Lesson 12 Overview INTRODUCTION We live in a global cybersociety where many are excluded from information and communications technologies (ICT) access and the education for creative ICT use. We can access world citizens, audiences and conversations with ICTs. Many people on the planet are still excluded from access to and education for use of the Internet and ICT. Article 19 of the Universal Declaration of Human Rights (1948) affirms the right to communicate. Social networking is valuable for the human communications it facilitates, so there are local and global initiatives to build ways to include those now excluded from the global cybersociety. Kvasny, et al (2008) examine gender and work to bridge a local digital divide in Kenya and build a more inclusive cybersociety in Kenya and the world. Our film for this lesson, Freedom of Expression, explores the complex issues of intellectual property rights and need for digital commons in cyberspace. We suggest you complete readings and view films before you complete any lesson activities. Reading and film notes are also provided for your reference. KNOWLEDGE GOALS Here are the knowledge goals for this lesson. Understand the UDHR Article 19 and the Human Right to Communicate. Understand how communication theory and concepts help explain conditions, problems and policy solution strategies for citizens of the Information Age. LESSON READINGS AND ACTIVITIES By the end of this lesson, make sure you have completed the readings and activities found in the Lesson 12 Course Schedule. Please direct technical questions to the World Campus Help Desk. Universal Declaration of Human Rights (2 of 4) Universal Declaration of Human Rights Read Universal Declaration of Human Rights (1948) Article 19 Right to Communicate. ‘Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.’ Gendered Perspectives Reading Notes (3 of 4) Gendered Perspectives Reading Notes Read Gendered Perspectives on the Digital Divide. The authors present ‘a study that examined undergraduate students enrolled in an IT-focused program in a Kenyan university. The purpose of the study was to understand and explain gendered perspectives in three topical areas: 1) the digital divide; 2) motivations for enrolling in IT-focused education program; and 3) career expectations upon completion of the program. To gain insights into these three topical areas, the researchers conducted interviews with 32 female and 31 male students. The methodology that guided these interviews as well as the findings and their implications for IT education are presented.’ (256) Authors situate their study in the ‘extant literature on gender in IT education, gender in the IT workforce, and the digital divide.’ (256) Numbers of women earning undergraduate degrees in computer science and engineering are significantly less than might be expected from their representation in the population. This under-representation can be partially explained by the following impediments that many women face in their STEM educational and career paths. A lack of role models and networking opportunities An education gap, coupled with the digital gap A lack of access to a technology-related career A lack of commitment from industry and academe The perception of IT as a white male career ‘Despite these challenges, formal STEM training and access to technology resources can be found at the elementary and secondary levels, and in institutions of higher education. The availability of formal STEM education in sub-Saharan Africa, however, may be more challenging due to infrastructure and economic development issues’ (256) CONCLUSIONS AND DISCUSSION ‘When discussing the digital divide, students situated their individual educational outcomes in the broader social structures. In doing so, they expressed dualistic thinking that presented binary opposites such as Western/African nations, skilled/unskilled, presence/absence of IT, old/young, advanced/behind, urban/rural, and new/old technology. These binary categories largely mirror those found in the digital divide discourse of Western nations. Perhaps this is because both developed and developing nations must contend with systemic inequities associated with human differences based on geographic location, gender, race, ethnicity, and socioeconomic class. To produce compassionate IT professionals equipped with the analytic and technical skills to develop solutions that facilitate development and redress the digital divide, IT education programs should include course modules and learning activities that raise students’ awareness of ethics, social responsibility and civic engagement. There is evidence, for instance, that globalization has given women in developing regions greater opportunities to partake in formal education and work in STEM-related disciplines. Morgan, Heeks, and Arun (22) reported that the United Nations placed access to IT as the third most important issue facing women globally, after poverty and violence against women. Access to IT and its potential role in reducing the income gap between men and women has also been documented in tele-education initiatives in sub-Saharan African nations. This study examined gender perspectives on the digital divide and IT workforce and education in Kenya. Through interviews with 32 female and 31 male students enrolled at a four-year university in Kenya, the authors found that students advocated for IT skills and competencies to enhance the economic development of the nation and to further their individual careers. However, their narratives revealed the unique challenges to deriving value from IT in Kenya. To overcome these challenges, national policies are needed to facilitate the growth of the IT sector and promote gender equity, and the capacity of organizations to leverage and develop the IT workforce. REFERENCE Kvasny, L., Payton, F., Mbarika, V., Amadi, A., & Meso, P. (2008). Gendered perspectives on the digital divide, IT education, and workforce participation in Kenya. IEEE Transactions on Education, 51(2), 256-261 Freedom of Expression Film Notes (4 of 4) Freedom of Expression Film Notes Watch Freedom of Expression. (61 minutes). Watch the film for this lesson. Filmmaker Information and Transcript are available online. INTRODUCTION Corporations control our information systems, the information on which we rely as citizens, responsible to each other for the political decisions we make. FREE SPEECH IN THE AGE OF COPYRIGHT Fair and Balanced trademark Intellectual Property Case: Franken vs Fox News. Copyright Law based on US Constitution, Article I, Section 8, Clause 8 ‘To promote the progress of science and useful arts’ for limited times. Copyright and intellectual property is used as a tool for censorship and as a way of restricting the public’s access to vital information. ‘Need a different structure of copyright, so the natural instincts about how you use creative work don’t also constitute piracy” (L. Lessig) FENCING THE CULTURAL COMMONS ‘Copyright law is a bargain between the public and creators’ (D. Bollier) Disney and others lobbied for the extension of copyright in law. Important question about copyright law is ‘Can we maintain a rich cultural commons and therefore a sense of cultural cohesion?’ Folk music tradition is a great example of how previous works of art, music and culture can inform new vibrant creations. The public domain is important for folk musicians who borrow and rework old bits of melody and lyrics. This Land is Your Land story illustrates the public private domain controversy. THE RISE OF THE CLEARANCE CULTURE Now unprecedented access to multimedia technology. The Clearance Culture is basically the assumption that copyright holders’ monopoly is absolute. SUPPRESSING THE FREEDOM OF INFORMATION ‘Pervasive notion that everything private is better than everything public.’ (S. Vaidhyanathan) Problem of the enclosure of the commons, based on the false notion that private is more efficient. Case of Diebold voting machine problems, not revealed to the citizens based on patent and copyright proprietary information, using the Digital Millennium Copyright Act. FREE SPEECH AND FAIR USE Important safeguard against overzealous copyright holders is legal doctrine, fair use which also protects the unlicensed reproduction of media. ‘Fair use of a copyrighted work for the purposes of criticism, news reporting, teaching, scholarship, research is not infringement of copyright’ Copyright Law of the US, 1976 Copyright Act. Pretty Woman parody case was important legal case for fair use. Other examples discussed include Outfoxed and Dreamworlds. Documentary filmmakers organized around protection of their rights to fair use. FIGHTING BACK Significant movement that resists the assaults on free expression is diverse and decentralized movement to protect fair use rights. Stay Free, led by teacher Carrie McLaren, illustrates how copyright law is affecting and limiting artists in ‘Illegal Art’ exhibit. ‘Culture Jamming, interrupts the traditional relationship between product and consumer.’ Tactics include generation of mock ads and media pranks to educate with often humorous and thought provoking parody and critique. Efforts include work by audio collective Negativeland, whose lawsuit became educational information about copyright and efforts to challenge. Art Mark (the yes men) created the Barbie Liberation Organization media prank. Kembrew McLeod sought and received trademark certificate for term Freedom of Expression. Creative Commons (cc) licenses create a more inclusive and diverse copyright environment. Free Culture.org engages students to organize, inform people of rights and encourage people to use their rights. Raises important questions to address the most basic First Amendment rights of citizens. REFERENCE McLeod, K. & Smith, J. (Producers) (2007). Freedom of expression? Resistance and repression in the age of intellectual property. [Motion picture]. US: MEF. undefined Top of page Footer vds Lesson 12 Overview undefined INTRODUCTION We live in a global cybersociety where many are excluded from information and communications technologies (ICT) access and the education for creative ICT use. We can access world citizens, audiences and conversations with ICTs. Many people on the planet are still excluded from access to and education for use of the Internet and ICT. Article 19 of the Universal Declaration of Human Rights (1948) affirms the right to communicate. Social networking is valuable for the human communications it facilitates, so there are local and global initiatives to build ways to include those now excluded from the global cybersociety. Kvasny, et al (2008) examine gender and work to bridge a local digital divide in Kenya and build a more inclusive cybersociety in Kenya and the world. Our film for this lesson, Freedom of Expression, explores the complex issues of intellectual property rights and need for digital commons in cyberspace. We suggest you complete readings and view films before you complete any lesson activities. Reading and film notes are also provided for your reference. KNOWLEDGE GOALS Here are the knowledge goals for this lesson. Understand the UDHR Article 19 and the Human Right to Communicate. Understand how communication theory and concepts help explain conditions, problems and policy solution strategies for citizens of the Information Age. LESSON READINGS AND ACTIVITIES By the end of this lesson, make sure you have completed the readings and activities found in the Lesson 12 Course Schedule. Please direct technical questions to the World Campus Help Desk. Universal Declaration of Human Rights (2 of 4) Universal Declaration of Human Rights Read Universal Declaration of Human Rights (1948) Article 19 Right to Communicate. ‘Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.’ Gendered Perspectives Reading Notes (3 of 4) Gendered Perspectives Reading Notes Read Gendered Perspectives on the Digital Divide. The authors present ‘a study that examined undergraduate students enrolled in an IT-focused program in a Kenyan university. The purpose of the study was to understand and explain gendered perspectives in three topical areas: 1) the digital divide; 2) motivations for enrolling in IT-focused education program; and 3) career expectations upon completion of the program. To gain insights into these three topical areas, the researchers conducted interviews with 32 female and 31 male students. The methodology that guided these interviews as well as the findings and their implications for IT education are presented.’ (256) Authors situate their study in the ‘extant literature on gender in IT education, gender in the IT workforce, and the digital divide.’ (256) Numbers of women earning undergraduate degrees in computer science and engineering are significantly less than might be expected from their representation in the population. This under-representation can be partially explained by the following impediments that many women face in their STEM educational and career paths. A lack of role models and networking opportunities An education gap, coupled with the digital gap A lack of access to a technology-related career A lack of commitment from industry and academe The perception of IT as a white male career ‘Despite these challenges, formal STEM training and access to technology resources can be found at the elementary and secondary levels, and in institutions of higher education. The availability of formal STEM education in sub-Saharan Africa, however, may be more challenging due to infrastructure and economic development issues’ (256) CONCLUSIONS AND DISCUSSION ‘When discussing the digital divide, students situated their individual educational outcomes in the broader social structures. In doing so, they expressed dualistic thinking that presented binary opposites such as Western/African nations, skilled/unskilled, presence/absence of IT, old/young, advanced/behind, urban/rural, and new/old technology. These binary categories largely mirror those found in the digital divide discourse of Western nations. Perhaps this is because both developed and developing nations must contend with systemic inequities associated with human differences based on geographic location, gender, race, ethnicity, and socioeconomic class. To produce compassionate IT professionals equipped with the analytic and technical skills to develop solutions that facilitate development and redress the digital divide, IT education programs should include course modules and learning activities that raise students’ awareness of ethics, social responsibility and civic engagement. There is evidence, for instance, that globalization has given women in developing regions greater opportunities to partake in formal education and work in STEM-related disciplines. Morgan, Heeks, and Arun (22) reported that the United Nations placed access to IT as the third most important issue facing women globally, after poverty and violence against women. Access to IT and its potential role in reducing the income gap between men and women has also been documented in tele-education initiatives in sub-Saharan African nations. This study examined gender perspectives on the digital divide and IT workforce and education in Kenya. Through interviews with 32 female and 31 male students enrolled at a four-year university in Kenya, the authors found that students advocated for IT skills and competencies to enhance the economic development of the nation and to further their individual careers. However, their narratives revealed the unique challenges to deriving value from IT in Kenya. To overcome these challenges, national policies are needed to facilitate the growth of the IT sector and promote gender equity, and the capacity of organizations to leverage and develop the IT workforce. REFERENCE Kvasny, L., Payton, F., Mbarika, V., Amadi, A., & Meso, P. (2008). Gendered perspectives on the digital divide, IT education, and workforce participation in Kenya. IEEE Transactions on Education, 51(2), 256-261 Freedom of Expression Film Notes (4 of 4) Freedom of Expression Film Notes Watch Freedom of Expression. (61 minutes). Watch the film for this lesson. Filmmaker Information and Transcript are available online. INTRODUCTION Corporations control our information systems, the information on which we rely as citizens, responsible to each other for the political decisions we make. FREE SPEECH IN THE AGE OF COPYRIGHT Fair and Balanced trademark Intellectual Property Case: Franken vs Fox News. Copyright Law based on US Constitution, Article I, Section 8, Clause 8 ‘To promote the progress of science and useful arts’ for limited times. Copyright and intellectual property is used as a tool for censorship and as a way of restricting the public’s access to vital information. ‘Need a different structure of copyright, so the natural instincts about how you use creative work don’t also constitute piracy” (L. Lessig) FENCING THE CULTURAL COMMONS ‘Copyright law is a bargain between the public and creators’ (D. Bollier) Disney and others lobbied for the extension of copyright in law. Important question about copyright law is ‘Can we maintain a rich cultural commons and therefore a sense of cultural cohesion?’ Folk music tradition is a great example of how previous works of art, music and culture can inform new vibrant creations. The public domain is important for folk musicians who borrow and rework old bits of melody and lyrics. This Land is Your Land story illustrates the public private domain controversy. THE RISE OF THE CLEARANCE CULTURE Now unprecedented access to multimedia technology. The Clearance Culture is basically the assumption that copyright holders’ monopoly is absolute. SUPPRESSING THE FREEDOM OF INFORMATION ‘Pervasive notion that everything private is better than everything public.’ (S. Vaidhyanathan) Problem of the enclosure of the commons, based on the false notion that private is more efficient. Case of Diebold voting machine problems, not revealed to the citizens based on patent and copyright proprietary information, using the Digital Millennium Copyright Act. FREE SPEECH AND FAIR USE Important safeguard against overzealous copyright holders is legal doctrine, fair use which also protects the unlicensed reproduction of media. ‘Fair use of a copyrighted work for the purposes of criticism, news reporting, teaching, scholarship, research is not infringement of copyright’ Copyright Law of the US, 1976 Copyright Act. Pretty Woman parody case was important legal case for fair use. Other examples discussed include Outfoxed and Dreamworlds. Documentary filmmakers organized around protection of their rights to fair use. FIGHTING BACK Significant movement that resists the assaults on free expression is diverse and decentralized movement to protect fair use rights. Stay Free, led by teacher Carrie McLaren, illustrates how copyright law is affecting and limiting artists in ‘Illegal Art’ exhibit. ‘Culture Jamming, interrupts the traditional relationship between product and consumer.’ Tactics include generation of mock ads and media pranks to educate with often humorous and thought provoking parody and critique. Efforts include work by audio collective Negativeland, whose lawsuit became educational information about copyright and efforts to challenge. Art Mark (the yes men) created the Barbie Liberation Organization media prank. Kembrew McLeod sought and received trademark certificate for term Freedom of Expression. Creative Commons (cc) licenses create a more inclusive and diverse copyright environment. Free Culture.org engages students to organize, inform people of rights and encourage people to use their rights. Raises important questions to address the most basic First Amendment rights of citizens. REFERENCE McLeod, K. & Smith, J. (Producers) (2007). Freedom of expression? Resistance and repression in the age of intellectual property. [Motion picture]. US: MEF. undefined Top of page Do we need to achieve a democratic Information Age? What are the challenges? What policies can enhance education for use of the Internet and other digital Information and Communication Technology (ICT)? Can Article 19 of the Universal Declaration of Human Rights (1948), the right to communicate, be a tool for social networking and inclusion in the global cybersociety? What did Kvasny, et al., (2008) find about gender, IT education and IT digital divide? The film Freedom of Expression explores complex issues of intellectual property rights in cyberspace. What challenges and opportunities do digital intellectual property rights (IP) of information offer? Consider the range of IP form protected and expensive commodities to free and shared creative commons? What are fair use values? Tags: democratic Information Information Age Communication Technology Human Rights Social networking User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.
Reference List: Basic Rules
Note: This page reflects the latest version of the APA Publication Manual (i.e., APA 7), which released in October 2019. The equivalent resource for the older APA 6 style can be found here.
This resource, revised according to the 7th edition APA Publication Manual, provides fundamental guidelines for constructing the reference pages of research papers. For more information, please consult the Publication Manual of the American Psychological Association, (7th ed.).
Note: Because the information on this page pertains to virtually all citations, we’ve highlighted one important difference between APA 6 and APA 7 with an underlined note written in red.
Formatting a Reference List
Your reference list should appear at the end of your paper. It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text.
Your references should begin on a new page separate from the text of the essay; label this page “References” in bold, centered at the top of the page (do NOT underline or use quotation marks for the title). All text should be double-spaced just like the rest of your essay.
Basic Rules for Most Sources
- All lines after the first line of each entry in your reference list should be indented one-half inch from the left margin. This is called hanging indentation.
- All authors’ names should be inverted (i.e., last names should be provided first).
- Authors’ first and middle names should be written as initials.
- For example, the reference entry for a source written by Jane Marie Smith would begin with “Smith, J. M.”
- If a middle name isn’t available, just initialize the author’s first name: “Smith, J.”
- Give the last name and first/middle initials for all authors of a particular work up to and including 20 authors (this is a new rule, as APA 6 only required the first six authors). Separate each author’s initials from the next author in the list with a comma. Use an ampersand (&) before the last author’s name. If there are 21 or more authors, use an ellipsis (but no ampersand) after the 19th author, and then add the final author’s name.
- Reference list entries should be alphabetized by the last name of the first author of each work.
- For multiple articles by the same author, or authors listed in the same order, list the entries in chronological order, from earliest to most recent.
- When referring to the titles of books, chapters, articles, reports, webpages, or other sources, capitalize only the first letter of the first word of the title and subtitle, the first word after a colon or a dash in the title, and proper nouns.
- Note again that the titles of academic journals are subject to special rules. See section below.
- Italicize titles of longer works (e.g., books, edited collections, names of newspapers, and so on).
- Do not italicize, underline, or put quotes around the titles of shorter works such as chapters in books or essays in edited collections.
Basic Rules for Articles in Academic Journals
- Present journal titles in full.
- Italicize journal titles.
- Maintain any nonstandard punctuation and capitalization that is used by the journal in its title.
- For example, you should use PhiloSOPHIA instead of Philosophia, or Past & Present instead of Past and Present.
- Capitalize all major words in the titles of journals. Note that this differs from the rule for titling other common sources (like books, reports, webpages, and so on) described above.
- This distinction is based on the type of source being cited. Academic journal titles have all major words capitalized, while other sources’ titles do not.
- Capitalize the first word of the titles and subtitles of journal articles, as well as the first word after a colon or a dash in the title, and any proper nouns.
- Do not italicize or underline the article title.
- Do not enclose the article title in quotes.
- So, for example, if you need to cite an article titled “Deep Blue: The Mysteries of the Marianas Trench” that was published in the journal Oceanographic Study: A Peer-Reviewed Publication, you would write the article title as follows:
- Deep blue: The mysteries of the Marianas Trench.
- …but you would write the journal title as follows:
- Oceanographic Study: A Peer-Reviewed Publication
- So, for example, if you need to cite an article titled “Deep Blue: The Mysteries of the Marianas Trench” that was published in the journal Oceanographic Study: A Peer-Reviewed Publication, you would write the article title as follows:
Please note: While the APA manual provides examples of how to cite common types of sources, it does not cover all conceivable sources. If you must cite a source that APA does not address, the APA suggests finding an example that is similar to your source and using that format. For more information, see page 282 of the Publication Manual of the American Psychological Association, 7th ed.
