Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged calls

Rss Feed Group items tagged

P Yim

Terrorism strikes Boston Marathon as bombs kill 3, wound scores - CNN.com - 1 views

  • In addition to scrutinizing images of surveillance cameras in the area, the FBI likely was issuing subpoenas for records from cell towers in the area to isolate and trace calls from around Copley Square at the time of the blasts, according to a former federal law enforcement official who now works in the intelligence community.
    • P Yim
       
      Digital Tool - Surveillance cameras - Cell Towers
  •  
    CNN article pre apprehension of suspect(s)
P Yim

2nd Bombing Suspect Caught After Frenzied Hunt Paralyzes Boston - NYTimes.com - 1 views

  • The Boston Police Department announced on Twitter: “Suspect in custody. Officers sweeping the area,” and MayorThomas M. Menino posted: “We got him.”
    • P Yim
       
      Digital Tool - Twitter
  • The discovery of Mr. Tsarnaev came just over 26 hours after the F.B.I. circulated pictures of him and his brother and called them suspects in Monday’s bombings,
    • P Yim
       
      Digital Tool - Photos
  • And Boston, New England’s largest city, was essentially shut down.
  • ...1 more annotation...
  • Transit service was suspended all day. Classes at Harvard, M.I.T., Boston University and other area colleges were canceled. Amtrak halted service into Boston. The Red Sox game at Fenway Park was postponed, as was a concert at Symphony Hall. Gov. Deval Patrick of Massachusetts urged residents to stay behind locked doors all day
  •  
    Article about Boston City Marathon 2nd Bomber
anthony chaney

ERIC - Collaborative Learning in Teaching a Second Language through the Internet, Turki... - 3 views

  • We can call the education offered by using the Internet environment as "teaching through the Internet". Such a teaching contributes to interaction, which is not sufficient in traditional classrooms most of the time.
  • discovering alternatives in learning and developing their own learning styles. In addition, this type of teaching allows learners to see subjects from different perspectives.
  • Groups having special interests can share their own experiences even if they are too far from each other. When we look at the aims of this type of learning that is mostly used in higher education, it is seen that learners are encouraged to learn through distance educatio
  • ...1 more annotation...
  • The aim of learning through collaboration is to obtain information and use this information to solve a problem. In general, collaborative learning creates a positive social environment and facilitates comprehension. Collaborative learning is based on the idea that learners working in groups towards a common goal can learn better than the students who can work on their own.
P Yim

Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views

  • By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
    • P Yim
       
      3 hours for information to spread
  • The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
    • P Yim
       
      Facebook- Digital Tool
  • At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
    • P Yim
       
      Twitter - Digital Tool
  • ...7 more annotations...
  • At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
  • Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
  • Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
  • @YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
  • Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
  • Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
  • @YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
  •  
    NY Times article - Negative
andrew marte

IdentityBlog - Digital Identity, Privacy, and the Internet's Missing Identity Layer - 0 views

  • , digital identity has a complex relationship with flesh-and-blood identity, which I'll call natural identity
  • Sometimes we want digital identity to correspond to natural identity
  • sometimes we want the two to be isolated, or the knowledge of the connection to be highly controlled.
andrew marte

illumiblog » Are You A "Digital Native" or a "Digital Immigrant"? - 0 views

  • “digital immigrants,” technology is a tool we pick up and use: we adapt to it, but it is not “home” for us
  • always retain to some extent what  Prensky calls their “accent,” that is, their “foot in the past.
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground I forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: Fraudulent websites are subtler. Since most savvy Internet shoppers now use price-comparison sites to seek out the best price on their travel tickets, CDs, DVDs and other essentials to their modern lifestyle, cybercriminals are known to create entirely bogus Web portals - suitably meta-tagged to allow Google and Yahoo to spider/screen scrape their data - designed to harvest customer card details and other credentials. Note 4:
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 11 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 80 Good This article explain how frequent and easy it is for companies to steal someone's identity
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: There are even reports of some sites supplying users with their required CDs or DVDs (pirate versions, of course) and then selling the identity and card sets via multiple card forums. This is fraud monétisation and identity theft on a one-stop basis.
Jose Nieves

Dangers of loneliness: Social isolation is deadlier than obesity. - 1 views

  • The increased mortality risk is comparable to that from smoking. And loneliness is about twice as dangerous as obesity.
  • A recent study of Facebook users found that the amount of time you spend on the social network is inversely related to how happy you feel throughout the day.
  • ost of us know what it is like to be lonely in a room full of people,
  • ...4 more annotations...
  • no one who knows you, you will feel isolated.
  • the number of people we know is not the best measure.
  • When we are lonely, we lose impulse control and engage in what scientists call “social evasion.”
  • less concerned with interactions and more concerned with self-preservation,
  •  
    Isolation stories
lsteimle

What can you do with digital security | CompuClever - 0 views

  • Despite a time of global recession, the “Digital Universe” expanded by 62% and by 2020 it will be 44 times as big.  We will have amassed digital information that can be described in zettabytes – that is to say, one zettabyte being a million, million gigabytes.  This would be the equivalent of a stack of DVD’s going halfway to Mars.
    • lsteimle
       
      Nergasm.
  • mass surveillance is occurring
  • This includes: public transport tracking; workplace surveillance, examination of communications (collecting data on all phone calls, emails, chat room discussions and web-browsing habits); mobile phone tracking; vehicle tracking; DNA database sampling; overseas travel; collecting data on political and environmental protestors; and using unmanned aircraft systems (drones) for purposes of security.
  • ...2 more annotations...
  • exposing our personal rights and freedoms
  • effective tools to analyze data, weed out the information that can be safely deleted, remove personal information that can cause us harm if it falls into the wrong hands (including hackers or unethical online businesses), and we need secure storage
    • lsteimle
       
      Digital Security
‹ Previous 21 - 30 of 30
Showing 20 items per page