a study, the “Why We Post” project, has just been published by nine anthropologists, led by Daniel Miller of University College, London. worked independently for 15 months at locations in Brazil, Britain, Chile, China (one rural and one industrial site), India, Italy, Trinidad and Tobago, and Turkey.
In rural China and Turkey social media were viewed as a distraction from education. But in industrial China and Brazil they were seen to be an educational resource. Such a divide was evident in India, too. There, high-income families regarded them with suspicion but low-income families advocated them as a supplementary source of schooling. In Britain, meanwhile, they were valued not directly as a means of education, but as a way for pupils, parents and teachers to communicate.
How would you answer if addressed by this study? How do you see social media?
On a recent visit in 2015, I found the social media landscape dramatically changed, again. Facebook began actively steering reading practices through changes in 2013 to the News Feed algorithm, which determines content in the site’s central feature. That year, Facebook announced an effort to prioritize “high quality content,” defined as timely, relevant, and trustworthy—and not clickbait, memes, or other viral links. This policy, along with changing practices in sharing news content generally, meant that current events can unfold on and through social media.
how much of your news do you acquire through social media? do you trust the information you acquire through social media? #FakeNews – have explored this hashtag? What is your take on fake news?
meaning management :
Anthropologists and the culturally sensitive analysts take complex bits of data and develop a higher-order sense of them. Information and meaning work at cross purposes. In managing meaning, context is everything while in managing information context is error and noise. When we give our social listening projects to information specialists, we lose an appreciation of context and with it the ability to extract the meanings that provide insight for our companies and brands.
Meaning management also involves a deeper appreciation of social listening as a component of a broader meaning-making system, rather than as, simply, a data source to be exploited.
How do you perceive meaning management? Do you see yourself being a professional with the ability to collect, analyze and interpret such data for your company?
Students will be introduced to exercises, experiences, and assignments, which focus on developing student’s classroom engagement, empowerment, critical awareness of media, civic engagement, and adoption of a social justice agenda. The guide enables students to work with faculty to produce GCMLP Webpage content, which can be consumed by the public to help expand citizen’s understanding of key events and processes in the global society. Furthermore, participating students will be granted academic and employment opportunities through the GCMLP, so they can be equitable participants in the 21st century economy.
more on fake news in this IMS blog http://blog.stcloudstate.edu/ims?s=fake+news
The Charles G. Koch Foundation offered to give the university $1.5 million to hire two assistant professors and fund fellowships and undergraduate curriculum on free-enterprise topics.
“In exchange for his ‘gift,’ the donor got to assign specific readings, select speakers brought to campus and instruct them with regard to the focus of their lectures, shape the curriculum with new courses and specify the number of students in the courses, name the program’s director, and initiate a student club.”
How the Koch Brothers Are Influencing U.S. Colleges
It is well-known that the Kochs’ network has invested hundreds of millions of hard-to-track dollars in conservative political nonprofits that influence elections. The brothers, who earned theirbillions leading private oil, chemical, and manufacturing conglomerate Koch Industries Inc., were dominant forces in recent election cycles
The Kochs educational giving, while rarefied, isn’t the most abundant in the United States. Gordon Moore, the co-founder of Intel, with his wife Betty, this year pledged $100 million to the California Institute of Technology—and offered to let the school to spend it as it sees fit.
At the College of Charleston in South Carolina, for example, documents show the foundation wanted more than just academic excellence for its money. It wanted information about students it could potentially use for its own benefit
Among the proposed conditions: Teachings must align with the libertarian economic philosophy of Charles Koch, the Charles Koch Foundation would maintain partial control over faculty hiring and the chairman of the school’s economics department—a prominent economic theorist—must stay in place for another three years despite his plans to step down.
Florida State University ultimately didn’t agree to the initial requests when, in 2008, it reached a funding agreement with the foundation. It’s also tightened and clarified policies that affect private donors’ contributions to the university.
To Charles Koch, Universities Are Propaganda Machines
This means that you’ll no longer have to deal with nerve-wracking copy-and-paste headaches since all formatting preferences from Docs will automatically be applied to the copy in WordPress.
But more importantly: You’ll also be able to edit pieces with partners and colleagues simultaneously and follow the changes they make in real-time.
The nifty integration will be available for any WordPress.com blog as well as any WordPress.org website equipped with the Jetpack plugin. All you have to do to enable it is authorize the add-on with access to your blog by signing up to your WordPress account.
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
how data is produced, collected and analyzed. make accessible all kind of data and info
ask good q/s and find good answers, share finding in meaningful ways. this is where digital literacy overshadows information literacy and this the fact that SCSU library does not understand; besides teaching students how to find and evaluate data, I also teach them how to communicate effectively using electronic tools.
connecting people tools and resources and making it easier for everybody. building collaborative, open and interdisciplinary
robust data computational literates. developing workshops, project and events to practice new skills. to position the library as the interdisciplinary nexus
what are data: definition. items of information, facts, traces of content and form. higher level, conception discussion about data in terms of social effects: matadata capturing information about the world, social political and economic changes. move away the mystic conceptions about data. nothing objective about data.
the emergence of IoT – digital meets physical. cyber physical systems. smart objects driven by industry. . proliferation of sensor and device – smart devices.
what does privacy looks like ? what is netneutrality when IoT? library must restructure : collaborate across institutions about collections of data in opien and participatory ways. put IoT in the hands of make and break things (she is maker space aficionado)
make and break things hackathons – use cheap devices such as Arduino and Pi.
data literacy programs with higher level conception exploration; libraries empower the campus in data collection. data science norms, store and share data to existing repositories and even catalogs. commercial services to store and connect data, but very restrictive and this is why libraries must be involved.
linked data and dark data
linked data – draw connections around online data most of the data are locked. linked data uses metadata to link related information in ways computers can understand.
libraries take advantage of link data. link data opportunity for semantics, natural language processing etc. if hidden data is relative to our communities, it is a library responsibility to provide it. community data practitioners
massive data, which cannot be analyzed by relational processing. data not yield significant findings. might be valuable for researchers: one persons trash is another persons’ treasure. preserving data and providing access to info. collaborate with researchers across disciplines and assist decide what is worth keeping and what discarding and how to study.
rich learning experience working with lined and dark data enable fresh perspective and learning how to work with data architecture. data literacy programming.
In the age of Big Data, there is an abundance of free or cheap data sources available to libraries about their users’ behavior across the many components that make up their web presence. Data from vendors, data from Google Analytics or other third-party tracking software, and data from user testing are all things libraries have access to at little or no cost. However, just like many students can become overloaded when they do not know how to navigate the many information sources available to them, many libraries can become overloaded by the continuous stream of data pouring in from these sources. This session will aim to help librarians understand 1) what sorts of data their library already has (or easily could have) access to about how their users use their various web tools, 2) what that data can and cannot tell them, and 3) how to use the datasets they are collecting in a holistic manner to help them make design decisions. The presentation will feature examples from the presenters’ own experience of incorporating user data in decisions related to design the Bethel University Libraries’ web presence.
lack of fear, changing the mindset.
deep collaboration both within and cross-consortia
don’t rely on vendor solutions. changing mindset
development = oppty (versus development as “work”)
private higher education is PALNI
3d virtual picture of disastrous areas. unlock the digital information to be digitally accessible to all people who might be interested.
they opened the maps of Katmandu for the local community and they were coming up with the strategies to recover. democracy in action
i can’t stop thinking that the keynote speaker efforts are mere follow up of what Naomi Klein explains in her Shock Doctrine: http://www.naomiklein.org/shock-doctrine: a government country seeks reasons to destroy another country or area and then NGOs from the same country go to remedy the disasters
A question from a librarian from the U about the use of drones. My note: why did the SCSU library have to give up its drone?
Douglas County Library model. too resource intensive to continue
Marmot Library Network
ILS integrated library system – shared with other counties, same sever for the entire consortium. they have a programmer, viewfind, open source, discovery player, he customized viewfind community to viewfind plus. instead of using the ILS public access catalogue, they are using the Vufind interface
Caiifa Enki. public library – single access collection. they purchase ebooks from the publisher and they are using also the viewfind interface. but not integrated with the library catalogs. Kansas public library went from OverDrive to Viewfind. CA State library is funding for the time being this effort.
Harper Collins is too cumbersome and the reason to avoid working with them.
security issues. some of the material sent over ftp and immediately moved to sftp
decisions – use of internal resources only, if now – amazon
programmer used for the pilot. contracted programmers. lack of the ability to see the large picture. eventually hired a full time person, instead of outsourcing. RDA compliant MARC.
ONIX, spreadsheet MARC.
Decision about who to start with : public or academic.
attempt to keep pricing down –
own agreement with the customers, separate from the agreement with the Publisher
current development: web-based online reading, shared-consortial collections and SIP2 authentication