Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "Research" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
7More

Etiquette Returns for the Digital Generation - NYTimes.com - 0 views

    • Rivkah WC
       
      To research Daniel Post Senning existence/lineage and book existenceAuthors creditabilityJane Pratt creditabilityRandi Zuckerberg and Dot ComplicatedSteven Petrow and his contributions to the NY times
  • Steven Petrow, an author of five etiquette books including “Mind Your Digital Manners: Advice for an Age Without Rules,”
  • Their apparent goal: to help members of Generation Y navigate thorny, tech-age minefields like Paperless Post invites, same-sex weddings and online dating — not to mention actual face-to-face contact with people they encounter in the offline world.
  • ...3 more annotations...
  • No arena of modern life, it seems, is too obscure or ridiculous for consideration.
  • (Mr. Petrow is a regular contributor to The New York Times, writing an advice column on gay-straight issues for the Booming blog.)
    • Rivkah WC
       
      Daniel Post Senning existence/lineage and book existence, Authors creditability, Jane Pratt creditability, Who is Gloria Starr, Steven Petrow and his contributions to the NY times
  •  
    Original Article
1More

Center for Digital Literacy :: Syracuse University's - 0 views

  •  
    " people's ability to demonstrate the skills, utilize the tools, and understand the standards and practices required to successfully find, use, manage, evaluate, create, and present digital information affects their lives."
1More

GEO Overview - GEO - NCBI - 4 views

  • General overview GEO is an international public repository that archives and freely distributes microarray, next-generation sequencing, and other forms of high-throughput functional genomics data submitted by the research community.
34More

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
1More

Social tracker: It knows where you are, when you're there, and when you'll be back | Ve... - 0 views

  •  
    Social tracker: It knows where you are, when you're there, and when you'll be back
1More

Support from EbscoHost - 0 views

  •  
    If you need help with EbscoHost, check out their support cite.
16More

Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views

    • ino moreno
       
      the content of this article has been proven over and over again and everytime you watch one of your favorite viral videos made by an 8th grader!
  • concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
  • , we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
  • ...12 more annotations...
  • For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
    • ino moreno
       
      this article shares and discusses the importance of media literacy and the need to learn so that we may embrace our social parameters
  • simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
  • andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
  • Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
  • the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
  • In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
    • ino moreno
       
      thats a true fact ive been able to prove time and time again by myself!
  • Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
  • For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
  • Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
    • ino moreno
       
      all the content in this article is good information.
  •  
    Issues to Consider when implementing digital and media literacy programs.
7More

MediaShift . The Importance and Challenges of Universal Media Literacy Education | PBS - 0 views

    • ino moreno
       
      safety has become a major issue with social networks all over the web.
  • The campaign reports that 61 percent of 13 to 17 year-olds publish a profile on social networking sites, and one in seven young people receive sexual solicitations over the Internet (70% of which are girls). But kids aren't only the victims. They can be perpetrators, as when it comes to so-called textual harassment" or cyber-bullying.
  • My curiosity about the prospects for media literacy education in the testing-heavy era of the "No Child Left Behind" Act led me to attended a panel at the NAMLE conference entitled, "Does It Work? Assessing the Effectiveness of Media Literacy in K-12 Education." The panel featured some of the brightest minds in media literacy, including Renee Hobbs, Cyndy Scheibe, Peter Worth and David Kleeman. Yet there was hardly a consensus on how to create a measurement protocol that can determine whether a certain media literacy curriculum is successful.
  • ...4 more annotations...
    • ino moreno
       
      begin using different approaches to teaching styles, i feel that would be a great improvement to this system.the more technology involved while expensive it may be, will interest and excite kids to learn in a "new" more up to date method.
  • Mark Hannah has spent the past several years conducting sensitive public affairs campaigns for well-known multinational corporations, major industry organizations and influential non-profits. He specializes in issues and reputation management online. Before joining the PR agency world (v-Fluence Interactive and Edelman), Mark worked for the Kerry-Edwards presidential campaign as a member of the national advance staff. He's more recently conducted advance work for the Obama-Biden campaign. He is a member of the Public Relations Society of America and a fellow at the Society for New Communications Research, and he serves as an awards judge for both organizations. A graduate of the University of Pennsylvania, he's currently pursuing a master's in strategic communications at Columbia University. He is an independent communications consultant based in New York City and the public relations correspondent for MediaShift. You can reach him at markphannah[at]gmail[dot]com.
    • ino moreno
       
      Good source!! lists their personal Email, where the person graduated from, and works within the public and whitehouse.
  • in order to prepare students for the modern workforce, education must go beyond core curricula and teach "critical thinking and problem solving skills, communication skills, creativity and innovation skills, collaboration skills, contextual learning skills, and information and media literacy skills."
3More

EBSCOhost: CHALLENGES IN SPREADING INFORMATION LITERACY AMONG STUDENTS - 1 views

  • Information literacy is a global phenomenon today and the critical importance of the role of information literacy is gaining increased recognition Information literacy means knowing information about information
    • Lisa Lowder
       
      This is a creditable article. It is published in a research journal, it contains well organized information which is easy to read, and it contains good references.
  •  
    This article defines information literacy and concludes that in order to teach information literacy to students the faculty must be fluent in information literacy.
2More

EBSCOhost: Unlocking the Power of Internet Collaboration: Adjusting Concepts So More P... - 0 views

  • The paper concludes that in order to unlock the power of online collaboration it is necessary to change focus from current solutions aimed at symptoms such as 'rules and guidelines' towards solutions addressing the underlying conceptual causes which result from the Internet's virtual nature. Addressing these issues has the potential to profoundly change our thinking and will be beneficial to organizations and communities. [
    • Lisa Lowder
       
      This article provides good insights into some of the problems and issue in internet collaboration. It is well cited and includes a lot of research. It is published in a professional journal. A downside is that the conclusion is weak.
7More

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
9More

World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
1More

Son of Citation Machine - 0 views

  •  
    citation maker
3More

EbscoHost Search Tutorial - 5 views

  •  
    Watch this tutorial from EbscoHost to help you learn how to search the database.
  •  
    This tutorial will help you get started using EbscoHost. This would be good to watch--prior to working on your week 3 project.
  •  
    You can access several databases from EbscoHost. If you don't find the results you are looking for initially with a general search, you can click on "choose databases" above the search box. Then you can choose the specific databases you would like to use.
1More

Running a $16 Million company from the living room - Yahoo Small Business Advisor - 0 views

    • Matthew Jackson
       
      Citation:  The author cites that the entire article is a story told by Allison O'Kelly. The links within the article are functional
3More

How Does Text Messaging Affect the Ability to Write & Speak in English? | eHow - 0 views

  • Millions of ludicrous emails are surfacing on the web, sent from students and job seekers to professionals, using made-up words like "i" and "come2u." It may not be the fault of schools, friends or even television, but because of the vastly popular
  • communication craze, text messaging.
  •  
    Improper grammar caused by texting.
« First ‹ Previous 61 - 80 of 154 Next › Last »
Showing 20 items per page