Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged live

Rss Feed Group items tagged

Joey Martinez

Digital Native - 0 views

  • where people are defined by the technological culture which they're familiar with.
  • Prensky defines digital natives as those born into an innate "new culture"
  • digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.
  • ...3 more annotations...
    • Laura Lewis
       
      definition of both digital natives and digital immigrants.
  • while the
    • Joey Martinez
       
      A person born into the digital world.
  •  
    Digital Native:  A person born into an innate "new culture" while the digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.  http://edition.cnn.com/2012/12/04/business/digital-native-prensky/   Marc Prensky U.S. Author Digital Native:  A digital native is an individual who was born after the widespread adoption of digital technology. http://www.techopedia.com/definition/28094/digital-native  
  •  
    Digital Native:  A person born into an innate "new culture" while the digital immigrants are old-world settlers, who have lived in the analogue age and immigrated to the digital world.  http://edition.cnn.com/2012/12/04/business/digital-native-prensky/   Marc Prensky U.S. Author
David Bell

Superstorm Sandy: key updates - Telegraph - 0 views

  •  
    "AP Photo/Bebeto Matthews" Live coverage of the impact of Hurricane Sandy on the city of New York.
LINDA RANDOLPH

Center for Digital Literacy :: Syracuse University's - 0 views

  •  
    " people's ability to demonstrate the skills, utilize the tools, and understand the standards and practices required to successfully find, use, manage, evaluate, create, and present digital information affects their lives."
ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
Matthew Jackson

Running a $16 Million company from the living room - Yahoo Small Business Advisor - 0 views

    • Matthew Jackson
       
      Citation:  The author cites that the entire article is a story told by Allison O'Kelly. The links within the article are functional
caprisunshine

Google Crisis Map - 0 views

    • caprisunshine
       
      Google is known as one of the most credible search engines and google maps is so credible that it is used by the U.S. government
  •  
    Google's Crisis Map combines information from the National Hurricane Center, American Red Cross and other trusted sources. It offers details about the storm's current and forecasted locations, emergency shelter locations, live webcam feeds, public safety alerts, traffic conditions and a wealth of other vital information.
Cameron Browne

Unlocking the Power of Internet Collaboration: Adjusting Concepts So More P...: EBSCOhost - 0 views

  •  
    Currency score: 13 It is stated that the document was written or updated in 2010 so it is up to date. but future updates were not stated. Content Score: 15 The article is written very professionally and is to the point. Grammar and spelling are perfect and it is in good taste. Authority Score: 10 Diane Spencer-Scarr, is a partner at an IT company and a leading researcher at Curtin University therefore very credible. Navigation Score: 10 Using EBSCO Host therefore very easy to access, links are placed well within sight and all links are relevant to your search. Experience Score: 10 Simple and easy to look at without obscuring the information. Multimedia Score: 0 No sounds or graphics. Treatment Score: 10 Fully age appropriate and professional, no stereotyping or bias. Access Score: 5 Easy to access with quick response times when links are clicked. Miscellaneous Score: 13 No awards received but the document had no pre-use cost. No private information was required and easy to print.
crinehart0420

What is a Digital Identity? - Definition from Techopedia - 0 views

  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual
  • organization or electronic device.
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
  • ...5 more annotations...
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
    • Brittni Roddin
       
      Important.
  • ore than one digital identity through multiple communities. In terms of digital
  • Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior
    • andrew marte
       
      perfect example
    • crinehart0420
       
      Great example
  • Techopedia explains Digital Identity Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavio
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  • ...1 more comment...
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
Alton Pettway

: The Last Sultan: The Life and Times of Ahmet Ertegun - 0 views

  •  
    Ahmet Ertegun
  •  
    Thanks for sharing this article from the EbscoHost research database, Alton.
DGL Diigo

LexisNexis Power Search - 3 views

  •  
    Conduct refined searches and utilize search operators, any type of (LexisNexis result) and even search by date, article length, et cetera. Wow! The LexisNexis "power search" lives up to its name!
David Bell

Hurricane Sandy Showing Social Power Of Instagram - Forbes - 0 views

  • Instagram has turned my iPhone into a window into all things Sandy with live views of flooding roads, to dangling cranes and drinking friends. It both captures the events unfolding (and unraveling) outside and also gives me a peak into how people are riding out the storm inside.
  • Instagram captures the storm entirely.
  • The storm has yet make landfall, but already there have are 300,026 photos shared on the mobile site under #sandy; 183,003 under #hurricanesandy, 27,564 photos shared tagged #frankenstorm and  1,467 marked with #huricanesandy
  •  
    An article examining how Hurricane Sandy played a role in highlighting the power of Instagram.
Nathan Pharris

Digital Literacy: New Literacy? - Forbes - 0 views

  • We live in a dynamic world where skills, and not degrees, are our access, not our assets
  • New education platforms that democratize access to all forms of higher learning impact, and advance, humanity.
  • Alice Brooks out of Stanford, is manufacturing modular dollhouses that are not only making technology and engineering fun, but also empowering girls.
  • ...3 more annotations...
  • First, the norms around elite educational access are changing, and some of the Ivy walls are coming down with regard to sharing access to elite institutions and academics. iTunesU allowed
  • Khan Academy,
  • Where such toys and tools impel a new demographic toward technology, these platforms are truly bringing down the costs of technical literacy, and insofar as this has positive impact, they are accretive to society
  •  
    Something I found on Forbes describing this generation.
caprisunshine

Technology and Hurricane Sandy Recovery - Sunlight Foundation Blog - 0 views

    • caprisunshine
       
      The use of public radio during the superstorm allowed NY residents to be informed of all happening during the chaos.
  • Micah Sifry, who lives in New York. On the website TechPresident, he wrote about how New York public radio station WNYC initiated a crowdsourcing project to keep listeners informed in the hours, days and now weeks since the storm hit the city.
  • WNYC was also quick to reach out to the public and encourage people to submit stories of what was happening in their surrounding communities -- in real time.
  • ...4 more annotations...
  • In Boston, CrisisCommons organized the Sandy CrisisCamp — a series of hackathons at MIT and around the world that brought together volunteers who could contribute to Sandy relief with communication technologies.
  • the Sandy Coworking crowdmap. A #NYResponds initiative, the map lists spaces where people can work, recharge and reconnect.
  • ScribbleLive -- which curates and aggregates from social networks -- to keep citizens informed of what was happening.
  • As the recovery process continues, it’s worth noting that technology is transforming the way we react and respond towards natural disaster. Take an example of Instagram. The tool’s CEO was quoted as saying there were “...10 pictures per second being posted with the hashtag #sandy...” It’s no wonder the 80 million user mobile app was a go-to tool during Sandy. For some, this may have been the first and only way they learnt about the disaster.
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Michael Fritzel

20 ways of thinking about digital literacy in higher education | Higher Education Netwo... - 0 views

    • Katrina Quick
       
       digital literacy = digital tool knowledge + critical thinking + social engagement.
  • From understanding what digital literacy is, to developing skills and establishing ethical principles for students, our live chat panel share ideas and resources for universities
  •  
    Digital Literacy= digital tool knowledge+critical thinking+social engagement. 
Ken Lehman

Boston Marathon Bombings Raise Social Media Etiquette Questions - ABC News - 2 views

shared by Ken Lehman on 23 Jan 14 - No Cached
DGL Diigo liked it
  • but really a lot of it is about making judgment calls and good choices, particularly when feelings are running so strong. I'd just apply some discretion."
  • Sylvie Barak, who lives and works in Silicon Valley, is one of those people who used discretion. While she wanted to share something about her excitement about Israel's Independence Day, she held off. "I thought about my audience right now and I knew it was mostly people in the U.S. at that time," Barak told ABC News. "I thought it wasn't appropriate to force that on people right now and I held back."
Corey Gyger

Breaking News & Top Stories - World News, US & Local | NBC News - 0 views

shared by Corey Gyger on 16 Mar 14 - No Cached
    • Corey Gyger
       
      She did it!
    • Corey Gyger
       
      And the Sheriff knows it!
  • Pfister, 57, whose late parents co-founded the Buttermilk Ski area west of town
  • ...11 more annotations...
  • was found slain inside her Aspen home on Feb. 26.
  • William Styler, 65, a retired physician, and his 62-year-old wife, Nancy, on first-degree murder charges.
  • Police said
  • moved to Aspen from the Denver area last November and had rented Pfister's home
  • Pfister was in Australia in January when she posted on Facebook that she was returning to Aspen because her tenants were not paying rent and utilities,
  • Authorities have not said how Pfister died
  • nor disclosed a possible motive for the slaying.
    • Corey Gyger
       
      This is crazy. Tenants killing landlords? Who would've thought?
  • Carpenter worked at a local bank
  • Buttermilk is one of the four mountains that comprise the Aspen/Snowmass ski resort complex, and the area has hosted numerous competitions includ
    • Corey Gyger
       
      It's crazy because I lived in Snow Mass Village. I worked at Kurbloonik Kennels!!
troy seaton

Wireless electricity? It's here - CNN.com - 0 views

  • What's the trick?
    • troy seaton
       
      This talks about how the wireless energy works.
  • Wireless homes Don't worry about getting zapped: Hall assures that the magnetic fields used to transfer energy are "perfectly safe" -- in fact, they are the same kind of fields used in Wi-Fi routers.
    • troy seaton
       
      Plans for use in future homes, a wire-free energy tranfer throughout the homes.
  • In the house of the future, wire-free energy transfer could be as easy as wireless internet. If all goes to WiTricity's plans, smartphones will charge in your pocket as you wander around, televisions will flicker with no wires attached, and electric cars will refuel while sitting on the driveway.
  • ...11 more annotations...
  • WiTricity have already demonstrated their ability to power laptops, cell-phones, and TVs by attaching resonator coils to batteries -- and an electric car refueller is reportedly in the works.
  • World outside
    • troy seaton
       
      Other ways that this tech has been used.
  • When Hall first saw the wireless bulb, she immediately thought of medical technology -- seeing that devices transplanted beneath the skin could be charged non-intrusively.
  • WiTricity is now working with a medical company to recharge a left-ventricular assist device -- "a heart-pump essentially." The technology opens the door to any number of mobile electronic devices which have so far been held back by limited battery lives.
  • What's next? The challenge now is increasing the distance that power can be transferred efficiently. This distance -- Hall explains -- is linked to the size of the coil, and WiTricity wants to perfect the same long-distance transfers to today's small-scale devices. For this reason, the team have high hopes for their new creation: AA-sized wirelessly rechargeable batteries. For Hall, the applications are endless: "I always say kids will say: 'Why is it called wireless?'" "The kids that are growing up in a couple of years will never have to plug anything in again to charge it."
    • troy seaton
       
      Future products in development.
  • Dr Katie Hall is developing ways to transfer power without wires In the home of the future, wireless energy will be as common as Wi-Fi Internet, she believes The technology could lead to new and revolutionary medical devices
    • troy seaton
       
      Summary of the artical
  • Katie Hall
    • troy seaton
       
      the person being interviewed
  • *UPDATE (March 17)
  • It's great to see so much discussion of this technology on social media and the comments thread. There seems to be a lot of interest in the contribution of Nikola Tesla's experiments to the development of this technology. Dr Hall discussed Tesla briefly in her interview with Nick Glass: Nick Glass: Given that Tesla and others realized all this over a Century ago, why's it taken so long? Dr Hall: I don't think they realized exactly what we've done. They were certainly dreaming of wireless power -- there's no question about that. In those days, it was a different problem, because they were really thinking about: how do they get the power from where it's generated to where it's used. And in that case they might have been thinking about Niagara Falls generating the power and getting it to New York City -- and that's a long distance. We're not proposing that the technology we have here at WiTricity would be used for that kind of application. When we came around, power's already being transferred by wires to homes and rooms and things of that nature, so we had a much different problem, which was really just this much shorter distance. As WiTricity have mentioned on their website the Highly Resonant Wireless Power Transfer technology they have developed is also distinct from Tesla's creations -- and, crucially, is efficient enough to be economically viable.
    • troy seaton
       
      New update - reliable source
1 - 20 of 33 Next ›
Showing 20 items per page