Skip to main content

Home/ Groups/ Digital Literacy at Full Sail University
Jose Nieves

Critical thinking web - 0 views

    • ino moreno
       
      Best Description i've found!!
  • critical thinking can also play an important role in cooperative reasoning and constructive tasks.
  • critical thinker is able to deduce consequences from what he knows, and he knows how to make use of information to solve problems, and to seek relevant sources of information to inform himself.
  • ...3 more annotations...
  • engage in reflective and independent thinking
  • challenging consensus and purusing less popular approaches
  • evaluate and improve our creative ideas.
ino moreno

Independent Learning in Higher Education - Google Books - 0 views

shared by ino moreno on 10 Feb 13 - No Cached
    • ino moreno
       
      cannot high light this...
  •  
    PERRFECT!!!
ino moreno

The 25 Rules of Disinformation - The Vigilant Citizen - 1 views

    • ino moreno
       
      Interesting article!!!!!!
  • The Rules of Disinformation
  • 1. Hear no evil, see no evil, speak no evil.
  • ...29 more annotations...
  • 2. Become incredulous and indignant.
  • 3. Create rumor mongers.
  • 4. Use a straw man.
    • ino moreno
       
      seems like a "how to be evil" step by step!
  • Sidetrack opponents with name calling and ridicule.
  • 6. Hit and Run. I
  • 7. Question motives.
  • 8. Invoke authority.
  • 9. Play Dumb.
  • 10. Associate opponent charges with old news.
  • 11. Establish and rely upon fall-back positions.
  • 12. Enigmas have no solution.
  • 13. Alice in Wonderland Logic.
  • 14. Demand complete solutions.
  • 15. Fit the facts to alternate conclusions.
  • 16. Vanishing evidence and witnesses.
  • 17. Change the subject.
  • 18. Emotionalize, Antagonize, and Goad Opponents.
  • 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  • 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
  • 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
  • 22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
  • leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  • 23. Create bigger distractions.
  • 24. Silence critics.
  • sh. If you are a key holder of secrets or otherwise overly illuminated and you
  • think the heat is getting too hot, to avoid the issues, vacate the kitchen.
  • 25. Van
    • ino moreno
       
      WOW! what an interesting read!
ino moreno

Conceptualizing Moral Literacy - 0 views

    • ino moreno
       
      Only definition i could find that described and defines moral literacy!
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
Cassandra Lawver

Redwood Collaborative Media - 0 views

  • creates highly interactive, integrated, and dynamic platforms for sharing knowledge, insights, and resources, and is dedicated to building deep relationships through its professional communities
Cassandra Lawver

digitalcitizenship - Dig Rights & Responsibilities - 0 views

  • The privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them
    • Cassandra Lawver
       
      examples
Cassandra Lawver

What Is Plagiarism? - 0 views

  • Plagiarism is when you use someone else's words or ideas and pass them off as your own
Cassandra Lawver

Plagiarism | Define Plagiarism at Dictionary.com - 0 views

  • thoughts of another author without authorization
Christina Younts

Critical Thinking Definition - 0 views

  • you apply skill in the form of knowledge of your subject matter to the thinking process.
  • critical thinking is a public, not a private act.
  • A good critical thinker thinks explicitly about why she has drawn her conclusions--and lists the reasons for her conclusions.
  • ...2 more annotations...
  • hat respects the way things are done in that particular field and presents conclusions in the manner appropriate to the field.
  • a good critical thinker is constantly trying to improve his thinking, like the track athlete always striving to improve his best time.
Katrina Quick

Defining Critical Thinking - 0 views

  • Critical thinking...the awakening of the intellect to the study of itself. Critical thinking is a rich concept that has been developing throughout the past 2500 years.  The term "critical thinking" has its roots in the mid-late 20th century. 
  • Critical thinking is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action. In its exemplary form, it is based on universal intellectual values that transcend subject matter divisions: clarity, accuracy, precision, consistency, relevance, sound evidence, good reasons, depth, breadth, and fairness
    • Katrina Quick
       
      Critical thinking is the intellectually disciplined process of actively and skillfully making concepts, analyzing synthesizing and evaluating information.
Christina Younts

Why is Digital Literacy Important? - Purposeful Technology-Constructing Meaning in 21st... - 1 views

  • Digital literacy is one component of being a digital citizen - a person who is responsible for how they utilize technology to interact with the world around them.
  • Literacy skills have always been important.
  • Students today learn in ways that their teachers could not even imagine decades ago when they were in school.
  • ...8 more annotations...
  • The way students learn and their abilities to showcase their learning has surpassed the years of book reports, posters, and shoe box representations. "We will not be able to achieve a liberating, collective intelligence until we can achieve a collective digital literacy, and we have now, more than ever, perhaps, the opportunity and the technologies to assist  us in the human project of shaping, creating, authoring and developing ourselves as the formers of our own culture.
  • Digital literacy is one component of being a digital citizen - a person who is responsible for how they utilize technology to interact with the world around them.
  • Digital technology allows people to interact and communicate with family and friends on a regular basis due to
  • the "busy constraints" of today's world.
  • Not only do white-collar jobs require digital literacy in the use of media to present, record and analyze data, but so do blue-collar jobs who are looking for way to increase productivity and analyze market trends, along with increase job safety.
  • higher order thinking skills taught to students in previous times.
  • Today's students are able to use the internet to research and find text sources, videos, pod casts and presentations related to anything they would like to learn about. The big catch is, can this "Google,  yahoo" part of the brain begin to differentiate what resources they consume online are valid or not. Can this "goggle, yahoo" part of the brain create new meaning from the authentic sources they read? Will this "goggle, yahoo" part of the brain lead to great innovations and discoveries that help humans understand their place in the world and make life easier for all our world's citizens?
  • Students now learn in a new way, never seen before! Students in this modern world need to utilize all of the
  •  
    Description 
Cassandra Lawver

Clive Thompson on the New Literacy - 0 views

  • I think we're in the midst of a literacy revolution the likes of which we haven't seen since Greek civilization," she says. For Lunsford, technology isn't killing our ability to write. It's reviving it—and pushing our literacy in bold new directions.
Cassandra Lawver

Copyright - Wikipedia, the free encyclopedia - 1 views

  • a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.
  • t is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.
Cassandra Lawver

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
Cassandra Lawver

Digital security - Wikipedia, the free encyclopedia - 0 views

  • is a type of information security affecting all aspects of digital communication, including computers and the internet, telecommunications, financial transactions, transportation, healthcare, and secure access.
Cassandra Lawver

Critical thinking - Wikipedia, the free encyclopedia - 0 views

  • s reflective reasoning about beliefs and actions.[
  • t is a way of deciding whether a claim is always true, sometimes true, partly true, or false.
Katrina Quick

Learn the Basics | digitalliteracy.gov - 0 views

  • Learn the Basics
    • Katrina Quick
       
      This is could be a good instruction for anyone who needs to learn how to use technology. 
ino moreno

Mindy eLearningPro's Public Library | Diigo - 1 views

    • ino moreno
       
      Mindy's Diigo
Mindy eLearningPro

The top 6 digital marketing trends for 2013 - iMediaConnection.com - 1 views

  • For the same reason, 2013 will see a significant rise in the number of collaborations between agency and marketing technologies.
  • Cross-channel campaigns will include offline events such as direct mail, tradeshows, city tours, and networking events. Companies need to tie offline events to online engagement to measure the impact of these cross-channel campaigns.
  • Customers no longer have simply offline or simply online experiences; they have integrated brand experiences.
  • ...3 more annotations...
  • Content marketing is becoming the core of every marketing initiative for B2B marketing as well as B2C. As the year progresses, we will see software and services solutions for content creation and syndication emerge and grow as companies try to leverage content for demand generation.
  • ontext improves your brand's awareness, and engagement will ultimately lead to more customers. This will require marketers
  • These factors contribute to the increase in digital marketing agencies -- from owner-operated agencies and consultants all the way to creative agencies offering the full span of sophisticated online services. The digital marketing agency is only going to grow.
  •  
    Digital trends, Digital Literacy
« First ‹ Previous 641 - 660 of 707 Next › Last »
Showing 20 items per page