User:Faithgbsn/GroupProjectPersonalLinks

1. Introductions
  Kevin Kelly: How technology evolves | *** Best article/video because it is so interesting and is relevant   https://www.ted.com/talks/kevin_kelly_how_technology_evolves?language=en   This TED talk is a novel and balanced way to think about how technology evolves.  It was first brought up in the "Selected Media - Society" discussion by Linh Tran.  I chose this talk because it was a refreshing, practical, and balanced way to look at evolving technology.  

 Exploring critical thinking online   https://www.saferinternet.org.uk/blog/exploring-critical-thinking-online   Even though it is a few years old, this article is a simple, straightforward guide for building critical thinking skills for evaluating online content.</DD>  Brought up in the "Selected Media - Society" discussion by Matthew Weidemann </DD>  I chose this article because it was one of the best articles describing how to evaluate online content, which seems to be one of the main points of this class. </DD> </DL> <BR>

2. Privacy and Freedom of Speech
<DL>  On internet privacy, be very afraid | *** Best article because it does a really good job of describing internet privacy</DT>  https://news.harvard.edu/gazette/story/2017/08/when-it-comes-to-internet-privacy-be-very-afraid-analyst-suggests/ </DD  From the title, you'd think this would be a fear-mongering article, but actually it provides fairly balanced information about how our data is used and what to consider when trying to protect your online privacy.</DD>  Posted to Privacy and Freedom of Speech Keywords Discussion by Molly Cavaness </DD>  I chose this article because it was a really good example of why privacy is important and what to consider when trying to protect it.</DD> <BR>

 [https://www.nytimes.com/2018/09/12/learning/why-is-freedom-of-speech-an-important-right-when-if-ever-can-it-be-limited.html Why Is Freedom of Speech an Important Right? When, if Ever, Can It Be Limited]</DT>  https://www.nytimes.com/2018/09/12/learning/why-is-freedom-of-speech-an-important-right-when-if-ever-can-it-be-limited.html </DD>  A thought-provoking article about how freedom of speech works and good questions about how far it should be protected.</DD>  Posted to Privacy and Freedom of Speech Keywords Discussion by Sahil Verma </DD>  This article was chosen because it provided a good background and real-life example of how freedom of speech works and what to expect when it comes to protection of speech. </DD> </DL> <BR>

3. Intellectual Property
<DL>  Four types of intellectual property | *** Best of the two articles because it describes the concept of IP </DT>  https://ocpatentlawyer.com/four-types-intellectual-property-protect-idea/  This article provides good descriptions of what Intellectual Property is along with relevant examples. </DD> <DD> - Posted to Intellectual Property Keywords discussion by Fangyi Wang  </DD> <DD> I chose this article because it provides a good definition of what IP is and provides good descriptions. </DD> <BR>

<DT> DCMA - What Is, Help with takedown… </DT> <DD> https://www.dmca.com/ </DD> <DD> The website, DCMA.com is a primary resource for handling copyright infringement on the web. The front page provides an overview of what DCMA is, and what the organization does to help with copyright infringement takedowns. </DD> <DD> Posted to Intellectual Property Keywords discussion by Evan Roland </DD> <DD> I chose this article/site because it provides good information on what DCMA is about and how the organization can help with copyright infringement online. </DD> </DL> <BR>

4. Crime
<DL> <DT> Computer Crime | *** Good first article for promoting basic understanding of computer crime </DT> <DD> https://www.computerhope.com/jargon/c/compcrim.htm Computer Crime </DD> <DD> Definition of the term "Computer Crime" with overview and examples. </DD> <DD> Posted by Emmanuel Monteon </DD> <DD> I chose this one because it provides a simple overview with definition of terms for most compute crimes.</DD> <BR>

<DT> Hackers steal data for 15 million patients, then sell it back to lab that lost it </DT> <DD> https://arstechnica.com/information-technology/2019/12/clinical-lab-pays-hackers-for-the-return-of-data-of-15-million-patients/ </DD> <DD> An example of the scope and actions of ransomware and what hackers do to get companies to pay up. </DD> <DD> Posted by Marcin Ossowski </DD> <DD> I chose this article because it is a good real-life example of a cybercrime. </DD> </DL> <BR>

5. Employment, Education and Entertainment
<DL> <DT> The Flipped Classroom | *** A good article to provide background for the next article</DT> <DD> https://www.educationnext.org/the-flipped-classroom/ </DD> <DD> The Flipped Classroom is online recordings and annotations for lessons, originally designed to help students who missed class, but now very useful for all students. </DD> <DD> Posted by Linh Tran to Employment, Education and Entertainment keywords </DD> <DD> I chose this article because the concept is a really good idea, and the article does a good job of covering the topic from history to implementation to uses to potential downsides and negative perceptions. </DD> <BR> <DT> 4 Tools for a Flipped Classroom </DT> <DD> https://www.edutopia.org/article/4-tools-flipped-classroom </DD> <DD> The article describes four tools that can be used in the flipped classroom. </DD> <DD> Posted by Linh Tran to Employment, Education and Entertainment keywords </DD> <DD> I chose this article to build on the first one for this module. It also describes the potential pitfalls of using the Flipped Classroom model. </DD>

</DL> <BR>

6. Midterm - Grand Challenges
<DL> <DT> RAINMAKER - Solar and Wind Powered Generators/ Air-to-Water Units | *** It was hard to choose the best one... I'm choosing this video because it describes one technology that is a solution to two problems </DT> <DD> https://www.youtube.com/watch?time_continue=10&v=kniBIYML4IA&feature=emb_logo </DD> <DD> Posted to the CIS 2 Grand Challenges midterm page by Molly Cavaness  </DD> <DD> This technology converts wind energy into both power and water. It condenses water from the air for potable water. </DD> <DD> I chose this link because the technology was an ingenious combination of power and water generation </DD> <BR>

<DT> How the Latest Technologies Help Improve Literacy Skills </DT> <DD> https://proliteracy.org/Blogs/Article/399/How-the-Latest-Technologies-Help-Improve-Literacy-Skills  </DD> <DD> Posted to the CIS 2 Grand Challenges midterm page by Evan Roland </DD> <DD> The article above describes the concepts of Gamification, extended access to educational resources, benefits of blogging to promote engagement, and improved collaboration and communication. </DD> <DD> I chose this article because it is an interesting perspective of Adult Learning. </DD>

</DL> <BR>

7. Evaluating and Controlling Technology
<DL> <DT> Control Systems are Ubiquitous | *** Best article for explaining one category of technology control </DT> <DD> http://ieeecss.org/control-systems-are-ubiquitous </DD> <DD>The article describes technical control systems, how it works, what feedback is, and describes some issues that control systems can have. </DD> <DD> Posted to Evaluating and Controlling Technology Keywords by Sohrob Rouhani </DD> <DD> I chose this article because it does a good job of explaining what control systems are, as well as providing some in-depth information about the processes that can be used. </DD>

<BR> <DT> Why Knowledge Sharing is SO Crucial to Business Success </DT> <DD> https://helpjuice.com/blog/knowledge-sharing </DD> <DD> This topic seems obvious, but is often overlooked in corporations. The article gives the definition of knowledge sharing, and then delves into challenges, benefits, and how to share knowledge in enterprise environments. </DD> <DD> Posted to Evaluating and Controlling Technology Keywords by Minha Choi </DD> <DD> I chose this article because the topic is very relevant when evaluating technology, and is also crucial for the groups who are responsible for technology control systems. </DD> <BR>

<DT> The internet without Net Neutrality isn’t really the internet. </DT> <DD> https://www.freepress.net/issues/free-open-internet/net-neutrality </DD> <DD> This topic is crucial to ensuring the internet is not controlled in ways that are detrimental to society. The author does a really good job of explaining why Net Neutrality is important, exposes some misunderstandings about it, and via links to more articles, provides ideas for how people can get involved if they are interested. </DD> <DD>Posted to Evaluating and Controlling Technology Keywords by Emmanuel Monteon </DD> <DD> I chose this article because net neutrality is important to make sure that tech is not controlled in the wrong ways.</DD>

</DL> <BR>

8. Risks, Failures and Responsibilities
<DL> <DT> How and where can your privacy on the internet be violated? | *** Best for identifying technology risks most people face  </DT> <DD> https://secureswissdata.com/internet-privacy-violated/ </DD> <DD> This article provides fairly thorough information about some of the risks to personal privacy when using the internet, and has good advice for how to mitigate it. </DD> <DD> Posted to the Risks, Failures and Responsibilities keywords discussion by Marcin Ossowski </DD> <DD> I chose this article because it is relevant to almost everyone using the internet. </DD> <BR>

<DT> Computer Ethics </DT> <DD> https://www.comptia.org/blog/ethical-problems-in-computing </DD> <DD> This article provides a good overview of some of the ethical issues that can occur in the technology field, including computer crime, privacy, and some ethical responsibilities of IT people. </DD> <DD> Posted to the Risks, Failures and Responsibilities keywords discussion by Emmanuel Monteon </DD> <DD> I chose this article because it covers a few risks and responsibilities in the technology world. </DD> <BR>

<DT> 5 Notorious Failed Projects & What We Can Learn from Them </DT> <DD> https://www.projectmanager.com/blog/failed-projects  </DD> <DD> The article describes some of the better-known failed technical business projects and what can be learned from them. </DD> <DD> Posted to the Risks, Failures and Responsibilities keywords discussion by Marcin Ossowski </DD> <DD> I chose this article because it is good to learn from past failures to avoid others in the future, but also good to realize that failures aren't complete "fails" when it can broaden your understanding of how things work. </DD>

</DL> <BR>

9. Anytime, Anywhere
<DL> <DT> What is the definition of mobile learning (m-learning)? | *** Good example of a "computing anywhere" technology that used to be rooted to one physical spot </DT> <DD> https://www.easy-lms.com/knowledge-center/lms-knowledge-center/mobile-learning/item10388 </DD> <DD> This article provides a good definition of m-learning and then gives specific examples of why it works, and advantages and disadvantages of mobile learning. </DD> <DD> Posted to Anytime, Anywhere Keywords discussion by Fantazya Kemnitz </DD> <DD> I chose this article because it is both relevant to the module topic and very informative about how mobile learning should work. </DD> <BR>

<DT> Apple Pay <DD> https://www.macrumors.com/roundup/apple-pay/ </DT> <DD> This article gives an in-depth look at what Apple Pay is, what versions of iOS it works with, how to set it up, and how it works. The article also includes information about how the security works, how Apple views privacy for Apple Pay, and what credit cards and banks are compatible with Apple Pay (as of the time of writing). </DD> <DD> Posted to Anytime, Anywhere Keywords discussion by Marcin Ossowski </DD> <DD> I chose this article because it was very pertinent to the module topic, and provides good information about how a very popular app/function of iOS works (even though I don't use an iPhone). </DD> <BR>

<DT> Geolocation 101: How It Works, the Apps, and Your Privacy  </DT> <DD> https://www.pcworld.com/article/192803/geolo.html </DD> <DD> This article starts with an overview of how Geolocation works, and then describes which apps used it (as of 2010, when the article was written), and details valid privacy issues to think about when using geolocation. </DD> <DD> Posted to Anytime, Anywhere Keywords discussion by Emmanuel Monteon </DD> <DD> I chose this article because geolocation has become very prolific in mobile apps, and it is good to know how it works and why and when you might want to turn it off, at least for some apps. </DD>

</DL> <BR>

10. Technology Advance, Social Trends
<DL> <DT> A Quantum Advantage in Fighting Climate Change | *** I liked this one the best because it was rather unexpected for me to see how to one commonly referenced technological advance could help solve one frequently referenced issue. </DT> <DD> https://www.bcg.com/publications/2020/quantum-advantage-fighting-climate-change.aspx </DD> <DD> The article explains how quantum computing can be used to determine the technologies that will work best or in combination to fight  climate change. The author gives relevant examples of industries that can use new materials in new technologies. </DD> <DD> Posted to Future of Computers discussion by Omair Ajaz </DD> <DD> I chose this article because it is both relevant to the topic and covers a lot of ground by using a specific technology to impact other technologies. </DD> <BR>

<DT> 7 amazing technologies we'll see by 2030 </DT> <DD> https://www.youtube.com/watch?v=AuVHftBiDVw&feature=youtu.be </DD> <DD> This video covers 7 areas that will be affected by advances in technology: Robots, Sensors, Medical, Internet, Phones, Cars, and AI. These advances are estimated to occur within the next 10 years (with many estimates of advances coming in the next 4 years). </DD> <DD> Posted to Future of Computers discussion by Kelsey Yee </DD> <DD> I chose this video because it is really interesting to see and not just read about some of the technology advances on the horizon </DD> </DL> <BR>