CAS 383: Culture and Technology
3.6K views | +0 today
CAS 383: Culture and Technology
Class Resources for Penn State Berks CAS 383 Course.
Curated by John Shank
Your new post is loading...
Your new post is loading...
Rescooped by John Shank from Social e-learning network
Scoop.it!

A Conversation About Big Shifts | Democratizing Knowledge

A Conversation About Big Shifts | Democratizing Knowledge | CAS 383: Culture and Technology | Scoop.it

Via Costas Vasiliou
No comment yet.
Scooped by John Shank
Scoop.it!

• E-book sales revenue forecast for the U.S. market 2010 - 2015 | Statistic

• E-book sales revenue forecast for the U.S. market 2010 - 2015 | Statistic | CAS 383: Culture and Technology | Scoop.it
The statistic above presents actual and forecast revenue data for the U.S. e-book market. In 2009, e-book sales generated 551 million U.S. dollars in the United States.
No comment yet.
Scooped by John Shank
Scoop.it!

Online sharing, information overload is worldwide problem: poll

Online sharing, information overload is worldwide problem: poll | CAS 383: Culture and Technology | Scoop.it
NEW YORK (Reuters) - The languages and the cultures are different, but the pet peeves of mobile technology users around the globe are the same, with most people annoyed by receiving too much information,...
No comment yet.
Scooped by John Shank
Scoop.it!

The End of Solitude - The Chronicle Review - The Chronicle of Higher Education

The End of Solitude - The Chronicle Review - The Chronicle of Higher Education | CAS 383: Culture and Technology | Scoop.it

According to “The End of Solitude,” what is it that “the contemporary self” wants, and consequently what is the “great contemporary terror”?

Monica Jones's comment, September 25, 2012 1:31 AM
According to “The End of Solitude" "the contemporary self" wants to be recognized and wants to be connected. It also wants to be visible. The "great contemporary terror" is anonymity.
John Nielson's comment September 25, 2012 9:00 AM
According to “The End of Solitude,” what is it that “the contemporary self” wants to be know by others, they want to be connected with other people constantly. "The contemporary self" wants to be visible. The "great contemporary terror" is anonymity or the state or quality of being anonymous. This is also goes hand and hand with people never want to be alone or are afraid to be alone.
Brittanie Rushing's comment, September 25, 2012 9:36 AM
The great contemporary terror is about being anonymous; being unknown by others. But the contemporary self desires to be constantly connected. The want to be seen and known. Oddly enough the two seem opposite yet related.
Scooped by John Shank
Scoop.it!

Great Wall of Facebook: The Social Network's Plan to Dominate the Internet

Great Wall of Facebook: The Social Network's Plan to Dominate the Internet | CAS 383: Culture and Technology | Scoop.it

As observed in “Great Wall of Facebook,” how does the “drumbeat of controversy surrounding Facebook” illustrate the catch-22 that the social network faces?

Monica Jones's comment, September 11, 2012 2:12 AM
One thing that catch-22 touches on is that facebook "has a massive storehouse of user data, but every time it tries to capitalize on that information, it's members freaks out". The users don't give them a chance to fix these glitches in time before they start reporting these problems. The users also may feel as if their privacy is being violated based on the information they post because facebook uses this to post their advertisements.
Brittanie Rushing's comment, September 11, 2012 8:08 AM
I think that in one word all the answers are contained. Privacy. We no longer have it yet we no longer seem to care or ask for it. I knew nothing about all the interactions between Google and Facebook before this piece. The owners of Facebook are quite frankly a little disturbing. We all enjoy a site for social networking and are on it daily. The question it are we thinking about what this means. As the Facebook experience improves our privacy seems to dwindle more and more.
Sung Hyun Kim's comment, September 11, 2012 10:50 AM
Many of us don't understand how much risk they are taking when they are entering their own personal information on facebook. The action itself became so normal for us that we do not even think its a threat to us anymore. I wouldn't say that catch-22 is specifically the main reason that we are leaking our own personal information on facebook. However, we have just gotten too numb about this action of ours.
Rescooped by John Shank from Didactics and Technology in Education
Scoop.it!

Only 2% of People Can Multitask Successfully [INFOGRAPHIC]

Only 2% of People Can Multitask Successfully [INFOGRAPHIC] | CAS 383: Culture and Technology | Scoop.it
Research suggests that 98% of people actually lessen their productivity by multitasking.

Via D Fowler, Rui Guimarães Lima
No comment yet.
Rescooped by John Shank from eLearning
Scoop.it!

Learning, Identity and Social Media


Via Paulo Simões
No comment yet.
Scooped by John Shank
Scoop.it!

5 Myths About the 'Information Age' - The Chronicle Review - The Chronicle of Higher Education

5 Myths About the 'Information Age' - The Chronicle Review - The Chronicle of Higher Education | CAS 383: Culture and Technology | Scoop.it
No comment yet.
Suggested by Patricia Sanford
Scoop.it!

The Drumbeat Surrounding Facebook

 

According to Fred Vogelstein's, "The Great Wall of Facebook" article, Vogelstein states that the controversy involves the fact that Facebook has secured a storehouse of user data but it cannot share that sensitive information with advertisers or others because those using the site want privacy protections. While these individuals will share their most innermost thoughts, comments or opinions about a variety of topics, they believe them to be sacrosanct and not privy to those they have not allowed to view them. Facebook users do not want their personal privacy to be violated or impinged upon by companies seeking it for utilitarian or financial gain. Sharing detailed information about sources, products, or people in real time, as compared to some information being available in a controlled format, such as through Google's algorithms, is what makes Facebook unique and fresh. It is also genuine as it links to a real individual with a real and viable email, thereby justifying its credibility.

No comment yet.
Rescooped by John Shank from Video Infographics Showcase
Scoop.it!

Everything is a Remix: Part 4

Everything is a Remix episode 4, produced by Kirby Ferguson, a New York-based filmmaker.

 

"Our system of law doesn't acknowledge the derivative nature of creativity. Instead, ideas are regarded as property, as unique and original lots with distinct boundaries.

 

But ideas aren't so tidy. They're layered, they’re interwoven, they're tangled."

 

A must watch video experience.

Find out more: http://www.everythingisaremix.info/  ;


Via Robin Good
Joe Silverstar's comment, April 14, 2013 10:47 AM
Brilliant, Indeed!! I hope Many, many people see this gem!
Paula Correia's curator insight, April 22, 2013 11:30 AM

Tudo é um remix...

As nossas ideias são consideradas, do ponto de vista do Direito, como propriedade, como únicas e com limites bem definidos.

Será isso um MEME? .

( O meme , termo criado por Richard Dawkins é o análogo do gene na genética.  É uma unidade de evolução cultural que pode de alguma forma autopropagar-se. Podem ser ideias, línguas, sons, desenhos, capacidades, valores estéticos e morais, ou qualquer outra coisa que possa ser aprendida e transmitida.)

Mr Tozzo's curator insight, June 12, 2013 11:25 AM
Everything is a Remix: Part 4
Scooped by John Shank
Scoop.it!

How to Create an iBook Step By Step Comprehensive How-To Guide (Part 1)

How to Create an iBook Step By Step Comprehensive How-To Guide (Part 1)...
No comment yet.
Scooped by John Shank
Scoop.it!

Growing up Gen Y: The Impact of Being Immersed in Technology

Growing up Gen Y: The Impact of Being Immersed in Technology | CAS 383: Culture and Technology | Scoop.it
Ken Morrison's comment, August 7, 2012 9:14 PM
Thank you for following my topic. I hope it is helpful for you. You have some good sites here. Keep up the great work. Enjoy. Ken
Rescooped by John Shank from Edutechification
Scoop.it!

An Interactive Infographic Maps The Future Of Emerging Technology

An Interactive Infographic Maps The Future Of Emerging Technology | CAS 383: Culture and Technology | Scoop.it

When will you get your robot butler? When will we first set foot on Mars? These and countless other questions about the future are answered in this amazing chart of where technology is headed in the next 30 years.

 

Can speculation about the future of technology serve as a measuring stick for what we create today? That's the idea behind Envisioning Technology's massive infographic, which maps the future of emerging technologies on a loose timeline between now and 2040.


Via Danielle Klaus
Rachel May's curator insight, March 22, 2013 6:43 AM

A time mapping of current and emerging technologies for the next 30 years including health care advancements such as self healing materials, organ printing and synthetic blood in the next couple of years. It is interesting to think about which ones we will be able to tick off as accurate and which ones will end up seeming as far fetched as all of us on hoverboards in 2012 (thinking 'Back to the Future').

Scooped by John Shank
Scoop.it!

Huge rise in ebook sales offsets decline in printed titles

Huge rise in ebook sales offsets decline in printed titles | CAS 383: Culture and Technology | Scoop.it
Alison Flood: Despite an increase in digital sales of 366% last year, printed books remain the choice for the majority of readers, figures show...
No comment yet.
Scooped by John Shank
Scoop.it!

Nexus Masterclass 2011 by Sherry Turkle: Alone Together -- Identity and Digital Culture

As described in “A Passion for Objects,” how does the author describe digital culture at its heart?

Monica Jones's comment, September 4, 2012 1:19 AM
Turkle describes digital culture as being a need and necessity in everyday life. She states that "by the end of the 1980s, my students begin to write about growing up with electronic games, lasers, video games, and "home computers," objects that are investigated through the manipulation of program and code. Yet even with the passage from mechanical to electronic, and from analog to digital, students express a desire to get close to the inner workings of their machines. The early personal computers made it relatively easy to do so". I think she means by this that her students liked working with digital objects that didn't come programed already like the ones do now in the new era. Maybe they liked working on these machines themselves and building them from scratch up also. The metaphor that she used to describe all this was "an early personal computer was like an old car in your garage. You could still "open up the hood and look inside.""
John Nielson's comment September 4, 2012 10:00 AM
Attaching Word files to e-mail is comparable to a standard railroad gauge as described in "Moore's Law and Technological Determinism" because they both show flaws such as Mircosoft Word changing font all of a sudden and the standard railroad gauge is slightly narrower than the optimum, but they are still continually used because they have become standard to use my the majority of people. In "A Passion for Objects' Turkle states at its heart digital culture is precision and infinite possibilities.
Jonathan Schneider's comment September 4, 2012 11:33 AM
Turkle decribes our passion for objects as a collective overwhelming need to be knowledgeable about technology as it has evolved over the past decades. I can personally relate to her article because I work in the telecommunications sales industry and I see everyday the passion and NEED for new smartphones in customers' questions like, "when is this or that device coming out?" Additionally, the need and passions are demonstrated when thousands of people line up outside of AT&T, Verizon and Apple stores to desperately get their hands on the newest iPhone.
Scooped by John Shank
Scoop.it!

HR Magazine: How Deep Can You Probe?

HR Magazine: How Deep Can You Probe? | CAS 383: Culture and Technology | Scoop.it

As detailed in “How Deep Can You Probe?”, what are some of the risks run by employers who vet candidates by looking at online information and social networking sites?

Alex Patton's comment, September 18, 2012 10:21 AM
There are many risks from looking for potential job employees at online sources and social networking cites. Viewing a person's online profile is very risky, it can be accurate or very misleading. Employers might want to not rely on Facebook and just do independent background checks instead, this would be more efficient and accurate.
Chris Bechtel's comment, September 20, 2012 5:57 PM
Researching potential job candidates on social networking sites is certainly a risky behavior by employers. The SNOPA (Social Networking Online Protection Act ) has already been created and passed by a few States and quickly, others are joining the movement. The problem with all the info available on sites like Facebook, is that none of it is verifiable data. With any photo, I can create a phony Identity on Facebook and even masquerade around as an actual real person. With the unemployment rate so high, American's can't afford this added investigation into their personal lives intended only to disqualify by focusing more on ambiguously defined infractions and less on one's morals and accomplishments.
Paola Alexandra Castello's comment, September 30, 2012 11:04 PM
According to the article one of the risks employers faced when researching a potential employee is crossing legal boundaries. As stated on the article it is illegal to conduct a background check without the individuals' consent. Another risk is discriminating a potential employee based in their religion, race, and marital status which is illegal. Knowing whether the information getting from the internet is true or not is another risk they may take. As stated on the article if their personal life does not interfere with their professional life it should not matter to the employer. "The internet is not necessarily s reliable source" Strickland says. By employers taking this risks to make sure they are hiring the best possible candidate for their job they may also "reject" a good candidate based on information gathered from the internet that may not be true or that may have been created by a third party without that person's consent.
Scooped by John Shank
Scoop.it!

Technology and Society by Neil Postman 1/7

The author of "Five Things We Need to Know About Technological Change" states that "We need to proceed with our eyes wide open so that we may use technology rather than be used by it." What does this mean to you?

Paola Alexandra Castello's comment, August 30, 2012 6:54 AM
When Neil Postman said the following statement" We need to proceed with our eyes wide open so that we may use technology rather than be used by it." it makes me think of how the use of technology and the advances through out the years has changed the lives of our generations. Technology is taking over our life and we are unknowingly letting it happened. Not only is the internet, and technology everywhere we go, but we look for it because it has made our life easier. Whether it is with communication between students and teachers, but even we our families which not necessarily means is a good to thing, at least not for me. Technology is taking over our life and we need to use it with caution to make sure our life does not revolve around it. Technology should be used as a tool not as an everyday necessity.
Sung Hyun Kim's comment, August 30, 2012 12:53 PM
I feel as though when Postman stated "We need to proceed with our eyes wide open so that we may use technology rather than be used by it." he was trying to inform and caution us to broaden our view towards technology itself. How it could lead us to a path of success or the other way around. Of course the technology was created so that information and various other services were there to help our lives be more convenient. However, exploiting these privileges and using these tools for wrong intentions could lead us to some bad situations.
For an example, we can use Facebook to connect to numerous people all around the world. However it could also put your privacy at risk while your basic information, your pictures, and with the GPS system being really efficient, people can even find out where you live.
Twitter, another mass-info service can be a problem as well. It could bring you various information depending on what kind of people you "follow" but not everything in the internet is true. It could inform you with the wrong details as well. It could also be very time consuming depending on the users.
We need to make sure that we are aware of these problems with technologies and use them efficiently and not so that we would waste our time looking at your friends "tweeted" for lunch.
Chris Bechtel's comment, August 30, 2012 6:51 PM
Postman's concept that we must use technology and not be used by it is very applicable to the present scenario in our world. I remember a less technological time (pre 1990) in which social interaction was less connective and far reaching, but more meaningful overall. At present, we as a collective, find ourselves fully engaged in the latest and greatest tech toys and tools but are we utilizing technology to our advantage or simply being distracted and addicted? It doesn't seem that long ago since we existed without the constant bombardment of computers/smartphones. Now, our day's success depends on our ability to constantly check updates that are predominantly meaningless and unproductive. Will we yield to the machines as we become increasingly mesmerized by their ability to captivate us? If the last two decades are anything to go by, things aren't looking good.
Scooped by John Shank
Scoop.it!

A Startup Asks: Why Can't You Resell Old Digital Songs? - Technology Review

A Startup Asks: Why Can't You Resell Old Digital Songs? - Technology Review | CAS 383: Culture and Technology | Scoop.it
ReDigi has technology that helps transfer ownership of digital media—but it's already being sued by the record industry.
No comment yet.
Scooped by John Shank
Scoop.it!

Microsoft Education Competencies

The Education Competencies are designed to help educators and administrators develop professional skills and proficiencies.
No comment yet.
Scooped by John Shank
Scoop.it!

A connected world

Tiffany Shlain, founder of the Webby Awards, talks about today's interconnected society at The Economist's Ideas Economy: Information 2012 event in San Franc...
No comment yet.
Scooped by John Shank
Scoop.it!

How to Share Personal Data While Keeping Secrets Safe - Technology Review

How to Share Personal Data While Keeping Secrets Safe - Technology Review | CAS 383: Culture and Technology | Scoop.it
A new technique could help companies like Facebook make money from your data without putting it at risk.
No comment yet.
Rescooped by John Shank from An Eye on New Media
Scoop.it!

Top Tech Trends and People of 2012

Here is the textbook that I created/curated for teaching my New Media Technology class during the Spring semester of 2012 at Hannam University's Linton Global College. I took great effort to give credit where it is due. I aimed to show my students how they could access enough free info on the web that was of equal or greater value than the wonderful information found in expensive textbooks. Feel free to share and please support the true authors of this book in any way you can (money, likes, blog comments, links, etc.) I am simply the currator of this content.

If you would like a free tablet-friendly PDF file, just email me at kenmorrison30 @ yahoo.com (no spaces)

 


Via Ken Morrison
Barbara Kurts's comment, January 9, 2013 9:04 PM
my topics here http://www.scoop.it/t/health-leads-plus
ben bernard's comment, January 9, 2013 11:37 PM
thanks ! http://www.scoop.it/t/direct-marketing-services my newly made scoop.it :)
Toni Plourde's comment, February 1, 2013 2:47 PM
Thanks for the PDF ! It's great!