Search

You can find the results of your search below.

Fulltext results:

hacker_culture
7 Hits, Last modified:
orm our technological lives? Do hacker formations like Wikileaks, Anonymous, and open-source software re... xercise for the class, using whatever format they like to invite participation, collaboration, and the s... represents. For examples of what this could look like, peruse reports from [Cisco](https://www.cisco.co... sophy to the world. Identify yourself any way you like or not at all. Seek to recruit, warn, alienate, t
email_etiquette
2 Hits, Last modified:
f a few pointers on what an effective email looks like. * **Be cordial**. It's important to signal resp... r time, and try to respect that. Avoid statements like "respond as soon as you see this" and "URGENT!" I
academic_honesty
1 Hits, Last modified:
y content that you turn in, it should be credited like any other source. Do not present AI-generated con
media_activism
1 Hits, Last modified:
on whom you ask, media-powered activism can sound like either a silver bullet or a lost cause. It's ofte
introduction_to_social_media
1 Hits, Last modified:
extensive, and you're expected to explore as you like, not necessarily to study the whole thing. Some
disruptive_entrepreneurship
1 Hits, Last modified:
u however we can. ## Topics The course topics, like the assignments, proceed in three phases. First,