Wikipedia, the free encyclopedia - 0 views
-
commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation.
-
People characterizing themselves as digital citizens often use IT extensively, creating blogs, using social networks, and participating in web journalism sites.[
-
A digital citizen commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation. K. Mossberger, et al.[1] define digital citizens as "those who use the Internet regularly and effectively."
- ...1 more annotation...
7More
MediaShift . The Importance and Challenges of Universal Media Literacy Education | PBS - 0 views
-
-
The campaign reports that 61 percent of 13 to 17 year-olds publish a profile on social networking sites, and one in seven young people receive sexual solicitations over the Internet (70% of which are girls). But kids aren't only the victims. They can be perpetrators, as when it comes to so-called textual harassment" or cyber-bullying.
-
My curiosity about the prospects for media literacy education in the testing-heavy era of the "No Child Left Behind" Act led me to attended a panel at the NAMLE conference entitled, "Does It Work? Assessing the Effectiveness of Media Literacy in K-12 Education." The panel featured some of the brightest minds in media literacy, including Renee Hobbs, Cyndy Scheibe, Peter Worth and David Kleeman. Yet there was hardly a consensus on how to create a measurement protocol that can determine whether a certain media literacy curriculum is successful.
- ...4 more annotations...
-
-
Mark Hannah has spent the past several years conducting sensitive public affairs campaigns for well-known multinational corporations, major industry organizations and influential non-profits. He specializes in issues and reputation management online. Before joining the PR agency world (v-Fluence Interactive and Edelman), Mark worked for the Kerry-Edwards presidential campaign as a member of the national advance staff. He's more recently conducted advance work for the Obama-Biden campaign. He is a member of the Public Relations Society of America and a fellow at the Society for New Communications Research, and he serves as an awards judge for both organizations. A graduate of the University of Pennsylvania, he's currently pursuing a master's in strategic communications at Columbia University. He is an independent communications consultant based in New York City and the public relations correspondent for MediaShift. You can reach him at markphannah[at]gmail[dot]com.
-
-
in order to prepare students for the modern workforce, education must go beyond core curricula and teach "critical thinking and problem solving skills, communication skills, creativity and innovation skills, collaboration skills, contextual learning skills, and information and media literacy skills."
2More
Lance's life: Travel, kids, golf handicap 'down to a 9' - 0 views
-
-
The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. N/A The information on the topic is thorough. Yes The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 15 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Mul
-
-
Lance Armstrong is the athlete who came out with the shocking news that he cheated for his Tour de France wins. This is the state of his life a year after. The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. N/A The information on the topic is thorough. Yes The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 15 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time.
8More
LexisNexis® Academic: Document - 0 views
-
-
1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
-
- ...5 more annotations...
-
LOAD-DATE: March 16, 2014LANGUAGE: ENGLISHGRAPHIC: A man cries (top) at prayer ceremony for passengers' family members Saturday in Subang Jaya, Malaysia. Messages of hope outside temple (c.). A family member gets emotional before prime minister's announcement Saturday.PUBLICATION-TYPE: NewspaperCopyright 2014 Daily News, L.P.
14More
Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views
-
By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
-
The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
-
At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
- ...7 more annotations...
-
At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
-
Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
-
Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
-
@YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
-
Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
-
Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
-
@YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
6More
shared by David Bell on 26 May 13
- No Cached
Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views
science.time.com/...rricane-sandy-will-be-historic
newspaper news preparation Time NOAA storm warning media digital
![](/images/link.gif)
-
will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
-
“We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
-
NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
- ...2 more annotations...
-
This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
2More
This Is How You Make Millions Off Your Grandma's Brownie Recipe - 0 views
-
-
The score for this article was an 81.2 based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. No This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 8.6 I arrived at this by using 15 (total score) divided by 7 (number of questions) multiplied by 4 (number of criteria met) and rounded to the nearest tenth. I used this scoring system for all sections. Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. No The links are logically grouped. No The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. No The icons clearly represent what is intended. Yes Total: 6.3 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Ye
-
-
This article is by Lauren Betesh and describes the success and motivations behind the company thinkThin. The CEO of thinkThin is Lizanne Falsetto. She turned a family recipe into a multimillion dollar company. This article includes a video interview that is a great digital resource. The interview is available right on the article page to view immediately.