Stay on the Path Lesson Four: Scavenger Hunt
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson students learn how to create well-defined search strings and to use tools and techniques such as bookmarking, browser filters and search engine preferences to avoid unwanted material.
In this lesson students learn how to authenticate online information by comparing “facts” from the website www.allaboutexplorers.com with more authoritative sources.
It's been a busy few months for Facebook: a government investigation, another in a seemingly endless series of changes to the site's privacy controls, a New Yorker profile of its famously publicity-shy founder and the upcoming release of The Social Network, a thoroughly unauthorized account of its early days. With all of the publicity and controversy around Facebook – not to mention its still-growing popularity – it's almost impossible to remember what online life was like before it. In fact, it's not much of an exaggeration to say that those who began using the Internet after the introduction of Facebook and its competitors do so in a way that is fundamentally different from older users.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
One of the most noted aspects of the Internet is its anonymity: by and large, people online will treat you as whoever you say you are. In the West, this is often used for mischief or identity play, but in other parts of the world anonymity can have a much more significant and liberating effect.
The last year has been an unusually busy one for watchers of gender representation in the news media, with not one but two high-profile women involved in the U.S. presidential race. The way in which these two politicians were covered provides a view of how gender in politics is portrayed in the media, and how this can help to explain just how unusual those two women are.
The history of the Internet -- and the history of technology in general -- could be described as one big demonstration of the doctrine of unintended consequences: a system designed to help researchers collaborate, and developed to protect military communications in the event of a nuclear war, wound up being used primarily for shopping, socializing and entertainment. The same is true of many of the products and services on the Internet as well. In its early years it was mostly seen as a one-to-many broadcast medium, like TV or radio, but over time it's the more interactive elements that have proven to be most popular, with users producing at least as much online content as professionals.
In the first part of this blog we looked at some of the challenges and barriers facing people with disabilities when it comes to the Internet and other new media. In this final part we turn to possible strategies for making the virtual world fully accessible to all.
Malcolm Gladwell's recent New Yorker article “Small Change” has set the blogosphere buzzing with its strongly stated argument that social networks such as Facebook and Twitter will not usher in a new age of social activism, as some digital evangelists have proposed, but that they and the relationships they foster are actually detrimental to real social change. As Gladwell puts it, "The instruments of social media are well suited to making the existing social order more efficient. They are not a natural enemy of the status quo."