116 items | 84 visits
guides for safe and productive online activity, including (in-)tolerable privacy policies
Updated on Dec 01, 14
Created on Aug 05, 08
Category: Computers & Internet
URL:
Loaded with tips and tools for finding and attributing sources of Creative Commons images.
A thorough account of an encounter with an unscrupulous publishing outfit
"What many people don’t realize is that communication overload today is not solely due to the overabundance of information or data. A huge part of the problem is the fact that the original filters we have in place to sort important information from irrelevant haven’t translated to the new online ecosystem. And in places where filters do exist, they don’t evolve as quickly as new modes of communication methods..." (Seeing the Forest Through the Trees, ¶1).
"This site is a central location for information on how to move your data in and out of Google products. Welcome. Click on any product link on the left hand side for more information on how to liberate your data from (or to!) that product" (deck, para. 1, 2012.01.26).
Written and Narrated by Dave Cormier / Video by Neal Gillis / Uploaded by davecormier on Dec 1, 2010.
Dave says,"You need to orient, declare, network, cluster, and focus," in order to succeed in a MOOC. "Connections are what the course is all about...."
Coiro, Julie. (2005). Making sense of online text. <i>Educational Leadership 62</i>(2), 30-35. Retrieved September 21, 2011, from http://www.ascd.org/publications/educational-leadership/oct05/vol63/num02/Making-Sense-of-Online-Text.aspx
"Four challenges face students as they use Internet technologies to search for, navigate, critically evaluate, and synthesize information. Here ... [Coiro] pose[s] each challenge as a question and suggest a corresponding activity that models effective strategies to help students meet that challenge" (A New Kind of Literacy, ¶3).
Highlights weaknesses in collections and uses of library resources
This site represents two editions of a guidebook for media literacy.
"In a short and readable format, ... [the second edition]:
- Provides a complete framework for critical inquiry, using CML’s Five Core Concepts, and Five Key Questions for both construction and deconstruction of media, along with handouts.
- Gives explanations and Guiding Questions to illustrate how to connect the Key Questions when consuming or producing or participating with media. - Provides in-depth explanations and the foundational role of the Five Key Questions of Media Literacy. - Offers a sample inquiry into visual language: ... How to Conduct a ‘Close Analysis' of a Media ‘Text'..." (SECOND EDITION, ¶4).
The first edition, available in English and Spanish, explores a "framework for deconstruction or critical analysis of media . . . from the point of view of media consumers" (FIRST EDITION, ¶1).
This page also links to a one-page PDF listing "... <a href="http://www.medialit.org/sites/default/files/14A_CCKQposter.pdf">Five Key Questions</a> for deconstructing media" (FIRST EDITION, ¶1).
To commemorate Safer Internet Day, Sandy posts "a few Internet safety skills" she thinks "are important" (February 9, 2011).
Digital divide deepening?
"Several principles are key to assuring that the Web becomes ever more valuable. The primary design principle underlying the Web's usefulness and growth is universality" (Universality is the Foundation, para. 1).
"[T]he upstart search engine Cuil has announced that it won’t keep any personally identifiable information at all, a privacy feature that distinguishes it from Google" (Rosen, 2010, Expiration Dates, ¶2).
Rosen, Jeffrey. (2010). The Web Means the End of Forgetting. The New York Times, July 21, 2010. Retrieved August 27, 2010, from http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all
Rather more than less palatable terms that give SNS creator considerable control over content
"This website is designed to support the book Teachingmedialiteracy.com: A Web-Linked Guide to Resources and Activities" (index page, ¶1, 2010.08.03)
Explains and illustrates features of version five, including a snapshot function enabling you to archive a webpage
"Reputation management has now become a defining feature of online life for many internet users, especially the young. While some internet users are careful to project themselves online in a way that suits specific audiences, other internet users embrace an open approach to sharing information about themselves and do not take steps to restrict what they share" (OVERVIEW, ¶2).
116 items | 84 visits
guides for safe and productive online activity, including (in-)tolerable privacy policies
Updated on Dec 01, 14
Created on Aug 05, 08
Category: Computers & Internet
URL: