ELI Webinar | Reading & Digesting Scholarly Research: Tips to Save Time While Increasing Understanding
Tuesday, February 26 | 1:00p.m. – 2:00p.m. ET | Online
Reading and digesting scholarly research can be challenging when new journal issues, reports, and books are being released every day. Join Katie Linder, director of research for Oregon State University Ecampus, to learn some tips that will help you find scholarly research that’s applicable to your work, read that research more efficiently, evaluate the quality of scholarly research, and decide on the applicability of the research you’re reading to your day-to-day work. You’ll also have the opportunity to ask any questions you might have about reading and digesting scholarly research.
Find the scholarly research that is of most importance to your work
Read scholarly research efficiently
Evaluate the quality of scholarly research
Decide when and how to apply scholarly research results in your work
Roskomnadzor has also exerted pressure on Google to remove certain sites on Russian searches.
Director of National Intelligence Dan Coats told Congress last month that Russia, as well as other foreign actors, will increasingly use cyber operations to “threaten both minds and machines in an expanding number of ways—to steal information, to influence our citizens, or to disrupt critical infrastructure.”
We can build robot teachers, or even robot teaching assistants. But should we?
the Chinese government has declared a national goal of surpassing the U.S. in AI technology by the year 2030, so there is almost a Sputnik-like push for the tech going on right now in China. At the same time, China is also facing a shortage of qualified teachers in many rural areas, and there’s a huge demand for high-quality language teachers and tutors throughout the country.
interview with Christopher Loss, one of the editors.
What role does technology play in some of the convergences that occur or are happening?
There’s a great essay in the collection by June Ahn, which deals with the idea of technology as a key mediating source and mechanism for the creation of various kinds of convergences between and among different sectors (my note: K12 and higher ed).
Americans like to see themselves as among the best in the world in education. But lately, the education leaders have been looking abroad for ideas, I think. What can we learn from countries that do have closer links between K-12 and higher ed?
Remember that a blockchain is an immutable, sequential chain of records called Blocks. They can contain transactions, files or any data you like, really. But the important thing is that they’re chained together using hashes.
Twenty years have passed since renowned Harvard Professor Larry Lessig coined the phrase “Code is Law”, suggesting that in the digital age, computer code regulates behavior much like legislative code traditionally did.These days, the computer code that powers artificial intelligence (AI) is a salient example of Lessig’s statement.
Good AI requires sound data.One of the principles,some would say the organizing principle, of privacy and data protection frameworks is data minimization.Data protection laws require organizations to limit data collection to the extent strictly necessary and retain data only so long as it is needed for its stated goal.
Preventing discrimination – intentional or not.
When is a distinction between groups permissible or even merited and when is it untoward? How should organizations address historically entrenched inequalities that are embedded in data? New mathematical theories such as “fairness through awareness” enable sophisticated modeling to guarantee statistical parity between groups.
Assuring explainability – technological due process.In privacy and freedom of information frameworks alike, transparency has traditionally been a bulwark against unfairness and discrimination.As Justice Brandeis once wrote, “Sunlight is the best of disinfectants.”
Deep learning means that iterative computer programs derive conclusions for reasons that may not be evident even after forensic inquiry.
Yet even with code as law and a rising need for law in code, policymakers do not need to become mathematicians, engineers and coders.Instead, institutions must develop and enhance their technical toolbox by hiring experts and consulting with top academics, industry researchers and civil society voices.Responsible AI requires access to not only lawyers, ethicists and philosophers but also to technical leaders and subject matter experts to ensure an appropriate balance between economic and scientific benefits to society on the one hand and individual rights and freedoms on the other hand.
The writer Zadie Smith laid into identity politics in a headline session at the 14th Hay Cartagena festival, insisting novelists had not only a right, but a duty to be free.
She conceded that the assertion of a collective identity was sometimes necessary “to demand rights”, but cited the dismay of her husband – the poet and novelist Nick Laird – at finding himself increasingly categorised. “He turned to me and said: ‘I used to be myself and I’m now white guy, white guy.’ I said: ‘Finally, you understand.’
She went on to question the role of social media in policing personal development.
to the issue of political correctness, she reflected on her debut novel White Teeth, which had depicted characters from many backgrounds but, she said, had been given an easy ride by the white critics because “[its characters] were mostly brown.
citing Gustave Flaubert’s Madame Bovary as an example of the power of the reprobate imagination. “Women have felt very close to these fake, pretend women invented by men. It makes us feel uncomfortable in real life. This is not real life. It’s perverse, but it’s what’s possible in fiction. There’s no excuse for its irresponsibility, but fiction is fundamentally irresponsible.”
For abstainers, breaking up with Facebook freed up about an hour a day, on average, and more than twice that for the heaviest users.
research led by Ethan Kross, a professor of psychology at the University of Michigan, has found that high levels of passive browsing on social media predict lowered moods, compared to more active engagement.
Gartner predicts that nearly 38 percent of companies will stop providing devices to workers by 2017 — but 20 percent of those BYOD programs will fail because of overly restrictive mobile device management measures. So how can IT pros devise a BYOD strategy that stays afloat? Here are six guidelines to accommodate legitimate IT concerns without sinking a policy’s odds of success:
Look to Existing Policies
Before creating a BYOD policy, take a look at existing HR and legal procedures. Many email, VPN, and remote access security policies can be applied to mobile devices, as well.
Provide Training and Education
Employees are using personal devices at work, whether the company realizes it or not. But that doesn’t mean they are using them correctly. Employees often use file-sharing and other tools of their choosing without IT’s knowledge, which could put sensitive corporate data at risk. Use a BYOD policy to trainemployees how to correctly use their applications
BYOD isn’t limited to smartphones. According to Gartner, a “new norm” is emerging in which employees manage up to four or five devices at work.
Enforce Passwords and Encryption
passwords aren’t foolprool. Data encryption is an additional security measure
Employees often fail to realize that all data on their devices is discoverable, regardless of whether the device is personal or company-owned. The question of who owns what is still a legal gray area, though companies increasingly take the liberty to remote wipe employees’ personal devices once they leave their job. Avoid the guessing game with a clear exit strategy.