Archive of ‘Library and information science’ category

digital literacy Confucius Institute

Plan for Fall 2018

August 23, 2018.

My name is Plamen Miltenoff and I will be assisting in your instruction today: Here is more about me: http://web.stcloudstate.edu/pmiltenoff/faculty/ and more about the issues we will be discussing today: https://blog.stcloudstate.edu/ims/
As well as my email address for further contacts: pmiltenoff@stcloudstate.edu

  1. Social Media for 2018
    1. WeChat and the connection to other social media
      1. building a community on WeChat
    2. SCSU Edublog http://blog.stcloudstate.edu/ci/
      1. the idea of a blog. the advantages compared to SM such as WeChat / Facebook
    3. Reflections
      1. Multimedia
    4. Connecting blogs to social media (WeChat and similar)
  2. Digital Literacy instruction
    1. what is digital literacy and how does it differ from other literacies? Why is it important?
      What other literacies must be considered when speaking about DL? E.g. media literacy: https://blog.stcloudstate.edu/ims?s=media+literacy
    2. Internet Resources
        1. How do we search?
          1. Google and Google Scholar (more focused, peer reviewed, academic content)
          2. Digg http://digg.com/, Reddit https://www.reddit.com/ , Quora https://www.quora.com/
          3. SCSU Library search, Google, Professional organization, (NASSP), Stacks of magazines, csu library info, but need to know what all of the options mean on that page
        2. Custom Search Engine:
          https://blog.stcloudstate.edu/ims/2017/11/17/google-custom-search-engine/
        3. Basic electronic (library) search information and strategies. Library research services
          https://www.semanticscholar.org/
        4. subject guide 3
        5. –Strategies for conducting advanced searches (setting up filters and search criteria)Filtersfilters
        6. ++++++++++++++++
          Search criteriasearch_criteria

      sdfgsdfg

    3. citation management software to organize bibliographic information
    4. Refworkhttps://www.refworks.com/refworks2/default.aspx?r=authentication::init&groupcode=RWStCloudSU
    5. Alternatives to Refworks (currently retired):
      1. Zotero, Mendeley, Endnote
      2. Fast and easy bibliographic tools:
        https://blog.stcloudstate.edu/ims/2013/12/06/bibliographic-tools-fast-and-easy/

ordoliberalism

Germany’s iron cage

Germany adopted the social market system of economic rules separated from political democracy, known as ordoliberalism, after 1945; it was later used as the ideological basis of Europe Union economic policy.

by François Denord, Rachel Knaebel & Pierre Rimbert

https://mondediplo.com/2015/08/03ordoliberalism

Ordoliberals, like the Anglo-Saxon advocates of laissez-faire, believe the state should not distort the workings of the markets, but they also believe that free competition does not develop spontaneously. The state should establish a legal, technical, social, moral and cultural framework for the markets, and make sure everyone follows the rules.

The rise of ordoliberalism was part of a vast international renewal of liberal thought in the 1930s — neoliberalism. In this context, the ordos opposed those nostalgic for laissez-faire — Ludwig von Mises and his disciple Friedrich Hayek — who, Rüstow complained, “found nothing to criticise or to change in traditional liberalism.”

 

50 years since invasion Czechoslovakia

The Invasion of Czechoslovakia Through Women’s Eyes

https://www.rferl.org/a/invasion-of-czechoslovakia-through-womens-eyes/29442053.html

Fifty years ago, five Warsaw Pact nations invaded Czechoslovakia. Here are stories of four women who didn’t hesitate to act bravely during these days.

+++++++++++++++++
more on history in this IMS blog
https://blog.stcloudstate.edu/ims?s=history

AI tracks students writings

Schools are using AI to track what students write on their computers

By Simone Stolzoff August 19, 2018
50 million k-12 students in the US
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like GaggleSecurly, and GoGuardian to surface potentially worrisome communications to school administrators
In an age of mass school-shootings and increased student suicides, SMPs Safety Management Platforms can play a vital role in preventing harm before it happens. Each of these companies has case studies where an intercepted message helped save lives.
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal at Facebook and other recent data breaches from companies like Equifax, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety

+++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

more on surveillance  in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

Open Learning Open University

Open Learning, Educational Media: An Interview with Theo Bastiaens, Newly Appointed Rector Magnificus of Open University and Chair of AACE Edmedia Conference

Open Learning, Educational Media: An Interview with Theo Bastiaens, Newly Appointed Rector Magnificus of Open University and Chair of AACE Edmedia Conference

Since the Open University was founded in 1984, more than 250,000 students have enrolled in courses. The Open University offers courses of study at the bachelor’s and master’s degree levels in cultural studies, education science, law, management, psychology, science and technology. Five of its master’s degree programs were top-ranked in 2017

4CID ID Model  https://edutechwiki.unige.ch/en/4C-ID

http://www.nwlink.com/~donclark/hrd/learning/id/4c_id.html

  1. Learning Tasks — concrete, authentic, whole task experiences that are provided to learners in order to promote schema construction for non-recurrent aspects and, to a certain degree, rule automation by compilation for recurrent aspects. Instructional methods primarily aim at induction, that is, constructing schemata through mindful abstraction from the concrete experiences that are provided by the learning tasks. Design steps:
    • Design learning tasks
    • Sequence task practice
    • Set performance objectives
  2. Supportive Information — information that is supportive to the learning and performance of non-recurrent aspects of learning tasks. It provides the bridge between learners’ prior knowledge and the learning tasks. Instructional methods primarily aim at elaboration, that is, embellishing schemata by establishing nonarbitrary relationships between new elements and what learners already know. Design steps:
    • Design supportive information
    • Analyze cognitive strategies
    • Analyze mental models
  3. JIT Information — information that is prerequisite to the learning and performance of recurrent aspects of learning tasks. Instructional methods primarily aim at compilation through restricted encoding, that is, embedding procedural information in rules. JIT information is not only relevant to learning tasks but also to Part-time practice. Design steps:
    • Design procedural information
    • Analyze cognitive rules
    • Analyze prerequisite knowledge
  4. Part-task Practice — practice items that are provided to learners in order to promote rule automation for selected recurrent aspects of the whole complex skill. Instructional methods primarily aim at rule automation, including compilation and subsequent strengthening to reach a very high level of automatically. Design step:
    • Design part-task practice

++++++++++
more on open education in this IMS blog
https://blog.stcloudstate.edu/ims?s=open+education

Media Manipulation and Disinformation Online

A Review of ‘Media Manipulation and Disinformation Online’

In Media Manipulation and Disinformation Online, Marwick and Lewis (2017) of the Data & Society Research Institute described the agents of media manipulation, their modus operandi, motivators, and how they’ve taken advantage of the vulnerability of online media. The researchers described the manipulators as right-wing extremists (RWE), also known as alt-right, who run the gamut from sexists (including male sexual conquest communities) to white nationalists to anti-immigration activists and even those who rebuke RWE identification but whose actions confer such classification. These manipulators rally behind a shared belief on online forums, blogs, podcasts, and social media through pranks or ruinous trolling anonymity, usurping participatory culture methods (networking, humor, mentorship) for harassment, and competitive cyber brigades that earn status by escalating bullying such as the sharing of a target’s private information.

Marwick and Lewis reported on how RWE groups have taken advantage of certain media tactics to gain viewers’ attention such as novelty and sensationalism, as well as their interactions with the public via social media, to manipulate it for their agenda. For instance, YouTube provides any individual with a portal and potential revenue to contribute to the media ecosystem. The researchers shared the example of the use of YouTube by conspiracy theorists, which can be used as fodder for extremist networks as conspiracies generally focus on loss of control of important ideals, health, and safety.

One tactic they’re using is to package their hate in a way that appeals to millennials. They use attention hacking to increase their status such as hate speech, which is later recanted as trickster trolling all the while gaining the media’s attention for further propagation

SHARED MODUS OPERANDI

Marwick and Lewis reported the following shared tactics various RWE groups use for online exploits:

  • Ambiguity of persona or ideology,
  • Baiting a single or community target’s emotions,
  • Bots for amplification of propaganda that appears legitimately from a real person,
  • “…Embeddedness in Internet culture… (p. 28),”
  • Exploitation of young male rebelliousness,
  • Hate speech and offensive language (under the guise of First Amendment protections),
  • Irony to cloak ideology and/or skewer intended targets,
  • Memes for stickiness of propaganda,
  • Mentorship in argumentation, marketing strategies, and subversive literature in their communities of interest,
  • Networked and agile groups,
  • “…Permanent warfare… (p.12)” call to action,
  • Pseudo scholarship to deceive readers,
  • “…Quasi moral arguments… (p. 7)”
  • Shocking images for filtering network membership,
  • “Trading stories up the chain… (p. 38)” from low-level news outlets to mainstream, and
  • Trolling others with asocial behavior.

teenagers in Veles, Macedonia who profited around 16K dollars per month via Google’s AdSense from Facebook post engagements

a long history of mistrust with mainstream media

If you’re a college instructor of communications or teach digital literacy as a librarian, see the corresponding syllabus for this article. It provides discussion questions and assignments for teaching students about media manipulation. To teach your students how to combat fake news online, see my post on Navigating Post-Truth Societies: Strategies, Resources, and Technologies.

+++++++++
more on fake news in this iMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

hi ed leaders and blockchain

3 steps higher ed leaders should take before investing in blockchain

Aug. 9, 2018
  • Blockchain will have the biggest value in higher education in areas where trust is essential to the value chain in institutional operations, such as evaluation of student transcripts, processing of applications and maintenance of articulation agreements, said Oral Roberts University CIO Michael Mathews, at The Blockchain in Education Conference hosted by the institution in May, reports Campus Technology.
  • From an infrastructure standpoint, Mathews said institutions have to establish a secure digital identity by investing in software that allows the credential recipient and granter to have a seamless and trusted connection, allowing for students to have a diploma that is stored safely within their digital wallet. This could mean working with a third-party application developer or developing the capability in-house.
  • But before fully investing in blockchain, higher education leaders must take these steps, said Mathews:
    • Spend a significant amount of time researching how the technology is impacting the industry and educate staff about it;
    • test the technology to see if it follows validation and security procedures; and
    • collaborate with other institutions to share best tips and practices.

++++++++++
more on blockchain in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain+education

Digital Literacy for SPED 405

Digital Literacy for SPED 405. Behavior Theories and Practices in Special Education.

Instructor Mark Markell. mamarkell@stcloudstate.edu Mondays, 5:30 – 8:20 PM. SOE A235

Preliminary Plan for Monday, Sept 10, 5:45 PM to 8 PM

Introduction – who are the students in this class. About myself: http://web.stcloudstate.edu/pmiltenoff/faculty Contact info, “embedded” librarian idea – I am available to help during the semester with research and papers

about 40 min: Intro to the library: http://web.stcloudstate.edu/pmiltenoff/bi/
15 min for a Virtual Reality tours of the Library + quiz on how well they learned the library:
http://bit.ly/VRlib
and 360 degree video on BYOD:
Play a scavenger hunt IN THE LIBRARY: http://bit.ly/learnlib
The VR (virtual reality) and AR (augmented reality) component; why is it important?
why is this technology brought up to a SPED class?
https://blog.stcloudstate.edu/ims/2015/11/18/immersive-journalism/
autism: https://blog.stcloudstate.edu/ims/2018/09/10/sound-and-brain/
Social emotional learning
https://blog.stcloudstate.edu/ims/2018/05/31/vr-ar-sel-empathy/
(transition to the next topic – digital literacy)

about 50 min:

  1. Digital Literacy

How important is technology in our life? Profession?

https://blog.stcloudstate.edu/ims/2018/08/20/employee-evolution/

Do you think technology overlaps with the broad field of special education? How?
How do you define technology? What falls under “technology?”

What is “digital literacy?” Do we need to be literate in that sense? How does it differ from technology literacy?
https://blog.stcloudstate.edu/ims?s=digital+literacy

Additional readings on “digital literacy”
https://blog.stcloudstate.edu/ims/2017/08/23/nmc-digital-literacy/

Digital Citizenship: https://blog.stcloudstate.edu/ims/2015/10/19/digital-citizenship-info/
Play Kahoot: https://play.kahoot.it/#/k/e844253f-b5dd-4a91-b096-b6ff777e6dd7
Privacy and surveillance: how does these two issues affect your students? Does it affect them more? if so, how?  https://blog.stcloudstate.edu/ims/2018/08/21/ai-tracks-students-writings/

Social Media:
http://web.stcloudstate.edu/pmiltenoff/lib290/. if you want to survey the class, here is the FB group page: https://www.facebook.com/groups/LIB290/

Is Social Media part of digital literacy? Why? How SM can help us become more literate?

Digital Storytelling:
http://web.stcloudstate.edu/pmiltenoff/lib490/

How is digital storytelling essential in digital literacy?

about 50 min:

  1. Fake News and Research

Syllabus: Teaching Media Manipulation: https://datasociety.net/pubs/oh/DataAndSociety_Syllabus-MediaManipulationAndDisinformationOnline.pdf

#FakeNews is a very timely and controversial issue. in 2-3 min choose your best source on this issue. 1. Mind the prevalence of resources in the 21st century 2. Mind the necessity to evaluate a) the veracity of your courses b) the quality of your sources (the fact that they are “true” does not mean that they are the best). Be prepared to name your source and defend its quality.
How do you determine your sources? How do you decide the reliability of your sources? Are you sure you can distinguish “good” from “bad?”
Compare this entry https://en.wikipedia.org/wiki/List_of_fake_news_websites
to this entry: https://docs.google.com/document/d/10eA5-mCZLSS4MQY5QGb5ewC3VAL6pLkT53V_81ZyitM/preview to understand the scope

Do you know any fact checking sites? Can you identify spot sponsored content? Do you understand syndication? What do you understand under “media literacy,” “news literacy,” “information literacy.”  https://blog.stcloudstate.edu/ims/2017/03/28/fake-news-resources/

Why do we need to explore the “fake news” phenomenon? Do you find it relevant to your professional development?

Let’s watch another video and play this Kahoot: https://play.kahoot.it/#/k/21379a63-b67c-4897-a2cd-66e7d1c83027

So, how do we do academic research? Let’s play another Kahoot: https://play.kahoot.it/#/k/5e09bb66-4d87-44a5-af21-c8f3d7ce23de
If you to structure this Kahoot, what are the questions, you will ask? What are the main steps in achieving successful research for your paper?

  • Research using social media

what is social media (examples). why is called SM? why is so popular? what makes it so popular?

use SM tools for your research and education:

– Determining your topic. How to?
Digg http://digg.com/, Reddit https://www.reddit.com/ , Quora https://www.quora.com
Facebook, Twitter – hashtags (class assignment 2-3 min to search)
LinkedIn Groups
YouTube and Slideshare (class assignment 2-3 min to search)
Flickr, Instagram, Pinterest for visual aids (like YouTube they are media repositories)

Academia.com (https://www.academia.edu/Academia.edu, a paper-sharing social network that has been informally dubbed “Facebook for academics,” https://www.academia.edu/31942069_Facebook_for_Academics_The_Convergence_of_Self-Branding_and_Social_Media_Logic_on_Academia.edu

ResearchGate: https://www.researchgate.net/

– collecting and managing your resources:
Delicious https://del.icio.us/
Diigo: https://www.diigo.com/
Evernote: evernote.com OneNote (Microsoft)

blogs and wikis for collecting data and collaborating

– Managing and sharing your information:
Refworks,
Zotero https://www.zotero.org/,
Mendeley, https://www.mendeley.com/

– Testing your work against your peers (globally):

Wikipedia:
First step:Using Wikipedia.Second step: Contributing to Wikipedia (editing a page). Third step: Contributing to Wikipedia (creating a page)  https://www.evernote.com/shard/s101/sh/ef743d1a-4516-47fe-bc5b-408f29a9dcb9/52d79bfa20ee087900764eb6a407ec86

– presenting your information


please use this form to cast your feedback. Please feel free to fill out only the relevant questions:
http://bit.ly/imseval

1 97 98 99 100 101 220