more about youth teenagers and social media in this IMS blog
more about youth teenagers and social media in this IMS blog
Jimmy Song Bitcoin Educator, Developer and Entrepreneur/PGP Fingerprint: C1D7 97BE 7D10 5291 228C D70C
The main thing distinguishing a blockchain from a normal database is that there are specific rules about how to put data into the database. That is, it cannot conflict with some other data that’s already in the database (consistent), it’s append-only (immutable), and the data itself is locked to an owner (ownable), it’s replicable and available. Finally, everyone agrees on what the state of the things in the database are (canonical) without a central party (decentralized).
It is this last point that really is the holy grail of blockchain. Decentralization is very attractive because it implies there is no single point of failure.
Like it or not, the word “blockchain” has taken on a life of its own. Very few people actually understand what it is, but want to appear hip so use these words as a way to sound more intelligent. Just like “cloud” means someone else’s computer and “AI” means a tweaked algorithm, “blockchain” in this context means a slow, expensive database.“blockchain” is really just a way to get rid of the heavy apparatus of government regulation. This is overselling what blockchain can do. Blockchain doesn’t magically take away human conflict.
Most industries require new features or upgrades and the freedom to change and expand as necessary. Given that blockchains are hard to upgrade, hard to change and hard to scale, most industries don’t have much use for a blockchain. a lot of companies looking to use the blockchain are not really wanting a blockchain at all, but rather IT upgrades to their particular industry. This is all well and good, but using the word “blockchain” to get there is dishonest and overselling its capability.
more on blockchain in this IMS blgo
By Tanner Higgin 08/09/18
Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat. Schools must reckon with this reality and commit to supporting thoughtful and critical social media use among students, teachers and administrators. If not, schools and classrooms risk everything from digital distraction to privacy violations.
Social media policies, like policies in general, are meant to mitigate the risk and liability of institutions rather than guide and support sound pedagogy and student learning. They serve a valuable purpose, but not one that impacts classrooms. So how do we make these policies more relevant to classrooms?
First, it forces policy to get distilled into what impacts classroom instruction and administration. Second, social media changes monthly, and it’s much easier to update a faculty handbook than a policy document. Third, it allows you to align social media issues with other aspects of teaching (assessment, parent communication, etc.) versus separating it out in its own section.
more on social media in education in this IMS blog
more on social media policies in this IMS blog
Wednesday, October 10, 2018
Lori Kressin Kyle Shachmut Christian Vinten-Johansen Sue Cullen
ELI Educause : Technology Procurement for Accessibility PDF document
Despite general agreement among institutional leaders that they are obligated to provide accessible technology, efforts at many colleges and universities to fulfil that promise are often ad hoc, incomplete, or not fully implemented. Including accessibility requirements or guidance in institutional policies and practices for how technology is procured is one way for colleges and universities to demonstrate a commitment to ensuring equal access to information, programs, and activities and to comply with applicable legal requirements.
Due to decentralized purchasing and contracting practices, as well as the growing ecosystem of easy-to-deploy learning apps, applications and services are often deployed with little or no oversight from an accessibility perspective.
George Mason University, the university counsel, purchasing office, libraries, and IT services are collaborating to establish purchasing guidelines that ensure all IT purchases are reviewed for accessibility and conform to explicit standards and guidelines. The California State University system has developed system-wide vendor accessibility requirements, as well as an Equally Effective Alternate Access Plan (EEAAP) to address accessibility barriers while the product development team addresses remediation of those barriers (which are outlined in a product Accessibility Roadmap). Penn State University updated its policy for accessibility of electronic and information technology to reflect evolving standards and new best practices. The University of Washington uses a step-by-step checklist, including suggested language for contracts, to help users across campus ensure accessibility compliance in technology acquisitions. The University of Wisconsin–Madison tells stakeholders that they “must consider accessibility early and throughout the process as one of the criteria for [technology] acquisition.” As part of a process of “growing a culture of access,” Wichita State University has developed an in-depth Foundations of Accessibility course for staff and a technology audit rubric, among other tools
Consistent adherence to accessibility policies for technology purchases can be challenging because some technologies might need to be deployed even though they are not fully accessible.
Campus policies allowing decentralized technology purchases can create gray areas where buyers may be uncertain about—or may not even be aware of—their responsibilities to ensure that such purchases comply with institutional accessibility policies.
Changes in pedagogic practice to ensure broader adoption of accessible technology are tangible demonstrations of that enhanced awareness. Broader adoption of the principles of Universal Design for Learning may stimulate more institutions to be intentional about policies that ensure accessible technology purchases.
notes from the webinar
Nate Otto Concentration Sky @ottonomy https://badgr.com/
A Beginner’s Guide To Open Badges, https://elearningindustry.com/guide-to-open-badges-beginners
Mozilla discontinue and switch to Badgr platform. free accounts to Badgr. current integration of Mozilla backpack with other platforms such as Moddle will be preserved. Backpack solution, or issue badges.
Steve Taylor: Moodle is one of the platforms integrated with Backpack.
Xapi infrastructure. super messaging protocol https://xapi.com/ . Ryan Harrell question. Nate response, great fit for badging. Badgr Pathways https://badgr.com/en-us/badgr-pathway.html
According to the International Center for Academic Integrity, 58% of more than 70,000 students surveyed say they have plagiarized someone else’s ideas in their writing.
Plagiarism-detection software can address the most pressing needs of classroom educators faced with assessing students’ written work. Here’s how:
The Challenge: The larger the class is, and the more students that are in it, the longer it takes to review each written assignment—checking grammar, style, originality of ideas, etc. This is especially important when screening for plagiarism.
My note: this is NOT true. If the teacher is still lingering in the old habits of lecturing, this could be true. However, when a teacher gets into the habit of reviewing papers, s/he can detect as soon as in the first several paragraphs the discrepancies due to copy and paste of other work versus the student’s work.
In addition, if the teacher applies group work in her/his class, s/he can organize students to proofread each other’s work, thus teaching them actively about plagiarism, punctuation etc.
2. Evidence Must Be Reliable
The Challenge: When identifying plagiarism, teachers need to be confident in their assessment. Accusing students of academic dishonesty is a weighty claim; it can lead to their suspension or even expulsion from school.
My note: another myth perpetuated by industry searching for profit. Instead of looking at the process of plagiarism as punitive action, an educator will look at it as education and prevention. Prevention of plagiarism will never be successful, if the focus as in this article is on “suspension,” “expulsion,” etc. The goal of the teacher is NOT to catch the student, but to work with the student and understand the complexity of plagiarism.
3. Tools Must Be Easy to Use
My note: right, the goal is to make the teacher think as less as possible.
My note: PlagiarismCheck is the same as TurnitIn and all other tools, which seek profit, not education. Considering that plagiarism is a moving target (http://blog.stcloudstate.edu/ims/2016/01/10/plagiarism-or-collaboration/) and it is a concept first and secondly an action, the attempt to extract profits from the mechanization of this process is no less corrupt then the attempt to focus on profit (of education) rather then on education (itself)
more on plagiarism in this IMS blog
While it may take time to do this reflection, it can have many important benefits: 1) research shows that reflecting on experiences creates an environment in which insights and creativity can flourish; 2) taking a moment to consider the positive experiences (and to learn from the challenging ones) generates positive emotions which can benefit everyone during highly stressful moments in the semester; and 3) your experiences in narrative form provide insights to the committee beyond what is possible through surveys. This helps us to tailor the program in the future.
Here are a few questions/topics you should consider in your reflection:
I was not able to collaborate last year, but this year it has been perfect match with my ID2ID buddy Aura Lippincott. It is just marvelous to work with same-minded and driven person
We are well underway with one of our two projects – the VRrelax one the project each of us is teaming up with faculty and staff from our universities. We plan to roll out the test at the end of this month (October), do the research in November and compare notes and results in December. The project aims to establish if VR delivered by Oculus Go may have positive impact on stress reduction for students.
Our second project, the Open Learning one is also gathering speed; we intend to have a research topic determined by the end of the month, while we are gathering resources at the time being.
Each of us is in a daily contact with faculty and staff, searching for the right people to build a team. By mid September, we were able to start forming the research questions with the team and establish responsibilities and deadlines. We keep track of the progress via Google Docs: https://docs.google.com/document/d/1kOgqC7vUaBtOEDaB6ZF-ayEyVw2yBmB0fHXWrrcFkB4/edit and https://docs.google.com/document/d/1huFe1bPE08ha9acDLTsDkCz0blaxQ2bKKSxg97woGIY/edit
I have difficulty to pinpoint obstacles, because with a determined ID2ID partner and team members, all obstacles start to seem minuscules. We had discussions about the video content of the VR session, or the frequency of the testing and some of these issues is impossible to reconcile for two teams on different campuses, but again, they do not seem crucial when the team is driven by conviction to finish the research
In regard of the ELI Key issues
I see our work falling neatly under: digital and information literacy. The work through ID2ID seems as a intake of fresh air, since digital and information literacy is not considered in the stagnant 90-ish interpretation, as myopically imposed in the library where i work. Our project aims to assert digital literacy as understood by Educause.
To some degree, our work also falls under the ELI issue of “learning space design.” While we advocate for virtual learning spaces, as well as under the ELI issue “academic transformation and faculty development.” Both XR and open learning are ambitious trends, which inadvertently can meet resistance with their novelty and lack of track in former traditional methods of teaching and learning.
***** The student club, the Philosophical Society, has now been recognized by SCSU as a student organization ***
Could it be the case that a random decision is still better then predetermined one designed to minimize harm?
similar ethical considerations are raised also:
in this sitcom
https://www.theatlantic.com/sponsored/hpe-2018/the-ethics-of-ai/1865/ (full movie)
This TED talk:
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain,
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain, Privacy, Security, Surveilance
Keyword search: ethic* + Internet of Things = 31
Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical Design in the Internet of Things. Science & Engineering Ethics, 24(3), 905–925. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-016-9754-5
Berman, F., & Cerf, V. G. (2017). Social and Ethical Behavior in the Internet of Things. Communications of the ACM, 60(2), 6–7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3036698
Murdock, G. (2018). Media Materialties: For A Moral Economy of Machines. Journal of Communication, 68(2), 359–368. https://doi-org.libproxy.stcloudstate.edu/10.1093/joc/jqx023
Carrier, J. G. (2018). Moral economy: What’s in a name. Anthropological Theory, 18(1), 18–35. https://doi-org.libproxy.stcloudstate.edu/10.1177/1463499617735259
Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology. Canadian Public Administration, 57(2), 295–317. https://doi-org.libproxy.stcloudstate.edu/10.1111/capa.12069
Koucheryavy, Y., Kirichek, R., Glushakov, R., & Pirmagomedov, R. (2017). Quo vadis, humanity? Ethics on the last mile toward cybernetic organism. Russian Journal of Communication, 9(3), 287–293. https://doi-org.libproxy.stcloudstate.edu/10.1080/19409419.2017.1376561
Keyword search: ethic+ + autonomous vehicles = 46
Cerf, V. G. (2017). A Brittle and Fragile Future. Communications of the ACM, 60(7), 7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3102112
Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health, 107(4), 632–537. https://doi-org.libproxy.stcloudstate.edu/10.2105/AJPH.2016.303628
HARRIS, J. (2018). Who Owns My Autonomous Vehicle? Ethics and Responsibility in Artificial and Human Intelligence. Cambridge Quarterly of Healthcare Ethics, 27(4), 599–609. https://doi-org.libproxy.stcloudstate.edu/10.1017/S0963180118000038
Keeling, G. (2018). Legal Necessity, Pareto Efficiency & Justified Killing in Autonomous Vehicle Collisions. Ethical Theory & Moral Practice, 21(2), 413–427. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10677-018-9887-5
Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for Crashes of Autonomous Vehicles: An Ethical Analysis. Science & Engineering Ethics, 21(3), 619–630. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-014-9565-5
Getha-Taylor, H. (2017). The Problem with Automated Ethics. Public Integrity, 19(4), 299–300. https://doi-org.libproxy.stcloudstate.edu/10.1080/10999922.2016.1250575
Keyword search: ethic* + artificial intelligence = 349
Etzioni, A., & Etzioni, O. (2017). Incorporating Ethics into Artificial Intelligence. Journal of Ethics, 21(4), 403–418. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10892-017-9252-2
Köse, U. (2018). Are We Safe Enough in the Future of Artificial Intelligence? A Discussion on Machine Ethics and Artificial Intelligence Safety. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 9(2), 184–197. Retrieved from http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d129943455%26site%3dehost-live%26scope%3dsite
Keynote presentations will explore the future of driving and the evolution and potential of automated vehicle technologies.
more on AI in this IMS blog
AI and autonomous cars as ALA discussion topic
and privacy concerns
the call of the German scientists on ethics and AI
AI in the race for world dominance
Meghan Daum Aug 24 https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059
the standard set of middle-class Democratic Party values: Public safety nets were a force for good, corporate greed was a real threat, civil and reproductive rights were paramount.
I remember how good it felt to stand with my friends in our matching college sweatshirts shouting “never again!” and “my body, my choice!”
(hey, why shouldn’t Sarah Palin call herself a feminist?) brought angry letters from liberals as well as conservatives.
We would all go to the mat for women’s rights, gay rights, or pretty much any rights other than gun rights. We lived, for the most part, in big cities in blue states.
When Barack Obama came into the picture, we loved him with the delirium of crushed-out teenagers, perhaps less for his policies than for being the kind of person who also listens to NPR. We loved Hillary Clinton with the fraught resignation of a daughter’s love for her mother. We loved her even if we didn’t like her. We were liberals, after all. We were family.
Words like “mansplaining” and “gaslighting” were suddenly in heavy rotation, often invoked with such elasticity as to render them nearly meaningless. Similarly, the term “woke,” which originated in black activism, was being now used to draw a bright line between those on the right side of things and those on the wrong side of things.
From the Black Guys on Bloggingheads, YouTube’s algorithms bounced me along a path of similarly unapologetic thought criminals: the neuroscientist Sam Harris and his Waking Up podcast; Christina Hoff Sommers, aka “The Factual Feminist”; the comedian turned YouTube interviewer Dave Rubin; the counter-extremist activist Maajid Nawaz; and a cantankerous and then little-known Canadian psychology professor named Jordan Peterson, who railed against authoritarianism on both the left and right but reserved special disdain for postmodernism, which he believed was eroding rational thought on campuses and elsewhere.
the sudden national obsession with female endangerment on college campuses struck me much the same way it had in the early 1990s: well-intended but ultimately infantilizing to women and essentially unfeminist.
Weinstein and his wife, the evolutionary biologist Heather Heying, who also taught at Evergreen, would eventually leave the school and go on to become core members of the “intellectual dark web.”
Weinstein talked about intellectual “feebleness” in academia and in the media, about the demise of nuance, about still considering himself a progressive despite his feeling that the far left was no better at offering practical solutions to the world’s problems than the far right.
an American Enterprise Institute video of Sommers, the Factual Feminist, in conversation with the scholar and social critic Camille Paglia — “My generation fought for the freedom for women to risk getting raped!” I watched yet another video in which Paglia sat by herself and expounded volcanically about the patriarchal history of art (she was all for it).
the brothers sat down together for a two-hour, 47-minute interview on theRubin Report,
James Baldwin’s line, “I love America more than any other country in the world, and, exactly for this reason, I insist on the right to criticize her perpetually
Jordan Peterson Twelve Rules for Life: An Antidote for Chaos, is a sort of New and Improved Testament for the purpose-lacking young person (often but not always male) for whom tough-love directives like “clean up your room!” go down a lot easier when dispensed with a Jungian, evo-psych panache.
Quillette, a new online magazine that billed itself as “a platform for free thought”
the more honest we are about what we think, the more we’re alone with our thoughts. Just as you can’t fight Trumpism with tribalism, you can’t fight tribalism with a tribe.
Jan 5, 2017danah boyd
Understanding what sources to trust is a basic tenet of media literacy education.
Think about how this might play out in communities where the “liberal media” is viewed with disdain as an untrustworthy source of information…or in those where science is seen as contradicting the knowledge of religious people…or where degrees are viewed as a weapon of the elite to justify oppression of working people. Needless to say, not everyone agrees on what makes a trusted source.
Students are also encouraged to reflect on economic and political incentives that might bias reporting. Follow the money, they are told. Now watch what happens when they are given a list of names of major power players in the East Coast news media whose names are all clearly Jewish. Welcome to an opening for anti-Semitic ideology.
In the United States, we believe that worthy people lift themselves up by their bootstraps. This is our idea of freedom. To take away the power of individuals to control their own destiny is viewed as anti-American by so much of this country. You are your own master.
Children are indoctrinated into this cultural logic early, even as their parents restrict their mobility and limit their access to social situations. But when it comes to information, they are taught that they are the sole proprietors of knowledge. All they have to do is “do the research” for themselves and they will know better than anyone what is real.
Combine this with a deep distrust of media sources.
Many marginalized groups are justifiably angry about the ways in which their stories have been dismissed by mainstream media for decades.It took five days for major news outlets to cover Ferguson. It took months and a lot of celebrities for journalists to start discussing the Dakota Pipeline. But feeling marginalized from news media isn’t just about people of color.
Keep in mind that anti-vaxxers aren’t arguing that vaccinations definitively cause autism. They are arguing that we don’t know. They are arguing that experts are forcing children to be vaccinated against their will, which sounds like oppression. What they want is choice — the choice to not vaccinate. And they want information about the risks of vaccination, which they feel are not being given to them. In essence, they are doing what we taught them to do: questioning information sources and raising doubts about the incentives of those who are pushing a single message. Doubt has become tool.
Addressing so-called fake news is going to require a lot more than labeling. It’s going to require a cultural change about how we make sense of information, whom we trust, and how we understand our own role in grappling with information. Quick and easy solutions may make the controversy go away, but they won’t address the underlying problems.
In the United States, we’re moving towards tribalism (see Fukuyama), and we’re undoing the social fabric of our country through polarization, distrust, and self-segregation.
John Palfrey, Urs Gasser: Born Digital
Digital Natives share a common global culture that is defined not by age, strictly, but by certain attributes and experience related to how they interact with information technologies, information itself, one another, and other people and institutions. Those who were not “born digital’ can be just as connected, if not more so, than their younger counterparts. And not everyone born since, say 1982, happens to be a digital native.” (see also http://blog.stcloudstate.edu/ims/2018/04/15/no-millennials-gen-z-gen-x/
the intellectual dark web
more on media literacy in this IMS blog
fake news in this IMS blog
1 2 3 … 129 Next