Nuance: A Love Story. My affair with the intellectual dark web
Meghan Daum Aug 24 https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059
the standard set of middle-class Democratic Party values: Public safety nets were a force for good, corporate greed was a real threat, civil and reproductive rights were paramount.
I remember how good it felt to stand with my friends in our matching college sweatshirts shouting “never again!” and “my body, my choice!”
(hey, why shouldn’t Sarah Palin call herself a feminist?) brought angry letters from liberals as well as conservatives.
We would all go to the mat for women’s rights, gay rights, or pretty much any rights other than gun rights. We lived, for the most part, in big cities in blue states.
When Barack Obama came into the picture, we loved him with the delirium of crushed-out teenagers, perhaps less for his policies than for being the kind of person who also listens to NPR. We loved Hillary Clinton with the fraught resignation of a daughter’s love for her mother. We loved her even if we didn’t like her. We were liberals, after all. We were family.
Words like “mansplaining” and “gaslighting” were suddenly in heavy rotation, often invoked with such elasticity as to render them nearly meaningless. Similarly, the term “woke,” which originated in black activism, was being now used to draw a bright line between those on the right side of things and those on the wrong side of things.
From the Black Guys on Bloggingheads, YouTube’s algorithms bounced me along a path of similarly unapologetic thought criminals: the neuroscientist Sam Harris and his Waking Up podcast; Christina Hoff Sommers, aka “The Factual Feminist”; the comedian turned YouTube interviewer Dave Rubin; the counter-extremist activist Maajid Nawaz; and a cantankerous and then little-known Canadian psychology professor named Jordan Peterson, who railed against authoritarianism on both the left and right but reserved special disdain for postmodernism, which he believed was eroding rational thought on campuses and elsewhere.
the sudden national obsession with female endangerment on college campuses struck me much the same way it had in the early 1990s: well-intended but ultimately infantilizing to women and essentially unfeminist.
Weinstein and his wife, the evolutionary biologist Heather Heying, who also taught at Evergreen, would eventually leave the school and go on to become core members of the “intellectual dark web.”
Weinstein talked about intellectual “feebleness” in academia and in the media, about the demise of nuance, about still considering himself a progressive despite his feeling that the far left was no better at offering practical solutions to the world’s problems than the far right.
an American Enterprise Institute video of Sommers, the Factual Feminist, in conversation with the scholar and social critic Camille Paglia — “My generation fought for the freedom for women to risk getting raped!” I watched yet another video in which Paglia sat by herself and expounded volcanically about the patriarchal history of art (she was all for it).
the brothers sat down together for a two-hour, 47-minute interview on theRubin Report,
James Baldwin’s line, “I love America more than any other country in the world, and, exactly for this reason, I insist on the right to criticize her perpetually
Jordan Peterson Twelve Rules for Life: An Antidote for Chaos, is a sort of New and Improved Testament for the purpose-lacking young person (often but not always male) for whom tough-love directives like “clean up your room!” go down a lot easier when dispensed with a Jungian, evo-psych panache.
Quillette, a new online magazine that billed itself as “a platform for free thought”
the more honest we are about what we think, the more we’re alone with our thoughts. Just as you can’t fight Trumpism with tribalism, you can’t fight tribalism with a tribe.
Did Media Literacy Backfire?
Jan 5, 2017danah boyd
Understanding what sources to trust is a basic tenet of media literacy education.
Think about how this might play out in communities where the “liberal media” is viewed with disdain as an untrustworthy source of information…or in those where science is seen as contradicting the knowledge of religious people…or where degrees are viewed as a weapon of the elite to justify oppression of working people. Needless to say, not everyone agrees on what makes a trusted source.
Students are also encouraged to reflect on economic and political incentives that might bias reporting. Follow the money, they are told. Now watch what happens when they are given a list of names of major power players in the East Coast news media whose names are all clearly Jewish. Welcome to an opening for anti-Semitic ideology.
In the United States, we believe that worthy people lift themselves up by their bootstraps. This is our idea of freedom. To take away the power of individuals to control their own destiny is viewed as anti-American by so much of this country. You are your own master.
Children are indoctrinated into this cultural logic early, even as their parents restrict their mobility and limit their access to social situations. But when it comes to information, they are taught that they are the sole proprietors of knowledge. All they have to do is “do the research” for themselves and they will know better than anyone what is real.
Combine this with a deep distrust of media sources.
Many marginalized groups are justifiably angry about the ways in which their stories have been dismissed by mainstream media for decades.It took five days for major news outlets to cover Ferguson. It took months and a lot of celebrities for journalists to start discussing the Dakota Pipeline. But feeling marginalized from news media isn’t just about people of color.
Keep in mind that anti-vaxxers aren’t arguing that vaccinations definitively cause autism. They are arguing that we don’t know. They are arguing that experts are forcing children to be vaccinated against their will, which sounds like oppression. What they want is choice — the choice to not vaccinate. And they want information about the risks of vaccination, which they feel are not being given to them. In essence, they are doing what we taught them to do: questioning information sources and raising doubts about the incentives of those who are pushing a single message. Doubt has become tool.
Addressing so-called fake news is going to require a lot more than labeling. It’s going to require a cultural change about how we make sense of information, whom we trust, and how we understand our own role in grappling with information. Quick and easy solutions may make the controversy go away, but they won’t address the underlying problems.
In the United States, we’re moving towards tribalism (see Fukuyama), and we’re undoing the social fabric of our country through polarization, distrust, and self-segregation.
boyd, danah. (2014). It’s Complicated: The Social Lives of Networked Teens (1 edition). New Haven: Yale University Press.
p. 8 networked publics are publics that are reconstructed by networked technologies. they are both space and imagined community.
p. 11 affordances: persistence, visibility, spreadability, searchability.
p. technological determinism both utopian and dystopian
p. 30 adults misinterpret teens online self-expression.
p. 31 taken out of context. Joshua Meyrowitz about Stokely Charmichael.
p. 43 as teens have embraced a plethora of social environment and helped co-create the norms that underpin them, a wide range of practices has emerged. teens have grown sophisticated with how they manage contexts and present themselves in order to be read by their intended audience.
p. 54 privacy. p. 59 Privacy is a complex concept without a clear definition. Supreme Court Justice Brandeis: the right to be let alone, but also ‘measure of th access others have to you through information, attention, and physical proximity.’
control over access and visibility
p. 65 social steganography. hiding messages in plain sight
p. 69 subtweeting. encoding content
p. 70 living with surveillance . Foucault Discipline and Punish
p. 77 addition. what makes teens obsessed w social media.
p. 81 Ivan Goldberg coined the term internet addiction disorder. jokingly
p. 89 the decision to introduce programmed activities and limit unstructured time is not unwarranted; research has shown a correlation between boredom and deviance.
My interview with Myra, a middle-class white fifteen-year-old from Iowa, turned funny and sad when “lack of time” became a verbal trick in response to every question. From learning Czech to trakc, from orchestra to work in a nursery, she told me that her mother organized “98%” of her daily routine. Myra did not like all of these activities, but her mother thought they were important.
Myra noted that her mother meant well, but she was exhausted and felt socially disconnected because she did not have time to connect with friends outside of class.
p. 100 danger
are sexual predators lurking everywhere
p. 128 bullying. is social media amplifying meanness and cruelty.
p. 131 defining bullying in a digital era. p. 131 Dan Olweus narrowed in the 70s bulling to three components: aggression, repetition and imbalance on power. p. 152 SM has not radically altered the dynamics of bullying, but it has made these dynamics more visible to more people. we must use this visibility not to justify increased punishment, but to help youth who are actually crying out for attention.
p. 153 inequality. can SM resolve social divisions?
p. 176 literacy. are today’s youth digital natives? p. 178 Barlow and Rushkoff p. 179 Prensky. p. 180 youth need new literacies. p. 181 youth must become media literate. when they engage with media–either as consumers or producers–they need to have the skills to ask questions about the construction and dissemination of particular media artifacts. what biases are embedded in the artifact? how did the creator intend for an audience to interpret the artifact, and what are the consequences of that interpretation.
p. 183 the politics of algorithms (see also these IMS blog entries http://blog.stcloudstate.edu/ims?s=algorithms
) Wikipedia and google are fundamentally different sites. p. 186 Eli Pariser, The Filter Bubble: the personalization algorithms produce social divisions that undermine any ability to crate an informed public. Harvard’s Berkman Center have shown, search engines like Google shape the quality of information experienced by youth.
p. 192 digital inequality. p. 194 (bottom) 195 Eszter Hargittai: there are signifficant difference in media literacy and technical skills even within age cohorts. teens technological skills are strongly correlated with socio-economic status. Hargittai argues that many youth, far from being digital natives, are quite digitally naive.
p. 195 Dmitry Epstein: when society frames the digital divide as a problem of access, we see government and industry as the responsible party for the addressing the issue. If DD as skills issue, we place the onus on learning how to manage on individuals and families.
p. 196 beyond digital natives
Palfrey, J., & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives (1 edition). New York: Basic Books.
John Palfrey, Urs Gasser: Born Digital
Digital Natives share a common global culture that is defined not by age, strictly, but by certain attributes and experience related to how they interact with information technologies, information itself, one another, and other people and institutions. Those who were not “born digital’ can be just as connected, if not more so, than their younger counterparts. And not everyone born since, say 1982, happens to be a digital native.” (see also http://blog.stcloudstate.edu/ims/2018/04/15/no-millennials-gen-z-gen-x/
p. 197. digital native rhetoric is worse than inaccurate: it is dangerous
many of the media literacy skills needed to be digitally savvy require a level of engagement that goes far beyond what the average teen pick up hanging out with friends on FB or Twitter. Technical skills, such as the ability to build online spaces requires active cultivation. Why some search queries return some content before others. Why social media push young people to learn how to to build their own systems, versus simply using a social media platforms. teens social status and position alone do not determine how fluent or informed they are via-a-vis technology.
p. 199 Searching for a public on their own
Daum, M. (2018, August 24). My Affair With the Intellectual Dark Web – Great Escape. Retrieved October 9, 2018, from https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059
the intellectual dark web
more on media literacy in this IMS blog
fake news in this IMS blog
Interview with the Creators of Hoaxy® from Indiana University
Interview with the Creators of Hoaxy® from Indiana University
Falsehoods are spread due to biases in the brain, society, and computer algorithms (Ciampaglia & Menczer, 2018). A combined problem is “information overload and limited attention contribute to a degradation of the market’s discriminative power” (Qiu, Oliveira, Shirazi, Flammini, & Menczer, 2017). Falsehoods spread quickly in the US through social media because this has become Americans’ preferred way to read the news (59%) in the 21st century (Mitchell, Gottfried, Barthel, & Sheer, 2016). While a mature critical reader may recognize a hoax disguised as news, there are those who share it intentionally. A 2016 US poll revealed that 23% of American adults had shared misinformation unwittingly or on purpose; this poll reported high to moderate confidence in one’s ability to identify fake news with only 15% not very confident (Barthel, Mitchell, & Holcomb, 2016).
Hoaxy® takes it one step further and shows you who is spreading or debunking a hoax or disinformation on Twitter.
more on fake news in this IMS blog
Limbic thought and artificial intelligence
September 5, 2018 Siddharth (Sid) Pai
An AI programme “catastrophically forgets” the learnings from its first set of data and would have to be retrained from scratch with new data. The website futurism.com says a completely new set of algorithms would have to be written for a programme that has mastered face recognition, if it is now also expected to recognize emotions. Data on emotions would have to be manually relabelled and then fed into this completely different algorithm for the altered programme to have any use. The original facial recognition programme would have “catastrophically forgotten” the things it learnt about facial recognition as it takes on new code for recognizing emotions. According to the website, this is because computer programmes cannot understand the underlying logic that they have been coded with.
Irina Higgins, a senior researcher at Google DeepMind, has recently announced that she and her team have begun to crack the code on “catastrophic forgetting”.
As far as I am concerned, this limbic thinking is “catastrophic thinking” which is the only true antipode to AI’s “catastrophic forgetting”. It will be eons before AI thinks with a limbic brain, let alone has consciousness.
Stephen Hawking warns artificial intelligence could end mankind
thank you Sarnath Ramnat (firstname.lastname@example.org) for the finding
more on AI in this IMS blog
Franken-algorithms: the deadly consequences of unpredictable code
by Andrew Smith Thu 30 Aug 2018 01.00 EDT
Between the “dumb” fixed algorithms and true AI lies the problematic halfway house we’ve already entered with scarcely a thought and almost no debate, much less agreement as to aims, ethics, safety, best practice. If the algorithms around us are not yet intelligent, meaning able to independently say “that calculation/course of action doesn’t look right: I’ll do it again”, they are nonetheless starting to learn from their environments. And once an algorithm is learning, we no longer know to any degree of certainty what its rules and parameters are. At which point we can’t be certain of how it will interact with other algorithms, the physical world, or us. Where the “dumb” fixed algorithms – complex, opaque and inured to real time monitoring as they can be – are in principle predictable and interrogable, these ones are not. After a time in the wild, we no longer know what they are: they have the potential to become erratic. We might be tempted to call these “frankenalgos” – though Mary Shelley couldn’t have made this up.
Twenty years ago, George Dyson anticipated much of what is happening today in his classic book Darwin Among the Machines. The problem, he tells me, is that we’re building systems that are beyond our intellectual means to control. We believe that if a system is deterministic (acting according to fixed rules, this being the definition of an algorithm) it is predictable – and that what is predictable can be controlled. Both assumptions turn out to be wrong.“It’s proceeding on its own, in little bits and pieces,” he says. “What I was obsessed with 20 years ago that has completely taken over the world today are multicellular, metazoan digital organisms, the same way we see in biology, where you have all these pieces of code running on people’s iPhones, and collectively it acts like one multicellular organism.“There’s this old law called Ashby’s law that says a control system has to be as complex as the system it’s controlling, and we’re running into that at full speed now, with this huge push to build self-driving cars where the software has to have a complete model of everything, and almost by definition we’re not going to understand it. Because any model that we understand is gonna do the thing like run into a fire truck ’cause we forgot to put in the fire truck.”
Walsh believes this makes it more, not less, important that the public learn about programming, because the more alienated we become from it, the more it seems like magic beyond our ability to affect. When shown the definition of “algorithm” given earlier in this piece, he found it incomplete, commenting: “I would suggest the problem is that algorithm now means any large, complex decision making software system and the larger environment in which it is embedded, which makes them even more unpredictable.” A chilling thought indeed. Accordingly, he believes ethics to be the new frontier in tech, foreseeing “a golden age for philosophy” – a view with which Eugene Spafford of Purdue University, a cybersecurity expert, concurs. Where there are choices to be made, that’s where ethics comes in.
our existing system of tort law, which requires proof of intention or negligence, will need to be rethought. A dog is not held legally responsible for biting you; its owner might be, but only if the dog’s action is thought foreseeable.
model-based programming, in which machines do most of the coding work and are able to test as they go.
As we wait for a technological answer to the problem of soaring algorithmic entanglement, there are precautions we can take. Paul Wilmott, a British expert in quantitative analysis and vocal critic of high frequency trading on the stock market, wryly suggests “learning to shoot, make jam and knit”
The venerable Association for Computing Machinery has updated its code of ethics along the lines of medicine’s Hippocratic oath, to instruct computing professionals to do no harm and consider the wider impacts of their work.
more on coding in this IMS blog
Schools are using AI to track what students write on their computers
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops
become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like Gaggle
, and GoGuardian
to surface potentially worrisome communications to school administrators
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey
from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal
at Facebook and other recent data breaches from companies like Equifax
, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety
more on cybersecurity in this IMS blog
more on surveillance in this IMS blog
more on privacy in this IMS blog
EdTech Research – Where to Publish, How to Share (Part 2): Journal Metrics, Rankings and Citation Information
EdTech Research – Where to Publish, How to Share (Part 1): Journal Overview
Publisher / Organization: Athabasca University Press
Year founded: 2000
Description: The International Review of Research in Open and Distributed Learning disseminates original research, theory, and best practice in open and distributed learning worldwide.
Publisher / Organization: The University of Illinois at Chicago- University Library
Year founded: 1996
Description: First Monday is among the very first open access journals in the EdTech field. The journal’s subject matter encompasses the full range of Internet issues, including educational technologies, social media and web search. Contributors are urged via author guidelines to use simple explanations and less complex sentences and to be mindful that a large proportion of their readers are not part of academia and do not have English as a first language.
Publisher / Organization: Springer (from 2013)
Academic Management: University of Catalonia (UOC)
Year founded: 2004
Description: This journal aims to: provide a vehicle for scholarly presentation and exchange of information between professionals, researchers and practitioners in the technology-enhanced education field; contribute to the advancement of scientific knowledge regarding the use of technology and computers in higher education; and inform readers about the latest developments in the application of information technologies (ITs) in higher education learning, training, research and management.
Publisher / Organization: Online Learning Consortium
Year founded: 1997
Description: Online Learning promotes the development and dissemination of new knowledge at the intersection of pedagogy, emerging technology, policy, and practice in online environments. The journal has been published for over 20 years as the Journal of Asynchronous Learning Networks (JALN) and recently merged with the Journal of Online Learning and Teaching (JOLT).
Publisher / Organization: International Forum of Educational Technology & Society
Description: Educational Technology & Society seeks academic articles on the issues affecting the developers of educational systems and educators who implement and manage these systems. Articles should discuss the perspectives of both communities – the programmers and the instructors. The journal is currently still accepting submissions for ongoing special issues, but will cease publication in the future as the editors feel that the field of EdTech is saturated with high quality publications.
Publisher / Organization: Ascilite (Organization) & PKP Publishing Services Network
Year founded: 1985
Description: The Australasian Journal of Educational Technology aims to promote research and scholarship on the integration of technology in tertiary education, promote effective practice, and inform policy. The goal is to advance understanding of educational technology in post-school education settings, including higher and further education, lifelong learning, and training.
Publisher / Organization: Elsevier Ltd.
YEAR FOUNDED: 1998
DESCRIPTION: The Internet and Higher Education is devoted to addressing contemporary issues and future developments related to online learning, teaching, and administration on the Internet in post-secondary settings. Articles should significantly address innovative deployments of Internet technology in instruction and report on research to demonstrate the effects of information technology on instruction in various contexts in higher education.
Publisher / Organization: British Educational Research Association (BERA)
YEAR FOUNDED: 1970
DESCRIPTION: The journal publishes theoretical perspectives, methodological developments and empirical research that demonstrate whether and how applications of instructional/educational technology systems, networks, tools and resources lead to improvements in formal and non-formal education at all levels, from early years through to higher, technical and vocational education, professional development and corporate training.
Publisher / Organization: Elsevier Ltd.
Year founded: 1976
Description: Computers & Education aims to increase knowledge and understanding of ways in which digital technology can enhance education, through the publication of high quality research, which extends theory and practice.
Publisher / Organization: Springer US
Year founded: 1985
Description: TechTrends targets professionals in the educational communication and technology field. It provides a vehicle that fosters the exchange of important and current information among professional practitioners. Among the topics addressed are the management of media and programs, the application of educational technology principles and techniques to instructional programs, and corporate and military training.
Year founded: 2002
Description: Advances in technology and the growth of e-learning to provide educators and trainers with unique opportunities to enhance learning and teaching in corporate, government, healthcare, and higher education. IJEL serves as a forum to facilitate the international exchange of information on the current research, development, and practice of e-learning in these sectors.
Led by an Editorial Review Board of leaders in the field of e-Learning, the Journal is designed for the following audiences: researchers, developers, and practitioners in corporate, government, healthcare, and higher education. IJEL is a peer-reviewed journal.
Year founded: 1981
Description: JCMST is a highly respected scholarly journal which offers an in-depth forum for the interchange of information in the fields of science, mathematics, and computer science. JCMST is the only periodical devoted specifically to using information technology in the teaching of mathematics and science.
Just as researchers build reputation over time that can be depicted (in part) through quantitative measures such as h-index and i10-index, journals are also compared based on the number of citations they receive..
Year founded: 1997
Description: The Journal of Interactive Learning Research (JILR) publishes papers related to the underlying theory, design, implementation, effectiveness, and impact on education and training of the following interactive learning environments: authoring systems, cognitive tools for learning computer-assisted language learning computer-based assessment systems, computer-based training computer-mediated communications, computer-supported collaborative learning distributed learning environments, electronic performance support systems interactive learning environments, interactive multimedia systems interactive simulations and games, intelligent agents on the Internet intelligent tutoring systems, microworlds, virtual reality based learning systems.
Year founded: 1996
Description: JEMH is designed to provide a multi-disciplinary forum to present and discuss research, development and applications of multimedia and hypermedia in education. It contributes to the advancement of the theory and practice of learning and teaching in environments that integrate images, sound, text, and data.
Publisher / Organization: Society for Information Technology and Teacher Education (SITE)
Year founded: 1997
Description: JTATE serves as a forum for the exchange of knowledge about the use of information technology in teacher education. Journal content covers preservice and inservice teacher education, graduate programs in areas such as curriculum and instruction, educational administration, staff development instructional technology, and educational computing.
Publisher / Organization: Association for the Advancement of Computing in Education (AACE)
YEAR FOUNDED: 2015
DESCRIPTION: The Journal of Online Learning Research (JOLR) is a peer-reviewed, international journal devoted to the theoretical, empirical, and pragmatic understanding of technologies and their impact on primary and secondary pedagogy and policy in primary and secondary (K-12) online and blended environments. JOLR is focused on publishing manuscripts that address online learning, catering particularly to the educators who research, practice, design, and/or administer in primary and secondary schooling in online settings. However, the journal also serves those educators who have chosen to blend online learning tools and strategies in their face-to-face classroom.
The most commonly used index to measure the relative importance of journals is the annual Journal Citation Reports (JCR). This report is published by Clarivate Analytics (previously Thomson Reuters).
SCImago Journal Rank (SJR indicator) measures the influence of journals based on the number of citations the articles in the journal receive and the importance or prestige of the journals where such citations come from. The SJR indicator is a free journal metric which uses an algorithm similar to PageRank and provides an open access alternative to the journal impact factor in the Web of Science Journal Citation Report. The portal draws from the information contained in the Scopus database (Elsevier B.V.).
Introduced by Google in 2004, Scholar is a freely accessible search engine that indexes the full text or metadata of scholarly publications across an array of publishing formats and disciplines.
Introduced by Elsevier in 2004, Scopus is an abstract and citation database that covers nearly 18,000 titles from more than 5,000 publishers. It offers journal metrics that go beyond just journals to include most serial titles, including supplements, special issues and conference proceedings. Scopus offers useful information such as the total number of citations, the total number of articles published, and the percent of articles cited.
“Citations are not just a reflection of the impact that a particular piece of academic work has generated. Citations can be used to tell stories about academics, journals and fields of research, but they can also be used to distort stories”.
Harzing, A.-W. (2013). The publish or perish book: Your guide to effective and responsible citation analysis. http://harzing.com/popbook/index.htm
ResearchGate is a social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators. The community was founded in May 2008. Today it has over 14 million members.
Google Scholar allows users to search for digital or physical copies of articles, whether online or in libraries. It indexes “full-text journal articles, technical reports, preprints, theses, books, and other documents, including selected Web pages that are deemed to be ‘scholarly. It comprises an estimated 160 million documents.
Academia.edu is a social-networking platform for academics to share research papers. You can upload your own work, and follow the updates of your peers. Founded in 2008, the network currently has 59 million users, and adding 20 million documents.
The ORCHID (Open Researcher and Contributor ID) is a nonproprietary alphanumeric code to uniquely identify scientific and other academic authors and contributors. It provides a persistent identity for humans, similar to content-related entities on digital networks that utilize digital object identifiers (DOIs). The organization offers an open and independent registry intended to be the de facto standard for contributor identification in research and academic publishing.
The Scopus Author Identifier assigns a unique number to groups of documents written by the same author via an algorithm that matches authorship based on a certain criteria. If a document cannot be confidently matched with an author identifier, it is grouped separately. In this case, you may see more than one entry for the same author.
more on metrics in this iMS blog