Symantec Web (Web 3.0)[]
10 Signs of a User-Focused Design - Web Design Ledger. (2008). Retrieved April 10, 2016, from http://webdesignledger.com/10-signs-of-a-user-focused-design/
3D Printer. (n.d.). Retrieved April 10, 2016, from https://www.flickr.com/photos/8114460@N08/9965243145/
3D Technology. (n.d.). Retrieved April 10, 2016, from http://www.3d-display-info.com/3d-technology
AJAX Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/ajax/
Bonsor, K., & Fenson, W. (2007). How RFID Works. Retrieved April 10, 2016, from http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm
Brickley, D., & Guha, R. (1999, March 3). Resource Description Framework(RDF) Schema Specification. Retrieved April 10, 2016, from https://www.w3.org/TR/PR-rdf-schema/
Caroll, J. M. (1991). Human Computer Interaction - brief intro. Retrieved April 10, 2016, from https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/human-computer-interaction-brief-intro
Cherry, K. (2015, December 31). What You Should Know About Schemas. Retrieved April 10, 2016, from http://psychology.about.com/od/sindex/g/def_schema.htm
Coding in Ajax. What is AJAX Programming Anyway? (n.d.). Retrieved April 10, 2016, from http://www.softwareengineerinsider.com/programming-languages/ajax.html#context/api/listings/prefilter
Computer Hardware. (2007). Retrieved April 10, 2016, from http://computer.howstuffworks.com/computer-hardware-channel.htm
Data Visualization. (n.d.). Retrieved April 10, 2016, from http://mashable.com/category/data-visualization/
Extensible Markup Language (XML). (n.d.). Retrieved April 10, 2016, from https://www.w3.org/XML/
Garrett, J. J., & Moriville, P. (n.d.). User Experience Basics. Retrieved April 10, 2016, from http://www.usability.gov/what-and-why/user-experience.html
HTML and XHTML. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/html/html_xhtml.asp
Home | Usability.gov. (n.d.). Retrieved April 10, 2016, from http://www.usability.gov/
Institute for Human Centered Design (IHCD) | Institute for Human Centered Design (IHCD). (n.d.). Retrieved April 10, 2016, from http://humancentereddesign.org/
Java (programming language). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Java_(programming_language)
Matusky, R. (2015, April 03). Web 2.0 vs. Web 3.0 - What Really is the Difference? Retrieved April 10, 2016, from http://randymatusky.com/2015/04/03/web-2-0-vs-web-3-0-what-really-is-the-difference/
Microchip implant (human). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Microchip_implant_(human)
N-Triples. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/2001/sw/RDFCore/ntriples/
Notation 3 Logic. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/DesignIssues/Notation3
OWL Web Ontology Language Overview. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/owl-features/
R. (2002, February 10). RDF. Retrieved April 10, 2016, from https://www.w3.org/RDF/
RDF. (2004, February 10). Retrieved April 10, 2016, from https://www.w3.org/RDF/
RIF Overview (Second Edition). (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/rif-overview/
Rouse, M. (2006, June). What is HTTP (Hypertext Transfer Protocol)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchwindevelopment.techtarget.com/definition/HTTP
Rouse, M. (2014, December). What is SOAP (Simple Object Access Protocol)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchsoa.techtarget.com/definition/SOAP
Rouse, M. (2014, May 6). What is URI (Uniform Resource Identifier)? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://searchsoa.techtarget.com/definition/URI
Rouse, M. (2015, May). What is social media? - Definition from WhatIs.com. Retrieved April 10, 2016, from http://whatis.techtarget.com/definition/social-media
Ruby. (n.d.). Retrieved April 10, 2016, from https://www.ruby-lang.org/en/
SKOS Simple Knowledge Organization System - Home Page. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/2004/02/skos/
SPARQL 1.1 Query Language. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TR/sparql11-query/
Strickland, J. (2007). How Virtual Reality Works. Retrieved April 10, 2016, from http://electronics.howstuffworks.com/gadgets/other-gadgets/virtual-reality.htm
Turtle - Terse RDF Triple Language. (n.d.). Retrieved April 10, 2016, from https://www.w3.org/TeamSubmission/turtle/
Unicode Consortium. (n.d.). Retrieved April 10, 2016, from http://unicode.org/
Web service. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Web_service
XML Schema Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/XML/schema_intro.asp
XML Tutorial. (n.d.). Retrieved April 10, 2016, from http://www.w3schools.com/xml/
Yukihiro Matsumoto. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Yukihiro_Matsumoto
Filter And Search Bubbles[]
Filter Bubble: Breaking Out of the Over-Personalised Internet! (2015, January 12). Retrieved April 10, 2016, from http://perspectiveix.com/blog/2015/01/filter-bubble-over-personalised-internet/
Filter bubble. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Filter_bubble
Gross, D. (2011). What the Internet is hiding from you. Retrieved April 10, 2016, from http://www.cnn.com/2011/TECH/web/05/19/online.privacy.pariser/
How to Burst the "Filter Bubble" that Protects Us from Opposing Views. (n.d.). Retrieved April 10, 2016, from https://www.technologyreview.com/s/522111/how-to-burst-the-filter-bubble-that-protects-us-from-opposing-views/
Pariser, E. (2011, March). Beware online "filter bubbles" Retrieved April 10, 2016, from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles
Shelly, A. (n.d.). Book review of Eli Pariser’s The filter bubble: What the Internet is hiding from you | Shelley | First Monday. Retrieved April 10, 2016, from http://firstmonday.org/ojs/index.php/fm/article/view/4100/3268
Stray, J. (2012, July 11). Are we stuck in filter bubbles? Here are five potential paths out. Retrieved April 10, 2016, from http://www.niemanlab.org/2012/07/are-we-stuck-in-filter-bubbles-here-are-five-potential-paths-out/
Privacy And Tracking[]
Madrigle, A.C. (2012). I'm being followed: how Google—and 104 other companies—are tracking me on the web. The Atlantic. Retrieved from http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/
Paul, I. (2012). Firefox add-on Collusion shows who's tracking you online. PCWorld. Retrieved from http://www.pcworld.com/article/250986/firefox_add_on_collusion_shows_whos_tracking_you_online.html
Rainie, L., Kiesler, S., Kang R., and Madden, M. (2013). Anonymity, privacy, and security online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/
Rouse, M. (2013). data privacy (information privacy). TechTarget. Retrieved from http://searchcio.techtarget.com/definition/data-privacy-information-privacy
Schell, W. (2016). Metadata experiment. Retrieved from http://moxie.cs.oswego.edu/~wschell/coursework/isc110/metadata_experiment.pdf
Schell, W. (2016). Metadata questions and answers. Retrieved from http://moxie.cs.oswego.edu/~wschell/coursework/isc110/metadata_q&a.pdf
Anonymity & Avatars[]
Anonymous (group). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Anonymous_(group)
Avatar (computing). (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Avatar_(computing)
Catfishing. (n.d.). Retrieved April 10, 2016, from https://en.wikipedia.org/wiki/Catfishing
Dr. Phil.com - Advice - Online Dating Red Flags: Warning Signs of a Catfish. (n.d.). Retrieved April 10, 2016, from http://www.drphil.com/articles/article/720
Golden, P. (2015, April 24). Online Avatars May Be Part of Our Developmental DNA. Retrieved April 10, 2016, from http://www.huffingtonpost.com/paula-golden/online-avatars-may-be-par_b_7122320.html
Palmer, R. (2013, January 17). Where Does 'Catfish' Come From? Online Hoax Movie Inspired By Fisherman's Lore. Retrieved April 10, 2016, from http://www.ibtimes.com/where-does-catfish-come-online-hoax-movie-inspired-fishermans-lore-1022374
Rainie, L., Kiesler, S., Kang R., and Madden, M. (2013). Anonymity, privacy, and security online. Pew Research Center. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/
Raza, A. (2016, January 13). 8 Most Awesome Hacks Conducted By Anonymous Hackers. Retrieved April 10, 2016, from https://www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/