Because of technological advances and the sheer amount of data now available about billions of other people, discretion no longer suffices to protect your privacy. Computer algorithms and network analyses can now infer, with a sufficiently high degree of accuracy, a wide range of things about you that you may have never disclosed, including your moods, your political beliefs, your sexual orientation and your health.
There is no longer such a thing as individually “opting out” of our privacy-compromised world.
In 2017, the newspaper The Australian published an article, based on a leaked document from Facebook, revealing that the company had told advertisers that it could predict when younger users, including teenagers, were feeling “insecure,” “worthless” or otherwise in need of a “confidence boost.” Facebook was apparently able to draw these inferences by monitoring photos, posts and other social media data.
In 2017, academic researchers, armed with data from more than 40,000 Instagram photos, used machine-learning tools to accurately identify signs of depression in a group of 166 Instagram users. Their computer models turned out to be better predictors of depression than humans who were asked to rate whether photos were happy or sad and so forth.
Computational inference can also be a tool of social control. The Chinese government, having gathered biometric data on its citizens, is trying to use big data and artificial intelligence to single out “threats” to Communist rule, including the country’s Uighurs, a mostly Muslim ethnic group.
This position paper is meant to i) support the dialog among European and national policy makers, industry, research, public sector and civic society in the definition of a common roadmap for the development and adoption of a pan-European Data Sharing Space, and ii) guide public and private investments in this area in the next Multiannual Financial Framework.
a tech catalog for students to explore and choose from, partially based on Georgetown’s enterprise suite, including a learning management system (Canvas), blogging (WordPress or other), student-run web domains, web annotation (Hypothesis) https://web.hypothes.is/, collaborative writing (Google Suite), discussion boards (Discourse), and videoconferencing (Zoom).
School districts are more connected than ever. The latest Infrastructure Survey report from CoSN shows that over 90% of districts have sufficient broadband. So why isn’t everyone using it to generate measurable outcomes?
How technology can be used in the classroom to help support learning and productivity How school leaders can calculate the value of their tech investments
The importance of video when it comes to keeping students engaged (hint: video is key)
The most important metrics to consider when collecting data on your technology (it’s ok to start small)
Research from the Center for Higher Education CIO Studies (CHECS) has been transferred to EDUCAUSE, including a report on the role of the Chief Academic Technology Officer and its differences and similarities to other higher ed IT tech executives.
The Center for Higher Education CIO Studies (CHECS) was a nonprofit organization founded by Dr. Wayne A. Brown, dedicated to the education and development of technology leaders in higher education. CHECS produced the CIO Study, the Technology Leadership (TL) Study, the Chief Information Security Officer (CISO) Study and the Higher Education Chief Academic Technology Officer Study.
The Chief Information Officer (CIO) study provides information about higher education CIOs’ attributes, education, experience and effectiveness. The CIO study was conducted from 2003 to 2018. Find all the CIO reports here.
The Technology Leadership (TL) study surveyed those in the next organizational layer down from the CIO. The TL study examines the demographics of the TL, where they have worked, and the activities they are undertaking to prepare themselves to become CIOs. The TL study was study was conducted from 2009 to 2018. Find all the TL reports here.
The Chief Information Security Officer (CISO)study examines the demographics of the higher education CISO, the career route they have taken to their role, and the activities and attributes needed for a CISO according to the CISO and the CIO. The CISO study was study was conducted from 2014 to 2017. Find all the CISO reports here.
Local Government Digital Equity Plans Municipal governments are in the forefront of local, collaborative digital access and equity planning. Local leaders will talk about the value of planning, the nuts and bolts of making a plan, and the outcomes of their planning efforts.
This research shows that it is more inclusive communities that experience better economic outcomes; that digital inclusion leads to economic benefits at the community level. Disparities in broadband adoption over time also track the widening inequalities that have become apparent across regions and communities in the U.S., and digital inclusion is a necessary part of policy solutions for narrowing place-based gaps in economic opportunity.