Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged photos

Rss Feed Group items tagged

Malcolm Jackson

How companies used social media during Hurricane Sandy | World news | guardian.co.uk - 0 views

    • Rivkah WC
       
      Con Edison-largest investment owned energy company
  • the company had only set up in June gained an extra 16,000 followers over the storm.
  • "The most important thing we gained from all of this is people notice someone is paying attention",
  • ...7 more annotations...
  • Con Edison, MTA and JetBlue gathered to discuss their interactions with people through the storm and how that had changed their practices after Sandy moved on.
  • Aaron Donovan, media liaison at the MTA, said the agency had focussed on Twitter, Flickr and YouTube in its Sandy response, but noted that "Twitter had the broadest pick up in a very immediate way
  • He said MTA employees were encouraged to take photos and video while they were out inspecting lines or surveying damage
  • The photos that we send out in real time are the photos that get the largest pick up.
  • "First to communicate changes to service then throughout the storm itself," he said, but later to let people know what they are doing to update service
  • We have incoming tweets asking us questions all the time. We do not have the resources to respond to each and every questions all the time," he said. Instead, "the incoming feed is almost as important as the outgoing feed"
    • Malcolm Jackson
       
      People uses social media to wheather the storm of Hurricane Sandy.
David Bell

Hurricane Sandy pictures: Instagram posts 10 images per second - Telegraph - 0 views

  • Photos of the storm were popping up on many social networks including Twitter and Google+, but Instagram data showed at least 521,000 photos with the hashtag Sandy
  • On Twitter, some 147,000 pictures were posted over a 24-hour period tagged Sandy
  •  
    "Hurricane Sandy pictures: Instagram posts 10 images per second" Another article highlighting Instagram's role in reporting Hurricane Sandy.
David Bell

Hurricane Sandy Showing Social Power Of Instagram - Forbes - 0 views

  • Instagram has turned my iPhone into a window into all things Sandy with live views of flooding roads, to dangling cranes and drinking friends. It both captures the events unfolding (and unraveling) outside and also gives me a peak into how people are riding out the storm inside.
  • Instagram captures the storm entirely.
  • The storm has yet make landfall, but already there have are 300,026 photos shared on the mobile site under #sandy; 183,003 under #hurricanesandy, 27,564 photos shared tagged #frankenstorm and  1,467 marked with #huricanesandy
  •  
    An article examining how Hurricane Sandy played a role in highlighting the power of Instagram.
David Bell

Superstorm Sandy: key updates - Telegraph - 0 views

  •  
    "AP Photo/Bebeto Matthews" Live coverage of the impact of Hurricane Sandy on the city of New York.
David Bell

The Jersey Shore Roller Coaster That Was Mangled In Hurricane Sandy Is Finally Being To... - 0 views

  •  
    Photo journal of the demolition of the Jersey Shore roller coaster. 16 May 2013
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Taemeishaca Johnson

Splashup - 0 views

shared by Taemeishaca Johnson on 15 Feb 13 - Cached
  •  Splashup, formerly Fauxto, is a powerful editing tool and photo manager. With the features professionals use and novices want, it's easy to use, works in real-time and allows you to edit many images at once. Splashup runs in all browsers, integrates seamlessly with top photo-sharing sites, and even has its own file format so you can save your work in progress.
    • Taemeishaca Johnson
       
      I really enjoy trying this web base tool out. It was fun and I was able to explore my creativity a little more.
Lisa Lowder

EBSCOhost: An Introduction and Guide to Enhancing Online Instruction with Web 2.0 Tool... - 0 views

  • hen direct contact with students in a traditional face-to-face classroom is not feasible, instructors must be innovative in content delivery and provide for students a sense of instructor presence. It has been suggested that the online instructor is the critical factor for a successful learning experience
    • Lisa Lowder
       
      This article is credible because it contains good information, it was published in a professional journal, and it contains good references and citations.
    • Lisa Lowder
       
      It also provides a list of web-based tools that can be used by online professors.
  •  
    This article explains how web-based tools can improve education for the online learner. It suggests that faculty plays a large role in educating online learners about the tools available, the tools they will be using, and how the tools are used. Examples of web-based tools are blogs, wikis, RSS feeds, video and photo sharing, avatars, microblogging, social bookmarking, and social media.
Lisa Lowder

EBSCOhost: An Introduction and Guide to Enhancing Online Instruction with Web 2.0 Tool... - 0 views

  • Web 2.0 tools offer ways to personalize classes and demonstrate instructional presence.
    • Lisa Lowder
       
      This article is a credible source. It is published in a professional journal which is peer reviewed. It includes good information and uses good sources. It also contains a glossary.
  •  
    This article explains how web-based tools can improve education for the online learner. It suggests that faculty plays a large role in educating online learners about the tools available, the tools they will be using, and how the tools are used. Examples of web-based tools are blogs, wikis, RSS feeds, video and photo sharing, avatars, microblogging, social bookmarking, and social media.
P Yim

Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views

  • By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
    • P Yim
       
      3 hours for information to spread
  • The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
    • P Yim
       
      Facebook- Digital Tool
  • At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
    • P Yim
       
      Twitter - Digital Tool
  • ...7 more annotations...
  • At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
  • Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
  • Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
  • @YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
  • Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
  • Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
  • @YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
  •  
    NY Times article - Negative
chris mackie

LexisNexis® Academic: Document - 0 views

  • San Jose Mercury News (California)March 12, 2014 Wednesday
  • BYLINE: Compiled by Tony Hicks Contra Costa Times
  • Copyright 2014 San Jose Mercury NewsAll Rights Reserved
  • ...2 more annotations...
  • LOAD-DATE: March 12, 2014
  • GRAPHIC: In this Dec. 4, 2012 file photo, actor Chris Pine attends a press conference for his latest film "Star Trek Into Darkness" in Tokyo.
chris mackie

McCain: 'Russia is a gas station masquerading as a country' - Yahoo News - 0 views

    • chris mackie
       
      1) Content - The intent of the content was to inform the readers that Sen. John McCaine thinks we need a more descisive plan for Russia. The author is clearly Identified. The content is serious. It was published on 03/16/2014 at 9AM PST. That would make it the most current edition. That is important because in the digital age information can change rapidly.
    • chris mackie
       
      2) Credibility - The author is identifible but his reliability leaves me questioning. His only previous article listed on yahoo is one about Katy Perry's new cd being deemed a "Biohazard". The content itself is credible and posted on a valid news site. I just don't feel that he would be an authority on the matter.
    • chris mackie
       
      3) Critical Thinking - I can identify the web page and have used it in the past. Also I see that there have similar articles posted on other news sites about this. Also he sites both The New York Times and CNN as references in the article.
    • chris mackie
       
      4) Copyright - This page is copyrighted by Yahoo news. Any graphical contect is referenced to the original site it came from.
    • chris mackie
       
      5) Citation - This website contains may references and they credit all of them. From the video being from Routers to the direct link to a NWY article.
    • chris mackie
       
      6) Continuity - While it's true that the internet can change information in a manner of minutes. This article doesn't appear to have been changed since the time of publishing.
    • chris mackie
       
      7) Censorship - This article is moderated to a degree. It's on Yahoonews so it has to be sent in and verified before publishing.
    • chris mackie
       
      8) Connectivity - This is a publically available news site on the internet that doesn't require log in to view.
    • chris mackie
       
      9) Comparaility - This page itself doesn't have a paper copy itself. however The New York Times (referenced in the article) does.
    • chris mackie
       
      10) - Context - Contexually this was a valid article as my topic for this search was the US and Russia. This does have an open forum for comments to be posted after the article.
    • chris mackie
       
      Web Page Evaluation: Currency - 15, Content -10, Authority -5, Navigation -10, Experience -8, Multimedia -10. Treatment -7, Access -5, Miscellaneous - 15. Total: 85 - Good.
  • (AP Photo/David Azia)
  • Related video:
P Yim

2nd Bombing Suspect Caught After Frenzied Hunt Paralyzes Boston - NYTimes.com - 1 views

  • The Boston Police Department announced on Twitter: “Suspect in custody. Officers sweeping the area,” and MayorThomas M. Menino posted: “We got him.”
    • P Yim
       
      Digital Tool - Twitter
  • The discovery of Mr. Tsarnaev came just over 26 hours after the F.B.I. circulated pictures of him and his brother and called them suspects in Monday’s bombings,
    • P Yim
       
      Digital Tool - Photos
  • And Boston, New England’s largest city, was essentially shut down.
  • ...1 more annotation...
  • Transit service was suspended all day. Classes at Harvard, M.I.T., Boston University and other area colleges were canceled. Amtrak halted service into Boston. The Red Sox game at Fenway Park was postponed, as was a concert at Symphony Hall. Gov. Deval Patrick of Massachusetts urged residents to stay behind locked doors all day
  •  
    Article about Boston City Marathon 2nd Bomber
Jose Nieves

What Is Blogging? - ABC News - 1 views

  • Web logs" -- are literally online diaries with articles, writings, photos, Web links or other entries made by the blogs' creators, or "bloggers."
  • he entries are typically listed in reverse chronological order where the most recent entry is on top and older "news" or musings can be found by scrolling down the Web page.
  • Most blogs allow readers to leave their own comments or links to topics and other Web sites relevant to the entry or the blog's topical focus
1 - 17 of 17
Showing 20 items per page