Welcome!

Below you will find my students' video essays from Composition II at Dakota State University. I invite you to watch the videos that sound interesting and to comment on the ones you especially enjoy. You can use the search tool, you can see which are most popular by checking "Popular Posts," and you can click on the tags below each posting to see what similar posts there are to ones you like. Enjoy!
Showing posts with label featured. Show all posts
Showing posts with label featured. Show all posts

Monday, December 9, 2013

How Important is Sleep?, by Victoria Sopko

What is keeping teenagers up at night? Are those late night Facebook posts and texts causing a negative impact on their school performance? 

Cartoons are not always Cartoons!, by Kirsten Smith

Cartoons are for kids, right? Animated movies are for kids, right? 'Animation' means 'cartoon,' right? Discover how the American mainstream is oddly prejudiced toward animation, and we do not realize it.

The Demon's Name Is Surveillance, by Jackson Ryan

 What happened to our right to privacy as American citizens? The government is monitoring practically anyone and everyone they can, and that includes U.S. citizens.

The Free to Play Scheme in Game Design, by Tyler Pokos


Is the evolving Free to Play system healthy or harmful for the future of the Game Design Industry? Find out here!

Plagiarism and Detection Software By Laura Otteson

Plagiarism has shown it’s ugly face in today’s society and is not anywhere near being fixed. Threats against plagiarism can only go so far. The statistics of people plagiarizing are astounding and will hopefully decrease with the use of plagiarism detection software called iThenticate and Turnitin. 

Self-Promotion through Social Media - For Artist and You! by Galacia Barton

Evolving technologies offer people the ability to teach themselves all sort of skills... but why is learning to use Facebook, Twitter, and other social media sites so vital?

Phishing, by Luke Gassman


Avoid being the catch of the day, by learning how to spot phishing attacks.