Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged A.

Rss Feed Group items tagged

2More

Game design - Wikipedia, the free encyclopedia - 0 views

  • Game design is the game development process of designing the content and rules of a game in the pre-production stage[1] and design of gameplay, environment, storyline, and characters during production stage. The designer of a game is very much like the director of a film; the designer is the visionary of the game and controls the artistic and technical elements of the game in fulfilment of their vision.[2] Game design requires artistic and technical competence as well as writing skills.[3]
  •  
    Game design is the game development process of designing the content and rules of a game in the pre-production stage[1] and design of gameplay, environment, storyline, and characters during production stage.
15More

Digital Citizenship - 1 views

  • Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology.
  • Digital citizenship is the norms of appropriate, responsible technology use.
  • Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately.
  • ...2 more annotations...
    • caprisunshine
       
      Digital citizenship is the norms of appropriate, responsible technology use.
    • Ryan ORourke
       
      Digital Citizenship
    • Jason Parker
       
      Digital Citizenship definition. A very important tool/resource for adults, children & edecation
    • Kenny VanNess
       
      Digital Citizenship definition: The norms of appropriate responsible technology use
    • Dustin Habermehl
       
      Digital Citizenship definition explained 
    • gb malone
       
      digital citizenship definition explaind. However thru digital citizenship we learn that we must be responsible and not miss use tehnology
    • Jim Davis
       
      Digital Citizenship explaination
    • Adam Myers
       
      This is an excellent and easily understandable definition of Digital Citizenship.
  •  
    "Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use."
  • ...1 more comment...
  •  
    "Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use."
  •  
    This is a website helping define the issues of appropriate technology use. It provides a framework of nine elements for users to better understand the issues.
  •  
    This is a website helping define the issues of appropriate technology use. It provides a framework of nine elements for users to better understand the issues.
2More

Westboro Baptist Church founder Fred Phelps Sr. 'on the edge of death' - NY Daily News - 0 views

    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
2More

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
7More

What Is Digital Identity? - 1 views

  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
    • hunta3454
       
      The knowledge of wha your digital identity actually is.
    • Joey Martinez
       
      I think our digital identity represents how we behave, intercact, and portray ourselves in the digital world.
  • the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships.
  • ...1 more annotation...
  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity
2More

Massive open online course - Wikipedia, the free encyclopedia - 0 views

  • A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course
  •  
    "A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course"
16More

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
1More

What is collaboration? definition and meaning - 0 views

  • General: Cooperative arrangement in which two or more parties (which may or may not have any previous relationship) work jointly towards a common goal.
4More

Database Definition - 1 views

  • A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.
    • Brittni Roddin
       
      Definition for Database
  • A database can generally be looked at as being a collection of records, each of which contains one or more fields (i.e., pieces of data) about some entity (i.e., object), such as a person, organization, city, product, work of art, recipe, chemical, or sequence of DNA.
  • Typically, a database has a schema, which is a description of the model, including the types of entities that are in it and the relationships among them.
31More

Nine Elements of Digital Citizenship - 3 views

    • yanika scotton
       
      1. Digital Access:   full electronic participation in society. 2. Digital Commerce:   electronic buying and selling of goods. 3. Digital Communication:   electronic exchange of information. 4. Digital Literacy:   process of teaching and learning about technology and the use of technology. 5. Digital Etiquette:   electronic standards of conduct or procedure. 6. Digital Law:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
    • Roberto Dunn
       
      one page, lots of useful information!
  • In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • ...22 more annotations...
  • Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
  • Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
  • We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
  • Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
  • It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
  • Digital law deals with the ethics of technology within a society.
  • Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
  • Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
  • Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.
  • Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
  • In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
    • gb malone
       
      digital security teaches us that we need protection at all times. ex{ virus protectionvirus protection
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
    • ino moreno
       
      Great notes guys!!:)
  • precautions
  • safety
  • safety
  • Digital Literacy:   process of teaching and learning about technology and the use of technology.
    • Katrina Quick
       
      to be taught, or to learn about technology and how to use it.
    • Nathan Pharris
       
      "Digital Citizenship" is refferenced in this passage. To be a "Digital Citizen" one must gain "electronic access."
  • Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
  • digital rights and supporting electronic access is the starting point of Digital Citizenship
    • Nathan Pharris
       
      Another example of what makes us a "Digital Citizen."
    • DeJuan Griggs
       
      An Example of the way you should conduct yourself in a digital environment 
  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • Gabrielle Yoder
       
      definition of digital citizenship
  •  
    Digital Citezenship
2More

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
5More

Digital identity - Wikipedia, the free encyclopedia - 0 views

  • evails in the domains of cyberspace, and is defined as a set of data that uniquely describes a person or a thing (sometimes referred to as subject or entity) and contains information about the subject's relationships to other entities
  • is a psychological identity that pr
    • gb malone
       
      digital identity; is online identity describes a person or a thing and contains information
  • ...2 more annotations...
  • Digital identity fundamentally requires digital identifiers—strings or tokens that are unique within a given scope (globally or locally within a specific domain, community, directory, application, etc.). Identifiers are the key used by the parties to an identification relationship to agree on the entity being represented. Identifiers may be classified as omnidirectional and unidirectiona
  • Despite the fact that there are many authentication systems and digital identifiers that try to address these problems, there is still a need for a unified and verified identification system.
4More

Digital citizen - Wikipedia, the free encyclopedia - 0 views

  • commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation.
  • People characterizing themselves as digital citizens often use IT extensively, creating blogs, using social networks, and participating in web journalism sites.[
  • A digital citizen commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation. K. Mossberger, et al.[1] define digital citizens as "those who use the Internet regularly and effectively."
  • ...1 more annotation...
  • Digital citizen
7More

MediaShift . The Importance and Challenges of Universal Media Literacy Education | PBS - 0 views

    • ino moreno
       
      safety has become a major issue with social networks all over the web.
  • The campaign reports that 61 percent of 13 to 17 year-olds publish a profile on social networking sites, and one in seven young people receive sexual solicitations over the Internet (70% of which are girls). But kids aren't only the victims. They can be perpetrators, as when it comes to so-called textual harassment" or cyber-bullying.
  • My curiosity about the prospects for media literacy education in the testing-heavy era of the "No Child Left Behind" Act led me to attended a panel at the NAMLE conference entitled, "Does It Work? Assessing the Effectiveness of Media Literacy in K-12 Education." The panel featured some of the brightest minds in media literacy, including Renee Hobbs, Cyndy Scheibe, Peter Worth and David Kleeman. Yet there was hardly a consensus on how to create a measurement protocol that can determine whether a certain media literacy curriculum is successful.
  • ...4 more annotations...
    • ino moreno
       
      begin using different approaches to teaching styles, i feel that would be a great improvement to this system.the more technology involved while expensive it may be, will interest and excite kids to learn in a "new" more up to date method.
  • Mark Hannah has spent the past several years conducting sensitive public affairs campaigns for well-known multinational corporations, major industry organizations and influential non-profits. He specializes in issues and reputation management online. Before joining the PR agency world (v-Fluence Interactive and Edelman), Mark worked for the Kerry-Edwards presidential campaign as a member of the national advance staff. He's more recently conducted advance work for the Obama-Biden campaign. He is a member of the Public Relations Society of America and a fellow at the Society for New Communications Research, and he serves as an awards judge for both organizations. A graduate of the University of Pennsylvania, he's currently pursuing a master's in strategic communications at Columbia University. He is an independent communications consultant based in New York City and the public relations correspondent for MediaShift. You can reach him at markphannah[at]gmail[dot]com.
    • ino moreno
       
      Good source!! lists their personal Email, where the person graduated from, and works within the public and whitehouse.
  • in order to prepare students for the modern workforce, education must go beyond core curricula and teach "critical thinking and problem solving skills, communication skills, creativity and innovation skills, collaboration skills, contextual learning skills, and information and media literacy skills."
2More

Lance's life: Travel, kids, golf handicap 'down to a 9' - 0 views

    • Reshunda Pickens
       
      The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. N/A  The information on the topic is thorough. Yes  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 15  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. Yes  There is a way to contact the author (s) via e-mail or traditional mail. Yes  You can easily tell from the domain name where the page originates. Yes  Total: 10  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10  Mul
  •  
    Lance Armstrong is the athlete who came out with the shocking news that he cheated for his Tour de France wins. This is the state of his life a year after. The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. N/A The information on the topic is thorough. Yes The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 15 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time.
8More

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
  • LOAD-DATE: March 16, 2014
  • Copyright 2014 Daily News, L.P.
  • ...5 more annotations...
  • March 16, 2014 Sunday
  • BYLINE: BY LARRY McSHANE NEW YORK DAILY NEWS
  • Daily News (New York)
  • BYLINE: BY LARRY McSHANE NEW YORK DAILY NEWSSECTION: NEWS; Pg. 5
  • LOAD-DATE: March 16, 2014LANGUAGE: ENGLISHGRAPHIC: A man cries (top) at prayer ceremony for passengers' family members Saturday in Subang Jaya, Malaysia. Messages of hope outside temple (c.). A family member gets emotional before prime minister's announcement Saturday.PUBLICATION-TYPE: NewspaperCopyright 2014 Daily News, L.P.
14More

Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views

  • By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
    • P Yim
       
      3 hours for information to spread
  • The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
    • P Yim
       
      Facebook- Digital Tool
  • At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
    • P Yim
       
      Twitter - Digital Tool
  • ...7 more annotations...
  • At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
  • Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
  • Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
  • @YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
  • Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
  • Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
  • @YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
  •  
    NY Times article - Negative
6More

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
2More

This Is How You Make Millions Off Your Grandma's Brownie Recipe - 0 views

    • Reshunda Pickens
       
      The score for this article was an 81.2 based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. No This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 8.6 I arrived at this by using 15 (total score) divided by 7 (number of questions) multiplied by 4 (number of criteria met) and rounded to the nearest tenth. I used this scoring system for all sections. Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. No The links are logically grouped. No The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. No The icons clearly represent what is intended. Yes Total: 6.3 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Ye
  •  
    This article is by Lauren Betesh and describes the success and motivations behind the company thinkThin. The CEO of thinkThin is Lizanne Falsetto. She turned a family recipe into a multimillion dollar company. This article includes a video interview that is a great digital resource. The interview is available right on the article page to view immediately.
‹ Previous 21 - 40 of 420 Next › Last »
Showing 20 items per page