Archives for : January2014



Summary #6= Pre-service teachers’ digital literacy practices: exploring contingency in identity and digital literacy in and out of educational contexts.

This paper demonstrates that individuals portray their digital identities as those that fit context specific identities. Also, that there is a motivation and expectation from our environment and from ourselves to continue the certain digital identity we have decided to show in the internet. Here, the author has used pre-service teachers as an example and further pinpointing the importance of teacher identity to discussions concerning the disconnect between digital literacies in and outside schools. Our digital experience is framed by appropriateness, legitimacy, and risk. This articles recognizes that the digital literacies skills, orientations, and attitudes might or might not be able to help when translating to education. Finally, it emphasizes the importance of teacher’s digital literacy experiences in their different domains should be taken into consideration because of emerging technologies.

The reason I chose this articles is because it shows us the link of how technologies and teachers should be in accordance when it comes to our educational system, which is one of the main ideas we are exploring in this course.

Summary #5= Revealing our digital identity.

The authors of this article discuss the importance of identity formation. The research they have conducted demonstrate that students know their identities can be explained by external factors but they don’t seem to really care what these factors are. However, the students in this research do seem to care about their digital appearance and image that they portray of themselves through the internet, but only as an immediate social form. 1 out of 4 students don’t seem to be worried about the impact of their digital impact on their own future. What they mean by this future is not only their educational future but when seeking jobs as well. There is a focus on the new form of identity, that is digital identity, and how it is represented in social networks and the impact of these identities of the current up and coming generation.

One of the reasons I chose this article was because the secondary author’s main field of study is psychology. Digital identity can still be treated with such a science. I also like that they conducted an experiment that is relatable to the students in our class and how they perceive themselves in the internet.

Summary #4= A World without Center: Culture, Identity Construction, and Cognition in the Digital Age.

The internet has demonstrated to have a great effect on cultural growth. Here, we learn that such transformations are worth noticing since this exploitation of information distribution channels have changed the global environment and allowed us to suppress our physical space as personal interaction. We are introduced with two questions: 1. what are the consequences of our cognitive and identity development, and therefore, the makeup of the individual in our culture? and 2. how do these processes operate in the overall latin american context? This article discusses how recent literature has redefined the development of such cognitive and identity development, the effects of the internet in the construction of our culture, the day to day interaction in social networks, and the rhetorical and argumentative customs of online debates.

I chose this article because it shows the viewpoint of latin americans on the internet. I also liked that it related how social and digital media help shape the individual and his/her values and customs.

Summary #3= INCREASED SECURITY Through Open Source.

Here, the author discusses how people have geared their use of open source softwares (OSS). Linux has become the most popular operating system rising about issues as Windows vs.Linux, intellectual property rights and costs. Security issues have been one of the most prominent troubles of these OSS. The publishing of designs and protocols by the OSS allow its computer systems to be further secured. The main discussion in this article relates the following question should one go all the way and publish source code as well?” In order to reinforce this point we are presented with two analogies 1. would you take medicines from a doctor without documentation? and 2. would you trust a locksmith who keeps the working of his locks secrets so that thieves won’t open them or would you trust a locksmith who publishes the knowledge of his locks so that others could evaluate if they are good or bad? Through these two analogies we can come to understand the effect on open source and the security and validity of a software system.

What I like about this article is that it addresses the issue of privacy/openness with analogies. These analogies demonstrate the advantages and disadvantages of OSS.

Summary #2= A core of flexibility

In this article we are presented with a proposal for the future of information systems. The author addresses the issue that libraries are no longer warehouses of content. He describes libraries to now be a set of services where that are constantly being changed by the same information professionals. He takes into account privacy, openness, and commitment as the goals of these information professionals. This approach emphasizes, designing, developing and delivering services that further provide resources for the continuous evolution of information systems. His approach has 4 main parts. 1. strategic thinking and facility with evidence-based planning and evaluation, 2. ability and skills necessary for trends analysis, 3. ability to effectively teach, train, and empower myriad learner types, and 4.ability and skills to respond to the needs of each unique customer. At the core of this proposal he acknowledges the need of information professionals to be able to overcome this constant adaptation by working in teams in which they can enhance their attitude and analytical skills in order to be able to problem solve effectively.

I believe this article relates to how the internet has revolutionized our world. So much so that, the author has come up with certain ideas on how information professionals should be better trained in order to catch up with the internet’s rapid spread.

Summary #1= Financial Affidavits in Domestic Relations Cases: Sunshine Trumps Privacy–A Proposed Solution

This article discusses how Florida Family Law Rule of Procedure calls for both parties to file and serve a financial affidavit on one another. A financial affidavit is a written statement confirmed by oath in order to be used as evidence in court. There’s been an amendment to that rule which states that a trial judge can by no circumstances waive this requisite.  Also, Florida policy requires all court records to be accessible for public inspection. Now, various committees have gathered in order to make these affidavits freely available in computer systems and the internet specifically. This has created a conflict of interests between individual rights to information privacy and the openness of courts. Parties are now worried that their personal information might be put to wrong use if these documents are so easily available in the internet. This article proposes an amendment to this law. The proposal is to seal the financial affidavits if if either divorcing party requests so. That is, if the divorcing parties have no minor children and resolved their cases without any legal proceeding. This proposed resolution would in turn meet the demands of both the Floridians right to privacy and the court’s purpose of such financial affidavits to be available to the public.

I chose this article because I believe it relates the issue of privacy/openness intertwined with another subject: law. This article demonstrates how the internet has been good in order to be able to further comply with this Florida law but also how it threatens certain people.

My first gif!


Lame-cool-girl handshake. Las amo niñas <3