Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged do

Rss Feed Group items tagged

darcy gill

Being a Digital Native Isn't Enough | Guest Blog, Scientific American Blog Network - 0 views

  • never realized how hard it would be to limit my toddler’s screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it “my phone” and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is “supposed” to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology–and it is intuitive and easy to navigate. One of our friend’s children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
  •  
    I never realized how hard it would be to limit my toddler's screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it "my phone" and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is "supposed" to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology-and it is intuitive and easy to navigate. One of our friend's children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
Lisa Lowder

EBSCOhost: Critical Appraisal of Information on the Web in Practice: Undergraduate Stu... - 0 views

  • Results indicated that students failed to use critical appraisal criteria, and that while knowledge of and self-reported use of these criteria were related to each other, they were not related to behaviour. This research demonstrates the need for alternative strategies for critical appraisal instruction and assessment. (Contains 3 figures.)
    • Lisa Lowder
       
      This article is credible. It is a research paper measuring how students actually use their information literacy skills. It contains many scholarly references and conclusions seem to be well supported. The authors are identified and the article is from a professional journal.
  •  
    This article describes a practical analysis of how students actually use information literacy. It argues that students may know what they are supposed to do to evaluate information but they do not often do it. An argument is made that students can be taught information literacy in universities.
Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
chris mackie

Westboro Baptist Church founder Fred Phelps Sr. 'on the edge of death' - NY Daily News - 0 views

    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
john grable

Digital Literacy Resource - Introduction - 1 views

    • caprisunshine
       
      Common misconception between "Digital Natives" and "Digital Immigrants" described in Marc Prensky's Digital Natives, Digital Immigrants article.
    • Jason Parker
       
      I think it's crucial that this may change as do people and technological advances
  • technology is changing faster than society is
  • What is Digital Literacy? Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet. As a Cornell student, activities including writing papers, creating multimedia presentations, and posting information about yourself or others online are all a part of your day-to-day life, and all of these activities require varying degrees of digital literacy. Is simply knowing how to do these things enough? No—there’s more to it than that.
  •  
    What is Digital Literacy? Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet. As a Cornell student, activities including writing papers, creating multimedia presentations, and posting information about yourself or others online are all a part of your day-to-day life, and all of these activities require varying degrees of digital literacy. Is simply knowing how to do these things enough? No-there's more to it than that.
john grable

Digital Citizenship - Defining Digital Citizenship - 0 views

  •  
    Defining Digital Citizenship Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use. Too often we are seeing students as well as adults misusing and abusing technology but not sure what to do. The issue is more than what the users do not know but what is considered appropriate technology usage.
Brittni Roddin

Digital Law - What is Digital Law - 2 views

  • Digital Law deals with society’s behaviour with using technology
  • Some examples of what digital law deals with are plagiarism, illegal downloading of music, hacking and creating worms or viruses. Plagiarism is the most common thing that teenagers usually do.
    • Nathan Pharris
       
      "Digital alarm" has to deal with the proper conduct online and the highlighted phrases below are examples of what is unethical to do online.
  • ...2 more annotations...
    • Brittni Roddin
       
      What not to do.
    • Brittni Roddin
       
      What not to do.
Michael Fritzel

Massive open online course - Wikipedia, the free encyclopedia - 0 views

  • A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course
  •  
    "A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course"
Joey Martinez

Moral Literacy - 0 views

  • Literacy, moral and other, is a matter of some knowledge-that, and a great deal of know-how.  It is a "capacity for knowing and doing, involving the symbolic manipulation of information as the condition for expressive action" (81).  To discover the connection between this capacity or set of skills and Herman's account of deliberation and choice, we have to look to what she says about the developmental history of moral character.
  •  
    Moral Literacy is a matter of some knowledge-that, and a great deal of know-how.  It is a "capacity for knowing and doing, involving the symbolic manipulation of information as the condition for expressive action" (81).  To discover the connection between this capacity or set of skills and Herman's account of deliberation and choice, we have to look to what she says about the developmental history of moral character.
Joey Martinez

Geo technology - 1 views

  • geotechnology is one of my subjects, I'm doing a presentation on geotechnology applications. I would like to learn more about problems related to geotechnology.
  •  
    Geotechnology is one of my subjects, I'm doing a presentation on Geotechnology applications. I would like to learn more about problems related to Geotechnology.
Joey Martinez

Copy right - 1 views

  • the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  •  
    the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
deborahnolan74

2 Pros And 2 Cons To Education Technology - 0 views

  •  
    There are some important reasons to integrate education technology. However, there are some key considerations to make before doing so.
  •  
    There are some important reasons to integrate education technology. However, there are some key considerations to make before doing so.
david masterson

Do Smart Phones Make Us Dumber? Asking The Internet's Intelligence Questions - All News... - 0 views

    • david masterson
       
      Using auto fill causes us to not use our memory ability, modifying our capacity to remember things.
    • david masterson
       
      Without search engines and GPS we would be totally lost.
Nathan Pharris

How you break digital law daily (and what to do about it) - TODAY.com - 0 views

    • Nathan Pharris
       
      What I highlighted are examples how people break copyright laws. I believe that "digital law" is a board define of "copyright law."
    • Nathan Pharris
       
      This highlighted passage reffences a clause in the "Digital Millennium Copyright Act (DMCA).
  • Despite all of that, you're legally prohibited from sharing your music on a large scale. Posting the actual song files online is particularly problematic. The recording industry even fought Amazon's Cloud Drive, which allows the online storage and playback of digital music without any
Malcolm Jackson

How companies used social media during Hurricane Sandy | World news | guardian.co.uk - 0 views

    • Rivkah WC
       
      Con Edison-largest investment owned energy company
  • the company had only set up in June gained an extra 16,000 followers over the storm.
  • "The most important thing we gained from all of this is people notice someone is paying attention",
  • ...7 more annotations...
  • Con Edison, MTA and JetBlue gathered to discuss their interactions with people through the storm and how that had changed their practices after Sandy moved on.
  • Aaron Donovan, media liaison at the MTA, said the agency had focussed on Twitter, Flickr and YouTube in its Sandy response, but noted that "Twitter had the broadest pick up in a very immediate way
  • He said MTA employees were encouraged to take photos and video while they were out inspecting lines or surveying damage
  • The photos that we send out in real time are the photos that get the largest pick up.
  • "First to communicate changes to service then throughout the storm itself," he said, but later to let people know what they are doing to update service
  • We have incoming tweets asking us questions all the time. We do not have the resources to respond to each and every questions all the time," he said. Instead, "the incoming feed is almost as important as the outgoing feed"
    • Malcolm Jackson
       
      People uses social media to wheather the storm of Hurricane Sandy.
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Lisa Lowder

EBSCOhost: A Student's Guide to Strengthening an Online Community - 1 views

  • . With ideas derived from research and practice, this guide has been written to inform online students about learning communities, the benefits they offer, and how students can assist in building a successful online community.
    • Lisa Lowder
       
      This article can be used for internet collaboration or online etiquette. The article is credible because it was published in an academic journal, it includes citations, it includes detailed information about the author and it has well supported, researched content.
  •  
    This article explains how students should interact in an online community. It provides a list of guidelines on what students can do to become better learners by nurturing online relationships.
ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
Stefanie Robinson

Feds allow banks to do business with marijuana shops, industry still nervous | Fox News - 0 views

  • Published February 14, 2014FoxNews.com
    • Stefanie Robinson
       
      content/ title is clear/ no author jst contributors
    • Stefanie Robinson
       
      content/popular via social net reposts/current post
1 - 20 of 85 Next › Last »
Showing 20 items per page