Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "phones" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
darcy gill

Being a Digital Native Isn't Enough | Guest Blog, Scientific American Blog Network - 0 views

  • never realized how hard it would be to limit my toddler’s screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it “my phone” and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is “supposed” to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology–and it is intuitive and easy to navigate. One of our friend’s children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
  •  
    I never realized how hard it would be to limit my toddler's screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it "my phone" and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is "supposed" to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology-and it is intuitive and easy to navigate. One of our friend's children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
troy seaton

Wireless electricity to soon power cell phones, cars, heart pumps - 0 views

  • A team of MIT professors then developed what they call “resonant power transfer,” in which a power coil is able to wirelessly transfer electricity to another device containing a similar coil set to the same frequency.
    • troy seaton
       
      The development of the "resonant power transfer," and how it works.
    • troy seaton
       
      The science behind how the energy is being transferred.
  • For example, in February, Toyota announced it began testing a wireless recharging station for its hybrid cars in which the vehicle would power up by parking over a charging pad on the ground.
  • ...4 more annotations...
    • troy seaton
       
      This new tech. is being used in cars
  • Giles says that if the hurdle of transferring electricity over greater physical distances can be crossed, then wireless electricity would quickly replace the world of cables. And after the technology is in place, manufacturers would then have to install the equipment allowing for the wireless electric transfer to take place.
    • troy seaton
       
      Giles long term goal, future use this tech., a "world without wires".
  • Wireless electricity to soon power cell phones, cars, heart pumps
    • troy seaton
       
      No author
troy seaton

Wireless electricity may soon power cell phones, cars and even heart pumps | The Sideshow - Yahoo News - 0 views

  • WiTricity CEO Eric Giler demonstrated the company’s technology during a TED talk, in which he explained, “This all came from a professor waking up at night to the third night in a row that his wife’s cell phone was beeping because it was running out of battery power. And he was thinking, ‘With all of the electricity that’s out there in the walls, why couldn’t some of that just come into the phone so I could get some sleep?’”
    • troy seaton
       
      The moment that started it all, the moment of Inspiration
  • A team of MIT professors then developed what they call “resonant power transfer,” in which a power coil is able to wirelessly transfer electricity to another device containing a similar coil set to the same frequency.
david masterson

Do Smart Phones Make Us Dumber? Asking The Internet's Intelligence Questions - All News Is Global | - 0 views

    • david masterson
       
      Using auto fill causes us to not use our memory ability, modifying our capacity to remember things.
    • david masterson
       
      Without search engines and GPS we would be totally lost.
Evon Kidan

Digital literacy - Wikipedia, the free encyclopedia - 0 views

  • "to recognize and use that power, to manipulate and transform digital media, to distribute pervasively, and to easily adapt them to new forms"
    • Cassandra Lawver
       
      Interesting way to perceive this
    • Evon Kidan
       
      Thank you.
  • the marrying of the two terms digital and literacy
  • Research around digital literacy is concerned with wider aspects associated with learning how to effectively find, use, summarize, evaluate, create, and communicate information while using digital technologies; not just being literate at using a computer.
  • ...7 more annotations...
    • Dionisio Saenz
       
      Digital literacy requires certain skill sets with that are interdisciplinary in nature.
  • these
    • Dionisio Saenz
       
      Digital literacy encompasses all digital devices, such as computer hardware, software, the Internet, and cell phones. A person using these skills to interact with society may be called a digital citizen.
  • gital literacy is t
  • summarize
  • summarize
  • Digital literacy researchers explore a wide variety of topics, including how people find, use, summarize, evaluate, create, and communicate information while using digital technologies. Research also encompasses a variety of hardware platforms, such as computer hardware, cell phones and other mobile devices and software or applications, including web search or Internet applications more broadly. As a result, the area is concerned with much more than how people learn to use computers. In Scandinavian English as well as in OECD research, the term Digital Competence is preferred over literacy due to its holistic use. A digitally literate person may be described as a digital citizen.
  •  
    Definition
  •  
    Digital Literacy is a digital way of learning rather than your traditional way of learning. 
Joey Martinez

Digital Literacy - 0 views

  • digital literacy means basic comfort and competence in using computers, smart phones, electronic tablets, and other web-accessible devices.
  •  
    Digital literacy means basic comfort and competence in using computers, smart phones, electronic tablets, and other web-accessible devices.
Ryan Jones

Internet and mobile phones are 'damaging education' - Telegraph | Diigo - 0 views

    • Ryan Jones
       
      This is important
ino moreno

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
Katrina Quick

12 Sites and web based tools that shined in 2012 - 0 views

    • Katrina Quick
       
      She placed her First and last name on the page, as well as the year published. 
    • Katrina Quick
       
      She has job listings, and different tools for looking for employment.
  •  
    These are web based tools of 2012. I believe this source to be credible because you can contact her by phone number and she lists a whole bunch of different sources that she got her info from. 
Jose Nieves

World Development book case study: the role of social networking in the Arab Spring -- New Internationalist - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
chris mackie

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Incredibly so. It not only had links to the web article but also links and information on the entire company. b. Does it answer your questions about the topic i. Not directly but through links to the company's press releases. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. The time stamp on the article is March 12, 2014. It doesn't appear to be revised after that date. b. Is there information that could be updated? i. Not really. This one is pretty good because it covers not only basic information about the company but also links to the content I was looking for directly. 3) Authority and Credibility a. Is the author identified? i. No but it does have the page it is from. b. Can we see their job title or description? i. Not for the person who wrote the article but the financial institution that it came from. c. Can you see where the article originates? i. Yes from Reuters Knowledge Direct. 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. This site is often updated. In this case mostly in a timely fashion. b. Can you rely on this source over time to provide up-to-date information? i. It still isn't real time but it is pretty close. This article was uploaded just a couple days ago. c. Does the internet site contain complete information as found in the comparable article? i. Yes. At least as it relates to the discussion of gay rights. This article has more information on the whole company. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. This article is factual instead of guiding towards a particular view. Because it focuses on the company as a whole and not the current debate it maintains its neutrality. b. Is there information included or not included that is found in the comparable article? i. Not within the scope of this article. Because this article just dic
  • March 12, 2014Heineken N.V. (ADR)Tweede Weteringplantsoen 21 AMSTERDAM 1017 ZD Netherlands
  • var myVar; function googleTranslateElementInit() { new google.translate.TranslateElement({ pageLanguage: 'auto' }, 'google_translate_element'); myVar=setInterval(function(){chkGoogle()},1000); } //Start: 4734642: SEC content seach causes screen to freeze: Nikhil function chkGoogle(){ var obj = $('.goog-te-combo')[0].value; if(obj!=null && obj!=""){ clearInterval(myVar); showHideOriginal(); obj.onchange = function(){showHideOriginal();} } } function showHideOriginal(){ var googleTranslateLang = $('.goog-te-combo')[0].value; if(googleTranslateLang!=null && googleTranslateLang!=""){ document.getElementById("showOrigBut").style.display = 'block'; } else{ document.getElementById("showOrigBut").style.display = 'none'; } } //End: 4734642: SEC content seach causes screen to freeze: Nikhil Copyright 2014 Thomson Financial, All Rights Reserved Reuters Knowledge Direct
  • ...3 more annotations...
  • TELEPHONE: Main Phone: 31-20-5239239, Contact Phone: 31-312-5239590 FAX: 31-20-6622640 URL: Home Page: http://www.theheinekencompany.com E-MAIL: investors@heineken.com OTHER URL:News Releases: http://www.theheinekencompany.com/media/media-releasesInvestor Relations: http://www.theheinekencompany.com/investorsFinancial Information: http://www.theheinekencompany.com/investors/reports-and-presentations?tab=financialsCorporate History/Profile: http://www.theheinekencompany.com/about-us/company-strategyExecutives: http://www.theheinekencompany.com/investors/governance/executive-boardProducts/Services: http://www.theheinekencompany.com/brandsEmployment Opportunities: http://www.theheinekencompany.com/careers
  • LOAD-DATE: March 12, 2014
  • Source [Reuters Knowledge Direct]
Lucas Pergler

File Sizes for Kindle Books-The Text, the Images, and the Cover Image - 0 views

    • Lucas Pergler
       
      1,2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for getting answers from professionals in the appropriate field. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed under the title for copyright. 5)No citation is given aside from general name for source of information. 6,7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Details average size of ebook. Compared to physical print, this is much smaller. Most people's phones have 8GB+ of storage space which is much smaller than even the smallest physical book.
lsteimle

What can you do with digital security | CompuClever - 0 views

  • Despite a time of global recession, the “Digital Universe” expanded by 62% and by 2020 it will be 44 times as big.  We will have amassed digital information that can be described in zettabytes – that is to say, one zettabyte being a million, million gigabytes.  This would be the equivalent of a stack of DVD’s going halfway to Mars.
    • lsteimle
       
      Nergasm.
  • mass surveillance is occurring
  • This includes: public transport tracking; workplace surveillance, examination of communications (collecting data on all phone calls, emails, chat room discussions and web-browsing habits); mobile phone tracking; vehicle tracking; DNA database sampling; overseas travel; collecting data on political and environmental protestors; and using unmanned aircraft systems (drones) for purposes of security.
  • ...2 more annotations...
  • exposing our personal rights and freedoms
  • effective tools to analyze data, weed out the information that can be safely deleted, remove personal information that can cause us harm if it falls into the wrong hands (including hackers or unethical online businesses), and we need secure storage
    • lsteimle
       
      Digital Security
david masterson

EBSCOhost: ETIQUETTE ONLINE: From NICE to NECESSARY. - 0 views

    • david masterson
       
      Different types of technology require difterent forms of etiquette [4]. Textmessaging via a mobile phone is difterent from instant messaging and worlds apart from the asynchronous experience of email. A short abrupt comment that is acceptable in instant messaging may not be in email where some people expect to be addressed by name. Emotional affordances, syntax, and semantics vary across technology, too. 1-urthermore, new technologies may challenge previously accepted norms. Who would have guessed that having a stranger edit one's fastidiously composed prose without first asking; permission would be acceptable?
    • david masterson
       
      Age differences in online behavior in nonacademic environments such as online shopping and purchasing (Sorce, Perotti & Widrick, 2005) or Web search (Grahame, Laberge, & Scialfa, 2004) have been often discussed in the literature, but only a small number of studies have been conducted to examine age differences in adult learners' online learning behavior in academic settings. Those studies revealed significant differences in online behavior due to age; however, it is difficult to conclude age-dependent online behavior based on the studies because of the contextual or missing definitions of "younger" and "older" used in the studies.
Cassandra Lawver

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
Jose Nieves

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
Stefanie Robinson

Comcast agrees to buy Time Warner Cable for $45 billion - Feb. 13, 2014 - 0 views

  • February 13, 2014: 3:09 PM ET
  • rification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
  • By Brian Stelter 
  • ...9 more annotations...
  • Comcast said Thursday it had agreed to buy Time Warner Cable for $45 billion in a deal that would combine the two biggest cable companies in the United States.
  • © 2014 Cable News Network. A Time Warner Company. All Rights Reserved
    • Stefanie Robinson
       
      copyright to Cable New Network/time warner
  • elated: Weather Channel's cable fight is the tip of the iceberg
    • Stefanie Robinson
       
      Citation..more research
  • Related: Customers say deal is evil
    • Stefanie Robinson
       
      Citation/more research, public opinion. reference copyright owned by TW too
    • Stefanie Robinson
       
      Connectivity. works in all my browsers...busy site 4k share in two days
    • Stefanie Robinson
       
      Navigation links to fb, twit, linkedin & email
  • Clarification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
    • Stefanie Robinson
       
      content...reference earlier version
    • Stefanie Robinson
       
      All links in the article under same ownership TW
    • Stefanie Robinson
       
      Continuity site is free and constantly maintain per time stamp of content.
  • This isn't about TV anymore -- it's about controlling a fatter, more intelligent pipe for multiple services that emanate from it," including broadband Internet, phone and home security monitoring, said Tim Hanlon, the founder of the Vertere Group, an investment advisory firm that focuses on media and technology.
    • Stefanie Robinson
       
      Context commentary
troy seaton

Wireless electricity? It's here - CNN.com - 0 views

  • What's the trick?
    • troy seaton
       
      This talks about how the wireless energy works.
  • Wireless homes Don't worry about getting zapped: Hall assures that the magnetic fields used to transfer energy are "perfectly safe" -- in fact, they are the same kind of fields used in Wi-Fi routers.
    • troy seaton
       
      Plans for use in future homes, a wire-free energy tranfer throughout the homes.
  • In the house of the future, wire-free energy transfer could be as easy as wireless internet. If all goes to WiTricity's plans, smartphones will charge in your pocket as you wander around, televisions will flicker with no wires attached, and electric cars will refuel while sitting on the driveway.
  • ...11 more annotations...
  • WiTricity have already demonstrated their ability to power laptops, cell-phones, and TVs by attaching resonator coils to batteries -- and an electric car refueller is reportedly in the works.
  • World outside
    • troy seaton
       
      Other ways that this tech has been used.
  • When Hall first saw the wireless bulb, she immediately thought of medical technology -- seeing that devices transplanted beneath the skin could be charged non-intrusively.
  • WiTricity is now working with a medical company to recharge a left-ventricular assist device -- "a heart-pump essentially." The technology opens the door to any number of mobile electronic devices which have so far been held back by limited battery lives.
  • What's next? The challenge now is increasing the distance that power can be transferred efficiently. This distance -- Hall explains -- is linked to the size of the coil, and WiTricity wants to perfect the same long-distance transfers to today's small-scale devices. For this reason, the team have high hopes for their new creation: AA-sized wirelessly rechargeable batteries. For Hall, the applications are endless: "I always say kids will say: 'Why is it called wireless?'" "The kids that are growing up in a couple of years will never have to plug anything in again to charge it."
    • troy seaton
       
      Future products in development.
  • Dr Katie Hall is developing ways to transfer power without wires In the home of the future, wireless energy will be as common as Wi-Fi Internet, she believes The technology could lead to new and revolutionary medical devices
    • troy seaton
       
      Summary of the artical
  • Katie Hall
    • troy seaton
       
      the person being interviewed
  • *UPDATE (March 17)
  • It's great to see so much discussion of this technology on social media and the comments thread. There seems to be a lot of interest in the contribution of Nikola Tesla's experiments to the development of this technology. Dr Hall discussed Tesla briefly in her interview with Nick Glass: Nick Glass: Given that Tesla and others realized all this over a Century ago, why's it taken so long? Dr Hall: I don't think they realized exactly what we've done. They were certainly dreaming of wireless power -- there's no question about that. In those days, it was a different problem, because they were really thinking about: how do they get the power from where it's generated to where it's used. And in that case they might have been thinking about Niagara Falls generating the power and getting it to New York City -- and that's a long distance. We're not proposing that the technology we have here at WiTricity would be used for that kind of application. When we came around, power's already being transferred by wires to homes and rooms and things of that nature, so we had a much different problem, which was really just this much shorter distance. As WiTricity have mentioned on their website the Highly Resonant Wireless Power Transfer technology they have developed is also distinct from Tesla's creations -- and, crucially, is efficient enough to be economically viable.
    • troy seaton
       
      New update - reliable source
Steve Dolan

Digital natives and digital immigrants - 0 views

  • he Digital Immigrant is the latecomer in the technology revolution and as with any immigrant, there is a certain “accent” that is readily apparent to the native speakers.
  • still try and work around or second guess technology
  • One major difference between Natives and Immigrants is the way we process information.
  • ...7 more annotations...
  • Immigrants grew up learning one topic at a time, everything in order, following a linear and logical progression, but Natives do not think that way.
  • Another major difference between Immigrants and Natives is a sense of identity (DigitalNative.org, 2007).  To Digital Immigrants, cell phones, emails, and the Internet are just tools that can be used to reach someone or set up a “real” face-to-face meeting. Natives look at the same technologies and see an extension of who they are.
  • Digital communication is just as real to Natives as face-to-face meetings are to Immigrants.   
  • Many Immigrants consider education as the process that forces as much information into students’ heads as possible so they can regurgitate a laundry list of facts at a moment’s notice. Natives donotconsider this an education.
  • Immigrants should be willing to teach Natives how to find important information and put less emphasis on forcing the students to learn exact information.
  • Prensky, Marc. (2007) To Educate, We Must Listen. Retrievedfrom http://www.marcprensky.com/writing/Prensky-To_Educate,We_Must_Listen.pdf
  • Cite this resource using APA style as:
  •  
    Digital natives and digital immigrants
P Yim

Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views

  • By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
    • P Yim
       
      3 hours for information to spread
  • The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
    • P Yim
       
      Facebook- Digital Tool
  • At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
    • P Yim
       
      Twitter - Digital Tool
  • ...7 more annotations...
  • At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
  • Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
  • Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
  • @YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
  • Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
  • Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
  • @YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.
  •  
    NY Times article - Negative
1 - 20 of 22 Next ›
Showing 20 items per page