Searching for "privacy"

7 Things You Shouldn’t Tweet

7 Things You Shouldn’t Tweet

http://www.socialmediatoday.com/content/5-things-you-shouldn%E2%80%99t-tweet

1. “What a workout! #exhausted #seeyoutomorrowgym”

New Years Day has come and gone, and like most Americans, my resolution for 2014 about working out is already nonexistent. Now, don’t make me or anyone else feel even worse about it by tweeting about “your extreme Crossfit session” or your “punishing leg day workout.”

Plus, are you really working out that hard if you have time to tweet about it?

2. “Gosh like 3 people today told me I’m beautiful, but I totally don’t think so. #confused #beauty”

Did you read that with a Valley girl tone of voice?

This kind of tweet is an example of the confusingly popular phenomenon that has been coined as humble brag tweeting. Humble bragging is boasting about something, but undercutting with modest humor. While the violation is mostly a Hollywood kind of offense, everyday Tweeters aren’t immune to the annoyance.

Arrogantly bragging about an achievement laced with an “oh my gosh how did that happen,” will not get you any new genuine followers or retweets. It will only get you unwanted eye rolling and unfollows. Say no to humble brag tweeting.

3. “Love is about finding it in unepected places. #anotherglassofwineplease #turndownforwhat”

If your guilty vice is having a few cocktails, or enjoying your favorite bottle of Syrah, so be it. But don’t let all of Twitter know about it, coupled with an inspirational quote about love, success, or how amazing the world is.

If you’re using Twitter to take advantage of its networking and outreach opportunities, tweeting that you’re under the influence isn’t the way to do it.

4. “I’m at ________ 4sq.com/S3a24j”

The dreaded foursquare tweet. Geotagging your Instagram and Facebook photo updates have surged across social media. But unless you’re into the whole stalker thing, don’t tweet out your exact location.

The purpose of this tweet is to invite others to join in, right? But did you know a majority of Twitter users are not in the U.S.? Again, if you like international lurkers, keep on checking into foursquare. But if you’re into privacy like me, keep your geo-tagging tweets to a general, “Hey I’m at Joe Momma’s Coffee.”

5. “RT if you love us plzzzzz”

How to put this lightly? No…one…will…retweet…you. Not only is this kind of tweet spammy and annoying, it screams juvenile. How can any audience take you seriously if they feel like they are following a toddler on Twitter who can’t even spell please?

Okay, I lied. Here are a few more things you shouldn’t tweet.

6. “Thanks for following via ManageFlitter. @i_alexandrarose is now following you.”

Stop reading right now, and go turn off this automated tweet. Nothing screams, “I don’t really even use Twitter, just HootSuite,” more than this nonsense of a tweet.

7. “Thanks for the follow! Now let’s connect on Facebook @i_alexandrarose.”

If I wanted to “like” you on Facebook, I wouldn’t be connecting with you on Twitter. Plus, an invite to your Facebook page sends the message “I’m so important and everything I tweet is so valuable, you shouldn’t miss any of my Facebook selfies.”

Newsflash, no one is that important. Except maybe Neil Diamond.

Sweet Caroline. Bum, bum, bum. Good times never seemed so good.

If you’re at the gym, stay off Twitter. If you’re drunk, stay of Twitter. If you feel like complimenting yourself, do so in the mirror while you’re taking a selfie. Don’t give your Twitter followers any reason to unfollow you. Stick to useful, conversation-fueling tweets, and soon everyone will want to listen to your bird chirping.

Research and Ethics: If Facebook can tweak our emotions and make us vote, what else can it Do?

If Facebook can tweak our emotions and make us vote, what else can it do?

http://www.businessinsider.com/facebook-calls-experiment-innovative-2014-7#ixzz36PtsxVfL

Google’s chief executive has expressed concern that we don’t trust big companies with our data – but may be dismayed at Facebook’s latest venture into manipulation

Please consider the information on Power, Privacy, and the Internet and details on ethics and big data in this IMS blog entry:https://blog.stcloudstate.edu/ims/2014/07/01/privacy-and-surveillance-obama-advisor-john-podesta-every-country-has-a-history-of-going-over-the-line/

important information:
Please consider the SCSU Research Ethics and the IRB (Institutional Review Board) document:
http://www.stcloudstate.edu/graduatestudies/current/culmProject/documents/ResearchEthicsandQualitative–IRBPresentationforGradStudentsv2.2011.pdf
For more information, please contact the SCSU Institutional Review Board : http://www.stcloudstate.edu/irb/default.asp

The Facebook Conundrum: Where Ethics and Science Collide

http://blogs.kqed.org/mindshift/2014/07/the-facebook-conundrum-where-ethics-and-science-collide

The field of learning analytics isn’t just about advancing the understanding of learning. It’s also being applied in efforts to try to influence and predict student behavior.

Learning analytics has yet to demonstrate its big beneficial breakthrough, its “penicillin,” in the words of Reich. Nor has there been a big ethical failure to creep lots of people out.

“There’s a difference,” Pistilli says, “between what we can do and what we should do.”

Social Media: Help and Reference Links

Social Media Help and Reference Links

https://blog.stcloudstate.edu/ims/wp-admin/post-new.php

excellent source of links to contact forms for various social media, privacy policies and terms, debugger and developers.
Do you have similar links? Pls share…

Open Source: why are we not allowed to use it?

Why Aren’t More Schools Using Free, Open Tools?

http://blogs.kqed.org/mindshift/2014/06/why-arent-more-schools-using-free-open-education-resources/

Teachers were complaining that they wanted a simple way to share files and links within the classroom, like a private Twitter app. Rather than having IT professionals respond to the request, Reisinger’s students programmed a solution that they call Paper Plane. ”Those kids have code up on GitHub [a site for open-source code] right now that they’re sharing out,” Reisinger said. Students also designed the help ticketing software that their peers use to request IT support.

oh, my, what a blasphemy; what do we do about SECURITY?…

A lot of people are scared away from open-source software or operating systems like Linux because of the belief that they are harder for teachers and students to use, and are more challenging to support.

a bigger reason people don’t go open-source is that the devices and software aren’t as shiny and exciting as iPads or Chromebooks.

recent concerns regarding third party providers and privacy are less of an issue

 

MOOC and Libraries

MOOC and Libraries

http://explore.tandfonline.com/content/bes/moocsandlibraries

New ACRL Discussion Group—Library Support for MOOCs

Libraries in the Time of MOOCs

http://www.educause.edu/ero/article/libraries-time-moocs
issues related to MOOCs, such as intellectual property rights, privacy issues, and state regulations.
MOOCs have arrived on the scene at a time when many institutions of higher learning are in extreme financial crisis
OCLC conference, “MOOCs and Libraries: Massive Opportunity or Overwhelming Challenge? http://www.oclc.org/research/events/2013/03-18.html
The MOOC movement might change this copyright-ownership contract between university and faculty.

Stephens, M. m., & Jones, K. L. (2014). MOOCs as LIS Professional Development Platforms: Evaluating and Refining SJSU’s First Not-for-Credit MOOC. Journal Of Education For Library & Information Science, 55(4), 345-361.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d99055676%26site%3deds-live%26scope%3dsite
xMOOCs. Using central­ized learning platforms (e.g., Coursera),they emphasize individual learning usingautomated assessment tools.In contrast, cMOOCs stress the relation­ship between course content and a com­munity of learners. Social learning, in thecase of cMOOCs, is emphasized  through uses of distributed tools (e.g., a combina­tion of a course site, student blogs, andsocial  etworking sites) to build networks of knowledge and learners. Unlike their xMOOC counterparts, the role of an in­ istructor in a cMOOC is to be a “guide on the side,” a facilitator of the knowledge­ making process who uses connectivist learning theory (Siemens, 2004; Siemens,2012)

Learning 2.0 programs, also known as“23 Things,” have offered online technol­ogy-focused  professional development for library staff and could be considered an early version of LIS-focused MOOCs (Stephens, 2013a). Utilizing concepts such as self-directed learning, play, and an emphasis on lifelong learning, these pro­grams have been offered for individual li­braries as well as consortial  and state level iterations to reach thousands of library staff.
The course structure of the MOOCversion of the HL incorporated content updated from the SLIS course by the co­instructors. Ten modules were scheduled over a twelve-week “semester.” Students
could earn a certificate of completion, if they finished three of five artifact-based assignments of their choosing, in addition to blogging and participating in an end-of-course virtual symposium. The weekly schedule is available in Appendix A, and assignment descriptions are available in Appendix B
utilizing concepts such as self-directed learning, play, and an emphasis on lifelong learning, these pro­grams have been offered for individual li­braries as well as consortial and state level iterations to reach thousands of library staff. Benefits to staff include increased comfort with emerging technologies and an increased desire to continue learning (p. 348).

Center for Democracy & Technology

Big Data and Privacy

April 17, 2014

Big data has been generating big hype for a while. In January, the White House jumped into the fray, launching a big data and privacy review. CDT participated in all three public workshops convened in connection with the review and submitted written comments.

CDT’s Big Data and Privacy Comments

In our comments, we focused on three main areas: applying the Fair Information Practice Principles (FIPPs) to both private sector and government big data programs; exploring technical measures such as de-identification to safeguard privacy; and reforming existing privacy laws, most notably the Electronic Communications Privacy Act, to account for rapid changes in the ways that digital data is collected, stored, and used.

CDT stressed that, as entities collect more data to offer innovative products and more efficient services, they must still be guided by purpose specification, consent, security, and the other elements of the FIPPs framework.

Government and Big Data

“Strong consensus is forming that the bulk collection of phone records should end.”

-Harley Geiger

The Administration says that it will end its bulk collection of telephony metadata, although the details of what will replace it remain unsettled. Meanwhile, CDT is pointing out that the laws the government has used to justify bulk collection are not limited just to phone records. Instead, they could be used to justify collection of location data, Internet browsing history, financial records, and more. CDT has been vocal in advocating the end of all forms of bulk collection, and we endorse the USA FREEDOM Act as the best legislation to do just that.

A report from the White House review is due before the end of April, but it is expected to present more questions than answers. In this complex and unsettled space, CDT will continue to work with companies and other stakeholders to develop workable approaches that will protect privacy while pursuing the benefits promised by advanced data analytics.


Check Out CDT’s New Website

CDT has launched a totally revamped website: http://www.cdt.org. It has a fresh new look and tools that should make our content more easily accessible. Thanks to our partners at iStrategy Labs for their creative and technical efforts on the new site.

mega trends in technology

THE SIX BIGGEST TRENDS IN SOCIAL THAT WILL BLOW YOUR MIND

Mega shifts in social business will significantly affect the way that business will run in the future.

http://www.socialmediaexplorer.com/social-media-marketing/the-six-biggest-trends-in-social-that-will-blow-your-mind/

1. Big Data

How it works: Businesses collect multiple data points, helping to create hyper-specific marketing for users, while making better predictions with more information from a larger data set.

Examples: You’ve already seen this when Target figured out a teen was pregnant before her dad did. Even though she didn’t buy diapers or formula, her purchasing habits correlated closely with other customers’ who were pregnant, and Target sent her coupons for her upcoming baby.

Factors: Big data is being powered by the reduction in costs of data storage, as well as an explosion in the ability of businesses to capture data points. Never before have retailers been able to capture as much data about purchases, never before has online tracking been so robust, nor have social platforms offered access to so much data about users.

How to Prepare: As a user, you can expect to see much more targeted marketing, and not necessarily what you may expect. By drawing conclusions from large sets of data, companies might be even a little creepy in being able to predict your life – like the Target pregnancy. For marketers, you can expect to find new ways to streamline your sales funnel and get more analytical data about customers through social networks, web analytics groups and at retail.

2. Social Tool Aggregation

How it works: More and more third-party tools are springing up to help marketers and social network users make sense of multiple networks. Furthermore, networks themselves are offering ways of connecting to other apps and networks.

Examples: Tools like IFTTT and Zapier use social network APIs to trigger responses, while others like HootSuite allow users to aggregate multiple network communication into one tool. At the same time, tools like About.me allow a combined view of an individual’s social activity. Furthermore, networks themselves are beginning to integrate. Facebook allows cross posts from Instagram, Foursquare, Yelp and a variety of others.

Factors: It’s already taking too much time for individuals and marketers alike to keep up with just a couple social networks, and both the social networks and third-party tools know this. By consolidating social network interaction into a single place, users may be able to spend less time trying to make sense of the chaos.

How to Prepare: Users and marketers alike should keep an eye out for how this data is being used. What happens if you like Eminem on Facebook, but check into a venue during a Taylor Swift concert on Foursquare? What happens if you listen to the Glee channel on Pandora? What says more about who you really are? Do these networks share that information? Is it part of the authorization you okayed? The future may tell.

3. Social Network Consolidation

How it works: Social networks and tool providers are consolidating to remain competitive, both in creating a better offering for users, as well as buying market share.

Examples: Facebook has had nearly 40 different acquisitions since 2005 including technologies that help import contacts, manage photos, create mobile apps, and more, with their largest acquisition being Instagram for one beelion dollars (Doctor Evil style, of course.) Not to be outdone, LinkedIn has scored about 10 of their own acquisitions including Slideshare. Twitter has acquired tools like TweetDeck, platforms like Posterous and has created Vine, but acquisitions aren’t limited to social networks, they extend into social tools as well. Salesforce just had their largest couple years so far acquiring Radian6, Buddy Media and most recently, their largest, Exact Target. Adobe purchased Omniture, and Google bought YouTube and Wildfire Apps, and Oracle took over Involver social apps. Everyone is finding some value in social.

Factors: Not only is social the big thing, but it’s the logical next step after Social Aggregation. People want to be able to easily publish across social networks and marketers want to have the ability to create one true set of data. Rather than having multiple tools these companies are attempting to offer consolidated suites for data creation, storage and analysis.

How to Prepare: Marketers need to be aware of evolving tools and networks. When Twitter bought TweetDeck, it dropped many of the supported features for Facebook, LinkedIn, Myspace and others. Be aware of these types of changes so you can make plans for uninterrupted service.

4. Crowdsourcing

How it works: Companies are offering bigger roles to consumers.

Examples: Small and medium business often resort to sites like DesignCrowd, who offers thousands of designers the opportunity to design a logo, print piece or something else. The customer picks the best designs, offers revisions and the winner gets about $200. Starbucks turned to crowdsourcing for coming up with new product ideas, with over 50,000 ideas coming through My Starbucks Idea. Doritos, Lincoln, Pepsi, Pizza Hut, Toyota and others have even crowdsourced Super Bowl ads.

Factors: Customers want to have a stake in companies. As more businesses go to greater and greater lengths to spotlight influential users or creative user-generated work, consumers are expecting to interact more and more with companies in these ways. Furthermore, consumers are expecting more unique messaging rather than traditional corporate marketing speak.

How to Prepare: Find new ways that you can incorporate customer feedback and ideas into marketing campaigns, product updates or other areas of the business.

5. Sharing Economy

How it works: Online networks, “peer-to-peer marketplaces” are set up to pay to use people’s spare assets – rent a bedroom, or car from, or even eat a meal with complete strangers.

Examples: Perhaps some of the first companies in this space followed the crowdfunding model – with Kickstarter and Indiegogo being the top two. Airbnb offers to rent out unoccupied living space from a bedroom to an entire island including 250,000 listings in 192 countries. Taskrabbit allows users to outsource small jobs such as picking up dog food and dropping it off at your door. RelayRides even offers unused personal vehicles to rent.

Factors: It could be the downturn in the economy making some folks want to rent out their cars and rooms for extra cash, or causing others to avoid committing to a car payment. Furthermore, people are increasingly aware of the toll on natural resources in manufacturing and the high costs of parking in major urban areas. Sharing based businesses help to alleviate these problems and make use of otherwise idle resources.

How to Prepare: See if there may be a natural fit in working with one of these sharing services or offering your services through one. Jeremiah Owyang offers an example where Marriott could work with a shared lodging hosts to offer a “stamp of approval” of sorts, where hosts could agree to abide by certain standards or receive certain training to become certified. Marriott could even offer bedding, linens or other materials that could both help guests feel more confident in their accommodations while helping guests distinguish themselves from competitors.

6. Quantified Self

How it works: Individuals using devices or social networks to track information about themselves. This data can be cross referenced to identify some interesting trends about yourself.

Examples: FitBit tracks your physical activity, while foursquare tracks the types of businesses where you check in. It’s not too difficult to find out that when you go to movie theaters, you tend to eat poorly, and when you go to museums, you add an extra thousand steps to your routine. Apply that across other areas of life, music, work, love and you can some very interesting trends can turn out.

Factors: People are increasingly using technology to extrapolate information to work more efficiently. Furthermore, an increase in the scrutiny of the NSA and increased awareness of privacy have perhaps made people more interested in creating and storing their own information.

How to Prepare: Companies need to offer APIs and other ways for users to control and access their own information where possible. Connect to services like IFTTT and Zapier so users can import data and manipulate it, and make accommodations for people using personal technology like FitBits, Nike Fuelband, Jawbone Up, and others.

Overall, these mega shifts in social networking and social business can significantly affect the way that business will run in the future. Are you prepared? Have you seen these shifts or experienced them? Look for our future posts on the Micro-Trends within each of these larger trends and let us know your thoughts in the comments.

==========================================================================

CES 2014: Four mega-trends for the professionals

Summary: Trends matter at CES. While there may not be major product announcements, trends will emerge to shape 2014. Here’s what to watch in business tech.

http://www.zdnet.com/ces-2014-four-mega-trends-for-the-professionals-7000024727/

1. Wearables

2. The Internet of Things

3. Contextual computing

4. Consumerization of business tech

blog under the articles holds good information

Tablets (iPADs) in the Classroom

From: Perry Bratcher [mailto:bratcher@nku.edu]
Sent: Wednesday, November 06, 2013 9:01 AM
To: ‘lita-l@ala.org’
Cc: Michael Providenti; Michael Wells; Millie Mclemore; Perry Bratcher; Stephen Moon
Subject: [lita-l] RE: Classroom iPads

All – Thanks to each of you for your responses to my email regarding classroom use of iPads (see email at the bottom).  Listed below are is a summary of the comments I received.  I cut/pasted and have reconfigured these comments for this email, so some may be taken out of context.  NOTE: My systems staff have adamantly opposed using the Microsoft Surface.  We have a campus “tech bar” where student/staff can check out new devices for experimentation.  My staff said that the Surface doesn’t work in our particular situation for a variety of reasons and they prefer the iPad tablet option (if we go the tablet route).

Before deciding on implementation of PCs vs. laptops vs. tablet for use in a classroom setting, one needs to consider the motivation for doing so.  Space? Portability? Availability of apps?  Is there a demand for using personal devices for research, etc?  What type of portable device to use (iPad, Microsoft Surface, etc.)

Pros for using iPad/tablets:

  • Keep a few in there to provide examples of how to search on mobile devices.
  • The amount of apps and types of apps out there. Great education apps exist that do not exist elsewhere online or on other platforms (Android or Windows).
  • The iPad is flexible and allows you to regain that floor space you lose with computers and give the user privacy.
  • If setup correctly, the devices can be erased when they are returned so any private data is wiped.
  • Users can download additional apps, even purchase apps if you allow them.
  • They hold a charge much longer then any laptop or ChromeBook on the market.
  • Apple sold 94% of its iPads into education – the reason being that it’s a great education and research tool.
    • Another advantage that I can see boot up time. The iPad is instantly on and connected to the network. Perhaps this most applicable to last-minute library instruction or ad hoc group research?   However, if I had the choice, I would equip a classroom with MacBook Air SSDs
    • Understand how they need to be configured and the tools needed to do so. I created a kit for this not long ago for public libraries: http://www.macprofessionals.com/new-library-ipad-checkout-solution/   Thank you Chris Ross, Macprofessionals
    • UVA has been using iPads for instruction for about 2 years.  They have been very pleased with the results.
    • Our electronic classroom is very small, so we purchased 30 iPads over a year ago to allow teaching in our larger meeting room. There are definitely distinct advantages: flexibility, mobility, lack of technical infrastructure needed (wires, ports, etc.), and the myriad possibilities of apps.

 

Cons for using iPad/tablets:

  • Most mobile devices have not become “workhorse” devices as of yet, so much of the students’ research will still need to be done on a computer.
  • We haven’t seen any advantage to having them either – but our librarians use them sporadically for instruction.
  • Charging, syncing, configuring, Apple ID’s, erasing, cases, restrictions, printing, presenting, etc. For example if you want to present with these, you will need an Apple TV or an adapter. If you want to print you will need AirPrint supported printers or software. If you want to configure and erase you will need a Mac.
  • The challenge I have found is trying to use an inherently personal device in the typical one shot classroom environment. There are lots of things you need to consider. How will they access the wireless? What about taking notes? What about apps that require login? And much more.
  • Someone on staff is equipped and has the time to manage them.
  • We have a pool of 30 loan laptops, recently we have supplemented this with 11 loan iPads. The iPads have generally been very popular but wouldn’t work as a substitute for laptops. As many have mentioned when it comes to getting real work done they are inferior to laptops and people have commented as such.
  • As a complement to laptops though they are great – they are more portable and our nursing students love being able to carry them around and quickly access medical apps, take notes, check calculations etc. I definitely see them as being a valuable resource but if it’s an either/or proposition then I would go on the side of laptops.
  • My personal opinion is that it’s not a bad idea as a supplement to existing systems, but I’d be wary of  replacing more flexible with more limited ones, and am particularly wary of committing to one operating system/vendor (particularly one that tends to charge half-again to twice as much as their competitors with only limited advantages).
  • In a classroom setting (e.g. instruction room) I see little advantage of tablets;  their sole advantage from I can figure out is their portability.   Why force people into a limited device if it is only going to be in one room anyway?

 

http://www.edudemic.com/social-media-in-education/

How Social Media Is Being Used In Education

good graph on the bottom of the article (http://www.edudemic.com/wp-content/uploads/2013/10/social-media-for-teaching.jpg)

  • The level of personal use of social media among faculty (70.3 percent) mirrors that of the general population
  • 55 percent of faculty use social media in a professional context (any aspect of their profession outside of teaching), up from 44.7 percent last year
  • Only 41 percent of faculty use social media in the classroom, but this use continues to experience steady year-to-year growth
  • Faculty are sophisticated consumers of social media. They match different sites to their varying personal, professional, and teaching needs
  • Concerns remain about privacy, maintaining the class as a private space for free and open discussion, and the integrity of student submissions
  • Most faculty agree that “the interactive nature of online and mobile technologies create better learning environments” and that digital communication has increased communication with students
  • Faculty believe that online and mobile technologies can be distracting, and that they have resulted in longer working hours and more stress

MnSCU Mediaspace AKA Kaltura

Getting Started with MediaSpace v5 (PDF attachment)

From: Todd Digby <Todd.Digby@so.mnscu.edu>
Date: Thursday, October 31, 2013 10:52 AM
To: Todd Digby <Todd.Digby@so.mnscu.edu>
Subject: MnSCU Mediaspace Update – New Version – New URL

Hello MnSCU Mediaspace user,

We have upgraded MediaSpace systems and now have a new permanent address for MnSCU MediaSpace http://mediaspace.mnscu.edu

You will also see that there have been some changes to this version from the previous version.   Just use your StarID to login, all you existing videos will be available in the site.  There are a few new features in this version of Mediaspace.    I have also updated the getting started document that I originally distributed to make adjustments for the new version.  Once we are confident that you have made the transition to the new version, we will start broadening the use to other campuses and to faculty / staff use.  Expect more announcements to come over the next couple weeks.

New Features

Direct links to videos can now be used.  The steps to follow

  1. Click on your Video title from your My Media listing
  2. Click on the Action button (below the video player box, to the right)
  3. Select “+ Publish”
  4. Chance the privacy settings to “Unlisted”
  5. Click on the “Share” button
  6. Copy link and send out.

Embedding can use an Iframe or the standard legacy embed.  

  • The embedding feature will now have the necessary security measures in place so that the D2L mixed content issues will not be present.

Downloading a copy of the video

  • You can now download a copy of the video from MediaSpace.  If you are the owner of the video, when you select the “Edit” screen for the video, the player will have a “Download” option in the middle of the screen.  This will allow an MPEG moving file to be downloaded to your workstation.  This is only available in the “Edit” screen player, so only the owner of the video will have the ability to download it from MediaSpace.

Thanks,

Todd
_______________________________

Todd R. Digby

System Director of Academic Technology

Minnesota State Colleges and Universities

30 7th St. E., Suite 350 | St. Paul, MN 55101-7804 | 651-201-1812 l 612-803-4922 (cell)

todd.digby@so.mnscu.edu  | http://www.asa.mnscu.edu/academictechnology

1 20 21 22 23