Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged programs

Rss Feed Group items tagged

ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
deborahnolan74

What is Database (DB)? Webopedia - 0 views

  • a database is basically a collection of information organized in such a way that a computer program can quickly select desired pieces of dat
  • ase as
  •  
    A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system.
  •  
    A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system.
Joey Martinez

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
Danelle Desire

Media Literacy, Managing Television - 0 views

    • Danelle Desire
       
      how to encourage media literacy
  • Turn off violent programming.
  • Set limits on the use of media in your home
  • ...1 more annotation...
  • Talk with your children about stereotypes and hidden messages in television programs, video and computer games, commercials and music. Take time to talk and listen.
anonymous

Hurricane Recovery Program | Red Cross | Disaster Recovery - 0 views

  •  
    A donor stewardship report from the American Red Cross on their Hurricane Sandy Relief campaign. 
Reshunda Pickens

Obama to propose key changes in data collection program - NBC Politics - 0 views

    • Reshunda Pickens
       
      The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. No  The information on the topic is thorough. No  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 10.7  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. No  There is a way to contact the author (s) via e-mail or traditional mail. No  You can easily tell from the domain name where the page originates. Yes  Total: 5  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10 
  •  
    The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 10.7 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. No There is a way to contact the author (s) via e-mail or traditional mail. No You can easily tell from the domain name where the page originates. Yes Total: 5 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Multimedia (0 to 10 P
Cameron Browne

What Is Malware? (with picture) - 1 views

  • Malware is a portmanteau, a term combining "malicious" and "software" to describe a type of program designed to steal information from or cause damage to a computer.
  • It includes things like spyware and adware programs, including pop-ups and even tracking cookies, which are used to monitor users' surfing habits without permission.
  • It also includes more sinister hazards, such as keyloggers, Trojan horses, worms, and viruses. In simpler terms, it is any software that is intended by the developer to cause harm or exploit people's computers or private records without consent.
  • ...1 more annotation...
  • The earliest well-known examples of malware, which appeared during the early to mid-1990s, were largely the result of experimentation and pranks by curious developers trying to expand their skills.
Malcolm Jackson

MOOCs: The future of education or mere marketing? - Future Tense - ABC Radio National (... - 0 views

    • Malcolm Jackson
       
      This takes online courses to another level!
  • MOOCs stands for Massive Open Online Courses. In essence, they’re simply another form of online education, but what makes them special is their sheer size: some MOOCs courses can have as many as a hundred thousand students actively involved at any one time.
Nathan Pharris

Malware Definition - 1 views

    • Malcolm Jackson
       
      Interesting!
  • Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.
    • Nathan Pharris
       
      Malware refers to internet viruses in general.
    • Nathan Pharris
       
      Here are some examples of Malware.
  •  
    Note my definition of "Malware," is highlighted in green.
Cassandra Lawver

What is wiki? - Definition from WhatIs.com - 0 views

  • A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site
Lisa Lowder

EBSCOhost: A Comparison of Different Communication Tools for Distance Learning in Nucl... - 0 views

  • general, the tools were found to be useful for mature students on the condition that the lecturer was comfortable with the tools and in some cases, adequate support from IT groups was provided. [ABSTRACT FROM AUTHOR]
    • Lisa Lowder
       
      This article is credible. While I am not interested in learning about nuclear education the fact that it is a distance education program featuring on line tools is relevant. This is a well written article from a professional journal. It is authored by professors and includes cited references.
  •  
    This article explains the use of web-based tools for online eduction of nuclear engineers, but the information is relevant to Full Sail students as well. In the article they evaluate several web based tools but the interesting thing is that in order for the students to use the tools effectively the teachers must be comfortable with the use of these tools.
Shelbie Myers

How Collaboration Tools Can Improve Knowledge Work - Brad Power - Harvard Business Review - 0 views

  • We can’t rely on people to pass on the best way to do work by word of mouth. Instead, we need to document and share them, before they become lost.
    • Shelbie Myers
       
      Collaborating via internet helps information pass more quickly than doing it verbally. It also insures information will not be lost.
  • Like Facebook, the Nationwide network enables people to share with groups or friends, with easy access through mobile devices. When workers ask questions of the community, they usually get faster answers than from the help desk or e-mail. Some leaders are now posting quick (less than two minutes) video announcements about new or changed processes, instead of sending e-mail.
  • Nationwide’s social collaboration tools help people get conversations started, make faster decisions, get work done more quickly, communicate better top to bottom, recognize peers and better engage workers.
  • ...1 more annotation...
  • Nationwide has been successful because it has managed its adoption of collaboration tools as part of a broader cultural change program. Chris Plescia, leader of marketing, collaboration and corporate Internet solutions, told me that the first step for leaders is a little bit of a leap: “We’ve made it okay to try something new. A couple years ago, it took me about five minutes to post my first question. I was worried I might make a mistake, so I spell-checked it several times before I sent it out. When people responded I realized I needed to quickly interact with them and eventually became comfortable with potential spelling errors. Another challenge was knowing that these conversations are public. So we spent time up front to define policies for compliance and governance.”
Joey Martinez

Malware - 0 views

  • So what is Malware? Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
  • Malware exists in many forms, most of which you’ve probably already heard of. The most common types of malware are viruses, trojans, worms, spyware and zombies.
  • In the early days of software, programmers wrote malware mostly to prank one another, or to show off their technical skills.
  • ...4 more annotations...
  • Some of these programmers learned that they can make thousands of dollars a day if they successfully exploit malware to their advantage.
  • These people went on to become cyber-crooks, defrauding individuals and organizations for financial gain.
  • A cyber-war between countries is raging. Some countries such as China, Syria, and America are rumored to be state-sponsoring cyber-gangs whose only purpose is to research and develop new malware techniques capable of infiltrating government agencies and infrastructures.
  • The malware problem is huge and is growing fast. By the end of 2010 the counter for unique malware programs stood at 14 million, with a staggering 60,000 pieces of new malicious code detected every day.
  •  
    Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
Cameron Browne

What is Malware? Defined! - ChicaLogic - 0 views

  • Malware refers to a program on your computer that is malicious in nature.  It is designed to take control, annoy, and destroy!
andrew marte

Massive Open Online Courses, aka MOOCs, Transform Higher Education and Science - Scient... - 0 views

  • MOOCs: Internet-based teaching programs designed to handle thousands of students simultaneously
  • using the tactics of social-networking websites
  • articipants even mark one another's tests
Jose Nieves

School for Ethical Education (SEE)  Integrity Works! Academic Intregrity Defi... - 1 views

  • Academic Integrity can be defined by honest academic work where (1) the ideas and the writing of others are properly cited;
  • students submit their own work for tests and assignments without unauthorized assistance
  • tudents report their research or accomplishments accurately.
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground I forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: Fraudulent websites are subtler. Since most savvy Internet shoppers now use price-comparison sites to seek out the best price on their travel tickets, CDs, DVDs and other essentials to their modern lifestyle, cybercriminals are known to create entirely bogus Web portals - suitably meta-tagged to allow Google and Yahoo to spider/screen scrape their data - designed to harvest customer card details and other credentials. Note 4:
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 11 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 80 Good This article explain how frequent and easy it is for companies to steal someone's identity
Joseph Rhodes II

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: There are even reports of some sites supplying users with their required CDs or DVDs (pirate versions, of course) and then selling the identity and card sets via multiple card forums. This is fraud monétisation and identity theft on a one-stop basis.
dmschool

Digital marketing course training in Hyderabad|Online marketing training in hyderabad|i... - 0 views

  •  
    Our Digital Marketing Training Program in Hyderabad is conducted by professionals who were in the Online Marketing Industry since 2008 and Enhance your career in Digital marketing by taking the advantage of the fastest growing Internent and web Marketing Industry
Cameron Browne

What is malware and how can we prevent it? | Security News - 1 views

  • Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.
  • There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
  • The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
1 - 20 of 21 Next ›
Showing 20 items per page