Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged internet

Rss Feed Group items tagged

Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
Michael Fritzel

internet privacy definition - Google Search - 1 views

  • Internet privacy is the desire or mandate of personal privacy with respect to transactions or transmission of data via the Internet.
  •  
    "Internet privacy is the desire or mandate of personal privacy with respect to transactions or transmission of data via the Internet."
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
deborahnolan74

Shibboleth Authentication Request - 5 views

    • Jackie Davidson
       
      Twitter shares up-this article gave more content and information.
    • Joshua Whitley
       
      10 Currency-Not current, no updates, can be used in classroom setting 7 Content is credible. the story can be useful to students to educate. The information is valid.  8 Authority- Authors' names are at the top of article, no links to contact author, Authors' Occupation is visible 7 Navigation-No links relevant to topic. everything clear and readable,  10 Experience-Fulfills it's intended purpose.  very engaging to me.  0 Multimedia-no multimedia  7 Treatment- Bias toward Democrats,   6 Access-Easy to access page, no relevant links to help further investigate,    7 Miscellaneous-no per-use cost, no inquiring of private info, can be printed with no issues 
    • troy seaton
       
      WiTricity Corporation make devices that allows wireless charging.
  • WiTricity is also developing technology for wireless charging of electric vehicles and, later, for use in implanted medical devices like heart pumps, said Katie Hall, its chief technology officer.
  • ...6 more annotations...
  • The technology is based on magnetic induction -- the process used to recharge electric toothbrushes. In the toothbrush, the base has a magnetic coil that generates a magnetic field. A second coil in the toothbrush captures some of that field, inducing an electric current.But electric toothbrushes transfer power only from the primary coil to the secondary one at very close range. Move the brush a short distance from the base, and it won't charge.
  • WiTricity has signed a technology transfer and licensing agreement with MediaTek, a semiconductor company in Taiwan, to collaborate on systems for wireless charging of mobile handsets, tablet computers, game controllers and other devices, Mr. Giler said.
    • troy seaton
       
      Other devices that are development
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
  •  
    AFP - RELAXNEWS (English International Version) Two film stars, Michael Douglas and Paul Rudd, are to share the title role in the next film from "The World's End" director Edgar Wright, due 2015. After Robert Redford's stint in "Captain America: The Winter Soldier," Marvel has recruited another legendary actor for an upcoming blockbuster in Michael Douglas. The 69-year-old will become the face of Henry Pym and hand over the Ant-Man moniker to Scott Lang, the new hero played by Paul Rudd. Ant-Man first appeared in print in 1962 and has become the alter ego for a number of Marvel characters; the film sees Lang succeed Pym as the electronics whizz in charge of wearing the Ant-Man mantle, able to shrink, grow, and communicate with insects. Dated for July 31, 2015, "Ant-Man" should also result in the character's addition to the supporting cast of the next Avengers film, set for mid-2018.
  •  
    Adknowledge is a leading digital marketing company working with some of the worldâs top brands. Adknowledge designs, manages and measures campaigns for companies including Audi, Starbucks, LG, Disney and LâOréal to unlock digital audiences using multiple channels: social media, mobile, apps, email, display ads and audience engagement. A proprietary database of more than 600 million internet and mobile users steers Adknowledgeâs targeting; user preferences, online behavior and unsurpassed optimization ensure surgical message precision. In addition, Adknowledge helps publishers monetize their sites and lists effectively, with great attention to contextual relevance. Since it was founded 2004, Adknowledge has grown organically and through acquisitions. This includes a 2011 purchase of Toronto-based AdParlor, one of the first Facebook Strategic Preferred Marketing Developers (sPMD). Adknowledge is based in Kansas City, Missouri; it also has North American offices in San Francisco, New York Fort Myers and Toronto. It has overseas locations in London, Paris, Munich and Shanghai with sales presence in Australia and Brazil. Today, there are approximately 300 Adknowledge employees located around the world.
ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
Jose Nieves

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
Jose Nieves

Networking Rebellion: Digital Policing and Revolt in the Arab Uprisings | The Abolitionist - 0 views

  • Because Egyptian television and radio were state-controlled, the internet became a means to publicize the demonstrations and evade state censorship. As a result, the Egyptian and other Arab uprisings have largely been described as a series of “Twitter” or “Facebook” revolutions.
  • global democracy, allowing repressed peoples to find each other and network in ways which were previously impossible or too dangerous under authoritarian regimes.
  • nternet and cellphone services were cut in a desperate attempt to stop the escalating protests.
  • ...9 more annotations...
  • consequences of this action actually increased mobilizations.
  • The disruption of cellphone [sic] coverage and Internet on the 28th exacerbated the unrest in at least three major ways. It implicated many apolitical citizens unaware of or uninterested in the unrest; it forced more face-to-face communication, i.e., more physical presence in streets; and finally it effectively decentralized the rebellion on the 28th through new hybrid communication tactics, producing a quagmire much harder to control and repress than one massive gathering in Tahrir
  • While the Egyptian government attempted to use digital technologies as a way to repress the uprisings, networks of activists from around the world quickly mobilized in solidarity with the pro-democracy movement.
  • Telecomix, a decentralized organization of Internet activists, quickly organized to provide free fax numbers and dial-up internet access to activists in Egypt so they could publicize the events and demonstrations occurring across the country.
  • echnologies still remain an important tool in transmitting information and spreading news of repression.
  • The Tor Project, a free piece of software that allows users to anonymously connect to the internet and evade state surveillance, has been critically important in allowing activists to avoid identification and repression.
  • digital-information technologies both provide activists with opportunities to communicate and network while also enabling new modes of repression, censorship, and surveillance.
    • Jose Nieves
       
      gave me good insight on how technology helped them
  • Navid Hassanpour wrote in his study, “Media Disruption Exacerbates Revolutionary Unrest”:
  •  
    helps with how the used tec to fight back
Lucas Pergler

Not Alone in the Field: Distance Collaboration via the Internet in a Focused Ethnography - 0 views

    • Lucas Pergler
       
      Evidence for how internet has closed gaps in collaboration efforts of distance, and also time.
    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by two PhD's. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4,5)Authors are printed at the start of the article and contains information under the creative commons attribution license, so no copyright/citation necessary. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)PDF verified viewable on IE, Chrome, Firefox. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Benefits of using internet collaboration for remote access from EBSCOhost
Joey Martinez

Netiquette - 0 views

  • Netiquette is a collection of social conventions which dictate the way in which people interact with each other on the Internet. The term is a portmanteau of “net,” short for “Internet,” and “etiquette.” Like social etiquette in real life, the rules of netiquette are commonly in flux, and they may vary significantly between different groups of Internet users and across different cultures. Some websites even post their own netiquette guidelines under headings such as “rules” or “comment policies” to provide directions to their users.
  •  
    Netiquette is a collection of social conventions which dictate the way in which people interact with each other on the Internet. 
Joey Martinez

Netiquette - 0 views

  • the correct or acceptable way of communicating on the Internet.
    • Joey Martinez
       
      The proper way of communicating online.
  •  
    10. Netiquette:  The correct or acceptable way of communicating on the Internet. http://www.google.com/webhp?nord=1#nord=1&q=what+does+netiquette+mean   Netiquette: Netiquette is a collection of social conventions, which dictate the way in which people interact with each other on the Internet.  http://www.wisegeek.com/what-does-netiquette-mean.htm  
  •  
    Netiquette:  The correct or acceptable way of communicating on the Internet. http://www.google.com/webhp?nord=1#nord=1&q=what+does+netiquette+mean  
kalebhschroder

Cornell University - Digital Literacy Resource - 1 views

  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet.
    • Brittni Roddin
       
      Digital Literacy Definition
  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet.
  • Digital literacy is the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet. As a Cornell student, activities including writing papers, creating multimedia presentations, and posting information about yourself or others online are all a part of your day-to-day life, and all of these activities require varying degrees of digital literacy. Is simply knowing how to do these things enough? No—there’s more to it than that.
  •  
    Digital Literacy allows people to collect and use information via the Internet.
  •  
    Digital Literacy allows people to collect and use information via the Internet.
chasidymorris

What is privacy - 1 views

    • Jose Nieves
       
      these seem kinda helpful.
  • Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others
  • The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
  • ...3 more annotations...
    • Laura Lewis
       
      Privacy definition
    • John StClair
       
      very simple definition
    • Gage Helton
       
      Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
    • chasidymorris
       
      Internet privacy is your right to control what happens with your personal info
Dre Adams

Internet Rights Protection Initiative Launches | Human Rights Watch - 0 views

    • Dre Adams
       
      Cool article on internet (digital) rights
  •  
    Article on digital rights.
Evon Kidan

Digital literacy - Wikipedia, the free encyclopedia - 0 views

  • "to recognize and use that power, to manipulate and transform digital media, to distribute pervasively, and to easily adapt them to new forms"
    • Cassandra Lawver
       
      Interesting way to perceive this
    • Evon Kidan
       
      Thank you.
  • the marrying of the two terms digital and literacy
  • Research around digital literacy is concerned with wider aspects associated with learning how to effectively find, use, summarize, evaluate, create, and communicate information while using digital technologies; not just being literate at using a computer.
  • ...7 more annotations...
    • Dionisio Saenz
       
      Digital literacy requires certain skill sets with that are interdisciplinary in nature.
  • these
    • Dionisio Saenz
       
      Digital literacy encompasses all digital devices, such as computer hardware, software, the Internet, and cell phones. A person using these skills to interact with society may be called a digital citizen.
  • gital literacy is t
  • summarize
  • summarize
  • Digital literacy researchers explore a wide variety of topics, including how people find, use, summarize, evaluate, create, and communicate information while using digital technologies. Research also encompasses a variety of hardware platforms, such as computer hardware, cell phones and other mobile devices and software or applications, including web search or Internet applications more broadly. As a result, the area is concerned with much more than how people learn to use computers. In Scandinavian English as well as in OECD research, the term Digital Competence is preferred over literacy due to its holistic use. A digitally literate person may be described as a digital citizen.
  •  
    Definition
  •  
    Digital Literacy is a digital way of learning rather than your traditional way of learning. 
Michael Fritzel

Viral video - Wikipedia, the free encyclopedia - 0 views

    • ino moreno
       
      LOVE THE LONELY ISLAND!
  • A viral video is a video that becomes popular through the process of Internet sharing, typically through video sharing websites, social media and email.[
  • Viral videos often contain humorous content and include televised comedy sketches, such as The Lonely Island's "Lazy Sunday" and "Dick in a Box", Numa Numa[2][3] videos, The Evolution of Dance,[4] Chocolate Rain[5]
  • ...5 more annotations...
  • Internet celebrities
  • Video websites such as YouTube often create Internet celebrities, individuals who have attracted significant publicity in their home countries from their videos.[17]
  • YouTube has become a means of promoting bands and their music. Many independent musicians, as well as large companies such as Universal Music Group, use YouTube to promote videos.[20]
    • ino moreno
       
      a feature I've extracted the most out of for years!
  • Viral videos continue to increase in popularity as teaching and instructive aids.
  •  
    Wikipedia has really thorough definitions i realize. 
Jose Nieves

World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
chris mackie

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
Lucas Pergler

Benefits of Team Collaboration in the Cloud | Enterprise CIO Forum - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many time over for a website made for business management and up. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4, 5)The author is posted next to the article for copyright, and the article contains original information from the author, so no citation needed. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Benefit of remote access to internet collaboration and how it closes distances.
Lucas Pergler

Average domestic airfare prices: Average domestic airfare rises 10% - Los Angeles Times - 1 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a well known and respected newspaper. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title and has been writing for the publication for years. 5)Citation is not fully defined other than to mention a source throughout the article. 6, 7)The site is continually updated and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Average cost of flights to increase, and continue to increase. Without internet collaboration, company execs from nationwide must be flown in for important conferences.
1 - 20 of 141 Next › Last »
Showing 20 items per page