Skip to main content

Home/ Digiteen/ Group items matching "sharing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
4More

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
3More

10 Best Rules of Netiquette - Associated Content from Yahoo! - associatedcontent.com - 3 views

  • 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason.
  • Good internet etiquette (netiquette) is all about being courteous to others online to make the internet a fun experience for everyone.
  •  
    "1.The Golden Rule: Treat others as you would like to be treated. This rule is an oldie but a goodie and can get you through just about any situation, online or off! 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. Harassing or insulting someone will not likely help you gain many online friends! 3. Respect Others' Copyrights: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. Copying the works of someone else without permission or saying it is your own will not only ruin your online reputation, but could land you with hefty fines and lawsuits! 4. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. 5. Don't Spam: As a blog owner, I get hundreds of spam messages each day. Most of them aren't even legible, with things like "kjhgsawu" typed in the comments and links to sites with adult or inappropriate content. I don't appreciate it! Some spammers are getting really sneaky, as they use the same generic post over and over again like "I really like your blog" - if you own multiple blogs like I do though you can quickly identify these types of spammers! There's a fine line between spam and self-promotion, do it very carefully! "
7More

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
2More

globeandmail.com: Faceless no more: Social networking comes with a price - 0 views

  •  
    This is my first try at sharing a link. Hope all goes well.
  •  
    In this series of globe and mail articles the reporter uses facebook profiles, canada411 and google earth to put together the digital footprint of a number of facebook users and then meets with them to get their reaction.
2More

Girl starved to death while parents raised virtual child in online game - 3 views

  •  
    This is just too far. Too FAR! Online game raising a "virtual child" causes parents to neglect their real life daughter - their three month old starved to death. I cannot even express the horror I feel at this article. Perhaps sharing this with my students and others will help people realize that face to face is FIRST PRIORITY! If you have addictive behaviors online - get OFFLINE for goodness sakes.
  •  
    Korean couple became obsessed with raising virtual baby while their real infant daughter lay abandoned and unfed
2More

Your Online Privacy: Because Your Privacy Matters!: Rule 8: Respect other people's priv... - 0 views

  •  
    "* Rule 1: Remember the Human * Rule 2: Adhere to the same standards of behavior online that you follow in real life * Rule 3: Know where you are in cyberspace * Rule 4: Respect other people's time and bandwidth * Rule 5: Make yourself look good online * Rule 6: Share expert knowledge * Rule 7: Help keep flame wars under control * Rule 8: Respect other people's privacy * Rule 9: Don't abuse your power * Rule 10: Be forgiving of other people's mistakes"
  •  
    This article gives rules for how to show respect for others online, and it elaborates on the 10 rules given. " Be forgiving of other people's mistakes"
7More

Virtual Worlds Review: What is a Virtual World? - 0 views

  • A virtual world is an interactive simulated environment accessed by multiple users through an online interface. Virtual worlds are also called "digital worlds," "simulated worlds" and "MMOG's." There are many different types of virtual worlds, however there are six features all of them have in common:
  • 1. Shared Space:
  • 3. Immediacy:
  • ...4 more annotations...
  • 2. Graphical User Interface:
  • 4. Interactivity:
  • 5. Persistence:
  • 6. Socialization/Community:
1More

Top 10 Healthy Internet Habits You Can Practice - 0 views

  • 10. Music: Listen to and discover new music. Listen to classical music to help you stay relaxed and focused. Find free music online to listen to. 9. Language: Learn a second language. This can help you when vacationing and it looks great on your resume. You can earn more money in your field if you know another language. 8. Health: Get healthier with diet plans, meal planning and exercise plans. Join an online community with people who have the same health goals as you: lose weight, get in shape, gain muscle, or just stay healthy. Plan your meals. Get healthy recipes. 7. Money: Manage your money. Read articles and newsletters from finance experts. Learn how to stick to a budget. Get discounts and coupons online to help save money. 6. Donate: Find your favorite charities and organizations online and donate your money, time, blood, etc. Many are eligible for tax deductions. Donate to help find a cure for cancer, help fund a Native American school, give aid in natural disasters…There are so many good causes out there. 5. News: Check out the current events around the world. There is more than just bad news out there. There are good people doing great things. 4. Education: Learn something new with an online course. What have you always wanted to learn how to do? You can also find courses online that can help you advance in your career. 3. Photos: Create an online photo album. Keep a photo album online to save space from printed photos. Your pictures will stay fresh. You can print them out when you want to for frames or gifts. You can share them with relatives and friends who live far away. 2. Ancestry: Research your ancestry and create a family tree. Talk to your mom, dad, siblings, and other relatives to get the names of your grandparents, aunts, uncles, and more. Map your ancestry online and create something to pass down to your kids. 1. Maps: Use maps to show your kids where they live. Print out maps of places you would like to visit. When you are board take a road trip. Print out some great restaurants nearby and make a day of it.
2More

Online Etiquette - 0 views

  • 1. Avoid language that may come across as strong or offensive. Language can be easily misinterpreted in written communication. If a point must be stressed, review the statement to make sure that an outsider reading it would not be offended, then post the statement. Humor and sarcasm may easily be misinterpreted as well, so try to be as matter-of-fact and professional as possible.2. Keep writing to a point and stay on topic. Online courses require a lot of reading. When writing, keep sentences poignant and brief so that readers do not get lost in wordy paragraphs and miss the point of the statement. Also, do not introduce new topics; it may just confuse the readers.3. Read first, write later. It is important to read all posts or comments of students and instructors within the course discussion before personally commenting to prevent repeating commentary or asking questions that have already been answered.4. Review, review, then send. There’s no taking back a comment that has already been sent, so it is important to double-check all writing to make sure that it clearly conveys the exact intended message.5. An online classroom is still a classroom. Though the courses may be online, appropriate classroom behavior is still mandatory. Respect for fellow classmates and the instructors is as important as ever.6. The language of the Internet. Though still a fairly young type of communication, certain aspects of this form of communication are becoming conventional. For example, do not write using all capital letters, because it will appear as shouting. Also, the use of emoticons can be helpful when used to convey nonverbal feelings (example: :-) or :-( ), but avoid overusing them.7. Consider the privacy of others'. Ask permission prior to giving out a classmate's email address or other information.8. If possible, keep attachments small. If it is necessary to send pictures, change the size to an acceptable 100k.9. No inappropriate material. Do not forward virus warnings, chain letters, jokes, etc. to classmates or instructors. The sharing of pornographic material is forbidden.
  •  
    rules
1More

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from your own. Consider others’ privacy. Be wary of your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
4More

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
1More

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
2More

Why Google Wants You To Google Yourself - TIME - 0 views

  • To give people a bit more control over search results, Google introduced a new feature this week it calls a "Google profile" that users can create so that a thumbnail of personal information appears at the bottom of U.S. name-query search pages. Once users create a Google profile, their name, occupation, location (and photo if they choose), appears in a box on the first page of the search results for their name. Next to the thumbnail info, there's a link to a full Google profile page that in many ways resembles a Facebook page.
  • And if you're already using Gmail for email, Google Maps for directions, and Google's Picasa for photo sharing, you may wind up spending more time with your Google profile than your Facebook or MySpace page.
1More

Super safe hard - 0 views

  • * of networked storage to business users searching for the easiest and most technologically advanced way to share, secure and protect their most important data, including productivity application data, media files, backup data, and other digital files.
5More

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
10More

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
2More

Collaboration - Wikipedia, the free encyclopedia - 0 views

  • Collaboration is a recursive process where two or more people or organizations work together in an intersection of common goals — for example, an intellectual endeavor[1] [2] that is creative in nature[3]—by sharing knowledge, learning and building consensus. Most collaboration requires leadership, although the form of leadership can be social within a decentralized and egalitarian group.[4] In particular, teams that work collaboratively can obtain greater resources, recognition and reward when facing competition for finite resources.[5]Collaboration is also present in opposing goals exhibiting the notion of adversarial collaboration, though this is not a common case for using the term.
  •  
    this is a bookmark for my project on access and collaboration.
7More

Communication - Wikipedia, the free encyclopedia - 0 views

  • Communication is a process of transferring information from one entity to anothe
  • sign-mediated interactions
  • between at least two agents which share a repertoire of signs and semiotic rules.
  • ...3 more annotations...
  • defined as "the imparting or
  • interchange of thoughts, opinions, or information by speech, writing, or signs".
  • two-way process in
  •  
    communication- the process of transferring information from one entity to another
« First ‹ Previous 81 - 100 of 103 Next ›
Showing 20 items per page