1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is Information literacy?
1) the adoption of appropriate information behavior to identify, though whatever channel or medium, information will fitted to information needs, leading to wise and ethical use of information in society
2) "Information Literacy is defined as the ability to know when there is a need for information, to be able to identify, locate, evaluate, and effectively use that information for the issue or problem at hand
Why is information literacy important?
- It addresses the problem of information overload It is an important skill which supports lifelong learning
It provides skills to evaluate information from a variety of sources
It helps in landing a job
What are the 5 steps for effective research?
Step 1) Define the need.
Step 2) Find the information.
Step 3) Evaluate the information.
Step 4) Organize the information.
Step 5) Communicate the information.
What are some key characteristics of 'defining the need'? Step 1
Identify a variety of types of potential sources
Consider the cost and benefits of acquiring the information
Explore general information sources Dictionaries, encyclopedias
Identify key concepts and terms Key Words and Concepts
In regard to "Defining the Need" Step 1; What are Primary and Secondary Sources?
Primary sources:
enable the researcher to get as close as possible to what actually happened reflects the individual viewpoint of a participant or observer
Secondary sources
A summary, interpretation or analysis Not necessarily reviewed (may be edited; marketing considerations).
What does it mean to "Find the Information?" Step 2
Select the most appropriate methods or retrieval systems Learn the scope, content and organization
Select efficient and effective approaches
What are two options within "Find the Information" for retrieving info?
Library:
- Library cultivates the content more closely on the way in • Library comes from a tradition of putting 'one' thing in 'one' place
Search Engine:
Search engines find the value of the relationships between documents They basically treat everything as a webpage (more of less)
What are the 4 modules within search engines?
- A document processor
A query processor A search and matching function
A ranking capability
What does Step 3 "Evaluate the information" look like?
- Applying things like the CRAAP test.
-avoiding things like 'fake news'.
What does CRAAP stand for? in CRAAP test.
Currency
Relevance
Authority
Accuracy
Purpose
What does Step 4 "Organize the Information" look like?
Ensures your work is honest, and provides evidence of your research
Allows the person reviewing your work to determine how legitimate your sources are
Gives credit to authors whose works you have used.
What does Step 5 "Communicating the Information" look like?
- The physical act of citing the material.
What is plagiarism?
the practice of taking someone else's work or ideas and passing them off as one's own.
About 70% of of university students say they cheat on tests, or have cheated, why is this number significant?
An environment in which cheating is ignored or tolerated breeds more and more cheating; it feeds on itself in a vicious cycle. It is harmful to everyone involved.
What are some rationale points for plagiarizing from students?
Academic, societal and family expectations and pressures
Desire to excel and pressure to get high grades (for good jobs or acceptance to grad school)
Stress
Competitive environment
Ignorance, laziness, apathy, lack of preparation and time management skills
What are the 6 D's of Plagiarism?
1) Define
2) Deter
3) Dialogue
4) Defend
5) Detect
6) Discipline
In relation to the 6 D's of plagiarism, describe the 'D' #1 - "Define"?
- Course syllabus
Knowledge of citing, paraphrasing, etc.
In relation to the 6 D's of plagiarism, describe the 'D' #2 - "Deter"?
- Role model
Tutorials
Course design
In relation to the 6 D's of plagiarism, describe the 'D' #3 - "Dialogue"?
Start of, and throughout, course (More on next slide) During hearing
In relation to the 6 D's of plagiarism, describe the 'D' #4 - "Defend"?
Knowledge of AI (again)
Discuss work habits
Care of work; Helping and asking for help; Academic Integrity 21 Group work; Journal; Procrastination
Ask for clarification if unsure of anything
Know Brock's procedures, if charged
In relation to the 6 D's of plagiarism, describe the 'D' #5 - "Detect"?
Time-honoured ways Phrase matching software
Turnitin Academic Integrity 22
Interpretation of TII reports
In relation to the 6 D's of plagiarism, describe the 'D' #6 - "Discipline"?
Evidence
Hearing
Consistency
Define plagiarism
Plagiarism is using the work/ideas of another as if they were your own, without "bounding the borrowed" and giving the appropriate credit
What are Lipson's Laws?
When you say you did the work yourself, you actually did it -- IOW, Academic Honesty!
What is McCabe's Hypothesis in relation to plagiarism?
15 - 20% of students will cheat no matter what we do.
15 - 20% of students will never cheat, regardless of the circumstances, therefore
60 - 70% of students can be influenced in their attitudes and behaviours after they arrive on campus
What is the 'pace of change'?
Rapid technological advancement
What is an example of change and unexpected development?
How has this affected our lives?
Cell Phones!
- Location tracking raises privacy concerns.
Cameras in cell phones affect privacy in public and non-public places.
Define 'Kill Switches'?
- Allow a remote entity to disable applications and delete files.
Are in operating systems for smartphones, tablets and some computers.
Used mainly for security, but raise concerns about user autonomy.
What are some positive effects of social networking?
- ease with which they can share aspects of their lives.
- Businesses connect with customers.
Organizations seek donations.
Groups organize volunteers.
What are some negative effects of social networking?
Stalkers and bullies stalk and bully.
Jurors tweet about court cases during trials.
Socialbots simulate humans.
How has Communication on the web affected our daily lives and privacy?
Blogs ("Web log") began as outlets for amateurs
wanting to express ideas, but they have become
significant source of news and entertainment.
Inexpensive video cameras and video-
manipulation tools have resulted in a burst
of amateur videos.
Many videos on the Web can infringe copyrights
owned by entertainment companies.
What are some examples of e-commerce? How does e-commerce impact human trust?
Amazon or Ebay -
People were reluctant to provide credit card
information to make online purchases, so
PayPal.com grew out of need for trusted
intermediary to handle payments. Encryption and secure servers made payments
s a f e r.
Define 'Free Stuff' in relation to unexpected developments?
Email programs and email accounts, browsers,
filters, firewalls, encryption software, word
processors, spreadsheets, software for viewing
documents, software to manipulate photos and
video, and much more
- Advertising pays for many free sites and services,
but not all
Generosity and public service flourish on the Web.
Many people share their expertise just because
they want to.
Define 'Artificial Intelligence' in relation to unexpected developments?
A branch of computer science that makes
computers perform tasks normally requiring
human intelligence.
What is the Turing Test?
If the computer convinces the
human subject that the computer is human, the
computer is said to "pass".
Define 'Robots' in relation to unexpected developments?
Mechanical devices that perform physical tasks
traditionally done by humans.
Can operate in environments that are hazardous
for people.
Define 'Robots' in relation to unexpected developments?
Assistive technology devices help restore
productivity and independence to people with
disabilities.
What are some challenges of technology?
Old problems in a new context: crime,
pornography, violent fiction
Adapting to new technology: thinking in a new
way
- Trade -offs and controversy: Increasing security
means reducing convenience.
Global reach of Net: ease of communication with
distant countries
What is ethics?
- Study of what it means to "do the right thing". Assumes people are rational and make free
choices.
What are three ethical POV's?
- Deontological theories Utilitarianism Natural rights
What is deontological ethics?
ethics based on duty with no consideration of personal benefits gained from doing right
What is utilitarianism?
Greatest good for the greatest number of people
What are natural rights?
Life, Liberty, and Property
Compare negative (Liberties) and positive (claim-rights) rights?
Negative (Liberties):
- The right to act without interference
Positive rights (claim-rights)
An obligation of some people to provide certain
things for others
What are the 3 key aspects of privacy?
- Freedom from intrusion (being left alone)
Control of information about oneself
Freedom from surveillance (from being
tracked, followed, watched)
What are some privacy threat categories?
- Intentional, institutional uses of personal
information
Unauthorized use or release by "insiders"
Theft of information
Inadvertent leakage of information
Our own actions
Discuss "New Technology, New Risks" in relation to privacy risks.
- Anything we do in cyberspace is recorded.
Huge amounts of data are stored.
People are not aware of collection of data.
Software is complex.
Leaks happen.
In relation to Privacy risks and principles, define "Personal Information"
any information
relating to an individual person.
In relation to Privacy risks and principles, define "Informed Consent"
Users being aware of what
information is collected and how it is used
In relation to Privacy risks and principles, define "Invisible Information gathering"
collection of
personal information about a user without the user's knowledge
In relation to Privacy risks and principles, define "Cookies"
Files a Web site stores on a visitor's
computer
In relation to Privacy risks and principles, define "Secondary Use"
Use of personal information
for a purpose other than the purpose for
which it was provided.
In relation to Privacy risks and principles, define "Data mining"
Searching and analyzing
masses of data to find patterns and develop
new information or knowledge.
What are two common forms for providing informed consent?
Opt out - Person must request (usually by
checking a box) that an organization not use
information.
Opt in - The collector of the information may
use information only if person explicitly
permits use (usually by checking a box)
What are the 7 fair information principles?
1. Inform people when you collect information.
2. Collect only the data needed.
3. Offer a way for people to opt out.
4. Keep data only as long as needed.
5. Maintain accuracy of data.
6. Protect security of data.
7. Develop policies for responding to law enforcement requests for data.
What are some examples of 'non-invasive' searches?
particle sniffers, imaging systems, location
trackers
What does "reasonable expectation of privacy" have to do with how the Supreme Court has interpreted the 4th Amendment?
Court said that the Fourth Amendment
protects people, not places. To intrude in a place where reasonable person has a
reasonable expectation of privacy requires a
court order.
What is data mining?
the process of analyzing data to extract information not offered by the raw data alone
What are targeted ads?
Ads targeted at the user based on the computer data habits.
Discuss the pros and cons of cloud storage
- Security of online data ? is this the most secure place for your personal data?
- It is certainly convenient however!
Discuss the implications of 'Location Tracking" and privacy?
Global Positioning Systems (GPS) - computer
or communication services that know exactly
where a person is at a particular time
Cell phones and other devices are used for
location tracking
Tools for parents
GPS tracking via cell phones or RFID
What is A right to be forgotten?
The right to have material removed
To exercise the right to be forgotten and request removal from a search engine
Discuss public records: Access vs. Privacy?
Public Records - records available to general
public (bankruptcy, property, and arrest records,
salaries of government employees, etc.)
Identity theft can arise when public records are
accessed
How should we control access to sensitive public
records?
Discuss Social Security Numbers within the context of National ID systems?
SSN's are:
- Too widely used
- easy to falsify
Discuss the implications of implementing a new national ID system? Pro's vs cons?
A new national ID system -
Pros
would require the card
harder to forge
have to carry only one card
A new national ID system -
Cons
Threat to freedom and privacy
Increased potential for abuse
What is encryption and public key cryptography?
- Privacy enhancing-technologies for
consumers
- Business tools and policies for protecting data
Compare Free Market view vs consumer protection view
Free Market View
Freedom of consumers to make voluntary
agreements
Diversity of individual tastes and values
Response of the market to consumer
preferences
Consumer Protection View
Uses of personal information
Costly and disruptive results of errors in
databases
Ease with which personal information leaks
out
What are the free speech principles?
-Advocating illegal acts is (usually) legal.
Anonymous speech is protected.
Some restrictions are allowed on advertising.
Libel and direct, specific threats are not
protected.
Inciting violence is illegal
What is offensive speech?
Most efforts to censor the Internet focus on
pornographic and other sexually explicit
material.
What does the phrase 'laws must not chill expression of legal speech' refer to?
Refers to freedom of speech guidelines.
- Distinguish speech from action. Advocating illegal
acts is (usually) legal
Discuss internet censorship and alternatives?
Made it a crime to make available to anyone under 18
any obscene or indecent communication
Found to be unconstitutional
The worst material threatening children was already
illegal
It was too vague and broad
It did not use the least restrictive means of
accomplishing the goal of protecting children
What is the most likely cause of a law being turned down?
Most likely, the law is found to be unconstitutional.
What does the phrase 'least restrictive means' refer to?
In regard to internet censorship, and the laws surrounding that, especially those protecting children, it is the goal of a law to provide the least restrictive form of protection.
Is Sexting considered legal or illegal?
Sexting is illegal! Falls under
What is spam? What are some of the issues surrounding spam?
Spam is unsolicited bulk email.
- Mostly commercial advertisement
Angers people because of content and the way it's sent
- Spam imposes a cost on recipients
In relation to 'sensitive material', what are 'leaks'?
Leaks of personal information.
-Value to society
Risks to society and individuals
- what is an example of a leaks source?
Wikileaks
Potentially dangerous leaks
Releasing a huge mass of documents
What are some positive uses of anonymity?
Protect political speech
Protect against retaliation and
embarrassment
What are some negative uses of anonymity?
protects criminal and antisocial activities
aids fraud, harassment, extortion, distribution
of child pornography, theft, and copyright
infringement
masks illegal surveillance by government
agencies
Is anonymity protected by the First Amendment?
yes.
Discuss censorship and political freedom?
Authoritarian governments have impeded flow of
information and opinion throughout history.
The vibrant communication of the Internet threatens
governments in countries that lack political and cultural
freedom.
Discuss net-neutrality vs market view?
Net Neutrality:
Refers to a variety of proposals for restrictions
on how telephone and cable companies
interact with their broadband customers and
set fees for services.
-every user on the internet should be treated the same way.
Market Views:
-Flexibility and market incentives will benefit
customers.
Define intellectual property
The intangible creative work, not its particular
physical form
Value of intelligence and artistic work comes
from creativity, ideas, research, skills, labor, non-
material efforts and attributes the creator
provides
Protected by copyright and patent law
- In simple terms, the person who created it, owns it!
As copyright holder, you hold exclusive rights to:
-To make copies
To produce derivative works, such as translations
into other languages or movies based on books
To distribute copies
To perform the work in public (e.g. music, plays) To display the work in public (e.g. artwork,
movies, computer games, video on a Web site)
In regard to intellectual property, how has new technology made things more difficult?
Digital technology and the Internet make
copyright infringement easier and cheaper.
New compression technologies make copying
large files (e.g. graphics, video and audio files)
feasible.
Search engines make finding material easier
What is the Fair use Doctrine?
- It is the ability to use an author's work legally. (to a limited degree)
What are four factors associated with the fair use doctrine?
1) Purpose and nature of use - commercial (less likely)
or nonprofit purposes
2) Nature of the copyrighted work 3) Amount and significance of portion used
4) Effect of use on potential market or value of the
copyright work (will it reduce sales of work?)
Discuss some ethical arguments regarding copying?
- Copying can decrease the amount of money that the copyright owner earns.
- Conversely, Copying enables users to try out products,
benefiting the copyright owner by encouraging
sales.
What are some methods to preventing copyright infringement?
Expiration dates within the software
Copy protection that prevents copying Activation or registration codes Court orders to shut down Internet bulletin boards
and Web sites
Discuss international piracy as it relates to intellectual property?
Some countries do not recognize or protect intellectual
property
Countries that have high piracy rates often do not have a
significant software industry
Discuss 'banning, suing, and taxing' in regard to intellectual property?
- Content industries can respond to copyright infringment by banning, suing, or taxing.
What is Digital Rights Management (DRM)?
Collection of techniques that control uses of
intellectual property in digital formats
Includes hardware and software schemes using
encryption
What is safe harbor in relation to intellectual property?
Protect Web-sites from lawsuits for copyright
infringement by users of site
Discuss the copyright issues that cloud storage raises?
Is copying legally purchased files to and from the
cloud a fair use? Will the companies operating the cloud services have
any responsibility for unauthorized content their
customers store and share
Discuss the copyright issues that search engines raise?
Caching and displaying small excerpts is fair use
Creating and displaying thumbnail images is fair
use
Discuss the copyright issues that online books raise?
Google has scanned millions of books that are in the
public domain and that are not; they display only
excerpts from those still copyrighted
Some court rulings favor search engines and
information access; some favor content producers
What is Free-software?
Free software is an idea advocated and supported by a
large, loose-knit group of computer programmers who allow people to copy, use, and modify their software
What is the concept of 'copyleft'?
the concept of copyleft
hundreds of programs freely available and
thousands of software packages available as free
software (with modifiable source code)
-Concepts such as copyleft and the GNU Public License
provide alternatives to proprietary software within
today's current legal framework
Describe the difference between a copyright and a patent?
Copyright:
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Patent:
Patents protect inventions by giving the inventor a
monopoly for a specified time period.
What are patent trolls?
people who buy patents from other people or file for patents then go around looking for companies/people who infringed on their patents
-> money!
if violated, and not fought off, patent office can issue triple damages from infringer
How are software patents beneficial?
- Reward inventors for their creative work
Encourage inventors to disclose their inventions
so others can build upon them Encourage innovation
HOWEVER:
Patents can stifle innovation, rather than
encourage it.
Cost of lawyers to research patents and risk of
being sued discourage small companies from
attempting to develop and market new
innovations.
It is difficult to determine what is truly original and
distinguish a patentable innovation from one that
is not.