Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged networking

Rss Feed Group items tagged

javolin

http://www.library.illinois.edu/diglit/definition.html - 4 views

  • What is Digital Literacy? The ability to use digital technology, communication tools or networks to locate, evaluate, use and create information. 1
    • Katrina Quick
       
      Digital Literacy term
    • David Bell
       
      Really good definition. I think it helps clarify the difference between digital literacy and literacy.
    • Victor Cruz
       
      Accurate definition for DGL
    • Roberto Dunn
       
      very clear! 
  • A person’s ability to perform tasks effectively in a digital environment... Literacy includes the ability to read and interpret media, to reproduce data and images through digital manipulation, and to evaluate and apply new knowledge gained from digital environments. 3
    • Cassandra Lawver
       
      Check out Digital Literacy in a 2.0 world by Kyle Jones
  • ...4 more annotations...
  • media, to r
  • understand and use information in multiple formats
  • The ability to use digital technology, communication tools or networks to locate, evaluate, use and create information.
  • The ability to use digital technology, communication tools or networks to locate, evaluate, use and create information. 1 The ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers. 2  A person’s ability to perform tasks effectively in a digital environment... Literacy includes the ability to read and interpret media, to reproduce data and images through digital manipulation, and to evaluate and apply new knowledge gained from digital environments. 3
  •  
    The ability to use digital technology, communication tools or network to locate, evaluate, use and create information.
  • ...2 more comments...
  •  
    Definition of Digital Literact
  •  
    The ability to use digital technology, communication tools or network to locate, evaluate, use and create information.
  •  
    The ability to use digital technology, communication tools or network to locate, evaluate, use and create information.
  •  
    The ability to use digital technology, communication tools or network to locate, evaluate, use and create information.
Lisa Lowder

EBSCOhost: Promote Digital Citizenship through School-Based Social Networking - 0 views

  • In this article, the author discusses the school-based social network that Southwest Christian School in Fort Worth, Texas, USA, uses which lets teachers integrate social networking into their curricula while teaching students appropriate online etiquette
    • Lisa Lowder
       
      This article is credible because it is published in a professional journal and it is a first hand account from the creator of the school-based social network.
  •  
    This article describes a school based social network that allows teachers to help students learn and use proper online etiquette.
reanna woolsey

Can social networking boost literacy skills? - 0 views

  • The answer seems to be that they do. The National Literacy Trust found that social networking sites and blogs help students to develop more positive attitudes toward writing and to become more confident in their writing abilities.
  • 49 per cent of young people believe that writing is “boring.” However, students who use technology-based texts such as blogs have more positive attitudes toward writing. Whereas 60 per cent of bloggers say that they enjoy writing, only 40 per cent of non-bloggers find writing enjoyable.
  •  
    social networking helps improve literacy 
deborahnolan74

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
Jose Nieves

Social network | Define Social network at Dictionary.com - 0 views

  • an online community of people with a common interest who use a Web site or other technologies to communicate with each other and share information, resources, etc.: a business-oriented social network.
Jose Nieves

What is Social Networking? - Social Networking Explained - 0 views

  • The easiest way to understand social networking is to think of it like high school.
  • ocial networking is based on a certain structure that allow people to both express their individuality and meet people with similar interests.
Jose Nieves

Networking Rebellion: Digital Policing and Revolt in the Arab Uprisings | The Abolitionist - 0 views

  • Because Egyptian television and radio were state-controlled, the internet became a means to publicize the demonstrations and evade state censorship. As a result, the Egyptian and other Arab uprisings have largely been described as a series of “Twitter” or “Facebook” revolutions.
  • global democracy, allowing repressed peoples to find each other and network in ways which were previously impossible or too dangerous under authoritarian regimes.
  • nternet and cellphone services were cut in a desperate attempt to stop the escalating protests.
  • ...9 more annotations...
  • consequences of this action actually increased mobilizations.
  • The disruption of cellphone [sic] coverage and Internet on the 28th exacerbated the unrest in at least three major ways. It implicated many apolitical citizens unaware of or uninterested in the unrest; it forced more face-to-face communication, i.e., more physical presence in streets; and finally it effectively decentralized the rebellion on the 28th through new hybrid communication tactics, producing a quagmire much harder to control and repress than one massive gathering in Tahrir
  • While the Egyptian government attempted to use digital technologies as a way to repress the uprisings, networks of activists from around the world quickly mobilized in solidarity with the pro-democracy movement.
  • Telecomix, a decentralized organization of Internet activists, quickly organized to provide free fax numbers and dial-up internet access to activists in Egypt so they could publicize the events and demonstrations occurring across the country.
  • echnologies still remain an important tool in transmitting information and spreading news of repression.
  • The Tor Project, a free piece of software that allows users to anonymously connect to the internet and evade state surveillance, has been critically important in allowing activists to avoid identification and repression.
  • digital-information technologies both provide activists with opportunities to communicate and network while also enabling new modes of repression, censorship, and surveillance.
    • Jose Nieves
       
      gave me good insight on how technology helped them
  • Navid Hassanpour wrote in his study, “Media Disruption Exacerbates Revolutionary Unrest”:
  •  
    helps with how the used tec to fight back
crinehart0420

What is a Digital Identity? - Definition from Techopedia - 0 views

  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual
  • organization or electronic device.
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
  • ...5 more annotations...
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
    • Brittni Roddin
       
      Important.
  • ore than one digital identity through multiple communities. In terms of digital
  • Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior
    • andrew marte
       
      perfect example
    • crinehart0420
       
      Great example
  • Techopedia explains Digital Identity Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavio
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  • ...1 more comment...
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
Jose Nieves

Networked Life | Coursera - 0 views

  • Networked Life looks at how our world is connected -- socially, strategically and technologically -- and why it matters.
Jose Nieves

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
ino moreno

My Networked Life: Internet Connections and Social Connections | KBZ - 0 views

    • ino moreno
       
      with a bit of reading, the article is not bad!
  • While she is on the road, Alisa is able to keep up with her assignments online. Her laptop is always on hand so she can quickly see what work she needs to do. Her computer also lets her stay connected to friends and her host families, who have become more like real family.
  • Internet is so important to Alisa because it allows her to stay in touch with people from her travels.
  • ...2 more annotations...
  • Social media in China is different than in other countries due to the special political situation and economic environment. China has social networks that are the equivalent of Facebook and Twitter, but in this country they are used in slightly different ways. “People in the U.S. use Twitter more like casual talking,” says Hanwen. “In China people use social media more to share formal news.”
    • ino moreno
       
      interesting to see how different in the world we really are. hmmmm what is going on america???
Cassandra Lawver

Definition of social network in Oxford Dictionaries (British & World English) - 0 views

  • a dedicated website or other application which enables users to communicate with each other by posting information, comments, messages, images
  • a network of social interactions and personal relationships
Jose Nieves

World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
Stefanie Robinson

Black Twitter Shows Off All #DangerousBlackKids America Should Fear - 0 views

  • Posted: 02/16/2014 5:50 pm EST Updated: 02/16/2014 8:59 pm EST
    • Stefanie Robinson
       
      Content title no aut/.com/public site/ updated
    • Stefanie Robinson
       
      Credibility/ no auth/title id/purpose to show public banding together online/sn posts
  • Copyright © 2014 TheHuffingtonPos
  • he black
    • Stefanie Robinson
       
      Critical thinkin/ saw tv recording..id publisher Citation/links direct to contributor's social network
  • ...1 more annotation...
    • Stefanie Robinson
       
      citation/ new sources used thru out continuity/site updated future unknown context/ lots of links to support topic shows the movement * articles linked
andrew marte

JOLT - Journal of Online Learning and Teaching - 0 views

  • A personally responsible digital citizen may opt out of paper mail for electronic mailings, communicate respectfully on public discussion forums, and subscribe to information feeds about local volunteering events from Web 2.0 resources such as blogs or social networks. A participatory digital citizen might use a discussion forum to organize a local clothing drive or use an online social network to raise money for a local charity (Center for Social Media, 2004). A justice oriented digital citizen might start to a Web 2.0 resource such as a wiki or a public discussion forum that directly deals with social issues (Westheimer & Kahne, 2004). He or she might support a movement towards social justice by joining an appropriate online social network.
Jazz Hedrick

http://www.culturaldiplomacy.org/academy/content/pdf/participant-papers/2012-02-bifef/T... - 0 views

    • Jazz Hedrick
       
      They used social networks as organization tools. They were quick, easy and accurate.
    • Jazz Hedrick
       
      The government believed that once it had placed restrictions on technology that the uprising would slow or halt effectively allowing them to gain control of the situation, however, the protesters rallied together and gained even more support despite the greatest efforts of the Mubarak government
    • Jazz Hedrick
       
      They used social media as alternative press: reporting on events on the ground, uploading text and video directly to the internet or feeding the information and videos to media outlets. 
  • ...1 more annotation...
    • Jazz Hedrick
       
      Social media networks were the main source of on the ground information during the uprising. Journalists identified key bloggers from before the protests broke out and used them as a way to verify the information the were gathering from other sources.
Jarrod Randolph

EBSCOhost: Unfriending The Enemy - 0 views

  • The Pew Research Center found that nearly 1 in 5 social networkers has blocked, hidden or unfriended someone over political material that was too frequent or too disagreeable.
    • Jarrod Randolph
       
      A good fact about how improper online etiquette can affect your social network life.
  • The original rule about politics and conversation, after all, was about having consideration for others' feelings.
  •  
    This article deals with the netiquette in the world of politics.
Michael Fritzel

20 ways of thinking about digital literacy in higher education | Higher Education Netwo... - 0 views

    • Katrina Quick
       
       digital literacy = digital tool knowledge + critical thinking + social engagement.
  • From understanding what digital literacy is, to developing skills and establishing ethical principles for students, our live chat panel share ideas and resources for universities
  •  
    Digital Literacy= digital tool knowledge+critical thinking+social engagement. 
Jason Loper

Digital citizen - Wikipedia, the free encyclopedia - 0 views

  • commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation.
  • People characterizing themselves as digital citizens often use IT extensively, creating blogs, using social networks, and participating in web journalism sites.[
  • A digital citizen commonly refers to a person utilizing information technology (IT) in order to engage in society, politics, and government participation. K. Mossberger, et al.[1] define digital citizens as "those who use the Internet regularly and effectively."
  • ...1 more annotation...
  • Digital citizen
1 - 20 of 52 Next › Last »
Showing 20 items per page