Unit 6 Activity 9: LinkedIn

Biggest thing learned from the video is how recruiters use key words to search LinkedIn for candidates. It is important to use key words related to your industry so that your profile comes up in a search by recruiters. I also never thought of performing an advanced person search using those key terms to make sure my profile shows up. I also like the public profile option for Google searches and that even with a public profile you can limit what is viewable.

https://www.linkedin.com/in/terrellgreen

Unit 6 Activity 8: Three new things I learned about academic citation

1. Academic citation is your friend. If you’re ever in doubt about whether or not you need to cite, you should probably cite.
2. Just because you can cite quoted texts, quoted texts should not make up the majority of your writing. Minimize direct quotes.
3. There are several styles of citations with one for each major area of research even though most often we use APA. Endnote is another friend because it can reformat your bibliography to fit these styles.

Unit 5 Assignment 2: Internet Use (Cyberethics)

A few words about the Acadia University Plagarism Tutorial:

The tutorial was a good starting place for students to recognize plagiarism. I appreciated that the tutorial provided examples of typical ways students intentionally and unintentionally plagiarize sources. One thing that was clarified for me was that things that are common knowledge to do not need to be cited. I’ve always wondered about this fact. I sometimes would still cite the source just to being cautious. I still think there is room for error with self-determining what is common knowledge and what is not especially when writing for specific research areas. For example, what I may consider to be common knowledge among biomedical engineers in one text may not be depending on the audience.

Unit 5 Assignment 2: Which scenarios below are appropriate and which are inappropriate?

1. Use various characters combined with numbers and letters to create passwords.
2. Purchase clothes from the Gap while drinking coffee at Starbucks.
3. Join and contribute thoughtful information to a Facebook group you’re interested in.
4. Advertise your new t-shirt making business on the timeline of the high school reunion Facebook page.
5. Someone posts a negative comment to your Instagram post and you tell them to look at themselves in the mirror first before speaking.
6. When creating your blog post, you are sure to give credit to and cite original authors.

Unit 5: Netiquette

Reading the chapter in the text and taking the online netiquette quiz taught me to think first and post later. I believe this practice applies even in how we speak with people in person. If you think things through before acting, you’re probably less likely to regret your actions later. Screen Shot 2015-10-01 at 10.33.24 AM

Unit 5 Assignment 1: Internet Privacy – Spokeo.com Search

Were you able to find information about these people? Do you feel that information of this sort should be publicly available on the Internet? Write a post on the appropriate discussion forum in your class about Internet privacy. What expectation of privacy should people have on the Internet? Do you feel there should be legal protections for privacy?

I was able to locate information on relatives and myself. Sometimes the information was more detailed in the case of my parents. I do not think information about a person’s addresses current or past should be posted. Your name, combined with your address, and month and year of birth, already provides enough information to be a victim of identity theft. If someone wanted to find someone and commit a crime against another person, the information is readily available for free. I think we should expect some amount of personal information to be covered under Internet privacy. Years ago when we all had telephone books (yellow pages), you could opt to not have your phone number and mailing address published publicly in this book. There was still some respect for a person’s expectation of privacy. Legally, sites should not allow access to personal information unless it has already been made public by the party being exposed.