Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged How-to

Rss Feed Group items tagged

Lisa Lowder

EBSCOhost: An Introduction and Guide to Enhancing Online Instruction with Web 2.0 Tool... - 0 views

  • Web 2.0 tools offer ways to personalize classes and demonstrate instructional presence.
    • Lisa Lowder
       
      This article is a credible source. It is published in a professional journal which is peer reviewed. It includes good information and uses good sources. It also contains a glossary.
  •  
    This article explains how web-based tools can improve education for the online learner. It suggests that faculty plays a large role in educating online learners about the tools available, the tools they will be using, and how the tools are used. Examples of web-based tools are blogs, wikis, RSS feeds, video and photo sharing, avatars, microblogging, social bookmarking, and social media.
David Bell

EBSCOhost: Scholarly Knowledge Development and Dissemination in an International Conte... - 0 views

    • David Bell
       
      WEB PAGE EVALUATION Currency: 15 The site has the date of last revision posted. The site has been updated recently. Frequency of planned updates and revisions is stated. Content: 15 The information will be useful to our curriculum and/or student interest. This information is not available in any other format elsewhere in my library. The information on the topic is thorough. The information is accurate. The purpose of the page is obvious. The information is in good taste. The page uses correct spelling and grammar. Authority: 10 The authors are clearly identified. The authors and/or maintainers of the site are authorities in their field. There is a way to contact the author (s) via e-mail or traditional mail. You can easily tell from the domain name where the page originates. Navigation: 7 You can tell from the first page how the site is organized and what options are available. The type styles and background make the page clear and readable. The links are easy to identify. The links are logically grouped. The layout is consistent from page to page. There is a link back to the home page on each supporting page. The links are relevant to the subject. The icons clearly represent what is intended. Experience: 10 The page fulfills its intended purpose. The page is worth the time. The page's presentation is eye-catching. The site engages the visitor to spend time there. Multimedia 1 Sound, graphics or video enhance the site's message. Treatment: 10 Any biases towards the subject matter can be easily identified. The page is free from stereotyping. The page is age appropriate for content and vocabulary for its intended audience. Access 5 You can connect quickly to the page. The page is available through search engines. The page loads quickly. You can choose whether to download smaller images, text-only, or non-frame versions. Miscellaneous: 15 There are no per-use costs involved. Interactions asking for private information are secured. Information can be printed wi
David Bell

Web 2.0: A New Wave of Innovation for Teaching and Learning? (EDUCAUSE Review) | EDUCAU... - 0 views

    • David Bell
       
      WEB PAGE EVALUATION Currency: 15 The site has the date of last revision posted. The site has been updated recently. Frequency of planned updates and revisions is stated. Content: 15 The information will be useful to our curriculum and/or student interest. This information is not available in any other format elsewhere in my library. The information on the topic is thorough. The information is accurate. The purpose of the page is obvious. The information is in good taste. The page uses correct spelling and grammar. Authority: 10 The authors are clearly identified. The authors and/or maintainers of the site are authorities in their field. There is a way to contact the author (s) via e-mail or traditional mail. You can easily tell from the domain name where the page originates. Navigation: 10 You can tell from the first page how the site is organized and what options are available. The type styles and background make the page clear and readable. The links are easy to identify. The links are logically grouped. The layout is consistent from page to page. There is a link back to the home page on each supporting page. The links are relevant to the subject. The icons clearly represent what is intended. Experience: 10 The page fulfills its intended purpose. The page is worth the time. The page's presentation is eye-catching. The site engages the visitor to spend time there. Multimedia: 9 Sound, graphics or video enhance the site's message. Treatment: 10 Any biases towards the subject matter can be easily identified. The page is free from stereotyping. The page is age appropriate for content and vocabulary for its intended audience. Access: 5 You can connect quickly to the page. The page is available through search engines. The page loads quickly. You can choose whether to download smaller images, text-only, or non-frame versions. Miscellaneous: 15 There are no per-use costs involved. Interactions asking for private information are secured. Information can be printed
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground I forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: Fraudulent websites are subtler. Since most savvy Internet shoppers now use price-comparison sites to seek out the best price on their travel tickets, CDs, DVDs and other essentials to their modern lifestyle, cybercriminals are known to create entirely bogus Web portals - suitably meta-tagged to allow Google and Yahoo to spider/screen scrape their data - designed to harvest customer card details and other credentials. Note 4:
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 11 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 80 Good This article explain how frequent and easy it is for companies to steal someone's identity
ino moreno

The 25 Rules of Disinformation - The Vigilant Citizen - 1 views

    • ino moreno
       
      Interesting article!!!!!!
  • The Rules of Disinformation
  • 1. Hear no evil, see no evil, speak no evil.
  • ...29 more annotations...
  • 2. Become incredulous and indignant.
  • 3. Create rumor mongers.
  • 4. Use a straw man.
    • ino moreno
       
      seems like a "how to be evil" step by step!
  • Sidetrack opponents with name calling and ridicule.
  • 6. Hit and Run. I
  • 7. Question motives.
  • 8. Invoke authority.
  • 9. Play Dumb.
  • 10. Associate opponent charges with old news.
  • 11. Establish and rely upon fall-back positions.
  • 12. Enigmas have no solution.
  • 13. Alice in Wonderland Logic.
  • 14. Demand complete solutions.
  • 15. Fit the facts to alternate conclusions.
  • 16. Vanishing evidence and witnesses.
  • 17. Change the subject.
  • 18. Emotionalize, Antagonize, and Goad Opponents.
  • 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  • 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
  • 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
  • 22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
  • leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  • 23. Create bigger distractions.
  • 24. Silence critics.
  • sh. If you are a key holder of secrets or otherwise overly illuminated and you
  • think the heat is getting too hot, to avoid the issues, vacate the kitchen.
  • 25. Van
    • ino moreno
       
      WOW! what an interesting read!
chasidymorris

What is privacy - 1 views

    • Jose Nieves
       
      these seem kinda helpful.
  • Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others
  • The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
  • ...3 more annotations...
    • Laura Lewis
       
      Privacy definition
    • John StClair
       
      very simple definition
    • Gage Helton
       
      Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
    • chasidymorris
       
      Internet privacy is your right to control what happens with your personal info
Lisa Lowder

EBSCOhost: A Student's Guide to Strengthening an Online Community - 1 views

  • . With ideas derived from research and practice, this guide has been written to inform online students about learning communities, the benefits they offer, and how students can assist in building a successful online community.
    • Lisa Lowder
       
      This article can be used for internet collaboration or online etiquette. The article is credible because it was published in an academic journal, it includes citations, it includes detailed information about the author and it has well supported, researched content.
  •  
    This article explains how students should interact in an online community. It provides a list of guidelines on what students can do to become better learners by nurturing online relationships.
Corey Gyger

Malaysian Airlines Flight MH370 was almost certainly hijacked by its pilots or a group ... - 0 views

    • Corey Gyger
       
      Thia article is very informative. But how much of it is true? Seems to be speculation. They have better luck trying to find Amelia.
    • Corey Gyger
       
      It shows the flight path and possible places the plane could be. Speculation.
    • Corey Gyger
       
      I wish I knew they're sources. If I could believe this I would be truly informed.
deborahnolan74

How Blogs Work - HowStuffWorks - 0 views

  •  
    Blogs serve as an online journal, linking to other sites and news stories. Learn the basics of blogging, explore the blogosphere and find out how to create blogs.
ino moreno

MediaShift . The Importance and Challenges of Universal Media Literacy Education | PBS - 0 views

    • ino moreno
       
      safety has become a major issue with social networks all over the web.
  • The campaign reports that 61 percent of 13 to 17 year-olds publish a profile on social networking sites, and one in seven young people receive sexual solicitations over the Internet (70% of which are girls). But kids aren't only the victims. They can be perpetrators, as when it comes to so-called textual harassment" or cyber-bullying.
  • My curiosity about the prospects for media literacy education in the testing-heavy era of the "No Child Left Behind" Act led me to attended a panel at the NAMLE conference entitled, "Does It Work? Assessing the Effectiveness of Media Literacy in K-12 Education." The panel featured some of the brightest minds in media literacy, including Renee Hobbs, Cyndy Scheibe, Peter Worth and David Kleeman. Yet there was hardly a consensus on how to create a measurement protocol that can determine whether a certain media literacy curriculum is successful.
  • ...4 more annotations...
    • ino moreno
       
      begin using different approaches to teaching styles, i feel that would be a great improvement to this system.the more technology involved while expensive it may be, will interest and excite kids to learn in a "new" more up to date method.
  • Mark Hannah has spent the past several years conducting sensitive public affairs campaigns for well-known multinational corporations, major industry organizations and influential non-profits. He specializes in issues and reputation management online. Before joining the PR agency world (v-Fluence Interactive and Edelman), Mark worked for the Kerry-Edwards presidential campaign as a member of the national advance staff. He's more recently conducted advance work for the Obama-Biden campaign. He is a member of the Public Relations Society of America and a fellow at the Society for New Communications Research, and he serves as an awards judge for both organizations. A graduate of the University of Pennsylvania, he's currently pursuing a master's in strategic communications at Columbia University. He is an independent communications consultant based in New York City and the public relations correspondent for MediaShift. You can reach him at markphannah[at]gmail[dot]com.
    • ino moreno
       
      Good source!! lists their personal Email, where the person graduated from, and works within the public and whitehouse.
  • in order to prepare students for the modern workforce, education must go beyond core curricula and teach "critical thinking and problem solving skills, communication skills, creativity and innovation skills, collaboration skills, contextual learning skills, and information and media literacy skills."
Malcolm Jackson

Information Literacy - 0 views

    • Malcolm Jackson
       
      Information literat is not the regurgitation of information, but knowing how to properly find credible sources of specific information.
  • Information Literacy: A Compilation of Web Resources
  • The Evolution of Information Literacy The accepted definition of literacy has evolved from being able to read and write to the expanded and more elaborate ability to address the practices and outcomes of education in the Information Age. Literacy is referred to in different terms: math literacy, reading literacy, media literacy, print literacy, visual literacy, cultural literacy, computer literacy. Each literacy prescribes a particular process by which that content area can be more easily negotiated. But there is one -- Information Literacy -- under which all the other literacies reside because it is a tool of empowerment. Students who possess information literacy have a heightened capacity for doing meaningful, relevant work. "Regardless of where information literacy skills are employed, they are applicable in any school, play, or work situation."
  • ...3 more annotations...
    • Malcolm Jackson
       
      Information literacy is the end result of being:math, reading,media, print, visual, cultural, and computer literate. it's understanding how to process and utilize information.
  • information literacy standards form a complete picture in terms of student learning.
  • information literacy provides a conceptual framework and broad guidelines which describe the information-literate student.
  •  
    information literacy characteristics
Jose Nieves

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
Lucas Pergler

Benefits of Team Collaboration in the Cloud | Enterprise CIO Forum - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many time over for a website made for business management and up. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4, 5)The author is posted next to the article for copyright, and the article contains original information from the author, so no citation needed. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Benefit of remote access to internet collaboration and how it closes distances.
Joey Martinez

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
javolin

http://schools.nyc.gov/community/innovation/ConnectedFoundations/EDL/default.htm - 0 views

  • Digital literacy is more than knowing how to send a text or watch a music video. It means having the knowledge and ability to use a range of technology tools for varied purposes.
    • Lucas Pergler
       
      Well articulated and brief definition.
    • Victor Cruz
       
      Great definition with examples
    • Adam Myers
       
      By far my favorite definition of Digital Literacy. It's short, concise, and extrememly accurate.
    • Gabrielle Yoder
       
      One of the best definitions!
  • Digital literacy is more than knowing how to send a text or watch a music video. It means having the knowledge and ability to use a range of technology tools for varied purposes. A digitally literate person can use technology strategically to find and evaluate information, connect and collaborate with others, produce and share original content, and use the Internet and technology tools to achieve many academic, professional, and personal goals.
dmschool

How to Do Keyword Analysis | Keyword Research Tools - 0 views

  •  
    Digital Marketing School provides professional training in how to conduct research and keyword research tools. Learn about free keyword research, SEO research tools and research tips.
Jose Nieves

Could 3D Printing Disrupt the Designer Eyewear Market? - BoF - The Business of Fashion - 0 views

  • It’s used daily across countless industries from automotive and aerospace, right through to consumer goods and electronics,
  • rapid prototyping
  • uxottica uses 3D printing technologies to speed up the process of product development in the prototyping phase,”
  • ...5 more annotations...
  • Using unique multi-material technology, customers can now even print the rigid plastic frame along with the clear transparent lens all in a single build — requiring no assembly — in just a matter of hours,
  • increase in manufacturers using 3D printing to produce short-run production parts that can be used directly in the final product
  • they are set to become better and cheaper over time, radically lowering barriers to entry for start-ups like Protos, no matter how small their production runs.
  • “With traditional methods of manufacturing, eyewear companies need to mass produce thousands of the same exact frame. With 3D printing, we are not constrained by the same rules or properties, so each pair of glasses can be unique,” said Levinson.
  • US president Obama’s administration has already pledged funding of up to $60 million to a National Additive Manufacturing Innovation Institute.
ino moreno

My Networked Life: Internet Connections and Social Connections | KBZ - 0 views

    • ino moreno
       
      with a bit of reading, the article is not bad!
  • While she is on the road, Alisa is able to keep up with her assignments online. Her laptop is always on hand so she can quickly see what work she needs to do. Her computer also lets her stay connected to friends and her host families, who have become more like real family.
  • Internet is so important to Alisa because it allows her to stay in touch with people from her travels.
  • ...2 more annotations...
  • Social media in China is different than in other countries due to the special political situation and economic environment. China has social networks that are the equivalent of Facebook and Twitter, but in this country they are used in slightly different ways. “People in the U.S. use Twitter more like casual talking,” says Hanwen. “In China people use social media more to share formal news.”
    • ino moreno
       
      interesting to see how different in the world we really are. hmmmm what is going on america???
kalebhschroder

Cornell University - Digital Literacy Resource - 1 views

  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet.
    • Brittni Roddin
       
      Digital Literacy Definition
  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet.
  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet. As a Cornell student, activities including writing papers, creating multimedia presentations, and posting information about yourself or others online are all a part of your day-to-day life, and all of these activities require varying degrees of digital literacy. Is simply knowing how to do these things enough? No—there’s more to it than that.
  •  
    Digital Literacy allows people to collect and use information via the Internet.
  •  
    Digital Literacy allows people to collect and use information via the Internet.
Laura Lewis

http://www.arabmediasociety.com/articles/downloads/20130221104512_Tusa_Felix.pdf - 0 views

    • Laura Lewis
       
      But even though social media and the Internet did not cause the Arab Spring and the  fall of President Hosni Mubarak in Egypt, they clearly defined how and when these  protests took place, and are thus of direct interest to this article. CMC creates a space  between the public and private spheres that was clearly little understood by the  authorities in these case studies. Technology allowed people to share not simply  information about how and when to protest, but more importantly, to share images  and videos that contributed to a different interpretation of events than that which the  authorities themselves wished.
« First ‹ Previous 41 - 60 of 109 Next › Last »
Showing 20 items per page