Archive of ‘digital identity’ category

elitism in higher ed

https://www.insidehighered.com/views/2020/10/23/divide-between-those-and-without-degrees-hurts-higher-education-and-country-opinion

America is divided by race, gender and geography. None of that is new. What’s new is division by education: a college divide.

One element of the college divide is hostility to higher education itself; the percentage of self-identified Republicans who say higher education has a negative effect on the country went from 37 percent in 2015 to 59 percent in 2019.

College graduates are being painted as elites principally because the vast majority of students who successfully complete four-plus years of college at the vast majority of institutions have the financial resources, family stability and support that are characteristic of top quartile (if not top decile) households.

 

Privacy data ignored by Android iPhone

 

+++++Under EU law, citizen can demand a copy of all personal data that companies hold about them. However, more than one year after implementation of the new law, most Android and iPhone apps still completely ignore this right, a new study has found. from r/iphone

https://dl.acm.org/doi/epdf/10.1145/3407023.3407057

How do App Vendors Respond to Subject Access Requests? A Longitudinal Privacy Study on iOS and Android Apps
the results of a four-year undercover field study.

Besides a general lack of responsiveness, the observed problems range from malfunctioning download links and authentication mechanisms over confusing data labels and le structures to impoliteness, incomprehensible language, and even serious cases of carelessness and data leakage. It is evident from our results that there are no well-established and standardized processes for subject access requests in the mobile app industry. Moreover, we found that many vendors lack the motivation to respond adequately. Many of the responses we received were not only completely insucient, but also deceptive or misleading. Equally worrisome are cases of unsolicited dissolution of personal data, for instance, due to the

apparently widespread practice of deleting stale accounts without prior notice

++++++++++++++

New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they’re not even in use? from r/technology

+++++++++++++++++
more on privacy data in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy+data

digital agility

Digital Agility: Embracing a Holistic Approach to Digital Literacy in the Liberal Arts

https://er.educause.edu/blogs/2020/1/digital-agility-embracing-a-holistic-approach-to-digital-literacy-in-the-liberal-arts

A 2016 Pew Research Center study indicates that the digital divide in the United States is not solely about access to technology; it also is about the ability to use technology to get what we need.1 What does digital readiness mean; applying cumulative knowledge to real-world situations. Having a tech or STEM-related degree does not ensure digital readiness.

How Can We Encourage Digital Agility in the Liberal Arts?

Digital pedagogy often creates opportunities for instructors to create non-disposable assignments—assignments that are not designed to be thrown away but rather have a purpose past being required.3

“We need to marry the best of our academic work with the best of edtech. In other words, what would it look like if education technology were embedded in the everyday practice of academic disciplines?”4

Project-based learning fits well within the curricular flexibility of the liberal arts. In project-based work, students apply what they are learning in the context of an engaging experience.

Building off frameworks that are already in place, like the Association for College and Research Libraries (ACRL) Framework for Information Literacy,

External-facing work offers students real situations where, if we imagine what digital agility looks like, they have to adjust to possible new digital environments and approaches.

Reflection provides a way for meaning-making to happen across individual assignments, projects, and classes. Without the chance to assemble assignments into a larger narrative, each experience lives in its own void.

How Can Institutions Build Systems-Level Support?

Liberal arts colleges in particular are interested in the ways they prepare graduates to be agile and critical in a digital world—as seen in the Association of American Colleges & Universities (AAC&U) Valid Assessment of Learning in Undergraduate Education (VALUE) Rubrics.

he Bryn Mawr Digital Competencies Framework5 was followed by more formal conversations and the formation of a working group (including Carleton College,

++++++++++++
more on digital fluency in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+fluency

data interference

APRIL 21, 2019 Zeynep Tufekci

Think You’re Discreet Online? Think Again

Because of technological advances and the sheer amount of data now available about billions of other people, discretion no longer suffices to protect your privacy. Computer algorithms and network analyses can now infer, with a sufficiently high degree of accuracy, a wide range of things about you that you may have never disclosed, including your moods, your political beliefs, your sexual orientation and your health.

There is no longer such a thing as individually “opting out” of our privacy-compromised world.

In 2017, the newspaper The Australian published an article, based on a leaked document from Facebook, revealing that the company had told advertisers that it could predict when younger users, including teenagers, were feeling “insecure,” “worthless” or otherwise in need of a “confidence boost.” Facebook was apparently able to draw these inferences by monitoring photos, posts and other social media data.

In 2017, academic researchers, armed with data from more than 40,000 Instagram photos, used machine-learning tools to accurately identify signs of depression in a group of 166 Instagram users. Their computer models turned out to be better predictors of depression than humans who were asked to rate whether photos were happy or sad and so forth.

Computational inference can also be a tool of social control. The Chinese government, having gathered biometric data on its citizens, is trying to use big data and artificial intelligence to single out “threats” to Communist rule, including the country’s Uighurs, a mostly Muslim ethnic group.

+++++++++++++

Zeynep Tufekci and Seth Stephens-Davidowitz: Privacy is over

https://www.centreforideas.com/article/zeynep-tufekci-and-seth-stephens-davidowitz-privacy-over

+++++++++++

Zeynep Tufekci writes about security and data privacy for NY Times, disinformation’s threat to democracy for WIRED

++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

1 2 3 10