Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged sharing

Rss Feed Group items tagged

Alton Pettway

: The Last Sultan: The Life and Times of Ahmet Ertegun - 0 views

  •  
    Ahmet Ertegun
  •  
    Thanks for sharing this article from the EbscoHost research database, Alton.
Jon Lawson

eCO, Electronic Copyright Information - U.S. Copyright Office - - 5 views

  •  
    This is the U.S. Copyright Office's web portal to pre-register, register and submit for copyright. I have used this for musical works and lyrical work for songwriters and artists. Easy to use navigation and explanation of terms. A great one stop shop to begin the process of copyrighting your material. This is a department of the Library of Congress. 
  •  
    Thank you for sharing this information, Jon. It's great to hear that you found the process to be easy to understand and navigate. The site and the online process definitely simplifies things.
Jazz Hedrick

EBSCOhost: A&M RECORDS, INC. V. NAPSTER INC. - 0 views

    • Jazz Hedrick
       
      This is very important. Much of the industry as a whole was against this file sharing system. There were actually more plaintiffs than solely A&M.
    • Jazz Hedrick
       
      In essence this software was allowing a place for studio recorded music to be distributed for free over the internet for download.
    • Jazz Hedrick
       
      The music companies won the case because Napster had no permission by the companies to allow uncharged distribution of their music.
  • ...3 more annotations...
    • Jazz Hedrick
       
      This article is reiterating the vast amount of issues that were associated with the free distribution of music that Napster had no rights to.
    • Jazz Hedrick
       
      Under Copyright Law, ALL music passed through Napster should have had adequate permissions for distribution and the case extended from the original claims to the Ninth Circuit filing an injunction against Napster.
    • Jazz Hedrick
       
      Pursuant to the ruling in the case, Napster became piled with injunctions against them for their copyright infringing activities.
Tony Lothes

Critical Media Literacy is Not an Option | Jeff Share - Academia.edu - 0 views

    • Tony Lothes
       
      This statement helps promote teaching media litreacy to accompany education in general.
Nathan Pharris

How you break digital law daily (and what to do about it) - TODAY.com - 0 views

    • Nathan Pharris
       
      What I highlighted are examples how people break copyright laws. I believe that "digital law" is a board define of "copyright law."
    • Nathan Pharris
       
      This highlighted passage reffences a clause in the "Digital Millennium Copyright Act (DMCA).
  • Despite all of that, you're legally prohibited from sharing your music on a large scale. Posting the actual song files online is particularly problematic. The recording industry even fought Amazon's Cloud Drive, which allows the online storage and playback of digital music without any
Nathan Pharris

Digital Literacy: New Literacy? - Forbes - 0 views

  • We live in a dynamic world where skills, and not degrees, are our access, not our assets
  • New education platforms that democratize access to all forms of higher learning impact, and advance, humanity.
  • Alice Brooks out of Stanford, is manufacturing modular dollhouses that are not only making technology and engineering fun, but also empowering girls.
  • ...3 more annotations...
  • First, the norms around elite educational access are changing, and some of the Ivy walls are coming down with regard to sharing access to elite institutions and academics. iTunesU allowed
  • Khan Academy,
  • Where such toys and tools impel a new demographic toward technology, these platforms are truly bringing down the costs of technical literacy, and insofar as this has positive impact, they are accretive to society
  •  
    Something I found on Forbes describing this generation.
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Michael Fritzel

20 ways of thinking about digital literacy in higher education | Higher Education Netwo... - 0 views

    • Katrina Quick
       
       digital literacy = digital tool knowledge + critical thinking + social engagement.
  • From understanding what digital literacy is, to developing skills and establishing ethical principles for students, our live chat panel share ideas and resources for universities
  •  
    Digital Literacy= digital tool knowledge+critical thinking+social engagement. 
Cassandra Lawver

Redwood Collaborative Media - 0 views

  • creates highly interactive, integrated, and dynamic platforms for sharing knowledge, insights, and resources, and is dedicated to building deep relationships through its professional communities
Cassandra Lawver

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
ino moreno

My Networked Life: Internet Connections and Social Connections | KBZ - 0 views

    • ino moreno
       
      with a bit of reading, the article is not bad!
  • While she is on the road, Alisa is able to keep up with her assignments online. Her laptop is always on hand so she can quickly see what work she needs to do. Her computer also lets her stay connected to friends and her host families, who have become more like real family.
  • Internet is so important to Alisa because it allows her to stay in touch with people from her travels.
  • ...2 more annotations...
  • Social media in China is different than in other countries due to the special political situation and economic environment. China has social networks that are the equivalent of Facebook and Twitter, but in this country they are used in slightly different ways. “People in the U.S. use Twitter more like casual talking,” says Hanwen. “In China people use social media more to share formal news.”
    • ino moreno
       
      interesting to see how different in the world we really are. hmmmm what is going on america???
Jose Nieves

Viral Videos - What Are Viral Videos? - 0 views

  • videos that are popular on the Internet.
  • The name is an allusion to the manner in which diseases spread--these videos, like a new strain of flu virus, start out being shared among a few people.
Jose Nieves

Social network | Define Social network at Dictionary.com - 0 views

  • an online community of people with a common interest who use a Web site or other technologies to communicate with each other and share information, resources, etc.: a business-oriented social network.
Cassandra Lawver

Urban Dictionary: viral video - 0 views

  • Viral Videos are online videos which gain mass popularity through Internet Sharing, such as entertainment websites, e-mail messages or suggesting a friend watch it
Cassandra Lawver

Social networking site Definition from PC Magazine Encyclopedia - 0 views

  • a virtual community for people to share their daily or even moment-to-moment activities with family and friend
Cassandra Lawver

Viral Video Definition and Meaning - 0 views

  • a video clip that achieves widespread distribution through online sharing
Taemeishaca Johnson

Splashup - 0 views

shared by Taemeishaca Johnson on 15 Feb 13 - Cached
  •  Splashup, formerly Fauxto, is a powerful editing tool and photo manager. With the features professionals use and novices want, it's easy to use, works in real-time and allows you to edit many images at once. Splashup runs in all browsers, integrates seamlessly with top photo-sharing sites, and even has its own file format so you can save your work in progress.
    • Taemeishaca Johnson
       
      I really enjoy trying this web base tool out. It was fun and I was able to explore my creativity a little more.
DGL Diigo

How to Submit Assignments - 0 views

  •  
    This tutorial will help you submit assignments on FSO.
‹ Previous 21 - 40 of 64 Next › Last »
Showing 20 items per page