Skip to main content

Home/ Digiteen/ Group items matching "individual" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Nicholas C

Copyright and Fair Use - UMUC Library - 2 views

  • An Introduction to Fair Use What is Fair Use? Fair use is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1). Deciding whether the use of a work is fair IS NOT a science. There are no set guidelines that are universally accepted. Instead, the individual who wants to use a copyrighted work must weigh four factors:
  •  
    More about copyright.
  •  
    This page has lots of information about fair use.
Morgan G

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
Haley M

Creative Commons - 1 views

  • Mission What is Creative Commons? Creative Commons helps you share your knowledge and creativity with the world. Creative Commons develops, supports, and stewards legal and technical infrastructure that maximizes digital creativity, sharing, and innovation.
  •  
    We are going to need to know about Creative Commons for our project. I hope this website helps you as well as me.
Haley M

Why must I indicate a claim for individual copyright materials in my program? | Screenrights - 0 views

  • Film and television programs contain a number of separate copyright materials including the visual images and associated sounds, the screenplay or narration, and other material incorporated in the film such as the music, sound recordings and artistic works. When a film or television program is copied, communicated or retransmitted under the royalty collection services, there are royalties for each of the separate copyright materials. By indicating a claim to a copyright material, you are warranting to Screenrights that you own or control the right to claim royalties for that specific copyright material incorporated in the program.
  •  
    This article explains why you must indicate a claim for individual copyright materials.
Haley M

Copyright - Wikipedia, the free encyclopedia - 0 views

  • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.[clarification needed][1]
  •  
    copyright definition
  •  
    This website defines copyright to help you better understand what copyright really is.
Dru F

What Are Emoticons Used For? - 0 views

  • Avoiding Misunderstandings Emoticons can also be utilized to avoid misunderstandings. A joke sent over the internet may be construed as a serious statement by the receiver, which can lead to negative consequences in interpersonal relationships. A serious statement may be interpreted sarcastically, hindering accurate communication between individuals. Including an emoticon with the message helps indicate the sender's original intent and avoid a misunderstanding. For example, sending a :) emoticon with your joke helps the receiver understand that you were joking, not being serious.
  •  
    Emoticons are used to make the point more clear if you are joking or being serious. "Avoiding Misunderstandings Emoticons can also be utilized to avoid misunderstandings. A joke sent over the internet may be construed as a serious statement by the receiver, which can lead to negative consequences in interpersonal relationships. A serious statement may be interpreted sarcastically, hindering accurate communication between individuals. Including an emoticon with the message helps indicate the sender's original intent and avoid a misunderstanding. For example, sending a :) emoticon with your joke helps the receiver understand that you were joking, not being serious."
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite Browser - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Haley M

legal compliance - Google Search - 0 views

  • Web definitionsYou agree to comply with all applicable domestic and international laws, statutes, ordinances and regulations regarding your use of the Site and the Content and Materials provided therein.
  •  
    This defines legal compliance. It helps to better our understanding of legal compliance.
Woody H

The Digital Divide: Where We Are | Edutopia - 0 views

  • The digital divide is most commonly defined as the gap between those individuals and communities that have, and do not have, access to the information technologies that are transforming our lives.
    • Ashley M
       
      This is an excellent definition on what the digital divide is.
  •  
    shows a snapshot of our ideas about the digital divide
Maggie H

Global Awareness of Habits of managing online activity - 0 views

  • Internet Addiction Disorder, a psychophysiological disorder involving tolerance; withdrawal symptoms; affective disturbances; and interruption of social relationships, is a presenting problem that is becoming more common in society as on-line usage increases by the day.
  • To be diagnosed as having Internet Addiction Disorder, a person must meet certain criteria as prescribed by the American Psychiatric Association. Three or more of these criteria must be present at any time during a twelve month period: 1. Tolerance: This refers to the need for increasing amounts of time on the Internet to achieve satisfaction and/or significantly diminished effect with continued use of the same amount of time on the Internet. 2. Two or more withdrawal symptoms developing within days to one month after reduction of Internet use or cessation of Internet use (i.e., quitting cold turkey) , and these must cause distress or impair social, personal or occupational functioning. These include: psychomotor agitation, i.e. trembling, tremors; anxiety; obsessive thinking about what is happening on the Internet; fantasies or dreams about the Internet; voluntary or involuntary typing movements of the fingers. 3. Use of the Internet is engaged in to relieve or avoid withdrawal symptoms. 4. The Internet is often accessed more often, or for longer periods of time than was intended. 5. A significant amount of time is spent in activities related to Internet use ( e.g., Internet books, trying out new World Wide Web browsers, researching Internet vendors, etc.). 6. Important social, occupational, or recreational activities are given up or reduced because of Internet use. 7. The individual risks the loss of a significant relationship, job, educational or career opportunity because of excessive use of the Internet. In recent research, other characteristics have been identified. Th
  • e first is feelings of restlessness or irritability when attempting to cut down or stop Internet use. The second is that the Internet is used as a way of escaping problems or relieving feelings of helplessness, guilt, anxiety or depression. The third characteristic is that the user lies to family members or friends to conceal the extent of involvement with the Internet. And, finally, the user returns repeatedly despite excessive fees (Egger & Rauterberg, 1996).
Blakelee H

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
Taylor B

The Core Rules of Netiquette -- Excerpted from Netiquette by Virginia Shea -- Albion.com - 2 views

  • Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes
  •  
    " * Rule 1: Remember the Human * Rule 2: Adhere to the same standards of behavior online that you follow in real life * Rule 3: Know where you are in cyberspace * Rule 4: Respect other people's time and bandwidth * Rule 5: Make yourself look good online * Rule 6: Share expert knowledge * Rule 7: Help keep flame wars under control * Rule 8: Respect other people's privacy * Rule 9: Don't abuse your power * Rule 10: Be forgiving of other people's mistakes"
  •  
    Being on the Internet is fun, when you are respected as a person, and an individual. There are many people that dont feel safe on the internet, and these ruls will help make the internet a better place.
  •  
    These are some good topics to help us research.
Zachary D

more effects of virtual worlds - 0 views

  •  
    people use it to fill a since of compliment that they don't have in the real world allows for people to have a relationship with complete strangers on the other side of the world may lead to a need of therapy
Haley M

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneyland | TIME.com - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
Blakelee H

How Do Computers Affect The Social Behavior Of Children? | LIVESTRONG.COM - 3 views

  • Effects of Moderate Use A moderate amount of computer use and game playing doesn't seem to affect social development. The social behavior of moderate computer users and nonusers was roughly the same in terms of sociability and relationships with friends and family. However, heavy computer users tended to believe they had less control over their lives than their classmates, a possible indication of inadequate socialization. Increased Hostility and Aggression After the massacre at Columbine High School in 1999, researchers and educators paid more attention to violent video games such as Doom, the daily game of choice for one of the two teenage killers. Many studies show that violent TV shows increase aggression and hostility in both children and adults. It appears the same is true of computer games. The key variable appears to be a preference for violent games, rather than the amount of time a child plays such games. Even playing Mortal Kombat for a short time increases a child's hostility and aggression. Violent computer games also desensitize children, who show less empathy and willingness to help others, according to research cited in "The Future of Children." Brain Drain In a small study of 18 Chinese university students, published in the "PLos ONE" journal and reported on Mail Online, kids who played games on their computers at least eight hours a day, six days per week showed alarming amounts of atrophy in parts of their brain, as measured by MRI scans. The scans also found abnormalities in the white matter of the brain, which coordinate communication between different areas of the mind. On Mail Online, Dr. Aric Sigman of the Royal Society of Medicine called the July 2011 report a "wake-up call." Experts fear that in addition to cognitive damage, heavy Internet use might reduce the inhibitions and decision-making ability of children, leading to damaged relationships with family members, peers and authority figures.
  •  
    Moderate use of internet and computers do not affect young people. Heavy use, however creates increased hostility and aggression, and can cause one to become "brain dead."
Haley M

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
Blakelee H

STOP cyberbullying: Are you a cyberbully? - 0 views

  • Often, people who are victims are also bullies. Before you feel too bad for yourself, take the quiz below to find if you, too, are part of the cyberbullying problem! Rate yourself on the following point scale according to if, and how many times, you have done the below activities. Give yourself 0 points if you’ve never done it, 1 point if you have done it 1 or 2 times, 2 points if you have done it 3-5 times, 3 points if you have done it more than 5 times.
  •  
    An online cyber bullying quiz that allows a person to know if they are a cyber bully. One can find through the questions what characteristics are of a cyber bully.
Blakelee H

Cyber-Bullying and its Effect on our Youth - 2 views

  • Between cell phones, social media Web sites, and online gaming, children today seem to have more outlets for interacting with each other virtually than they do for interacting with each other in person. However, with all of the good social interaction that is done as a result of these technologies also comes the bad. In addition to the physical and verbal bullying that may take place at school, cyber-bullying in the form of harassing text messages and derogatory posts on children’s Facebook pages is now commonplace. Even though it may not take place in person, the emotional and psychological effects of cyber-bullying are just as destructive. Since new media and cell phones are harder to track and monitor, parents need to take preventive measures that can help minimize the effects of cyber-bullying on their children. 
  •  
    Cyber bullying takes a bad affect on health of today's youth.
Zachary D

negative effects of virtual worlds - 0 views

  •  
    need to look at during project very notable source
1 - 20 of 84 Next › Last »
Showing 20 items per page