Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged data

Rss Feed Group items tagged

deborahnolan74

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
Jim Davis

Digital identity - 0 views

    • Malcolm Jackson
       
      Any data used to identify one self online.
  • Digital identity is all the online information and data specifically about an individual.
  • Digital identity is all the online information and data specifically about an individual.
  • ...4 more annotations...
  • Digital identity is made up of elements that fall into four categories (
  • Authentication elements: identification number, IP address, email address, user name, password, last name, first name, alias, etc. Data: personal, administrative, banking, occupational, social data, etc. Identifiers: photograph, avatar, logo, image, etc. Digital traces: contributions to blogs and other content management systems, links, etc.
  • Caution
    • Jim Davis
       
      Precautions to your Digital Identity
  • How can you protect yourself?
    • Jim Davis
       
      Protecting your digital identity
  •  
    Digital identity is all the online information and data specifically about an individual.
deborahnolan74

What is Wiki? Webopedia - 1 views

    • Nathan Pharris
       
      Great definition of both a wiki and blog.
  • (n.) A collaborative Web site comprises the perpetual collective work of many authors. Similar to a blog in structure and logic, a wiki allows anyone to edit, delete or modify content that has been placed on the Web site using a browser interface, including the work of previous authors.
    • Wilfredo Cruz
       
      Wiki defined
  • The term wiki refers to either the Web site or the software used to create the site.
  •  
    A wiki is a a web site that displays information, in which anyone can edit. In this article, the author compares a wiki to a blog.
  •  
    A collaborative Web site comprises the perpetual collective work of many authors.
  •  
    A collaborative Web site comprises the perpetual collective work of many authors.
Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
andrew marte

database (computer science) -- Encyclopedia Britannica - 0 views

  • any collection of data, or information, that is specially organized for rapid search and retrieval by a computer
  • structured to facilitate the storage, retrieval, modification, and deletion of data in conjunction with various data-processing operations.
Cameron Browne

What is database? definition and meaning - 1 views

  • Systematically organized or structured repository of indexed information (usually as a group of linked data files) that allows easy retrieval, updating, analysis, and output of data.
  • this data could be in the form of graphics, reports, scripts, tables, text, etc., representing almost every kind of information.
deborahnolan74

What is Database (DB)? Webopedia - 0 views

  • a database is basically a collection of information organized in such a way that a computer program can quickly select desired pieces of dat
  • ase as
  •  
    A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system.
  •  
    A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system.
Cameron Browne

Database Definition - 0 views

  • A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields.
  • Nearly all e-commerce sites uses databases to store product inventory and customer information.
  • By storing website data in a database, the data can be easily searched, sorted, and updated.
  • ...1 more annotation...
  • today's relational databases allow users to access, update, and search information based on the relationship of data stored in different tables.
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground I forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: Fraudulent websites are subtler. Since most savvy Internet shoppers now use price-comparison sites to seek out the best price on their travel tickets, CDs, DVDs and other essentials to their modern lifestyle, cybercriminals are known to create entirely bogus Web portals - suitably meta-tagged to allow Google and Yahoo to spider/screen scrape their data - designed to harvest customer card details and other credentials. Note 4:
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 11 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 80 Good This article explain how frequent and easy it is for companies to steal someone's identity
crinehart0420

What is a Digital Identity? - Definition from Techopedia - 0 views

  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual
  • organization or electronic device.
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
  • ...5 more annotations...
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
    • Brittni Roddin
       
      Important.
  • ore than one digital identity through multiple communities. In terms of digital
  • Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior
    • andrew marte
       
      perfect example
    • crinehart0420
       
      Great example
  • Techopedia explains Digital Identity Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavio
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  • ...1 more comment...
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
kalebhschroder

What Is Digital Identity? - 1 views

  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
    • hunta3454
       
      The knowledge of wha your digital identity actually is.
    • Joey Martinez
       
      I think our digital identity represents how we behave, intercact, and portray ourselves in the digital world.
  • the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships.
  • ...1 more annotation...
  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. That is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity
Michael Fritzel

databases definition - Google Search - 0 views

  • databases  plural of da·ta·base NounA structured set of data held in a computer, esp. one that is accessible in various ways.
  •  
    "databases   A structured set of data held in a computer, esp. one that is accessible in various ways."
Michael Fritzel

internet privacy definition - Google Search - 1 views

  • Internet privacy is the desire or mandate of personal privacy with respect to transactions or transmission of data via the Internet.
  •  
    "Internet privacy is the desire or mandate of personal privacy with respect to transactions or transmission of data via the Internet."
Reshunda Pickens

Obama to propose key changes in data collection program - NBC Politics - 0 views

    • Reshunda Pickens
       
      The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. No  The information on the topic is thorough. No  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 10.7  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. No  There is a way to contact the author (s) via e-mail or traditional mail. No  You can easily tell from the domain name where the page originates. Yes  Total: 5  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10 
  •  
    The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 10.7 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. No There is a way to contact the author (s) via e-mail or traditional mail. No You can easily tell from the domain name where the page originates. Yes Total: 5 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Multimedia (0 to 10 P
andrew marte

CNN - Does technology make the grade? - August 3, 1998 - 0 views

  • schools are rising to the challenge of bringing technology into the classroom and trying to figure out what to do with it once it's there. In
  • his brave new high-tech world, art teachers can take students on a digital trip to the Louvre in Paris for a look at the Mona Lis
  • musicians can compose symphonies on a computer keyboard
  • ...10 more annotations...
  • science classes can access up-to-the-minute NASA data for a project.
  • the school district wanted entire classes to be able to use the computers at one time
  • t invested in laptops, which are easily shared among classes on the same floor.
  • more computers means fewer kids sharing each one--an average of 7.3 students per computer in 1996­97, compared with 19.2 students per terminal just five years earlier, according to Market Data Retr
  • The system delivers information where and when it's needed, and we get the most value for the dollars spent,"
  • Many believe schools like Red Hook's are the future of education.
  • et hooked up to the Internet by 2001.
  • In the 1996-97 school year, 6.3 million computers were used for instruction in U.S. public schools, a whopping 186-percent increase from just five years earlier, according to the most recent figures from Market Data Retrieval, which surveys schools on technology use.
  • teachers use a remote control to access video, satellite, cable and laser- disc technology from the school district's media distribution center without leaving their students.
  • 78 percent of public schools had at least one computer hooked up to the Internet, as did 27 percent of classrooms, up from only 3 percent of classrooms in 1994,
Joey Martinez

Databases - 0 views

  • a structured set of data held in a computer, esp. one that is accessible in various ways.
  •  
    a structured set of data held in a computer, esp. one that is accessible in various ways.
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: There are even reports of some sites supplying users with their required CDs or DVDs (pirate versions, of course) and then selling the identity and card sets via multiple card forums. This is fraud monétisation and identity theft on a one-stop basis.
lsteimle

What can you do with digital security | CompuClever - 0 views

  • Despite a time of global recession, the “Digital Universe” expanded by 62% and by 2020 it will be 44 times as big.  We will have amassed digital information that can be described in zettabytes – that is to say, one zettabyte being a million, million gigabytes.  This would be the equivalent of a stack of DVD’s going halfway to Mars.
    • lsteimle
       
      Nergasm.
  • mass surveillance is occurring
  • This includes: public transport tracking; workplace surveillance, examination of communications (collecting data on all phone calls, emails, chat room discussions and web-browsing habits); mobile phone tracking; vehicle tracking; DNA database sampling; overseas travel; collecting data on political and environmental protestors; and using unmanned aircraft systems (drones) for purposes of security.
  • ...2 more annotations...
  • exposing our personal rights and freedoms
  • effective tools to analyze data, weed out the information that can be safely deleted, remove personal information that can cause us harm if it falls into the wrong hands (including hackers or unethical online businesses), and we need secure storage
    • lsteimle
       
      Digital Security
Brittni Roddin

Database Definition - 1 views

  • A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.
    • Brittni Roddin
       
      Definition for Database
  • A database can generally be looked at as being a collection of records, each of which contains one or more fields (i.e., pieces of data) about some entity (i.e., object), such as a person, organization, city, product, work of art, recipe, chemical, or sequence of DNA.
  • Typically, a database has a schema, which is a description of the model, including the types of entities that are in it and the relationships among them.
David Bell

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
1 - 20 of 56 Next › Last »
Showing 20 items per page