Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "that" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Disinformation - 0 views

  • The noun DISINFORMATION has 1 sense: 1. misinformation that is deliberately disseminated in order to influence or confuse rivals (foreign enemies or business competitors etc.)
  •  
    The noun DISINFORMATION has 1 sense: Misinformation that is deliberately disseminated in order to influence or confuse rivals (foreign enemies or business competitors etc.)
2More

Viral video - 0 views

  • A viral video is a video that becomes popular through the process of (most often) Internet sharing, typically through video sharing websites, social media and email.
  •  
    A viral video is a video that becomes popular through the process of (most often) Internet sharing, typically through video sharing websites, social media and email.
2More

Databases - 0 views

  • a structured set of data held in a computer, esp. one that is accessible in various ways.
  •  
    a structured set of data held in a computer, esp. one that is accessible in various ways.
2More

Moral Literacy - 0 views

  • Literacy, moral and other, is a matter of some knowledge-that, and a great deal of know-how.  It is a "capacity for knowing and doing, involving the symbolic manipulation of information as the condition for expressive action" (81).  To discover the connection between this capacity or set of skills and Herman's account of deliberation and choice, we have to look to what she says about the developmental history of moral character.
  •  
    Moral Literacy is a matter of some knowledge-that, and a great deal of know-how.  It is a "capacity for knowing and doing, involving the symbolic manipulation of information as the condition for expressive action" (81).  To discover the connection between this capacity or set of skills and Herman's account of deliberation and choice, we have to look to what she says about the developmental history of moral character.
1More

Plagiarism and Technology: A Tool for Coping With Plagiarism.: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1:  Thus, it is important to explore the potential of using current technology to identify and deter plagiarism. Note 2: Thus, students in the 2nd and subsequent semesters may have ha a stronger belief that plagiarism would be detected than did the students in the 1st semester. If the students in the 2nd ans subsequent semesters believed more strongly that plagiarism could be detected. Note 3: The subsequent reduction in the last 3 semesters may indicate that, in general, the students were convinced.
1More

Turnitin Systems: A Deterrent to Plagiarism in College Classrooms.: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Most researchers conclude that digital plagiarism - Internet pr computer-driven copying without attribution - is rampant(e.g., Macdonald & Carroll, 2006; Walker, 2010) and has been for some time. Note 2: In short, computer technology and the Internet now make plagiarism an easy enterprise. A major implication of this state of affairs is that faculty will need to be more diligent in their efforts to mitigate the practice, especially those who educate large number of students (Ledwith & Risquez, 2008) Note 3:  Consequently,plagiarism detection systems offer educational research a direct empirical measurement of the behavior rather than speculation based on hearsay. Note 4: In addition to catching plagiarism when it occurs, detection systems also can be useful in deterring plagiarism outright. Note 5: a large body of evidence suggests that this software can be  an effective tool in detecting plagiarism(e.g., Batane, 2010; Ogilvie & Stewart, 2010; Tackett et al, 2010; Walker, 2010). 
2More

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground I forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: Fraudulent websites are subtler. Since most savvy Internet shoppers now use price-comparison sites to seek out the best price on their travel tickets, CDs, DVDs and other essentials to their modern lifestyle, cybercriminals are known to create entirely bogus Web portals - suitably meta-tagged to allow Google and Yahoo to spider/screen scrape their data - designed to harvest customer card details and other credentials. Note 4:
    • Joseph Rhodes II
       
      Ten C's Rating: Currency: 11 Content:11 Authority:9 Navigation:9 Experience:10 Multimedia:5 Treatment: 10 Access:5 Miscellaneous:10 Total: 80 Good This article explain how frequent and easy it is for companies to steal someone's identity
1More

IDENTITY CRISIS?: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Stealing someone's identity in the world of Facebook, Linkedin, Twitter and other social networks - allied with a sea of easily obtained name, address and associated data from a wealth of free and low-cost online sources - is now so easy that cybercriminals are even offering DIY kits to novice criminals. If that wasn't enough, online underground forums now act as a 'carder forums' where cybercriminals buy, sell and exchange identity and payment card sets for as little as $2.00 a time - rising to $6.00 if the identity on sale is that of an apparent high-flyer (e.g. a platinum card holder) located in the UK or premium income parts of the US such as New York City and Florida. Note 2: The carder forums - and the criminals who exchange data on them - have become highly sophisticated in the last few years, expanding their data-harvesting programs to encompass both legitimate and fraudulent e-commerce websites, as well as bribing members of low-paid staff in outsourced call centres, for whom $500 for a copy of their employer's database, or partial database, may be a highly enticing prospect. Note 3: There are even reports of some sites supplying users with their required CDs or DVDs (pirate versions, of course) and then selling the identity and card sets via multiple card forums. This is fraud monétisation and identity theft on a one-stop basis.
32More

The 25 Rules of Disinformation - The Vigilant Citizen - 1 views

    • ino moreno
       
      Interesting article!!!!!!
  • The Rules of Disinformation
  • 1. Hear no evil, see no evil, speak no evil.
  • ...29 more annotations...
  • 2. Become incredulous and indignant.
  • 3. Create rumor mongers.
  • 4. Use a straw man.
    • ino moreno
       
      seems like a "how to be evil" step by step!
  • Sidetrack opponents with name calling and ridicule.
  • 6. Hit and Run. I
  • 7. Question motives.
  • 8. Invoke authority.
  • 9. Play Dumb.
  • 10. Associate opponent charges with old news.
  • 11. Establish and rely upon fall-back positions.
  • 12. Enigmas have no solution.
  • 13. Alice in Wonderland Logic.
  • 14. Demand complete solutions.
  • 15. Fit the facts to alternate conclusions.
  • 16. Vanishing evidence and witnesses.
  • 17. Change the subject.
  • 18. Emotionalize, Antagonize, and Goad Opponents.
  • 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  • 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
  • 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
  • 22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
  • leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  • 23. Create bigger distractions.
  • 24. Silence critics.
  • sh. If you are a key holder of secrets or otherwise overly illuminated and you
  • think the heat is getting too hot, to avoid the issues, vacate the kitchen.
  • 25. Van
    • ino moreno
       
      WOW! what an interesting read!
2More

Viral Video - 1 views

  • Definition - What does Viral Video mean? A viral video is any clip of animation or film that is spread rapidly through online sharing. Viral videos can receive millions of views as they are shared on social media sites, reposted to blogs, sent in emails and so on.
  •  
    A viral video is a video that becomes popular through the process of (most often) Internet sharing, typically through video sharing websites, social media and email.
2More

What Is Digital Literacy? | Digital Literacy - 0 views

  •  
    My favourite definition of Digital Literacy that I have found so far is part of a presentation on Digital Literacy in Primary School Sites, an experiment in 3 schools in Ireland (Casey & Bruce,...
  •  
    My favourite definition of Digital Literacy that I have found so far is part of a presentation on Digital Literacy in Primary School Sites, an experiment in 3 schools in Ireland (Casey & Bruce,...
1More

Creative Commons - 0 views

  •  
    Creative Commons is a nonprofit organization that enables the sharing and use of creativity and knowledge through free legal tools. Our free, easy-to-use copyright licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you easily change your copyright terms from the default of "all rights reserved" to "some rights reserved."
1More

Office of the U.S. Intellectual Property Enforcement Coordinator | The White House - 2 views

  •  
    This is the site for the IPEC. A regulatory and enforcement branch of the U.S. government that investigates intellectual property claims, violations and infringements. It also establishes regulations to protect and secure intellectual property through changing technologies and methods globally.
4More

Skills21-B3 - Digital Security - 0 views

  • The definition of digital security is being safe online and anything you do that involves technology.
    • Dre Adams
       
      Digital security definition (2)
  • Weak passwords can lead to accounts being stolen easily. You must have strong passwords that are difficult to guess.Someone can delete your hard work or make you appear poorly by hacking into one of your social/work accounts and writing/deleting informationsomeone can steal money from you through your bank account because they found your credit card or have your personal account information.
    • Dre Adams
       
      Digital security examples
2More

Definition of Copyright - Copyright - 0 views

  • A broad definition of copyright is that copyright is the legal rights of the owner of the intellectual property created. Literally, the definition of copyright is the right to copy. The person who owns the copyright of a work is the only person who can copy that work or give permission to someone else to copy it.
    • Dre Adams
       
      First definition of copyright, pretty good one, but research to find a better one.
4More

http://www.culturaldiplomacy.org/academy/content/pdf/participant-papers/2012-02-bifef/T... - 0 views

    • Jazz Hedrick
       
      They used social networks as organization tools. They were quick, easy and accurate.
    • Jazz Hedrick
       
      The government believed that once it had placed restrictions on technology that the uprising would slow or halt effectively allowing them to gain control of the situation, however, the protesters rallied together and gained even more support despite the greatest efforts of the Mubarak government
    • Jazz Hedrick
       
      They used social media as alternative press: reporting on events on the ground, uploading text and video directly to the internet or feeding the information and videos to media outlets. 
  • ...1 more annotation...
    • Jazz Hedrick
       
      Social media networks were the main source of on the ground information during the uprising. Journalists identified key bloggers from before the protests broke out and used them as a way to verify the information the were gathering from other sources.
6More

EBSCOhost: A&M RECORDS, INC. V. NAPSTER INC. - 0 views

    • Jazz Hedrick
       
      This is very important. Much of the industry as a whole was against this file sharing system. There were actually more plaintiffs than solely A&M.
    • Jazz Hedrick
       
      In essence this software was allowing a place for studio recorded music to be distributed for free over the internet for download.
    • Jazz Hedrick
       
      The music companies won the case because Napster had no permission by the companies to allow uncharged distribution of their music.
  • ...3 more annotations...
    • Jazz Hedrick
       
      This article is reiterating the vast amount of issues that were associated with the free distribution of music that Napster had no rights to.
    • Jazz Hedrick
       
      Under Copyright Law, ALL music passed through Napster should have had adequate permissions for distribution and the case extended from the original claims to the Ninth Circuit filing an injunction against Napster.
    • Jazz Hedrick
       
      Pursuant to the ruling in the case, Napster became piled with injunctions against them for their copyright infringing activities.
9More

YouTube Era Creates New Metric For Billboard's 'Top 100' : NPR - 1 views

  • Billboard now incorporates the number of views on YouTube to determine the top songs in the country
    • david masterson
       
      YouTube Views is new deciding factor when determining top songs in the country.
  • if you turn on the radio, you might not actually hear the song.
    • david masterson
       
      Creates opportunities for unknown artists that would not otherwise have been there.
  • you used to count sheet music sales.
  • ...2 more annotations...
  • Yeah. That was the first charts, and then it was jukebox, airplay sales, vinyl, cassette, CDs,
    • david masterson
       
      None of these previously used materials would have included people just being silly.
  • sales, airplay and streaming - sales still weighs heavier than radio; radio weighs heavier than streaming.
    • david masterson
       
      Still maintaining a few legitimate measuring methodology techniques.
4More

EBSCOhost: Unfriending The Enemy - 0 views

  • The Pew Research Center found that nearly 1 in 5 social networkers has blocked, hidden or unfriended someone over political material that was too frequent or too disagreeable.
    • Jarrod Randolph
       
      A good fact about how improper online etiquette can affect your social network life.
  • The original rule about politics and conversation, after all, was about having consideration for others' feelings.
  •  
    This article deals with the netiquette in the world of politics.
2More

Collaboration - Wikipedia, the free encyclopedia - 0 views

  • Collaboration is working with each other to do a task.[1] It is a recursive[2] process where two or more people or organizations work together to realize shared goals, (this is more than the intersection of common goals seen in co-operative ventures, but a deep, collective, determination to reach an identical objective[by whom?][original research?]) — for example, an intriguing[improper synthesis?] endeavor[3][4] that is creative in nature[5]—by sharing knowledge, learning and building consensus. Most collaboration requires leadership, although the form of leadership can be social within a decentralized and egalitarian group.[6] In particular, teams that work collaboratively can obtain greater resources, recognition and reward when facing competition for finite resources.[7] Collaboration is also present in opposing goals exhibiting the notion of adversarial collaboration, though this is not a common case for using the word.
    • Ryan ORourke
       
      pretty good definition
« First ‹ Previous 81 - 100 of 261 Next › Last »
Showing 20 items per page