ALA Digital Literacy Task Force. What is digital literacy? ALA, Office for Information Technology Policy; 2011 Retrieved from. http://connect.ala.org/node/181197#sthash.LtRAktge.dpuf.
American Psychological Association. (n.d.). APA Style. Quick answers – References. Retrieved from http://www.apastyle.org/learn/quick-guide-on-references.aspx.
Badke W.B. Research strategies: Finding your way through the information fog. New York: iUniverse, Inc.; 2004.
Barry C, Lardner M. A study of first click behavior and user interaction on the Google SERP. In: 19th international conference on information systems development (ISD 2010). Prague, Czech Republic, August 25–27, 2010. 2010 Retrieved from. http://hdl.handle.net/10379/1492.
Bartlett J. iSPY: How the internet buys and sells your secrets. The Spectator; December 7, 2013 Retrieved from. http://www.spectator.co.uk/features/9093961/little-brothers-are-watching-you.
Benson V, Filippaios F. Effects of digital footprint on career management: evidence from social media in business education. Knowledge management, information systems, e-learning, and sustainability researchCommunications in Computer and Information Science. 2010;111:480–486 Retrieved from. https://kar.kent.ac.uk/28769/1/TECHEDU.pdf.
Bergman M.K. White paper: the deep web: surfacing hidden value. Journal of Electronic Publishing. 2001;7(1) Retrieved from. http://quod.lib.umich.edu/cgi/t/text/idx/j/jep/3336451.0007.104/–white-paper-the-deep-web-surfacing-hidden-value?rgn=main;view=fulltext.
Brown D. Scientific communication and the dematerialization of scholarship; glossary. Proquest-CSA Discovery Guides; 2007 Retrieved from. http://archive-com.com/page/1795906/2013-04-02/http://www.csa.com/discoveryguides/scholarship/gloss_f.phph.
Budapest Open Access Initiative. Read the Budapest Open Access Initiative. 2002 Retrieved from. http://www.budapestopenaccessinitiative.org/read.
Careerbuilder. More employers finding reasons not to hire candidates on social media, finds Careerbuilder survey. 2013 Retrieved from. http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?sd=6/26/2013&id=pr766&ed=12/31/2013.
CIFAS, . Identity Fraud Retrieved from. https://www.cifas.org.uk/glossary_i, 2015.
Clark W, Logan K, Luckin R, Mee A, Oliver M. Beyond web 2.0: mapping the technology landscapes of young learners. Journal of Computer Assisted Learning. 2009;25(1):56–69.
Colker D, Raab L. Judd Nelson’s agent sends photo to dispel twitter rumors of actor’s death. LA Times; October 26, 2014 Retrieved from. http://www.latimes.com/entertainment/gossip/la-et-mg-judd-nelson-not-dead-20141026-story.html.
Creative Commons. (n.d.). About the licenses. Retrieved from https://creativecommons.org/licenses.
Curtis E. Is Snapchat as private as it seems? The Telegraph; March 12, 2014 Retrieved from. http://www.telegraph.co.uk/technology/internet-security/10692856/Is-Snapchat-as-private-as-it-seems.html.
Deep Web Technologies. (n.d.). What is the deep web? Retrieved from http://www.deepwebtech.com/company/resource-center/faqs/#deepweb.
Edwards M. Why you should hire a social media consultant. LinkedIn; April 3, 2014 Retrieved from. https://www.linkedin.com/pulse/20140403135916-133448973-why-you-should-hire-a-social-media-consultant.
Eells L, Vondracek R, Vondracek B. Fishing the deep web: the search for information. In: Jennings C.A, Lauer T.E, Vondracek B, eds. Scientific communication for natural resource professionals. Bethesda, Maryland: American Fisheries Society; 2012 Retrieved from. http://www.fisheriessociety.org/proofs/sci/eells.pdf.
Ego surfing. (n.d.). Webopedia. Retrieved from http://www.webopedia.com/TERM/E/ego_surfing.html, 25.08.15.
Eijkman H. Academics and wikipedia: reframing web 2.0+ as a disruptor of traditional academic power-knowledge arrangements. Campus-Wide Information Systems. 2010;27(3):173–185.
Encyclopedia Britannica. Cybercrime. 2014 Retrieved from. http://www.britannica.com/EBchecked/topic/130595/cybercrime.
English Wikipedia. (n.d.). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/English_Wikipedia, 06.08.15.
European Commission. Factsheet on the right to be forgotten ruling. 2014 Retrieved from. http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_data_protection_en.pdf.
European Cybercrime Centre. Internet organized crime threat assessment (iOCTA). 2014 Retrieved from. https://www.europol.europa.eu/iocta/2014/toc.html.
European Cybercrime Centre. A collective EU response to cybercrime. Europol; 2015 Retrieved from. https://www.europol.europa.eu/ec3.
Ferrari A. DIGCOMP: A framework for developing and understanding digital competence in Europe Joint Research Centre (JRC): Scientific and Policy Reports. Report EUR 26035. Seville, Spain: JRC, European Union; 2013 Retrieved from https://ec.europa.eu/jrc/sites/default/files/lb-na-26035-enn.pdf.
Focus Ireland. Roisin’s story: The new face of homelessness. 2013 Retrieved from. https://www.focusireland.ie/about-homelessness/customer-and-staff-stories/roisin-s-story 19.08.15.
Fulton C. Information pathways: A problem-solving approach to information literacy. Lanham: Scarecrow Press; 2010.
Giles J. Special report: internet encyclopedias go head to head. Nature. 2005;438:900–901.
Gilster P. Digital literacy. New York: Wiley Computer Publications; 1997.
Goldman D. Google: The reluctant censor of the internet. CNN Money; 2015 Retrieved from. http://money.cnn.com/2015/01/04/technology/google-censorship 04.01.15.
Google. About google search history. 2014 Retrieved from. https://support.google.com/accounts/answer/54068?hl=en.
Google Scholar. (n.d.). About Google Scholar. Retrieved from https://scholar.google.com/intl/en/scholar/about.html.
Green K.C. Campus computing: Big gains in going mobile. 2011 Retrieved from. http://www.campuscomputing.net/item/campus-computing-2011-big-gains-going-mobile.
Hampton K.N, Rainie L, Weixu L, Dwyer M, Inyoung S, Purcell K. Social media and the spiral of silence. Pew Research Center; 2014 Retrieved from. http://www.pewinternet.org/files/2014/08/PI_Social-networks-and-debate_082614.pdf.
Harpring P. Introduction to controlled vocabularies: terminology for art, architecture, and other cultural works. J. Paul Getty Trust; 2010 Retrieved from. http://www.getty.edu/research/publications/electronic_publications/intro_controlled_vocab/index.html.
Head A.J. Learning the ropes: How freshmen conduct course research once they enter college, project information literacy research report. 2013 Retrieved from. http://projectinfolit.org/images/pdfs/pil_2013_freshmenstudy_fullreport.pdf.
Head A.J, Eisenberg M.B. Lessons learned: How college students seek information in the digital age. Project information literacy first year report with student survey findings. University of Washington’s Information School; 2009 Retrieved from. http://projectinfolit.org/images/pdfs/pil_fall2009_finalv_yr1_12_2009v2.pdf.
Head A.J, Eisenberg M.B. How today’s college students use Wikipedia for course-related research. First Monday. 2010;15(3) Retrieved from. http://firstmonday.org/article/view/2830/2476.
Head A.J, Eisenberg M.B. Truth be told: How college students evaluate and use information in the digital age Project information literacy progress report. 2010 Retrieved from. http://projectinfolit.org/images/pdfs/pil_fall2010_survey_fullreport1.pdf.
HLWiki International. Snowballing. 2015 Retrieved from. http://hlwiki.slais.ubc.ca/index.php/Snowballing.
Hochstotter N, Lewandowski D. What users see – structures in search engine results pages. Information Sciences. 2009;179(12):1796–1812.
Hoffman C. Why you should use a password manager and how to get started [blog post]. How-to Geek. March 22, 2013 Retrieved from. http://www.howtogeek.com/141500/why-you-should-use-a-password-manager-and-how-to-get-started.
IAB Ireland. Digital glossary – IP address. 2015 Retrieved from. http://iabireland.ie/research-case-studies/glossary/digital-glossary.
Information Commissioner’s Office. What are cookies? 2015 Retrieved from. https://ico.org.uk/for-the-public/online/cookies.aspx.
Institute of Electrical and Electronics Engineers (IEEE). (n.d.). Discovery services. Retrieved from http://ieeexplore.ieee.org/Xplorehelp/#/tools/toolsForAdministratorsAndLibrarians/discoveryServices.
Internet Crime Complaint Center. 2013 internet crime report. 2014 Retrieved from. http://www.ic3.gov/media/annualreport/2013_ic3report.pdf.
Internet Society. Why did we start leaving such big footprints? [Online tutorial]. 2015 Retrieved from. http://www.internetsociety.org/your-digital-footprint/why-start.
ISBN.org. FAQs: General questions. 2014 Retrieved from. http://www.isbn.org/faqs_general_questions.
Jeffries S. Sock puppets, twitterjacking and the art of digital fakery. The Guardian; September 29, 2011 Retrieved from. http://www.theguardian.com/technology/2011/sep/29/sock-puppets-twitterjacking-digital-fakery.
Jobvite. Social recruiting survey. 2014 Retrieved from. https://www.jobvite.com/wp-content/uploads/2014/10/Jobvite_SocialRecruiting_Survey2014.pdf.
Jones R.H, Hafner C.A. Understanding digital literacies: A practical introduction. New York: Routledge; 2012.
Jones W. Keeping found things found: The study and practice of personal information management. London: Elsevier Inc; 2008.
Kaplan A.M, Haenlein M. Users of the world, unite! the challenges and opportunities of social, media. Business Horizons. 2010;53:59–68.
Kumar M. What is the deep web? A first trip into the Abyss. The Hacker News; 2012 Retrieved from. http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html.
Laniado D, Tasso R. Co-authorship 2.0: patterns of collaboration in Wikipedia. In: Presented at ACM hypertext 2011, 22nd ACM conference on hypertext and hypermedia, June 6–11, 2011. 2011 Retrieved from. http://airwiki.ws.dei.polimi.it/images/2/23/Coauthorship2.pdf.
Lee C. How to cite something you found on a website in APA style [Blog post]. 2010, November 18 Retrieved from. http://blog.apastyle.org/apastyle/2010/11/how-to-cite-something-you-found-on-a-website-in-apa-style.html.
Lee C. How to cite social media in APA style (Twitter, Facebook, and Google+) [Blog post]. 2013, October 18 Retrieved from. http://blog.apastyle.org/apastyle/2013/10/how-to-cite-social-media-in-apa-style.html.
Lee D. The top memes and viral videos of 2014. BBC News; 2014 Retrieved from. http://www.bbc.com/news/technology-30625633.
Lewsey F. How to read a digital footprint. University of Cambridge; 2015 Research Features. Retrieved from. http://www.cam.ac.uk/research/features/how-to-read-a-digital-footprint.
Lim S. How and why do college students use Wikipedia? Journal of the American Society for Information Science and Technology. 2009;60(11):2189–2202.
Madden M. Privacy management on social media sites. Pew Research Center’s Internet & American Life Project; 2012 Retrieved from. http://www.pewinternet.org/files/old-media//Files/Reports/2012/PIP_Privacy_management_on_social_media_sites_022412.pdf.
Madden M. Public perceptions of privacy and security in the post-Snowden era. Pew Research Center; November 2014 Retrieved from. http://www.pewinternet.org/2014/11/12/public-privacy-perceptions.
Madden M, Smith A. Reputation management and social media: How people monitor their identity and search for others online. Pew Research Center’s Internet & American Life Project; 2010 Retrieved from. http://www.pewinternet.org/files/old-media//Files/Reports/2010/PIP_Reputation_Management_with_topline.pdf.
Magnuson L. Promoting privacy: Online and reputation management as an information literacy skill. College & Research Libraries News. 2011;72(3):137–140.
Mayer-Schönberger V, Cukier K. Big data: A revolution that will transform how we live, work and think. London: John Murray; 2013.
McLoughlin C, Lee M.J.W. Personalized and self-regulated learning in the web 2.0 era: international exemplars of innovative pedagogy using social software. Australasian Journal of Education Technology. 2010;26(1):28–43 Retrieved from. http://ascilite.org.au/ajet/ajet26/mcloughlin.html.
Microsoft. Phishing – frequently asked questions Retrieved from. https://www.microsoft.com/security/online-privacy/phishing-faq.aspx, 2014.
Microsoft Academic Search. About Microsoft academic search. 2013 Retrieved from. http://academic.research.microsoft.com/About/Help.htm.
Microsoft Safety & Security Center. What is a cookie? 2014 Retrieved from. http://www.microsoft.com/security/resources/cookie-whatis.aspx.
Milburn A.B, Braham A, McClinton J. Integrating qualitative components in quantitative courses using Facebook. Interdisciplinary Journal of E-Learning and Learning Objects. 2014;10:229–246 Retrieved from. http://www.ijello.org/Volume10/IJELLOv10p229-246Milburn0872.pdf.
Ministry of Justice. New law to tackle revenge porn. October 12, 2015 Retrieved from. https://www.gov.uk/government/news/new-law-to-tackle-revenge-porn.
Morrison K. How different generations consume content online [Infographic]. Social Times, Adweek Blog Network; May 7, 2015 Retrieved from. http://www.adweek.com/socialtimes/how-different-generations-consume-content-online-infographic/619882.
NASA. Media usage guidelines. NASA; July 27, 2015 Retrieved from. http://www.nasa.gov/audience/formedia/features/MP_Photo_Guidelines.html.
Naughton J. 25 things you might not know about the web on its 25th birthday. The Guardian; March 9, 2014 Retrieved from. http://www.theguardian.com/technology/2014/mar/09/25-years-web-tim-berners-lee.
Nudd T. Chrysler throws down an F-bomb on Twitter. AdWeek. March 9, 2011 Retrieved from. http://www.adweek.com/adfreak/chrysler-throws-down-f-bomb-twitter-126967.
OECD. Glossary of statistical terms. 2013 Retrieved from. http://stats.oecd.org/glossary/detail.asp?ID=198.
Office of the Privacy Commissioner of Canada. Cookies – Following the crumbs [fact sheet]. 2011 Retrieved from. https://www.priv.gc.ca/resource/fs-fi/02_05_d_49_e.asp.
Oxford Dictionaries. 2015 Retrieved from. http://www.oxforddictionaries.com.
Pangrazio L. Reconceptualising critical digital literacy. Discourse: Studies in the Cultural Politics of Education. 2014:1–12. doi: 10.1080/01596306.2014.942836.
Pariser E. The filter bubble: What the internet is hiding from you. London: Penguin Viking; 2011.
Parr C. MOOCs: Fluctuating rates in online investment. Times Higher Education. 2015, April 23 Retrieved from. https://www.timeshighereducation.com/news/moocs-fluctuating-rates-in-online-investment/2019816.article.
Password Manager. In: Wikipedia. 2015 Retrieved from. https://en.wikipedia.org/wiki/Password_manager 14.08.15.
PC Mag Encyclopedia, . Definition of firewall Retrieved from. http://www.pcmag.com/encyclopedia/term/43218/firewall, 2015.
PeekYou. How it works. 2015 Retrieved from. http://www.peekyou.com.
Pilkington E. Justine Sacco, PR executive fired over racist tweet, ‘ashamed.’. The Guardian; December 22, 2013 Retrieved from. http://www.theguardian.com/world/2013/dec/22/pr-exec-fired-racist-tweet-aids-africa-apology.
PPRO, . Payment fraud types and how to prevent them Retrieved from. https://www.ppro.com/blog/payment-fraud-types-and-how-to-prevent-them/, 2014.
Prescott J, Wilson S, Becket G. Students want more guidelines on Facebook and online professionalism. The Pharmaceutical Journal. 2012;289(August):1–3.
Purcell K, et al. How teens do research in the digital world. Pew Internet & American Life Project; 2012 Retrieved from. http://www.pewinternet.org/2012/11/01/how-teens-do-research-in-the-digital-world.
Rheinhold H. Attention and other 21st-century social media literacies. Educause Review. September/October 2010:14–24 Retrieved from. https://net.educause.edu/ir/library/pdf/ERM1050.pdf.
Rouse M. DarkNet definition. TechTarget Network; 2011 Retrieved from. http://searchnetworking.techtarget.com/definition/darknet.
Rowley J.E, Hartley R.J. Organizing knowledge: An introduction to managing access to information. Hampshire: Ashgate; 2008.
Sandeen C. Assessment’s place in the new MOOC world. Research & Practice in Assessment. 2013;8:5–12.
Scally D. De-google your life: It’s worth the hassle if you value your privacy. Irish Times; May 14, 2015 Retrieved from. http://www.irishtimes.com/business/technology/de-google-your-life-it-s-worth-the-hassle-if-you-value-your-privacy-1.2211355.
Silverman C, ed. Verification handbook: A definitive guide to verifying digital content for emergency coverage. Netherlands: European Journalism Centre (EJC); 2014 Retrieved from. http://verificationhandbook.com.
Smith C. By the numbers: 25 amazing vine statistics. 2015 Retrieved from. http://expandedramblings.com/index.php/vine-statistics.
Soanes C, Waite M, Hawker S. The Oxford dictionary, thesaurus, and wordpower guide. Oxford: Oxford University Press; 2001.
SPARC Europe. Institutional repositories. 2015 Retrieved from. http://sparceurope.org/repositories.
StatCounter GlobalStats. Search engine (desktop, mobile, tablet, console). 2015 Retrieved from. http://gs.statcounter.com/#all-search_engine-ww-monthly-201408-201507-b.
Steel E, Locke C, Cadman E, Freese B. How much is your personal data worth? Financial Times; June 12, 2013 Retrieved from. http://www.ft.com/cms/s/2/927ca86e-d29b-11e2-88ed-00144feab7de.html#axzz3e3uym5NJ.
Stein K. PENN GSE study shows MOOCs have relatively few active users, with only a few persisting to course end. PENN GSE Graduate School of Education Press Room. 2013, December 5 Retrieved from. https://www.gse.upenn.edu/pressroom/press-releases/2013/12/penn-gse-study-shows-moocs-have-relatively-few-active-users-only-few-persisti.
Stokes P, Martin L. Reading lists: a study of tutor and student perceptions, expectations and realities. Studies in Higher Education. 2008;33(2):113–125. doi: 10.1080/03075070801915874.
Suber P. Open access overview. 2015 Retrieved from. http://legacy.earlham.edu/∼peters/fos/overview.htm.
Sullivan R.J. The benefits of collecting and reporting payment fraud statistics in the United States Federal Reserve Bank of Kansas City. Retrieved from. https://www.kansascityfed.org/PUBLICAT/PSR/Briefings/PSR-BriefingOct09.pdf, 2009, October.
Tardy C.M. Writing for the world: Wikipedia as an introduction to academic writing. English Teaching Forum. 2010;48(1):12–19 27.
Thakur B. What does your digital footprint reveal? [blog post]. November 25, 2011 Retrieved from. http://bhaskarthakur.com/blog/your-digital-footprint.
Travis A, Arthur C. EU court backs ‘right to be forgotten’: Google must amend results on request. The Guardian; May 13, 2014 Retrieved from. http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-eu-court-google-search-results.
United Nations Educational Scientific and Cultural Organization (UNESCO). Global media and information literacy assessment framework: Country readiness and competencies. Paris, France: UNESCO; 2013.
University of British Columbia Library. (n.d.). Scholarly vs. popular sources. Retrieved from http://help.library.ubc.ca/evaluating-and-citing-sources/scholarly-versus-popular-sources.
US-Cert, . Recognizing and avoiding email scams Retrieved from. https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf, 2008.
Vasager J, Fontanella-Khan J. Berlin pushes google to reveal search engine formula. Financial Times; September 15, 2014 Retrieved from. http://www.ft.com/cms/s/0/9615661c-3ce1-11e4-9733-00144feabdc0.html#axzz3K4nl0o7P.
Wikipedia. (n.d.). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Wikipedia, 06.08.15.
Wikipedia: Education Program/Ambassadors. (n.d.). Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Wikipedia:Education_program/Ambassadors.
Wikipedia: Systemic Bias. (n.d.). In Wikipedia. Retrieved from http://en.m.wikipedia.org/wiki/Wikipedia:Systemic_bias, 06.08.15.
Wurman R.S. Information anxiety. New York: Doubleday; 1989.
YouTube. Statistics. 2015 Retrieved from. https://www.YouTube.com/yt/press/statistics.html.