Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged protection

Rss Feed Group items tagged

ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Cassandra Lawver

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
Joey Martinez

Copyright - 0 views

  • A copyright protects the form of expression of a creator against copying. Literary, dramatic, musical and artistic works are included within the protection of U.S. copyright law. The USPTO does not register copyrights, the copyright office does.
  •  
    A copyright protects the form of expression of a creator against copying. Literary, dramatic, musical and artistic works are included within the protection of U.S. copyright law. The USPTO does not register copyrights, the copyright office does.
gb malone

Nine Elements of Digital Citizenship - 3 views

    • yanika scotton
       
      1. Digital Access:   full electronic participation in society. 2. Digital Commerce:   electronic buying and selling of goods. 3. Digital Communication:   electronic exchange of information. 4. Digital Literacy:   process of teaching and learning about technology and the use of technology. 5. Digital Etiquette:   electronic standards of conduct or procedure. 6. Digital Law:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
    • Roberto Dunn
       
      one page, lots of useful information!
  • In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • ...22 more annotations...
  • Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
  • Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
  • We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
  • Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
  • It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
  • Digital law deals with the ethics of technology within a society.
  • Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
  • Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
  • Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.
  • Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
  • In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
    • gb malone
       
      digital security teaches us that we need protection at all times. ex{ virus protectionvirus protection
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
    • ino moreno
       
      Great notes guys!!:)
  • precautions
  • safety
  • safety
  • Digital Literacy:   process of teaching and learning about technology and the use of technology.
    • Katrina Quick
       
      to be taught, or to learn about technology and how to use it.
    • Nathan Pharris
       
      "Digital Citizenship" is refferenced in this passage. To be a "Digital Citizen" one must gain "electronic access."
  • Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
  • digital rights and supporting electronic access is the starting point of Digital Citizenship
    • Nathan Pharris
       
      Another example of what makes us a "Digital Citizen."
    • DeJuan Griggs
       
      An Example of the way you should conduct yourself in a digital environment 
  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • Gabrielle Yoder
       
      definition of digital citizenship
  •  
    Digital Citezenship
deborahnolan74

Protect Your Privacy Online | USA.gov - 0 views

  •  
    Tips and guidelines to look for to ensure that private information you enter online is protected.
Derek Northcutt

Defining Digital Security - 0 views

  • Digital Security means to protect information.
  •  
    Digital security deals with protecting individuals from online threats such as viruses and scams.
  •  
    Digital security deals with protecting individuals from online threats such as viruses and scams.
Dre Adams

Internet Rights Protection Initiative Launches | Human Rights Watch - 0 views

    • Dre Adams
       
      Cool article on internet (digital) rights
  •  
    Article on digital rights.
Jon Lawson

Office of the U.S. Intellectual Property Enforcement Coordinator | The White House - 2 views

  •  
    This is the site for the IPEC. A regulatory and enforcement branch of the U.S. government that investigates intellectual property claims, violations and infringements. It also establishes regulations to protect and secure intellectual property through changing technologies and methods globally.
Jose Nieves

U.S. Copyright Office - Copyright in General (FAQ) - 0 views

  • Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works.
  • protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
Stefanie Robinson

MarkMonitor | Brand Protection, Domain Management, Anti Piracy, Anti Fraud - 0 views

    • Stefanie Robinson
       
      critiical thinking owner if NY times is in the business of brand protection
Joey Martinez

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
Joseph Rhodes II

THE COPYRIGHT DILEMMA: COPYRIGHT SYSTEMS, INNOVATION AND ECONOMIC DEVELOPME...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 15 Content:12 Authority:10 Navigation:10 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 87 Good
    • Joseph Rhodes II
       
      This article explains that copyright laws stretch out across vast media industires.
    • Joseph Rhodes II
       
      For example, the standards of copyright protection in developing economies should be appropriate for the level of economic development in order to account for the different weighting of the costs and benefits of copyright protection.
Joseph Rhodes II

FIGHTING THE FIRST SALE DOCTRINE: STRATEGIES FOR A STRUGGLING FILM INDUSTRY...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Article discusses the strategies for copyright lawmakers.
    • Joseph Rhodes II
       
      8 During the 112th Congress,  the House and Senate considered two competing measures, the Stop  Online Piracy Act ("SOPA")29 and the Protect IP Act of 2011 ("PIPA").30  SOPA and PIPA were designed to target foreign websites that engage in  copyright violations.31 The bills would allow the Justice Department to seek  court orders requiring U.S. websites to block access to foreign sites offering  pirated material, and would allow copyright owners to seek court orders  preventing such sites from receiving payment services from the U.S.32
    • Joseph Rhodes II
       
      8 During the 112th Congress,  the House and Senate considered two competing measures, the Stop  Online Piracy Act ("SOPA")29 and the Protect IP Act of 2011 ("PIPA").30  SOPA and PIPA were designed to target foreign websites that engage in  copyright violations.31 The bills would allow the Justice Department to seek  court orders requiring U.S. websites to block access to foreign sites offering  pirated material, and would allow copyright owners to seek court orders  preventing such sites from receiving payment services from the U.S.32
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 14 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 83 Good The article displays different ways the film industry is struggling.
Jim Davis

Digital identity - 0 views

    • Malcolm Jackson
       
      Any data used to identify one self online.
  • Digital identity is all the online information and data specifically about an individual.
  • Digital identity is all the online information and data specifically about an individual.
  • ...4 more annotations...
  • Digital identity is made up of elements that fall into four categories (
  • Authentication elements: identification number, IP address, email address, user name, password, last name, first name, alias, etc. Data: personal, administrative, banking, occupational, social data, etc. Identifiers: photograph, avatar, logo, image, etc. Digital traces: contributions to blogs and other content management systems, links, etc.
  • Caution
    • Jim Davis
       
      Precautions to your Digital Identity
  • How can you protect yourself?
    • Jim Davis
       
      Protecting your digital identity
  •  
    Digital identity is all the online information and data specifically about an individual.
Cameron Browne

What is malware and how can we prevent it? | Security News - 1 views

  • Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.
  • There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
  • The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
Laura Lewis

123digitalcitizenship - Digital Security - 0 views

  • The full definition of Digital Security (self-protection) is: taking necessary precautions to guarantee electronic digital safety.
    • Dre Adams
       
      Digital security definition (1)
    • Laura Lewis
       
      DIGITAL SECURITY DEFINITION.
  • Digital Security is simply about being secure about everthing that is electronic
Michael Fritzel

Copyright | Define Copyright at Dictionary.com - 1 views

  • the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on or after January 1, 1978, are protected for the lifetime of the author return hotwordOneClick(th
ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
1 - 20 of 31 Next ›
Showing 20 items per page