Searching for "philosophy"

ELI 2018 Key Issues Teaching Learning

Key Issues in Teaching and Learning

https://www.educause.edu/eli/initiatives/key-issues-in-teaching-and-learning

A roster of results since 2011 is here.

ELI 2018 key issues

1. Academic Transformation

2. Accessibility and UDL

3. Faculty Development

4. Privacy and Security

5. Digital and Information Literacies

https://cdn.nmc.org/media/2017-nmc-strategic-brief-digital-literacy-in-higher-education-II.pdf
Three Models of Digital Literacy: Universal, Creative, Literacy Across Disciplines

United States digital literacy frameworks tend to focus on educational policy details and personal empowerment, the latter encouraging learners to become more effective students, better creators, smarter information consumers, and more influential members of their community.

National policies are vitally important in European digital literacy work, unsurprising for a continent well populated with nation-states and struggling to redefine itself, while still trying to grow economies in the wake of the 2008 financial crisis and subsequent financial pressures

African digital literacy is more business-oriented.

Middle Eastern nations offer yet another variation, with a strong focus on media literacy. As with other regions, this can be a response to countries with strong state influence or control over local media. It can also represent a drive to produce more locally-sourced content, as opposed to consuming material from abroad, which may elicit criticism of neocolonialism or religious challenges.

p. 14 Digital literacy for Humanities: What does it mean to be digitally literate in history, literature, or philosophy? Creativity in these disciplines often involves textuality, given the large role writing plays in them, as, for example, in the Folger Shakespeare Library’s instructor’s guide. In the digital realm, this can include web-based writing through social media, along with the creation of multimedia projects through posters, presentations, and video. Information literacy remains a key part of digital literacy in the humanities. The digital humanities movement has not seen much connection with digital literacy, unfortunately, but their alignment seems likely, given the turn toward using digital technologies to explore humanities questions. That development could then foster a spread of other technologies and approaches to the rest of the humanities, including mapping, data visualization, text mining, web-based digital archives, and “distant reading” (working with very large bodies of texts). The digital humanities’ emphasis on making projects may also increase

Digital Literacy for Business: Digital literacy in this world is focused on manipulation of data, from spreadsheets to more advanced modeling software, leading up to degrees in management information systems. Management classes unsurprisingly focus on how to organize people working on and with digital tools.

Digital Literacy for Computer Science: Naturally, coding appears as a central competency within this discipline. Other aspects of the digital world feature prominently, including hardware and network architecture. Some courses housed within the computer science discipline offer a deeper examination of the impact of computing on society and politics, along with how to use digital tools. Media production plays a minor role here, beyond publications (posters, videos), as many institutions assign multimedia to other departments. Looking forward to a future when automation has become both more widespread and powerful, developing artificial intelligence projects will potentially play a role in computer science literacy.

6. Integrated Planning and Advising Systems for Student Success (iPASS)

7. Instructional Design

8. Online and Blended Learning

In traditional instruction, students’ first contact with new ideas happens in class, usually through direct instruction from the professor; after exposure to the basics, students are turned out of the classroom to tackle the most difficult tasks in learning — those that involve application, analysis, synthesis, and creativity — in their individual spaces. Flipped learning reverses this, by moving first contact with new concepts to the individual space and using the newly-expanded time in class for students to pursue difficult, higher-level tasks together, with the instructor as a guide.

Let’s take a look at some of the myths about flipped learning and try to find the facts.

Myth: Flipped learning is predicated on recording videos for students to watch before class.

Fact: Flipped learning does not require video. Although many real-life implementations of flipped learning use video, there’s nothing that says video must be used. In fact, one of the earliest instances of flipped learning — Eric Mazur’s peer instruction concept, used in Harvard physics classes — uses no video but rather an online text outfitted with social annotation software. And one of the most successful public instances of flipped learning, an edX course on numerical methods designed by Lorena Barba of George Washington University, uses precisely one video. Video is simply not necessary for flipped learning, and many alternatives to video can lead to effective flipped learning environments [http://rtalbert.org/flipped-learning-without-video/].

Myth: Flipped learning replaces face-to-face teaching.

Fact: Flipped learning optimizes face-to-face teaching. Flipped learning may (but does not always) replace lectures in class, but this is not to say that it replaces teaching. Teaching and “telling” are not the same thing.

Myth: Flipped learning has no evidence to back up its effectiveness.

Fact: Flipped learning research is growing at an exponential pace and has been since at least 2014. That research — 131 peer-reviewed articles in the first half of 2017 alone — includes results from primary, secondary, and postsecondary education in nearly every discipline, most showing significant improvements in student learning, motivation, and critical thinking skills.

Myth: Flipped learning is a fad.

Fact: Flipped learning has been with us in the form defined here for nearly 20 years.

Myth: People have been doing flipped learning for centuries.

Fact: Flipped learning is not just a rebranding of old techniques. The basic concept of students doing individually active work to encounter new ideas that are then built upon in class is almost as old as the university itself. So flipped learning is, in a real sense, a modern means of returning higher education to its roots. Even so, flipped learning is different from these time-honored techniques.

Myth: Students and professors prefer lecture over flipped learning.

Fact: Students and professors embrace flipped learning once they understand the benefits. It’s true that professors often enjoy their lectures, and students often enjoy being lectured to. But the question is not who “enjoys” what, but rather what helps students learn the best.They know what the research says about the effectiveness of active learning

Assertion: Flipped learning provides a platform for implementing active learning in a way that works powerfully for students.

9. Evaluating Technology-based Instructional Innovations

Transitioning to an ROI lens requires three fundamental shifts
What is the total cost of my innovation, including both new spending and the use of existing resources?

What’s the unit I should measure that connects cost with a change in performance?

How might the expected change in student performance also support a more sustainable financial model?

The Exposure Approach: we don’t provide a way for participants to determine if they learned anything new or now have the confidence or competence to apply what they learned.

The Exemplar Approach: from ‘show and tell’ for adults to show, tell, do and learn.

The Tutorial Approach: Getting a group that can meet at the same time and place can be challenging. That is why many faculty report a preference for self-paced professional development.build in simple self-assessment checks. We can add prompts that invite people to engage in some sort of follow up activity with a colleague. We can also add an elective option for faculty in a tutorial to actually create or do something with what they learned and then submit it for direct or narrative feedback.

The Course Approach: a non-credit format, these have the benefits of a more structured and lengthy learning experience, even if they are just three to five-week short courses that meet online or in-person once every week or two.involve badges, portfolios, peer assessment, self-assessment, or one-on-one feedback from a facilitator

The Academy Approach: like the course approach, is one that tends to be a deeper and more extended experience. People might gather in a cohort over a year or longer.Assessment through coaching and mentoring, the use of portfolios, peer feedback and much more can be easily incorporated to add a rich assessment element to such longer-term professional development programs.

The Mentoring Approach: The mentors often don’t set specific learning goals with the mentee. Instead, it is often a set of structured meetings, but also someone to whom mentees can turn with questions and tips along the way.

The Coaching Approach: A mentor tends to be a broader type of relationship with a person.A coaching relationship tends to be more focused upon specific goals, tasks or outcomes.

The Peer Approach:This can be done on a 1:1 basis or in small groups, where those who are teaching the same courses are able to compare notes on curricula and teaching models. They might give each other feedback on how to teach certain concepts, how to write syllabi, how to handle certain teaching and learning challenges, and much more. Faculty might sit in on each other’s courses, observe, and give feedback afterward.

The Self-Directed Approach:a self-assessment strategy such as setting goals and creating simple checklists and rubrics to monitor our progress. Or, we invite feedback from colleagues, often in a narrative and/or informal format. We might also create a portfolio of our work, or engage in some sort of learning journal that documents our thoughts, experiments, experiences, and learning along the way.

The Buffet Approach:

10. Open Education

Figure 1. A Model for Networked Education (Credit: Image by Catherine Cronin, building on
Interpretations of
Balancing Privacy and Openness (Credit: Image by Catherine Cronin. CC BY-SA)

11. Learning Analytics

12. Adaptive Teaching and Learning

13. Working with Emerging Technology

In 2014, administrators at Central Piedmont Community College (CPCC) in Charlotte, North Carolina, began talks with members of the North Carolina State Board of Community Colleges and North Carolina Community College System (NCCCS) leadership about starting a CBE program.

Building on an existing project at CPCC for identifying the elements of a digital learning environment (DLE), which was itself influenced by the EDUCAUSE publication The Next Generation Digital Learning Environment: A Report on Research,1 the committee reached consensus on a DLE concept and a shared lexicon: the “Digital Learning Environment Operational Definitions,

Figure 1. NC-CBE Digital Learning Environment

suggestions for academic writing

these are suggestions from Google Groups with doctoral cohorts 6, 7, 8, 9 from the Ed leadership program

How to find a book from InterLibrary Loan: find book ILL

Citing someone else’s citation?:

http://library.northampton.ac.uk/liberation/ref/adv_harvard_else.php

http://guides.is.uwa.edu.au/c.php?g=380288&p=3109460
use them sparingly:
http://www.apastyle.org/learn/faqs/cite-another-source.aspx
Please take a look at “Paraphrasing sources: in
http://www.roanestate.edu/owl/usingsources_mla.html
it gives you a good idea why will distance you from a possibility of plagiarizing.
n example of resolution by this peer-reviewed journal article
https://doi.org/10.19173/irrodl.v17i5.2566
Ungerer, L. M. (2016). Digital Curation as a Core Competency in Current Learning and Literacy: A Higher Education Perspective. The International Review of Research in Open and Distributed Learning17(5). https://doi.org/10.19173/irrodl.v17i5.2566
Dunaway (2011) suggests that learning landscapes in a digital age are networked, social, and technological. Since people commonly create and share information by collecting, filtering, and customizing digital content, educators should provide students opportunities to master these skills (Mills, 2013). In enhancing critical thinking, we have to investigate pedagogical models that consider students’ digital realities (Mihailidis & Cohen, 2013). November (as cited in Sharma & Deschaine, 2016), however warns that although the Web fulfils a pivotal role in societal media, students often are not guided on how to critically deal with the information that they access on the Web. Sharma and Deschaine (2016) further point out the potential for personalizing teaching and incorporating authentic material when educators themselves digitally curate resources by means of Web 2.0 tools.
p. 24. Communities of practice. Lave and Wenger’s (as cited in Weller, 2011) concept of situated learning and Wenger’s (as cited in Weller, 2011) idea of communities of practice highlight the importance of apprenticeship and the social role in learning.
criteria to publish a paper

Originality: Does the paper contain new and significant information adequate to justify publication?

Relationship to Literature: Does the paper demonstrate an adequate understanding of the relevant literature in the field and cite an appropriate range of literature sources? Is any significant work ignored?

Methodology: Is the paper’s argument built on an appropriate base of theory, concepts, or other ideas? Has the research or equivalent intellectual work on which the paper is based been well designed? Are the methods employed appropriate?

Results: Are results presented clearly and analyzed appropriately? Do the conclusions adequately tie together the other elements of the paper?

Implications for research, practice and/or society: Does the paper identify clearly any implications for research, practice and/or society? Does the paper bridge the gap between theory and practice? How can the research be used in practice (economic and commercial impact), in teaching, to influence public policy, in research (contributing to the body of knowledge)? What is the impact upon society (influencing public attitudes, affecting quality of life)? Are these implications consistent with the findings and conclusions of the paper?

Quality of Communication: Does the paper clearly express its case, measured against the technical language of the field and the expected knowledge of the journal’s readership? Has attention been paid to the clarity of expression and readability, such as sentence structure, jargon use, acronyms, etc.

mixed method research

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ971947%26site%3dehost-live%26scope%3dsite

Stanton, K. V., & Liew, C. L. (2011). Open Access Theses in Institutional Repositories: An Exploratory Study of the Perceptions of Doctoral Students. Information Research: An International Electronic Journal16(4),

We examine doctoral students’ awareness of and attitudes to open access forms of publication. Levels of awareness of open access and the concept of institutional repositories, publishing behaviour and perceptions of benefits and risks of open access publishing were explored. Method: Qualitative and quantitative data were collected through interviews with eight doctoral students enrolled in a range of disciplines in a New Zealand university and a self-completion Web survey of 251 students. Analysis: Interview data were analysed thematically, then evaluated against a theoretical framework. The interview data were then used to inform the design of the survey tool. Survey responses were analysed as a single set, then by disciple using SurveyMonkey’s online toolkit and Excel. Results: While awareness of open access and repository archiving is still low, the majority of interview and survey respondents were found to be supportive of the concept of open access. The perceived benefits of enhanced exposure and potential for sharing outweigh the perceived risks. The majority of respondents were supportive of an existing mandatory thesis submission policy. Conclusions: Low levels of awareness of the university repository remains an issue, and could be addressed by further investigating the effectiveness of different communication channels for promotion.

PLEASE NOTE:

the researchers use the qualitative approach: by interviewing participants and analyzing their responses thematically, they build the survey.
Then then administer the survey (the quantitative approach)

How do you intend to use a mixed method? Please share

paraphrasing quotes

statement of the problem

Problem statement – Wikipedia

 
Metaphors: A Problem Statement is like… 
metaphor — a novel or poetic linguistic expression where one or more words for a concept are used outside normal conventional meaning to express a similar concept. Aristotle l 
The DNA of the research l A snapshot of the research l The foundation of the research l The Heart of the research l A “taste” of the research l A blueprint for the study
 
 
 
Here is a good exercise for your writing of the problem statement:
Chapter 3
several documents, which can be helpful in two different ways:
– check your structure and methodology
– borrow verbiage
http://education.nova.edu/Resources/uploads/app/35/files/arc_doc/writing_chpt3_quantitative_research_methods.pdf 
http://education.nova.edu/Resources/uploads/app/35/files/arc_doc/writing_chpt3_qualitative_research_methods.pdf
http://www.trinitydc.edu/sps/files/2010/09/APA-6-BGS-Quantitative-Research-Paper-August-2014.pdf

digital object identifier, or DOI

digital object identifier (DOI) is a unique alphanumeric string assigned by a registration agency (the International DOI Foundation) to identify content and provide a persistent link to its location on the Internet. The publisher assigns a DOI when your article is published and made available electronically.

Why do we need it?

2010 Changes to APA for Electronic Materials Digital object identifier (DOI). DOI available. If a DOI is available you no longer include a URL. Example: Author, A. A. (date). Title of article. Title of Journal, volume(number), page numbers. doi: xx.xxxxxxx

http://www.stcloudstate.edu/writeplace/_files/documents/working-with-sources/apa-electronic-material-citations.pdf

Mendeley (vs Zotero and/or RefWorks)

https://www.brighttalk.com/webcast/11355/226845?utm_campaign=Mendeley%20Webinars%202&utm_campaignPK=271205324&utm_term=OP28019&utm_content=271205712&utm_source=99&BID=799935188&utm_medium=email&SIS_ID=46360

Online Writing Tools: FourOnlineToolsforwriting

social media and altmetrics

Accodring to Sugimoto et al (2016), the Use of social media platforms for by researchers is high — ranging from 75 to 80% in large -scale surveys (Rowlands et al., 2011; Tenopir et al., 2013; Van Eperen & Marincola, 2011) .
There is one more reason, and, as much as you want to dwell on the fact that you are practitioners and research is not the most important part of your job, to a great degree, you may be judged also by the scientific output of your office and/or institution.
In that sense, both social media and altimetrics might suddenly become extremely important to understand and apply.
Shortly altmetrics (alternative metrics) measure the impact your scientific output has on the community. Your teachers and you present, publish and create work, which might not be presented and published, but may be widely reflected through, e.g. social media, and thus, having impact on the community.
How such impact is measured, if measured at all, can greatly influence the money flow to your institution
For more information:
For EVEN MORE information, read the entire article:
Sugimoto, C. R., Work, S., Larivière, V., & Haustein, S. (2016). Scholarly use of social media and altmetrics: a review of the literature. Retrieved from https://arxiv.org/abs/1608.08112
related information:
In the comments section on this blog entry,
I left notes to
Thelwall, M., & Wilson, P. (2016). Mendeley readership altmetrics for medical articles: An analysis of 45 fields. Journal of the Association for Information Science and Technology, 67(8), 1962–1972. https://doi.org/10.1002/asi.23501
Todd Tetzlaff is using Mendeley and he might be the only one to benefit … 🙂
Here is some food for thought from the article above:
Doctoral students and junior researchers are the largest reader group in Mendeley ( Haustein & Larivière, 2014; Jeng et al., 2015; Zahedi, Costas, & Wouters, 2014a) .
Studies have also provided evidence of high rate s of blogging among certain subpopulations: for example, approximately one -third of German university staff (Pscheida et al., 2013) and one fifth of UK doctoral students use blogs (Carpenter et al., 2012) .
Social data sharing platforms provide an infrastructure to share various types of scholarly objects —including datasets, software code, figures, presentation slides and videos —and for users to interact with these objects (e.g., comment on, favorite, like , and reuse ). Platforms such as Figshare and SlideShare disseminate scholars’ various types of research outputs such as datasets, figures, infographics, documents, videos, posters , or presentation slides (Enis, 2013) and displays views, likes, and shares by other users (Mas -Bleda et al., 2014) .
Frequently mentioned social platforms in scholarly communication research include research -specific tools such as Mendeley, Zotero, CiteULike, BibSonomy, and Connotea (now defunct) as well as general tools such as Delicious and Digg (Hammond, Hannay, Lund, & Scott, 2005; Hull, Pettifer, & Kell, 2008; Priem & Hemminger, 2010; Reher & Haustein, 2010) .
qualitative research
“The focus group interviews were analysed based on the principles of interpretative phenomenology”
 
1. What are  interpretative phenomenology?
Here is an excellent article in ResarchGate:
 
https://www.researchgate.net/publication/263767248_A_practical_guide_to_using_Interpretative_Phenomenological_Analysis_in_qualitative_research_psychology
 
and a discussion from the psychologists regarding the weaknesses when using IPA (Interpretative phenomenological analysis)

https://thepsychologist.bps.org.uk/volume-24/edition-10/methods-interpretative-phenomenological-analysis

2. What is Constant Comparative Method?

http://www.qualres.org/HomeCons-3824.html

Nvivo shareware

http://blog.stcloudstate.edu/ims/2017/01/11/nvivo-shareware/

Qualitative and Quantitative research in lame terms
podcast:
https://itunes.apple.com/us/podcast/how-scientific-method-works/id278981407?i=1000331586170&mt=2
if you are not podcast fans, I understand. The link above is a pain in the behind to make work, if you are not familiar with using podcast.
Here is an easier way to find it:
1. open your cell phone and go find the podcast icon, which is pre-installed, but you might have not ever used it [yet].
2. In the app, use the search option and type “stuff you should know”
3. the podcast will pop up. scroll and find “How the scientific method works,” and/or search for it if you can.
Once you can play it on the phone, you have to find time to listen to it.
I listen to podcast when i have to do unpleasant chores such as: 1. walking to work 2. washing the dishes 3. flying long hours (very rarely). 4. Driving in the car.
There are bunch of other situations, when you may be strapped and instead of filling disgruntled and stressed, you can deliver the mental [junk] food for your brain.
Earbuds help me: 1. forget the unpleasant task, 2. Utilize time 3. Learn cool stuff
Here are podcasts, I am subscribed for, besides “stuff you should know”:
TED Radio Hour
TED Talks Education
NPR Fresh Air
BBC History
and bunch others, which, if i don’t go a listen for an year, i go and erase and if i peruse through the top chart and something picks my interest, I try.
If I did not manage to convince to podcast, totally fine; do not feel obligated.
However, this podcast, you can listen to on your computer, if you don’t want to download on your phone.
It is one hour show by two geeks, who are trying to make funny (and they do) a dry matter such as quantitative vs qualitative, which you want to internalize:
1. Sometimes at minute 12, they talk about inductive versus deductive to introduce you to qualitative versus quantitative. It is good to listen to their musings, since your dissertation is going through inductive and deductive process, and understanding it, can help you control better your dissertation writing. 
2. Scientific method. Hypothesis etc (around min 17).
While this is not a Ph.D., but Ed.D. and we do not delve into the philosophy of science and dissertation etc. the more you know about this process, the better control you have over your dissertation. 
3. Methods and how you prove (Chapter 3) is discussed around min 35
4. dependent and independent variables and how do you do your research in general (min ~45)
Shortly, listen and please do share your thoughts below. You do not have to be kind to this source offering. Actually, be as critical as possible, so you can help me decide, if I should offer it to the next cohort and thank you in advance for your feedback. 

 

 

AI and ethics

Live Facebook discussion at SCSU VizLab on ethics and technology:

Join our discussion on #technology and #ethics. share your opinions, suggestions, ideas

Posted by InforMedia Services on Thursday, November 1, 2018

Heard on Marketplace this morning (Oct. 22, 2018): ethics of artificial intelligence with John Havens of the Institute of Electrical and Electronics Engineers, which has developed a new ethics certification process for AI: https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ec_bios.pdf

Ethics and AI

***** The student club, the Philosophical Society, has now been recognized by SCSU as a student organization ***

https://ed.ted.com/lessons/the-ethical-dilemma-of-self-driving-cars-patrick-lin

Could it be the case that a random decision is still better then predetermined one designed to minimize harm?

similar ethical considerations are raised also:

in this sitcom

https://www.theatlantic.com/sponsored/hpe-2018/the-ethics-of-ai/1865/ (full movie)

This TED talk:

http://blog.stcloudstate.edu/ims/2017/09/19/social-media-algorithms/

http://blog.stcloudstate.edu/ims/2018/10/02/social-media-monopoly/

 

 

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain,

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain, Privacy, Security, Surveilance

http://blog.stcloudstate.edu/ims?s=internet+of+things

peer-reviewed literature;

Keyword search: ethic* + Internet of Things = 31

Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical Design in the Internet of Things. Science & Engineering Ethics24(3), 905–925. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-016-9754-5

Berman, F., & Cerf, V. G. (2017). Social and Ethical Behavior in the Internet of Things. Communications of the ACM60(2), 6–7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3036698

Murdock, G. (2018). Media Materialties: For A Moral Economy of Machines. Journal of Communication68(2), 359–368. https://doi-org.libproxy.stcloudstate.edu/10.1093/joc/jqx023

Carrier, J. G. (2018). Moral economy: What’s in a name. Anthropological Theory18(1), 18–35. https://doi-org.libproxy.stcloudstate.edu/10.1177/1463499617735259

Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology. Canadian Public Administration57(2), 295–317. https://doi-org.libproxy.stcloudstate.edu/10.1111/capa.12069

Koucheryavy, Y., Kirichek, R., Glushakov, R., & Pirmagomedov, R. (2017). Quo vadis, humanity? Ethics on the last mile toward cybernetic organism. Russian Journal of Communication9(3), 287–293. https://doi-org.libproxy.stcloudstate.edu/10.1080/19409419.2017.1376561

Keyword search: ethic+ + autonomous vehicles = 46

Cerf, V. G. (2017). A Brittle and Fragile Future. Communications of the ACM60(7), 7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3102112

Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health107(4), 632–537. https://doi-org.libproxy.stcloudstate.edu/10.2105/AJPH.2016.303628

HARRIS, J. (2018). Who Owns My Autonomous Vehicle? Ethics and Responsibility in Artificial and Human Intelligence. Cambridge Quarterly of Healthcare Ethics27(4), 599–609. https://doi-org.libproxy.stcloudstate.edu/10.1017/S0963180118000038

Keeling, G. (2018). Legal Necessity, Pareto Efficiency & Justified Killing in Autonomous Vehicle Collisions. Ethical Theory & Moral Practice21(2), 413–427. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10677-018-9887-5

Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for Crashes of Autonomous Vehicles: An Ethical Analysis. Science & Engineering Ethics21(3), 619–630. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-014-9565-5

Getha-Taylor, H. (2017). The Problem with Automated Ethics. Public Integrity19(4), 299–300. https://doi-org.libproxy.stcloudstate.edu/10.1080/10999922.2016.1250575

Keyword search: ethic* + artificial intelligence = 349

Etzioni, A., & Etzioni, O. (2017). Incorporating Ethics into Artificial Intelligence. Journal of Ethics21(4), 403–418. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10892-017-9252-2

Köse, U. (2018). Are We Safe Enough in the Future of Artificial Intelligence? A Discussion on Machine Ethics and Artificial Intelligence Safety. BRAIN: Broad Research in Artificial Intelligence & Neuroscience9(2), 184–197. Retrieved from http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d129943455%26site%3dehost-live%26scope%3dsite

++++++++++++++++
http://www.cts.umn.edu/events/conference/2018

2018 CTS Transportation Research Conference

Keynote presentations will explore the future of driving and the evolution and potential of automated vehicle technologies.

+++++++++++++++++++
http://blog.stcloudstate.edu/ims/2016/02/26/philosophy-and-technology/

+++++++++++++++++++
more on AI in this IMS blog
http://blog.stcloudstate.edu/ims/2018/09/07/limbic-thought-artificial-intelligence/

AI and autonomous cars as ALA discussion topic
http://blog.stcloudstate.edu/ims/2018/01/11/ai-autonomous-cars-libraries/

and privacy concerns
http://blog.stcloudstate.edu/ims/2018/09/14/ai-for-education/

the call of the German scientists on ethics and AI
http://blog.stcloudstate.edu/ims/2018/09/01/ethics-and-ai/

AI in the race for world dominance
http://blog.stcloudstate.edu/ims/2018/04/21/ai-china-education/

The monopoly of the tech giants

Here’s the real danger that Facebook, Google, and the other tech monopolies pose to our society

Jamie Bartlett, October 1, 2018, https://blog.ed.ted.com/2018/10/01/heres-the-real-danger-that-facebook-google-and-the-other-tech-monopolies-pose-to-our-society/

distributed computing + power encryption = the future of Internet

the Dark Net is going mainstream, liberty, freedom, democracy; neither entirely dark, not entirely light, both things

The threat that tech monopolies pose to democracies is about more than the prices they charge: it’s the concentration of power, data and control over the public space — and their ability to wield this power over a growing number of economic activities, especially in the infrastructure and technologies of the future. The following companies operate as either monopolies or oligopolies in their respective fields: Google, Facebook, Uber, Airbnb, Amazon, Twitter, Instagram, Spotify. Integrated into everything, everywhere, their technology will blanket the world.

cultural hegemony.” That is, where domination can be achieved through controlling the ideas and assumptions available to the public. The idea, associated with philosopher and politician Antonio Gramsci

In 1995, left-wing academics Richard Barbrook and Andy Cameron detailed the philosophy and ideas of the new tech wunderkinds, christening it “The Californian Ideology.” This ideology represented a fusion of the cultural bohemianism of San Francisco and entrepreneurial free market zeal.

All you needed to get to utopia was a belief in “disruption,” the idea that progress is achieved through smashing up old industries and institutions and replacing them with something new and digital.

Money and ideas in Silicon Valley have a very complicated relationship. Silicon Valley runs according to a Faustian pact: money in exchange for world-changing ideas.

Over the years, the big tech firms have very carefully cultivated the Californian Ideology. Even though they are massive multi-billion-dollar corporations with huge PR teams, they pitch themselves as anti-establishment.The worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community.

And to whom do we look in order to solve our collective social problems? It’s no longer the state, but the modern tech-geek superhero.

Total victory for the monopoly is not over economics or politics. It’s over assumptions, ideas and possible futures.

++++++++++++
more on social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media

coding ethics unpredictability

Franken-algorithms: the deadly consequences of unpredictable code

by  Thu 30 Aug 2018 

https://www.theguardian.com/technology/2018/aug/29/coding-algorithms-frankenalgos-program-danger

Between the “dumb” fixed algorithms and true AI lies the problematic halfway house we’ve already entered with scarcely a thought and almost no debate, much less agreement as to aims, ethics, safety, best practice. If the algorithms around us are not yet intelligent, meaning able to independently say “that calculation/course of action doesn’t look right: I’ll do it again”, they are nonetheless starting to learn from their environments. And once an algorithm is learning, we no longer know to any degree of certainty what its rules and parameters are. At which point we can’t be certain of how it will interact with other algorithms, the physical world, or us. Where the “dumb” fixed algorithms – complex, opaque and inured to real time monitoring as they can be – are in principle predictable and interrogable, these ones are not. After a time in the wild, we no longer know what they are: they have the potential to become erratic. We might be tempted to call these “frankenalgos” – though Mary Shelley couldn’t have made this up.

Twenty years ago, George Dyson anticipated much of what is happening today in his classic book Darwin Among the Machines. The problem, he tells me, is that we’re building systems that are beyond our intellectual means to control. We believe that if a system is deterministic (acting according to fixed rules, this being the definition of an algorithm) it is predictable – and that what is predictable can be controlled. Both assumptions turn out to be wrong.“It’s proceeding on its own, in little bits and pieces,” he says. “What I was obsessed with 20 years ago that has completely taken over the world today are multicellular, metazoan digital organisms, the same way we see in biology, where you have all these pieces of code running on people’s iPhones, and collectively it acts like one multicellular organism.“There’s this old law called Ashby’s law that says a control system has to be as complex as the system it’s controlling, and we’re running into that at full speed now, with this huge push to build self-driving cars where the software has to have a complete model of everything, and almost by definition we’re not going to understand it. Because any model that we understand is gonna do the thing like run into a fire truck ’cause we forgot to put in the fire truck.”

Walsh believes this makes it more, not less, important that the public learn about programming, because the more alienated we become from it, the more it seems like magic beyond our ability to affect. When shown the definition of “algorithm” given earlier in this piece, he found it incomplete, commenting: “I would suggest the problem is that algorithm now means any large, complex decision making software system and the larger environment in which it is embedded, which makes them even more unpredictable.” A chilling thought indeed. Accordingly, he believes ethics to be the new frontier in tech, foreseeing “a golden age for philosophy” – a view with which Eugene Spafford of Purdue University, a cybersecurity expert, concurs. Where there are choices to be made, that’s where ethics comes in.

our existing system of tort law, which requires proof of intention or negligence, will need to be rethought. A dog is not held legally responsible for biting you; its owner might be, but only if the dog’s action is thought foreseeable.

model-based programming, in which machines do most of the coding work and are able to test as they go.

As we wait for a technological answer to the problem of soaring algorithmic entanglement, there are precautions we can take. Paul Wilmott, a British expert in quantitative analysis and vocal critic of high frequency trading on the stock market, wryly suggests “learning to shoot, make jam and knit

The venerable Association for Computing Machinery has updated its code of ethics along the lines of medicine’s Hippocratic oath, to instruct computing professionals to do no harm and consider the wider impacts of their work.

+++++++++++
more on coding in this IMS blog
http://blog.stcloudstate.edu/ims?s=coding

Teacher Brand and Digital Reputation

Rise and Shine! How to Boost Your Teacher Brand and Digital Reputation

By Kasey Bell     Apr 5, 2016

https://www.edsurge.com/news/2016-04-05-rise-and-shine-how-to-boost-your-teacher-brand-and-digital-reputation

Five tips to help you create a personal brand and a positive digital reputation

1. What will they find when they Google you?

2. What is branding?

Your brand is what you represent, the content that you share, your audience, your Personal Learning Network (PLN), and your teaching philosophy. You want your brand to demonstrate that you are trustworthy, and offer quality content, insightful comments, and experience. Your brand tells your audience that what you offer is of value. Together, the elements that create your brand should communicate a distinct, cohesive story. For instance, when you visit any of my social media profiles, you will see a consistent message. The avatar and logo for my website Shake Up Learning are more recognizable than my face, and that’s intentional. That isn’t to say that every brand needs an avatar. But do find a creative way to tell your personal story.

3. Choose the right platforms

There is no right or wrong platform. Choosing where you want to build your online presence depends on the audience that you want to engage. If you want to reach parents and school community stakeholders, Facebook is a strong bet. If you want to reach other educators, Twitter and Pinterest are big winners. The bottom line is that you don’t have to use them all. Find and connect with your audience where your audience resides.

4. Claim your social media real estate

Before you settle on a username, check that it’s available on all of the social media platforms that you want to use—and then keep it consistent. You will lose your audience if you make it hard to find you. Also keep your handle simple and short, and try to avoid special characters. When a new platform arrives, claim your username early even if you aren’t sure that you will maintain a presence there.

5. Optimize your social media profiles

Guy Kawasaki, co-author of The Art of Social Media, khas nearly 1.5 million followers on Twitter alone, and he offers effective social media tips in his book. Here are the basics:

  • Add a picture of your face or logo. Your picture validates who you are. No more eggheads! Using the default egg avatar on Twitter says you don’t have a brand, and doesn’t tell your audience that you are trustworthy.
  • Use your real name. Sure, you can lie, but that isn’t going to help you build a brand and online presence. Many platforms allow you to show your name as well as your handle.
  • Link to your website, blog or About.me page. Don’t have one? Get one! You may not be ready to start a blog, but anyone can easily set up an About.me page—which is like an online resume.
  •  Compose a meaningful bio, which will help others find and follow you. It should describe your experience in the field of education and highlight topics that you follow like Maker EdGoogle Apps, or edtech.
  • Add a cover image. Choose an image that tells your story. Who are you? What do you do that sets you apart? Canva is a graphic design tool that makes creating a cover image easy. It offers ready-made templates in the right size for all of the major social media platforms.
  • Be consistent across all mediums. You want your followers to see the same brand on all of your social media profiles. This also means you shouldn’t change your profile picture every five minutes. Be recognizable.

Tools to build your brand and online presence

  •  About.me: A quick and easy personal homepage that shows your audience who you are and how to connect with you.
  •  Canva: An easy-to-use design tool for creating images, with templates for social media.
  •  Fiverr: A marketplace for services that you can use to commission a logo, avatar, or web design.
  •  Wix: A free website builder.
  •  Weebly: A free website builder.
  •  Buffer: A free web tool for sharing and scheduling content across multiple social media platforms.
  •  Nuzzel: A free web tool that lets you see the content trending among the people you follow.
  •  The Art of Social Media: A guide to creating a compelling social media presence, by Guy Kawasaki and Peg Fitzpatrick.
  •  What Happens in Vegas Stays on YouTube: Tips for preserving your digital reputation, by Erik Qualman.
  •  What Happens on Campus Stays on YouTube: Advice for students on protective their digital reputations, by Erik Qualman.

++++++++++++
more on digital citizenship in this IMS blog
http://blog.stcloudstate.edu/ims?s=digital+citizenship

also:

https://www.pinterest.com/pin/628252216744698154/
social media cheat sheet and content calendar

Disruption in Higher Education

What to Expect in an Era of Disruption in Higher Education

Jim Black President & CEO of SEM Works https://www.linkedin.com/pulse/what-expect-era-disruption-higher-education-jim-black/

1. Determine what the customer craves and deliver it. In the case of college and university students, there are limits. Balancing student wants and desires with what they actually need to be successful students and engaged citizens can, in fact, be extremely challenging. “The customer is always right” philosophy practiced by many businesses simply does not fit with the mission of postsecondary institutions. Instead, the role of educators is to advance and apply knowledge, facilitate the exploration of ideas, foster cognitive dissonance, prepare students as lifelong learners and productive workers, and even, hold them accountable for their actions or inactions. Ideally, the college experience should be transformational—helping students become the best person they can be. With that said, failing to align teaching methods, curriculum, academic programs, and institutional services with the needs and expectations of students is a perilous path.

2. Create unexpected value. Incumbent institutions tend to focus on known problems (e.g., student attrition causation factors, poor service delivery, cumbersome processes, undersubscribed programs, insufficient class availability). True disruption seldom occurs in this space. Creating value where it did not exist before or was not expected spawns disruption. In the private sector, such intuitive value ideation is seen in Disney’s “Imagineering” the attractions in its theme parks, Apple’s invention of the iPhone, and Airbnb’s alternative to staying with the multitudes at expensive, disturbingly uniform hotel chains. This is what the authors of Blue Ocean Strategy characterize as swimming in the “blue ocean”, where there are few, if any, competitors (Kim, W. C. & Mauborgne, R., 2005). No disruptor is found in the “red ocean” crowded with similar competitors.

3. Avoid being average. If your school is one of the elite, well-known few, with highly selective admissions, it is not average. However, the vast majority of colleges and universities do not fit this profile. They have to find other ways to distinguish themselves. A capstone student experience, an innovative curriculum, guaranteed internship placement or study abroad, digital career portfolios, or a unique pricing model represent just a few examples. While it would be ideal to find something that makes your institution distinctive throughout the nation or the world, that is highly improbable. A more attainable goal is to position your institution uniquely among your direct competitors.

4. Identify the potential for expansion. As it relates to student enrollment growth, expansion opportunities are usually found within one or more of four domains: (1) thorough penetration of your existing primary market, where the institution and its academic programs have a strong presence, (2) the introduction of new programs into your primary market, (3) promotion of the institution and existing programs in a new market, and (4) diversification—new programs and new markets. Each domain has inherent risks and potential rewards. Risk levels are illustrated in Figure 1 and are described here.

Primary market penetration possesses the lowest risk, requires the least investment of resources, and has the fastest return on investment. Depending on an institution’s primary market, this domain also may produce only modest new enrollments. Option two, mounting new programs in an institution’s existing primary market has risks associated with conducting the proper market research to determine student and industry demand as well as market saturation. Another common risk relates to the degree to which new program offerings are adequately promoted. An obvious upside to this domain is that the institution already has visibility in the market. Taking the current program array to a new marketrequires the time and resources to develop a presence where none has previously existed. Sending recruiters to a new territory once or twice a year is woefully insufficient. Creating such visibility requires a sustained physical presence with area recruiters or alumni volunteers, targeted advertising, networking with schools and other organizations in the region, and strategic partnerships. Finally, diversification carries with it the highest level of risk because it involves assuming all the risks of launching new programs in a market with no prior visibility. If executed effectively, however, this domain can generate an abundance of new students.
market expansion risk

5. Disruption always comes at a cost. It is true that your institution may create a disruption by leveraging existing technologies and human capital. Yet, no organization can avoid the cultural and real costs associated with unlearning old ways, creating new programs and business models, scaling innovations, or marketing a new approach. These costs must be weighed judiciously against potential benefits of such a paradigm shift. Once a decision is made to pull the trigger, the change process must be managed carefully with the upfront inclusion of key stakeholders.

6. Equate disruption with innovation, not extinction. The rise of educational disruptors can be unsettling. If disruption is simply perceived as a threat to the way of life in the academy or ignored, the results will be devastating for many higher education institutions. Conversely, if disruption pushes college leaders and enrollment managers out of their comfort zone and they reinvent their institutions, the educational experience of students will be greatly enhanced. In a time of creative destruction, the winners are those who exert extraordinary efforts to go beyond traditional norms, which is not always the early adopters of a new educational model or practice.

7. Successful disruptors pursue four disciplines simultaneously. The four disciplines translated into the higher education lexicon include low costs, relational connections with students, program innovations, and rapid time-to-market. Of these, student connections is the only discipline college and universities excel at consistently. To thrive in a future with a seemingly infinite number of nimble disruptive innovators, educators must compete in the other three disciplines as well.

++++++++++++++
more about higher ed in this IMS blog
http://blog.stcloudstate.edu/ims?s=higher+ed

http://blog.stcloudstate.edu/ims/2018/07/14/disrupting-higher-education/

future of Internet

Can the Internet be saved?

https://mondediplo.com/outsidein/can-the-internet-be-saved
In 2014 Tim Berners-Lee, inventor of the World Wide Web, proposed an online ‘Magna Carta’ to protect the Internet, as a neutral system, from government and corporate manipulation. He was responding after revelations that British and US spy agencies were carrying out mass surveillance programmes; the Cambridge Analytica scandal makes his proposal as relevant as ever.

Luciano Floridi, professor of Philosophy and Ethics of Information at the Oxford Internet Institute, explains that grey power is not ordinary socio-political or military power. It is not the ability to directly influence others, but rather the power to influence those who influence power. To see grey power, you need only look at the hundreds of high-level instances of revolving-door staffing patterns between Google and European governmentsand the U.S. Department of State.

And then there is ‘surveillance capitalism’. Shoshana Zuboff, Professor Emerita at Harvard Business School, proposes that surveillance capitalism is ‘a new logic of accumulation’. The incredible evolution of computer processing power, complex algorithms and leaps in data storage capabilities combine to make surveillance capitalism possible. It is the process of accumulation by dispossession of the data that people produce.

The respected security technologist Bruce Schneier recently applied the insights of surveillance capitalism to the Cambridge Analytica/Facebook crisis.

For Schneier, ‘regulation is the only answer.’ He cites the EU’s General Data Protection Regulation coming into effect next month, which stipulates that users must consent to what personal data can be saved and how it is used.

++++++++++++++++++++++
more on the Internet in this IMS blog
https://blog.stcloudstate.edu/ims?s=internet

second IMS podcast on technology in education

Second IMS podcast on technology in education: Constructivism

Today’s vocast will be broadcasted live at:

Adobe Connect      |     Facebook Live   |       Twitter (#IMSvodcast) |

and will be archived at:

SCSU MediaSpaceYouTube   (subscribe for the channel for future conversations)

IMS vodcast technology in education

Posted by InforMedia Services on Thursday, February 22, 2018

Constructivism.
Student-centered learning theory and practice are based on the constructivist learning theory that emphasizes the learner’s critical role in constructing meaning from new information and prior experience.

  • What is it?
  • Why do we have to know about it
  • Can we just disagree and stick to behaviorism?
  • Is it about student engagement?
  • Is it about the use of technology?
  • Resources
    • http://blog.stcloudstate.edu/ims/2014/06/28/constructivism-lecture-versus-project-based-learning/
      http://blog.stcloudstate.edu/ims/2013/12/03/translating-constructivism-into-instructional-design-potential-and-limitations/
      http://blog.stcloudstate.edu/ims/2016/03/28/student-centered-learning-literature-review/
      http://blog.stcloudstate.edu/ims/2015/11/05/online-discussion-with-plovdiv-university/
      http://blog.stcloudstate.edu/ims/2015/05/27/handbook-of-mobile-learning/
      Crompton, Muilenburg and Berge’s definition for m-learning is “learning across multiple contexts, through social and content interactions, using personal electronic devices.”
    • The “context”in this definition encompasses m-learnng that is formalself-directed, and spontaneous learning, as well as learning that is context aware and context neutral.
    • therefore, m-learning can occur inside or outside the classroom, participating in a formal lesson on a mobile device; it can be self-directed, as a person determines his or her own approach to satisfy a learning goal; or spontaneous learning, as a person can use the devices to look up something that has just prompted an interest (Crompton, 2013, p. 83). (Gaming article Tallinn)Constructivist Learnings in the 1980s – Following Piage’s (1929), Brunner’s (1996) and Jonassen’s (1999) educational philosophies, constructivists proffer that knowledge acquisition develops through interactions with the environment. (p. 85). The computer was no longer a conduit for the presentation of information: it was a tool for the active manipulation of that information” (Naismith, Lonsdale, Vavoula, & Sharples, 2004, p. 12)Constructionist Learning in the 1980s – Constructionism differed from constructivism as Papert (1980) posited an additional component to constructivism: students learned best when they were actively involved in constructing social objects. The tutee position. Teaching the computer to perform tasks.Problem-Based learning in the 1990s – In the PBL, students often worked in small groups of five or six to pool knowledge and resources to solve problems. Launched the sociocultural revolution, focusing on learning in out of school contexts and the acquisition of knowledge through social interaction
    • Socio-Constructivist Learning in the 1990s. SCL believe that social and individual processes are independent in the co-construction of knowledge (Sullivan-Palinscar, 1998; Vygotsky, 1978).
    • 96-97). Keegan (2002) believed that e-learning was distance learning, which has been converted to e-learning through the use of technologies such as the WWW. Which electronic media and tools constituted e-learning: e.g., did it matter if the learning took place through a networked technology, or was it simply learning with an electronic device?
  • Discussion
    • Share with us practical examples of applying constructivist approach in your class
    • Would one hour workshop on turning existing class assignments into constructivist-based class assignments be of interest for you?

+++++++++++++++
http://blog.stcloudstate.edu/ims/2018/02/12/first-ims-podcast-on-technology-in-education/

Charles Taylor

Taylor, C. (2017). Our evolving agenda. Philosophy & Social Criticism43(3), 274-275. doi:10.1177/0191453716680433

 Neo-Kantian ethics, for its part, tends to separate issues of the good life from what it considers the central questions of justice.

The reigning neo-liberal ideology, and the order it lauds, is meant to produce a maximization of wealth, and hence of means to fulfil our goals, without asking in what ways our frenetic attempts to increase GNP run counter to some of our most important goals: solidarity, the ability to discern and pursue a truly meaningful and fulfilling life, in keeping with our endowment and inclinations. We are either induced to neglect these in favour of playing our part in increasing GNP and/or we never pause to consider questions about what kind of life is best for us and, above all, what we owe to each other in this department

One of the central issues that arises in this context is that of democracy. After 1945, and then 1989, and then again in 2011 with the Arab Spring, we had the sense that democracy was on the march in history. But not only have many of the new departures been disappointing – Russia, Turkey, Egypt – but democracy is beginning to decay in its historic heartlands, where it has been operative for more than a century.

Inequalities are growing; in fact, democracy has been sacrificed to the supposed path of more rapid growth, as defined by neo-liberalism. This has led to a sense of impotence among non-elites, which has meant a drop in electoral participation, which in turn increases the power of money in politics, which leads to an intensified sense of impotence, and so on.

Taylor, C. (1998, October). The Dynamics of Democratic Exclusion. Journal of Democracy. p. 143.

Liberal democracy is a great philosophy of inclusion. It is rule of the people, by the people, and for the people, and today the “people” is taken to mean everybody, without the unspoken restrictions that formerly excluded peasants, women, or slaves. Contemporary liberal democracy offers the spectacle of the most inclusive politics in human history. Yet there is also something in the dynamic of democracy that pushes toward exclusion. This was allowed full rein in earlier democracies, as among the ancient republics, but today is a cause of great malaise.

The basic mode of legitimation of democratic states implies that they are founded on popular sovereignty. Now, for the people to be sovereign, it needs to form an entity and have a personality. This need can be expressed in the following way: The people is supposed to rule; this means that its members make up a decision-making unit, a body that takes joint decisions through a consensus, or at least a majority vote, of agents who are deemed equal and autonomous. It is not “democratic” for some citizens to be under the control of others. This might facilitate decision making, but it is not democratically legitimate.

In other words, a modern democratic state demands a “people” with a strong collective identity. Democracy obliges us to show much more solidarity and much more commitment to one another in our joint political project than was demanded by the hierarchical and authoritarian societies of yesteryear.

Thinkers in the civic humanist tradition, from Aristotle through Hannah Arendt, have noted that free societies require a higher level of commitment and participation than despotic or authoritarian ones. Citizens have to do for themselves, as it were, what the rulers would otherwise do for them. But this will happen only if these citizens feel a strong bond of identification with their political community, and hence with their fellow citizens.

successive waves of immigrants were perceived by many U.S. citizens of longer standing as a threat to democracy and the American way of life. This was the fate of the Irish beginning in the 1840s, and later in the century of immigrants from Southern and Eastern Europe. And of course, the long-established black population, when it was given citizen rights for the first time after the Civil War, was effectively excluded from voting through much of the Old South up until the civil rights legislation of the 1960s.

Multiculturalism and Postmodernism

For although conservatives often lump “postmodernists” and “multiculturalists” together with “liberals,” nothing could be less fair. In fact, the “postmodernists” themselves attack the unfortunate liberals with much greater gusto than they direct against the conser-vatives.

the two do have something in common, and so the targets partly converge. The discourse of the victim-accuser is ultimately rooted in certain philosophical sources that the postmodernists share with procedural liberalism—in particular, a commitment to negative liberty and/or a hostility to the Herder-Humboldt model of the associative bond. That is why policies framed in the language of “postmodernism” usually share certain properties with the policies of their procedural liberal enemies.

The struggle to redefine our political life in order to counteract the dangers and temptations of democratic exclusion will only intensify in the next century (My note: 21st century). There are no easy solutions, no universal formulas for success in this struggle. But at least we can try to avoid falling into the shadow or illusory ways of thinking. This means, first, that we must understand the drive to exclusion (as well as the vocation of inclusion) that democratic politics contains; and second, that we must fight free of some of the powerful philosophical illusions of our age. This essay is an attempt to push our thought a little ahead in both these directions.

+++++++++++++++++++++++

Taylor, C., & And, O. (1994). Multiculturalism: Examining the Politics of Recognition.

 

+++++++++++++++++++

Taylor, C. A. (1996). Theorizing Practice and Practicing Theory: Toward a Constructive Analysis of Scientific Rhetorics. Communication Theory (10503293)6(4), 374-387.

+++++++++++++++++++

Taylor, C., & Jennings, I. (2005). The Immanent Counter-Enlightenment: Christianity and Morality. South African Journal Of Philosophy24(3), 224-239.

a passage from Paul Bénichou’s fa mous work Mo rales du grand siècle: ‘Hu man kind re presses its mis ery when ever it can; and at the same time for gets that hu mil i at ing mo ral ity by which it had con demned life, and in do ing so had made a vir tue of ne ces sity.2 ’ In this ver sion, the la tent hu man ist mo ral ity suc ceeds in es tab – lish ing it self, and in so do ing helps to throw the theo log i cal-as cetic code onto the scrap heap. On this view, it is as if the hu man ist mo ral ity had al ways been there, wait ing for the chance to over throw its op pres sive pre de ces sor.

The re la tion ship was something like the fol low ing: As long as one lived in the en – chanted world, where the weather-bells chimed, one felt one self to be in a world full of threats, vul ner a ble to black magic in all its forms. In this world God was for most be liev ers the source of a pos i tive power, which was able to de feat the pow ers of evil. God was the chief source of coun ter-, or white, magic. He was the fi nal guar an tor that good would tri umph in this world of man i fold spir its and pow ers. For those com pletely ab sorbed in this world, it was prac ti cally im pos si ble not to be – lieve in God. Not to be lieve would mean de vot ing one self to the devil. A small mi nor – ity of truly re mark able – or per haps truly des per ate – peo ple did in deed do this. But for the vast ma jor ity there was no ques tion whether one be lieved in God or not – the pos i – tive force was as real a fact as the threats it coun ter acted. The ques tion of be lief was a ques tion of trust and mem ber ship rather than one of the ac cep tance of par tic u lar doc – trines. In this sense they were closer to the con text of the gos pels.

++++++++++
more on philosophy in this IMS blog
http://blog.stcloudstate.edu/ims?s=philosophy

1 2 3 4 5