Archive of ‘information technology’ category

AI tracks students writings

Schools are using AI to track what students write on their computers

By Simone Stolzoff August 19, 2018
50 million k-12 students in the US
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like GaggleSecurly, and GoGuardian to surface potentially worrisome communications to school administrators
In an age of mass school-shootings and increased student suicides, SMPs Safety Management Platforms can play a vital role in preventing harm before it happens. Each of these companies has case studies where an intercepted message helped save lives.
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal at Facebook and other recent data breaches from companies like Equifax, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety

+++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

more on surveillance  in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

Media Manipulation and Disinformation Online

A Review of ‘Media Manipulation and Disinformation Online’

In Media Manipulation and Disinformation Online, Marwick and Lewis (2017) of the Data & Society Research Institute described the agents of media manipulation, their modus operandi, motivators, and how they’ve taken advantage of the vulnerability of online media. The researchers described the manipulators as right-wing extremists (RWE), also known as alt-right, who run the gamut from sexists (including male sexual conquest communities) to white nationalists to anti-immigration activists and even those who rebuke RWE identification but whose actions confer such classification. These manipulators rally behind a shared belief on online forums, blogs, podcasts, and social media through pranks or ruinous trolling anonymity, usurping participatory culture methods (networking, humor, mentorship) for harassment, and competitive cyber brigades that earn status by escalating bullying such as the sharing of a target’s private information.

Marwick and Lewis reported on how RWE groups have taken advantage of certain media tactics to gain viewers’ attention such as novelty and sensationalism, as well as their interactions with the public via social media, to manipulate it for their agenda. For instance, YouTube provides any individual with a portal and potential revenue to contribute to the media ecosystem. The researchers shared the example of the use of YouTube by conspiracy theorists, which can be used as fodder for extremist networks as conspiracies generally focus on loss of control of important ideals, health, and safety.

One tactic they’re using is to package their hate in a way that appeals to millennials. They use attention hacking to increase their status such as hate speech, which is later recanted as trickster trolling all the while gaining the media’s attention for further propagation

SHARED MODUS OPERANDI

Marwick and Lewis reported the following shared tactics various RWE groups use for online exploits:

  • Ambiguity of persona or ideology,
  • Baiting a single or community target’s emotions,
  • Bots for amplification of propaganda that appears legitimately from a real person,
  • “…Embeddedness in Internet culture… (p. 28),”
  • Exploitation of young male rebelliousness,
  • Hate speech and offensive language (under the guise of First Amendment protections),
  • Irony to cloak ideology and/or skewer intended targets,
  • Memes for stickiness of propaganda,
  • Mentorship in argumentation, marketing strategies, and subversive literature in their communities of interest,
  • Networked and agile groups,
  • “…Permanent warfare… (p.12)” call to action,
  • Pseudo scholarship to deceive readers,
  • “…Quasi moral arguments… (p. 7)”
  • Shocking images for filtering network membership,
  • “Trading stories up the chain… (p. 38)” from low-level news outlets to mainstream, and
  • Trolling others with asocial behavior.

teenagers in Veles, Macedonia who profited around 16K dollars per month via Google’s AdSense from Facebook post engagements

a long history of mistrust with mainstream media

If you’re a college instructor of communications or teach digital literacy as a librarian, see the corresponding syllabus for this article. It provides discussion questions and assignments for teaching students about media manipulation. To teach your students how to combat fake news online, see my post on Navigating Post-Truth Societies: Strategies, Resources, and Technologies.

+++++++++
more on fake news in this iMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

hi ed leaders and blockchain

3 steps higher ed leaders should take before investing in blockchain

Aug. 9, 2018
  • Blockchain will have the biggest value in higher education in areas where trust is essential to the value chain in institutional operations, such as evaluation of student transcripts, processing of applications and maintenance of articulation agreements, said Oral Roberts University CIO Michael Mathews, at The Blockchain in Education Conference hosted by the institution in May, reports Campus Technology.
  • From an infrastructure standpoint, Mathews said institutions have to establish a secure digital identity by investing in software that allows the credential recipient and granter to have a seamless and trusted connection, allowing for students to have a diploma that is stored safely within their digital wallet. This could mean working with a third-party application developer or developing the capability in-house.
  • But before fully investing in blockchain, higher education leaders must take these steps, said Mathews:
    • Spend a significant amount of time researching how the technology is impacting the industry and educate staff about it;
    • test the technology to see if it follows validation and security procedures; and
    • collaborate with other institutions to share best tips and practices.

++++++++++
more on blockchain in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain+education

VWMOOC18

https://docs.google.com/document/d/1dVtIha1-P1t6t7GEFjzGYd8aegU_OVzRQM-BHzxYwNg/edit

VWMOOC18 August 1-31, 2018

Excerpts from the program

Sun.

August 5

12NOON SLT CVL Librarians Networking Forum at Community Virtual Library How can librarians help educators in virtual worlds?

Held at CVL main library SLurl:

http://maps.secondlife.com/secondlife/Cookie/206/219/21

Embedded librarianship holds potential for immersive learning.  Come learn how to promote your virtual world communities and the great work of educators in virtual worlds through networking.  https://communityvirtuallibrary.wordpress.com/

 

Fri. August 10 12pm SLT Dieter Heyne (Edward Tarber) Web Based Virtual Worlds in Education Organizing collaboration for 400 students in a web based virtual learning environment. Setting up a “synthetic” college.

In the VWMOOC HQ: http://maps.secondlife.com/secondlife/Madhupak/113/66/62

Sat. August 11 Noon SLT /

3pm Eastern

Lyr Lobo, Cynthia Calongne

Kae Novak (SL: Kavon Zenovka, WoW: Maskirovka)

Chris Luchs (SL: Abacus Capellini, WoW: Cheerwine)

What Can We Learn from the World of Warcraft? Join us as we host a blended reality session featuring a live stream from the World of Warcraft (WoW) as we explore educational opportunities in a massive multiplayer online roleplaying game (MMORPG). We will have a YouTube live stream, a Discord channel for voice discussion, and an immersive event in WoW. Educators from the International Society for Technology in Education – Games and Simulations Network (ISTE G&SN) will host an immersive event & discuss learning in a multiuser virtual environment (MUVE).

To join us in WoW: visit this site: https://worldofwarcraft.com/en-us/news/3128270

Click Try for Free and download the Blizzard Launcher, which manages the download. You’ll need 52GB for the game. Create an account, select Sisters of Elune realm and create a troll if you are new to WoW and using a Free Trial account.

Location: In the World of Warcraft and for those who do not have the game, over a YouTube Live stream (available that day) and hosted after the event over https://www.youtube.com/user/gamesmooc/videos

 

Friday

August 17

9 am slt Lynne Berrett (Wisdomseeker) Howard Gardner’s “Theory of Multiple Intelligences” explored through an Interactive, Immersive Experience in Second Life Dr. Gardner has proposed 8 different types of intelligence, ranging from Interpersonal to Kinesthetic. Join us to discover your own most innate type. You may be surprised, like many of the teachers who have tried this challenge as part of our whole-brain training program.

http://maps.secondlife.com/secondlife/Inspiration%20Island/48/54/22

Fri. August 17 Noon SLT Mark Childs (Gann McGann) Theatrical performances in virtual worlds This is a summary of various performance-based activities in Second Life and how performance studies can provide an insight into the experience of virtual worlds.

Presented in the VWMOOC HQ: http://maps.secondlife.com/secondlife/Madhupak/113/66/62

thermal imaging

***** thank you Tirthankar ! ******* : https://www.linkedin.com/feed/update/urn:li:activity:6424443573785235456

Recovering Keyboard Inputs through Thermal Imaging

https://www.schneier.com/blog/archives/2018/07/recovering_keyb.html

Researchers at the University of California, Irvine, are able to recover user passwords by way of thermal imaging. The tech is pretty straightforward, but it’s interesting to think about the types of scenarios in which it might be pulled off.

+++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

social media adoption education

Arshad, M., & Akram, M. S. (2018). Social Media Adoption by the Academic Community: Theoretical Insights and Empirical Evidence From Developing Countries. The International Review of Research in Open and Distributed Learning, 19(3). Retrieved from http://www.irrodl.org/index.php/irrodl/article/view/3500
Building on the social constructivist paradigm and technology acceptance model, we propose a conceptual model to assess social media adoption in academia by incorporating collaboration, communication, and resource sharing as predictors of social media adoption, whereas perceived ease of use and perceived usefulness act as mediators in this relationship.
According to the latest social media statistics, there are more than 2 billion Facebook users, more than 300 million Twitter users, more than 500 million Google+ users, and more than 400 million LinkedIn users (InternetLiveStats, 2018).
although social media is rapidly penetrating into the society, there is no consensus in the literature on the drivers of social media adoption in an academic context. Moreover, it is not clear how social media can impact academic performance.
Social media platforms have significant capability to support the social constructivist paradigm that promotes collaborative learning (Vygotsky, 1978).
+++++++++++++
technology acceptance model (https://en.wikipedia.org/wiki/Technology_acceptance_model):
  • Perceived usefulness (PU) – This was defined by Fred Davis as “the degree to which a person believes that using a particular system would enhance his or her job performance“.
  • Perceived ease-of-use (PEOU) – Davis defined this as “the degree to which a person believes that using a particular system would be free from effort” (Davis 1989).

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW. MIS Quarterly27(3), 425-478.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d10758835%26site%3dehost-live%26scope%3dsite
++++++++++++++

proposing a Social Media Adoption Model (SMAM) for the academic community

Social media platforms provide an easy alternative, to the academic community, as compared to official communications such as email and blackboard. my note: this has been established as long as back as in 2006 – https://www.chronicle.com/article/E-Mail-is-for-Old-People/4169. Around the time, when SCSU announced email as the “formal mode of communication).Thus, it is emerging as a new communication and collaboration tool among the academic community in higher education institutions (Roblyer, McDaniel, Webb, Herman, & Witty, 2010). Social media has greatly changed the communication/feedback environment by introducing technologies that have modified the educational perspective of learning and interacting (Prensky, 2001).

++++++++++++++
Theory of Reasoned Action : https://en.wikipedia.org/wiki/Theory_of_reasoned_action
++++++++++++++++++++

the Theory of Reasoned Action (Fishbein & Ajzen, 1975) and the Technology Acceptance Model (Davis, 1989) have been used to assess individuals’ acceptance and use of technology. According to the Technology Acceptance Model, perceived usefulness and perceived ease are the main determinants of an individual’s behavioral intentions and actual usage (Davis, 1989).

Perceived usefulness, derived from the Technology Acceptance Model (TAM), is the particular level that an individual perceives that they can improve their job performance or create ease in attaining the targeted goals by using an information system. It is also believed to make an individual free from mental pressure (Davis, 1989).

Perceived ease of use can be defined as the level to which an individual believes that using a specific system will make a task easier (Gruzd, Staves, & Wilk, 2012) and will reduce mental exertion (Davis, 1989). Venkatesh (2000) posits this construct as a vital element in determining a user’s behavior toward technology. Though generally, there is consensus on the positive effect of perceived ease of use and perceived usefulness on users’ attitude towards social media, it is not yet clear which one of these is more relevant in explaining users’ attitude towards social media in the academic community (Lowry, 2002). Perceived ease of use is one of the eminent behavioral beliefs affecting the users’ intention toward technology acceptance (Lu et al., 2005). The literature suggests that perceived ease of use of technology develops a positive attitude toward its usage (Davis, 1989).

Collaborative learning is considered as an essential instructional method as it assists in overcoming the communication gap among the academic community (Bernard, Rubalcava, & St-Pierre, 2000). The academic community utilizes various social media platforms with the intention to socialize and communicate with others and to share common interests (Sánchez et al., 2014; Sobaih et al., 2016). The exchange of information through social media platforms help the academic community to develop an easy and effective communication among classmates and colleagues (Kaplan & Haenlein, 2010). Social media platforms can also help in developing communities of practice that may help improve collaboration and communication among members of the community (Sánchez et al., 2014). Evidence from previous work confirms that social media platforms are beneficial to college and university students for education purposes (Forkosh-Baruch & Hershkovitz, 2012). Due to the intrinsic ease of use and usefulness of social media, academics are regularly using information and communication technologies, especially social media, for collaboration with colleagues in one way or the other (Koh & Lim, 2012; Wang, 2010).

++++++++++++++++
more about social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

SCSU at 2018 LITA Library Technology Forum

++++++++++++++
On behalf of the 2018 LITA Library Technology Forum Committee, I am pleased to notify you that your proposal, “Virtual Reality (VR) and Augmented Reality (AR) for Library Orientation: A Scalable Approach to Implementing VR/AR/MR in Education”, has been accepted for presentation at the 2018 LITA Library Technology Forum in Minneapolis, Minnesota (November 8-10).
++++++++++++++
Mark Gill and Plamen Miltenoff will participate in a round table discussion Friday. November 9, 3:30PM at Haytt Regency, Minneapolis, MN. We will stream live on Facebook: https://www.facebook.com/InforMediaServices/

SCSU Augmented Reality Library Tour from Plamen Miltenoff

++++++++++++++++

Notes from the Forum

Risk and Reward: Public Interest and the Public Good at the Intersection of Law, Tech, and Libraries

https://thatandromeda.github.io/forum18_schedule/

Blog: Copyright Librarian; Twitter: @CopyrightLibn

U of MN has a person, whose entire job is to read and negotiate contracts with vendors. No resources, not comfortable to negotiate contracts and vendors use this.

If you can’t open it, you don’t own it. if it is not ours… we don’t get what we don’t ask for.

libraries are now developing plenty, but if something is brought in, so stop analytics over people. Google Analytics collects data, which is very valuable for students. bring coherent rink of services around students and show money saving. it is not possible to make a number of copyright savings. collecting such data must be in the library, not outside. Data that is collected, will be put to use. Data that is collected, will be put to uses that challenge library values. Data puts people at risk. anonymized data is not anonymous. rethink our relationship to data. data sensitivity is contextual.

stop requiring MLSs for a lot of position. not PhDs in English, but people with specific skills.

perspective taking does not help you understand what others want.  connection to tech. user testing – personas (imagining one’s perspective). we need to ask, better employ the people we want to understand. in regard of this, our profession is worse then other professions.

pay more is important to restore value of the profession.

https://docs.google.com/document/d/1lLHP2TZnmrRodSdulPPOruEeF20iwF5zw6h5aOV8ogg/edit

++++++++++++

Library System Migrations: Issues and Solutions 

https://drive.google.com/open?id=109w_NU3zki_A6Fukpa50zzGJdgazbVSKqf7zAoYaKsc

from Sierra to Alma. SFX. number of challenges

Stanford – Folio, Cornell, Duke and several others. https://www.folio.org/ Alma too locked up for Stanford.

Easy Proxy for Alma Primo

Voyager to OCLC. Archive space from in-house to vendor. Migration

Polaris, payments, scheduling, PC sign up.  Symphony, but discussing migration to Polaris to share ILS. COntent Diem. EasyProxy, from Millenium no Discovery Layer to Koha and EDS. ILL.

WMS to Alma. Illinois State – CARLY – from Voyager to Alma Primo. COntent Diem, Dynex to Koha.

Princeton: Voyager, migrating Alma and FOlio. Ex Libris. Finances migrate to PeopleSoft. SFX. Intota

RFPs – Request for Proposals stage. cloud and self-hosted bid.

Data Preparation. all data is standard, consistent. divorce package for vendors (preparing data to be exported (~10K). the less to migrate, the better, so prioritize chunks of data (clean up the data)

Data. overwhelming for the non-tech services. so a story is welcome. Design and Admin background, not librarian background, big picture, being not a librarian helps not stuck with the manusha (particular records)

teams and committees – how to compile a great team. who makes the decision. ORCHID integration. Blog or OneNote place to share information. touch base with everyone before they come to the meeting. the preplanning makes large meetings more productive.

+++++++++++++

Using Design Thinking — Do we really want a makerspace? 

makerbot replicator 3d printer

one touch studio 4 ready record studio. data analytics + several rooms to schedule.

lighting turned on when USB drive inserted.

++++++++++++++

Article Shortcuts 

2:30 – 2:50

Talk To the Phone (Because the Human Is Overwhelmed) 

Google physical web beacons, NFC lables, QR codes, Augmented Reality. magnetic position. nearby navigations

 

1 53 54 55 56 57 114