References

ALA Digital Literacy Task Force. What is digital literacy? ALA, Office for Information Technology Policy; 2011 Retrieved from. http://connect.ala.org/node/181197#sthash.LtRAktge.dpuf.

American Psychological Association. (n.d.). APA Style. Quick answers – References. Retrieved from http://www.apastyle.org/learn/quick-guide-on-references.aspx.

Badke W.B. Research strategies: Finding your way through the information fog. New York: iUniverse, Inc.; 2004.

Barry C, Lardner M. A study of first click behavior and user interaction on the Google SERP. In: 19th international conference on information systems development (ISD 2010). Prague, Czech Republic, August 25–27, 2010. 2010 Retrieved from. http://hdl.handle.net/10379/1492.

Bartlett J. iSPY: How the internet buys and sells your secrets. The Spectator; December 7, 2013 Retrieved from. http://www.spectator.co.uk/features/9093961/little-brothers-are-watching-you.

Benson V, Filippaios F. Effects of digital footprint on career management: evidence from social media in business education. Knowledge management, information systems, e-learning, and sustainability researchCommunications in Computer and Information Science. 2010;111:480–486 Retrieved from. https://kar.kent.ac.uk/28769/1/TECHEDU.pdf.

Bergman M.K. White paper: the deep web: surfacing hidden value. Journal of Electronic Publishing. 2001;7(1) Retrieved from. http://quod.lib.umich.edu/cgi/t/text/idx/j/jep/3336451.0007.104/–white-paper-the-deep-web-surfacing-hidden-value?rgn=main;view=fulltext.

Brown D. Scientific communication and the dematerialization of scholarship; glossary. Proquest-CSA Discovery Guides; 2007 Retrieved from. http://archive-com.com/page/1795906/2013-04-02/http://www.csa.com/discoveryguides/scholarship/gloss_f.phph.

Budapest Open Access Initiative. Read the Budapest Open Access Initiative. 2002 Retrieved from. http://www.budapestopenaccessinitiative.org/read.

Careerbuilder. More employers finding reasons not to hire candidates on social media, finds Careerbuilder survey. 2013 Retrieved from. http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?sd=6/26/2013&id=pr766&ed=12/31/2013.

CIFAS, . Identity Fraud Retrieved from. https://www.cifas.org.uk/glossary_i, 2015.

Clark W, Logan K, Luckin R, Mee A, Oliver M. Beyond web 2.0: mapping the technology landscapes of young learners. Journal of Computer Assisted Learning. 2009;25(1):56–69.

Colker D, Raab L. Judd Nelson’s agent sends photo to dispel twitter rumors of actor’s death. LA Times; October 26, 2014 Retrieved from. http://www.latimes.com/entertainment/gossip/la-et-mg-judd-nelson-not-dead-20141026-story.html.

Creative Commons. (n.d.). About the licenses. Retrieved from https://creativecommons.org/licenses.

Curtis E. Is Snapchat as private as it seems? The Telegraph; March 12, 2014 Retrieved from. http://www.telegraph.co.uk/technology/internet-security/10692856/Is-Snapchat-as-private-as-it-seems.html.

Deep Web Technologies. (n.d.). What is the deep web? Retrieved from http://www.deepwebtech.com/company/resource-center/faqs/#deepweb.

Edwards M. Why you should hire a social media consultant. LinkedIn; April 3, 2014 Retrieved from. https://www.linkedin.com/pulse/20140403135916-133448973-why-you-should-hire-a-social-media-consultant.

Eells L, Vondracek R, Vondracek B. Fishing the deep web: the search for information. In: Jennings C.A, Lauer T.E, Vondracek B, eds. Scientific communication for natural resource professionals. Bethesda, Maryland: American Fisheries Society; 2012 Retrieved from. http://www.fisheriessociety.org/proofs/sci/eells.pdf.

Ego surfing. (n.d.). Webopedia. Retrieved from http://www.webopedia.com/TERM/E/ego_surfing.html, 25.08.15.

Eijkman H. Academics and wikipedia: reframing web 2.0+ as a disruptor of traditional academic power-knowledge arrangements. Campus-Wide Information Systems. 2010;27(3):173–185.

Encyclopedia Britannica. Cybercrime. 2014 Retrieved from. http://www.britannica.com/EBchecked/topic/130595/cybercrime.

English Wikipedia. (n.d.). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/English_Wikipedia, 06.08.15.

European Commission. Factsheet on the right to be forgotten ruling. 2014 Retrieved from. http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_data_protection_en.pdf.

European Cybercrime Centre. Internet organized crime threat assessment (iOCTA). 2014 Retrieved from. https://www.europol.europa.eu/iocta/2014/toc.html.

European Cybercrime Centre. A collective EU response to cybercrime. Europol; 2015 Retrieved from. https://www.europol.europa.eu/ec3.

Ferrari A. DIGCOMP: A framework for developing and understanding digital competence in Europe Joint Research Centre (JRC): Scientific and Policy Reports. Report EUR 26035. Seville, Spain: JRC, European Union; 2013 Retrieved from https://ec.europa.eu/jrc/sites/default/files/lb-na-26035-enn.pdf.

Focus Ireland. Roisin’s story: The new face of homelessness. 2013 Retrieved from. https://www.focusireland.ie/about-homelessness/customer-and-staff-stories/roisin-s-story 19.08.15.

Fulton C. Information pathways: A problem-solving approach to information literacy. Lanham: Scarecrow Press; 2010.

Giles J. Special report: internet encyclopedias go head to head. Nature. 2005;438:900–901.

Gilster P. Digital literacy. New York: Wiley Computer Publications; 1997.

Goldman D. Google: The reluctant censor of the internet. CNN Money; 2015 Retrieved from. http://money.cnn.com/2015/01/04/technology/google-censorship 04.01.15.

Google. About google search history. 2014 Retrieved from. https://support.google.com/accounts/answer/54068?hl=en.

Google Scholar. (n.d.). About Google Scholar. Retrieved from https://scholar.google.com/intl/en/scholar/about.html.

Green K.C. Campus computing: Big gains in going mobile. 2011 Retrieved from. http://www.campuscomputing.net/item/campus-computing-2011-big-gains-going-mobile.

Hampton K.N, Rainie L, Weixu L, Dwyer M, Inyoung S, Purcell K. Social media and the spiral of silence. Pew Research Center; 2014 Retrieved from. http://www.pewinternet.org/files/2014/08/PI_Social-networks-and-debate_082614.pdf.

Harpring P. Introduction to controlled vocabularies: terminology for art, architecture, and other cultural works. J. Paul Getty Trust; 2010 Retrieved from. http://www.getty.edu/research/publications/electronic_publications/intro_controlled_vocab/index.html.

Head A.J. Learning the ropes: How freshmen conduct course research once they enter college, project information literacy research report. 2013 Retrieved from. http://projectinfolit.org/images/pdfs/pil_2013_freshmenstudy_fullreport.pdf.

Head A.J, Eisenberg M.B. Lessons learned: How college students seek information in the digital age. Project information literacy first year report with student survey findings. University of Washington’s Information School; 2009 Retrieved from. http://projectinfolit.org/images/pdfs/pil_fall2009_finalv_yr1_12_2009v2.pdf.

Head A.J, Eisenberg M.B. How today’s college students use Wikipedia for course-related research. First Monday. 2010;15(3) Retrieved from. http://firstmonday.org/article/view/2830/2476.

Head A.J, Eisenberg M.B. Truth be told: How college students evaluate and use information in the digital age Project information literacy progress report. 2010 Retrieved from. http://projectinfolit.org/images/pdfs/pil_fall2010_survey_fullreport1.pdf.

HLWiki International. Snowballing. 2015 Retrieved from. http://hlwiki.slais.ubc.ca/index.php/Snowballing.

Hochstotter N, Lewandowski D. What users see – structures in search engine results pages. Information Sciences. 2009;179(12):1796–1812.

Hoffman C. Why you should use a password manager and how to get started [blog post]. How-to Geek. March 22, 2013 Retrieved from. http://www.howtogeek.com/141500/why-you-should-use-a-password-manager-and-how-to-get-started.

IAB Ireland. Digital glossary – IP address. 2015 Retrieved from. http://iabireland.ie/research-case-studies/glossary/digital-glossary.

Information Commissioner’s Office. What are cookies? 2015 Retrieved from. https://ico.org.uk/for-the-public/online/cookies.aspx.

Institute of Electrical and Electronics Engineers (IEEE). (n.d.). Discovery services. Retrieved from http://ieeexplore.ieee.org/Xplorehelp/#/tools/toolsForAdministratorsAndLibrarians/discoveryServices.

Internet Crime Complaint Center. 2013 internet crime report. 2014 Retrieved from. http://www.ic3.gov/media/annualreport/2013_ic3report.pdf.

Internet Society. Why did we start leaving such big footprints? [Online tutorial]. 2015 Retrieved from. http://www.internetsociety.org/your-digital-footprint/why-start.

ISBN.org. FAQs: General questions. 2014 Retrieved from. http://www.isbn.org/faqs_general_questions.

Jeffries S. Sock puppets, twitterjacking and the art of digital fakery. The Guardian; September 29, 2011 Retrieved from. http://www.theguardian.com/technology/2011/sep/29/sock-puppets-twitterjacking-digital-fakery.

Jobvite. Social recruiting survey. 2014 Retrieved from. https://www.jobvite.com/wp-content/uploads/2014/10/Jobvite_SocialRecruiting_Survey2014.pdf.

Jones R.H, Hafner C.A. Understanding digital literacies: A practical introduction. New York: Routledge; 2012.

Jones W. Keeping found things found: The study and practice of personal information management. London: Elsevier Inc; 2008.

Kaplan A.M, Haenlein M. Users of the world, unite! the challenges and opportunities of social, media. Business Horizons. 2010;53:59–68.

Kumar M. What is the deep web? A first trip into the Abyss. The Hacker News; 2012 Retrieved from. http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html.

Laniado D, Tasso R. Co-authorship 2.0: patterns of collaboration in Wikipedia. In: Presented at ACM hypertext 2011, 22nd ACM conference on hypertext and hypermedia, June 6–11, 2011. 2011 Retrieved from. http://airwiki.ws.dei.polimi.it/images/2/23/Coauthorship2.pdf.

Lee C. How to cite something you found on a website in APA style [Blog post]. 2010, November 18 Retrieved from. http://blog.apastyle.org/apastyle/2010/11/how-to-cite-something-you-found-on-a-website-in-apa-style.html.

Lee C. How to cite social media in APA style (Twitter, Facebook, and Google+) [Blog post]. 2013, October 18 Retrieved from. http://blog.apastyle.org/apastyle/2013/10/how-to-cite-social-media-in-apa-style.html.

Lee D. The top memes and viral videos of 2014. BBC News; 2014 Retrieved from. http://www.bbc.com/news/technology-30625633.

Lewsey F. How to read a digital footprint. University of Cambridge; 2015 Research Features. Retrieved from. http://www.cam.ac.uk/research/features/how-to-read-a-digital-footprint.

Lim S. How and why do college students use Wikipedia? Journal of the American Society for Information Science and Technology. 2009;60(11):2189–2202.

Madden M. Privacy management on social media sites. Pew Research Center’s Internet & American Life Project; 2012 Retrieved from. http://www.pewinternet.org/files/old-media//Files/Reports/2012/PIP_Privacy_management_on_social_media_sites_022412.pdf.

Madden M. Public perceptions of privacy and security in the post-Snowden era. Pew Research Center; November 2014 Retrieved from. http://www.pewinternet.org/2014/11/12/public-privacy-perceptions.

Madden M, Smith A. Reputation management and social media: How people monitor their identity and search for others online. Pew Research Center’s Internet & American Life Project; 2010 Retrieved from. http://www.pewinternet.org/files/old-media//Files/Reports/2010/PIP_Reputation_Management_with_topline.pdf.

Magnuson L. Promoting privacy: Online and reputation management as an information literacy skill. College & Research Libraries News. 2011;72(3):137–140.

Mayer-Schönberger V, Cukier K. Big data: A revolution that will transform how we live, work and think. London: John Murray; 2013.

McLoughlin C, Lee M.J.W. Personalized and self-regulated learning in the web 2.0 era: international exemplars of innovative pedagogy using social software. Australasian Journal of Education Technology. 2010;26(1):28–43 Retrieved from. http://ascilite.org.au/ajet/ajet26/mcloughlin.html.

Microsoft. Phishing – frequently asked questions Retrieved from. https://www.microsoft.com/security/online-privacy/phishing-faq.aspx, 2014.

Microsoft Academic Search. About Microsoft academic search. 2013 Retrieved from. http://academic.research.microsoft.com/About/Help.htm.

Microsoft Safety & Security Center. What is a cookie? 2014 Retrieved from. http://www.microsoft.com/security/resources/cookie-whatis.aspx.

Milburn A.B, Braham A, McClinton J. Integrating qualitative components in quantitative courses using Facebook. Interdisciplinary Journal of E-Learning and Learning Objects. 2014;10:229–246 Retrieved from. http://www.ijello.org/Volume10/IJELLOv10p229-246Milburn0872.pdf.

Ministry of Justice. New law to tackle revenge porn. October 12, 2015 Retrieved from. https://www.gov.uk/government/news/new-law-to-tackle-revenge-porn.

Morrison K. How different generations consume content online [Infographic]. Social Times, Adweek Blog Network; May 7, 2015 Retrieved from. http://www.adweek.com/socialtimes/how-different-generations-consume-content-online-infographic/619882.

NASA. Media usage guidelines. NASA; July 27, 2015 Retrieved from. http://www.nasa.gov/audience/formedia/features/MP_Photo_Guidelines.html.

Naughton J. 25 things you might not know about the web on its 25th birthday. The Guardian; March 9, 2014 Retrieved from. http://www.theguardian.com/technology/2014/mar/09/25-years-web-tim-berners-lee.

Nudd T. Chrysler throws down an F-bomb on Twitter. AdWeek. March 9, 2011 Retrieved from. http://www.adweek.com/adfreak/chrysler-throws-down-f-bomb-twitter-126967.

OECD. Glossary of statistical terms. 2013 Retrieved from. http://stats.oecd.org/glossary/detail.asp?ID=198.

Office of the Privacy Commissioner of Canada. Cookies – Following the crumbs [fact sheet]. 2011 Retrieved from. https://www.priv.gc.ca/resource/fs-fi/02_05_d_49_e.asp.

Oxford Dictionaries. 2015 Retrieved from. http://www.oxforddictionaries.com.

Pangrazio L. Reconceptualising critical digital literacy. Discourse: Studies in the Cultural Politics of Education. 2014:1–12. doi: 10.1080/01596306.2014.942836.

Pariser E. The filter bubble: What the internet is hiding from you. London: Penguin Viking; 2011.

Parr C. MOOCs: Fluctuating rates in online investment. Times Higher Education. 2015, April 23 Retrieved from. https://www.timeshighereducation.com/news/moocs-fluctuating-rates-in-online-investment/2019816.article.

Password Manager. In: Wikipedia. 2015 Retrieved from. https://en.wikipedia.org/wiki/Password_manager 14.08.15.

PC Mag Encyclopedia, . Definition of firewall Retrieved from. http://www.pcmag.com/encyclopedia/term/43218/firewall, 2015.

PeekYou. How it works. 2015 Retrieved from. http://www.peekyou.com.

Pilkington E. Justine Sacco, PR executive fired over racist tweet, ‘ashamed.’. The Guardian; December 22, 2013 Retrieved from. http://www.theguardian.com/world/2013/dec/22/pr-exec-fired-racist-tweet-aids-africa-apology.

PPRO, . Payment fraud types and how to prevent them Retrieved from. https://www.ppro.com/blog/payment-fraud-types-and-how-to-prevent-them/, 2014.

Prescott J, Wilson S, Becket G. Students want more guidelines on Facebook and online professionalism. The Pharmaceutical Journal. 2012;289(August):1–3.

Purcell K, et al. How teens do research in the digital world. Pew Internet & American Life Project; 2012 Retrieved from. http://www.pewinternet.org/2012/11/01/how-teens-do-research-in-the-digital-world.

Rheinhold H. Attention and other 21st-century social media literacies. Educause Review. September/October 2010:14–24 Retrieved from. https://net.educause.edu/ir/library/pdf/ERM1050.pdf.

Rouse M. DarkNet definition. TechTarget Network; 2011 Retrieved from. http://searchnetworking.techtarget.com/definition/darknet.

Rowley J.E, Hartley R.J. Organizing knowledge: An introduction to managing access to information. Hampshire: Ashgate; 2008.

Sandeen C. Assessment’s place in the new MOOC world. Research & Practice in Assessment. 2013;8:5–12.

Scally D. De-google your life: It’s worth the hassle if you value your privacy. Irish Times; May 14, 2015 Retrieved from. http://www.irishtimes.com/business/technology/de-google-your-life-it-s-worth-the-hassle-if-you-value-your-privacy-1.2211355.

Silverman C, ed. Verification handbook: A definitive guide to verifying digital content for emergency coverage. Netherlands: European Journalism Centre (EJC); 2014 Retrieved from. http://verificationhandbook.com.

Smith C. By the numbers: 25 amazing vine statistics. 2015 Retrieved from. http://expandedramblings.com/index.php/vine-statistics.

Soanes C, Waite M, Hawker S. The Oxford dictionary, thesaurus, and wordpower guide. Oxford: Oxford University Press; 2001.

SPARC Europe. Institutional repositories. 2015 Retrieved from. http://sparceurope.org/repositories.

StatCounter GlobalStats. Search engine (desktop, mobile, tablet, console). 2015 Retrieved from. http://gs.statcounter.com/#all-search_engine-ww-monthly-201408-201507-b.

Steel E, Locke C, Cadman E, Freese B. How much is your personal data worth? Financial Times; June 12, 2013 Retrieved from. http://www.ft.com/cms/s/2/927ca86e-d29b-11e2-88ed-00144feab7de.html#axzz3e3uym5NJ.

Stein K. PENN GSE study shows MOOCs have relatively few active users, with only a few persisting to course end. PENN GSE Graduate School of Education Press Room. 2013, December 5 Retrieved from. https://www.gse.upenn.edu/pressroom/press-releases/2013/12/penn-gse-study-shows-moocs-have-relatively-few-active-users-only-few-persisti.

Stokes P, Martin L. Reading lists: a study of tutor and student perceptions, expectations and realities. Studies in Higher Education. 2008;33(2):113–125. doi: 10.1080/03075070801915874.

Suber P. Open access overview. 2015 Retrieved from. http://legacy.earlham.edu/∼peters/fos/overview.htm.

Sullivan R.J. The benefits of collecting and reporting payment fraud statistics in the United States Federal Reserve Bank of Kansas City. Retrieved from. https://www.kansascityfed.org/PUBLICAT/PSR/Briefings/PSR-BriefingOct09.pdf, 2009, October.

Tardy C.M. Writing for the world: Wikipedia as an introduction to academic writing. English Teaching Forum. 2010;48(1):12–19 27.

Thakur B. What does your digital footprint reveal? [blog post]. November 25, 2011 Retrieved from. http://bhaskarthakur.com/blog/your-digital-footprint.

Travis A, Arthur C. EU court backs ‘right to be forgotten’: Google must amend results on request. The Guardian; May 13, 2014 Retrieved from. http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-eu-court-google-search-results.

United Nations Educational Scientific and Cultural Organization (UNESCO). Global media and information literacy assessment framework: Country readiness and competencies. Paris, France: UNESCO; 2013.

University of British Columbia Library. (n.d.). Scholarly vs. popular sources. Retrieved from http://help.library.ubc.ca/evaluating-and-citing-sources/scholarly-versus-popular-sources.

US-Cert, . Recognizing and avoiding email scams Retrieved from. https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf, 2008.

Vasager J, Fontanella-Khan J. Berlin pushes google to reveal search engine formula. Financial Times; September 15, 2014 Retrieved from. http://www.ft.com/cms/s/0/9615661c-3ce1-11e4-9733-00144feabdc0.html#axzz3K4nl0o7P.

Wikipedia. (n.d.). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Wikipedia, 06.08.15.

Wikipedia: Education Program/Ambassadors. (n.d.). Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Wikipedia:Education_program/Ambassadors.

Wikipedia: Systemic Bias. (n.d.). In Wikipedia. Retrieved from http://en.m.wikipedia.org/wiki/Wikipedia:Systemic_bias, 06.08.15.

Wurman R.S. Information anxiety. New York: Doubleday; 1989.

YouTube. Statistics. 2015 Retrieved from. https://www.YouTube.com/yt/press/statistics.html.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset