Searching for "privacy"

student centered social media policies

How to Craft Useful, Student-Centered Social Media Policies

By Tanner Higgin  08/09/18

https://thejournal.com/articles/2018/08/09/how-to-craft-useful-student-centered-social-media-policies.aspx

Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat. Schools must reckon with this reality and commit to supporting thoughtful and critical social media use among students, teachers and administrators. If not, schools and classrooms risk everything from digital distraction to privacy violations.

Key Elements to Include in a Social Media Policy

  • Create parent opt-out forms that specifically address social media use.Avoid blanket opt-outs that generalize all technology or obfuscate how specific social media platforms will be used. (See this example by the World Privacy Forum as a starting point.)
    • Use these opt-out forms as a way to have more substantive conversations with parents about what you’re doing and why.
    • Describe what platforms are being used, where, when and how.
    • Avoid making the consequences of opt-out selections punitive (e.g., student participation in sports, theater, yearbook, etc.).
  • Establish baseline guidelines for protecting and respecting student privacy.
    • Prohibit the sharing of student faces.
    • Restrict location sharing: Train teachers and students on how to turn off geolocation features/location services on devices as well as in specific apps.
    • Minimize information shared in teacher’s social media profiles: Advise teachers to list only grade level and subject in their public profiles and not to include specific school or district information.
  • Make social media use transparent to students: Have teachers explain their social media plan, and find out how students feel about it.
  • Most important: As with any technology, attach social media use to clearly articulated goals for student learning. Emphasize in your guidelines that teachers should audit any potential use of social media in terms of student-centered pedagogy: (1) Does it forward student learning in a way impossible through other means? and (2) Is using social media in my best interests or in my students’?

Moving from Policy to Practice.

Social media policies, like policies in general, are meant to mitigate the risk and liability of institutions rather than guide and support sound pedagogy and student learning. They serve a valuable purpose, but not one that impacts classrooms. So how do we make these policies more relevant to classrooms?

First, it forces policy to get distilled into what impacts classroom instruction and administration. Second, social media changes monthly, and it’s much easier to update a faculty handbook than a policy document. Third, it allows you to align social media issues with other aspects of teaching (assessment, parent communication, etc.) versus separating it out in its own section.

++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

more on social media policies in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+policies

AI and ethics

Live Facebook discussion at SCSU VizLab on ethics and technology:

Heard on Marketplace this morning (Oct. 22, 2018): ethics of artificial intelligence with John Havens of the Institute of Electrical and Electronics Engineers, which has developed a new ethics certification process for AI: https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ec_bios.pdf

Ethics and AI

***** The student club, the Philosophical Society, has now been recognized by SCSU as a student organization ***

https://ed.ted.com/lessons/the-ethical-dilemma-of-self-driving-cars-patrick-lin

Could it be the case that a random decision is still better then predetermined one designed to minimize harm?

similar ethical considerations are raised also:

in this sitcom

https://www.theatlantic.com/sponsored/hpe-2018/the-ethics-of-ai/1865/ (full movie)

This TED talk:

https://blog.stcloudstate.edu/ims/2017/09/19/social-media-algorithms/

https://blog.stcloudstate.edu/ims/2018/10/02/social-media-monopoly/

 

 

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain,

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain, Privacy, Security, Surveilance

https://blog.stcloudstate.edu/ims?s=internet+of+things

peer-reviewed literature;

Keyword search: ethic* + Internet of Things = 31

Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical Design in the Internet of Things. Science & Engineering Ethics24(3), 905–925. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-016-9754-5

Berman, F., & Cerf, V. G. (2017). Social and Ethical Behavior in the Internet of Things. Communications of the ACM60(2), 6–7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3036698

Murdock, G. (2018). Media Materialties: For A Moral Economy of Machines. Journal of Communication68(2), 359–368. https://doi-org.libproxy.stcloudstate.edu/10.1093/joc/jqx023

Carrier, J. G. (2018). Moral economy: What’s in a name. Anthropological Theory18(1), 18–35. https://doi-org.libproxy.stcloudstate.edu/10.1177/1463499617735259

Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology. Canadian Public Administration57(2), 295–317. https://doi-org.libproxy.stcloudstate.edu/10.1111/capa.12069

Koucheryavy, Y., Kirichek, R., Glushakov, R., & Pirmagomedov, R. (2017). Quo vadis, humanity? Ethics on the last mile toward cybernetic organism. Russian Journal of Communication9(3), 287–293. https://doi-org.libproxy.stcloudstate.edu/10.1080/19409419.2017.1376561

Keyword search: ethic+ + autonomous vehicles = 46

Cerf, V. G. (2017). A Brittle and Fragile Future. Communications of the ACM60(7), 7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3102112

Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health107(4), 632–537. https://doi-org.libproxy.stcloudstate.edu/10.2105/AJPH.2016.303628

HARRIS, J. (2018). Who Owns My Autonomous Vehicle? Ethics and Responsibility in Artificial and Human Intelligence. Cambridge Quarterly of Healthcare Ethics27(4), 599–609. https://doi-org.libproxy.stcloudstate.edu/10.1017/S0963180118000038

Keeling, G. (2018). Legal Necessity, Pareto Efficiency & Justified Killing in Autonomous Vehicle Collisions. Ethical Theory & Moral Practice21(2), 413–427. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10677-018-9887-5

Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for Crashes of Autonomous Vehicles: An Ethical Analysis. Science & Engineering Ethics21(3), 619–630. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-014-9565-5

Getha-Taylor, H. (2017). The Problem with Automated Ethics. Public Integrity19(4), 299–300. https://doi-org.libproxy.stcloudstate.edu/10.1080/10999922.2016.1250575

Keyword search: ethic* + artificial intelligence = 349

Etzioni, A., & Etzioni, O. (2017). Incorporating Ethics into Artificial Intelligence. Journal of Ethics21(4), 403–418. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10892-017-9252-2

Köse, U. (2018). Are We Safe Enough in the Future of Artificial Intelligence? A Discussion on Machine Ethics and Artificial Intelligence Safety. BRAIN: Broad Research in Artificial Intelligence & Neuroscience9(2), 184–197. Retrieved from http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d129943455%26site%3dehost-live%26scope%3dsite

++++++++++++++++
http://www.cts.umn.edu/events/conference/2018

2018 CTS Transportation Research Conference

Keynote presentations will explore the future of driving and the evolution and potential of automated vehicle technologies.

+++++++++++++++++++
https://blog.stcloudstate.edu/ims/2016/02/26/philosophy-and-technology/

+++++++++++++++++++
more on AI in this IMS blog
https://blog.stcloudstate.edu/ims/2018/09/07/limbic-thought-artificial-intelligence/

AI and autonomous cars as ALA discussion topic
https://blog.stcloudstate.edu/ims/2018/01/11/ai-autonomous-cars-libraries/

and privacy concerns
https://blog.stcloudstate.edu/ims/2018/09/14/ai-for-education/

the call of the German scientists on ethics and AI
https://blog.stcloudstate.edu/ims/2018/09/01/ethics-and-ai/

AI in the race for world dominance
https://blog.stcloudstate.edu/ims/2018/04/21/ai-china-education/

media literacy backfire

Did Media Literacy Backfire?

Jan 5, 2017danah boyd

https://points.datasociety.net/did-media-literacy-backfire-7418c084d88d

Understanding what sources to trust is a basic tenet of media literacy education.

Think about how this might play out in communities where the “liberal media” is viewed with disdain as an untrustworthy source of information…or in those where science is seen as contradicting the knowledge of religious people…or where degrees are viewed as a weapon of the elite to justify oppression of working people. Needless to say, not everyone agrees on what makes a trusted source.

Students are also encouraged to reflect on economic and political incentives that might bias reporting. Follow the money, they are told. Now watch what happens when they are given a list of names of major power players in the East Coast news media whose names are all clearly Jewish. Welcome to an opening for anti-Semitic ideology.

In the United States, we believe that worthy people lift themselves up by their bootstraps. This is our idea of freedom. To take away the power of individuals to control their own destiny is viewed as anti-American by so much of this country. You are your own master.

Children are indoctrinated into this cultural logic early, even as their parents restrict their mobility and limit their access to social situations. But when it comes to information, they are taught that they are the sole proprietors of knowledge. All they have to do is “do the research” for themselves and they will know better than anyone what is real.

Combine this with a deep distrust of media sources.

Many marginalized groups are justifiably angry about the ways in which their stories have been dismissed by mainstream media for decades.It took five days for major news outlets to cover Ferguson. It took months and a lot of celebrities for journalists to start discussing the Dakota Pipeline. But feeling marginalized from news media isn’t just about people of color.

Keep in mind that anti-vaxxers aren’t arguing that vaccinations definitively cause autism. They are arguing that we don’t know. They are arguing that experts are forcing children to be vaccinated against their will, which sounds like oppression. What they want is choice — the choice to not vaccinate. And they want information about the risks of vaccination, which they feel are not being given to them. In essence, they are doing what we taught them to do: questioning information sources and raising doubts about the incentives of those who are pushing a single message. Doubt has become tool.

Addressing so-called fake news is going to require a lot more than labeling. It’s going to require a cultural change about how we make sense of information, whom we trust, and how we understand our own role in grappling with information. Quick and easy solutions may make the controversy go away, but they won’t address the underlying problems.

In the United States, we’re moving towards tribalism (see Fukuyama), and we’re undoing the social fabric of our country through polarization, distrust, and self-segregation.

++++++++++++++++++++++++++++++

boyd, danah. (2014). It’s Complicated: The Social Lives of Networked Teens (1 edition). New Haven: Yale University Press.
p. 8 networked publics are publics that are reconstructed by networked technologies. they are both space and imagined community.
p. 11 affordances: persistence, visibility, spreadability, searchability.
p. technological determinism both utopian and dystopian
p. 30 adults misinterpret teens online self-expression.
p. 31 taken out of context. Joshua Meyrowitz about Stokely Charmichael.
p. 43 as teens have embraced a plethora of social environment and helped co-create the norms that underpin them, a wide range of practices has emerged. teens have grown sophisticated with how they manage contexts and present themselves in order to be read by their intended audience.
p. 54 privacy. p. 59 Privacy is a complex concept without a clear definition. Supreme Court Justice Brandeis: the right to be let alone, but also ‘measure of th access others have to you through information, attention, and physical proximity.’
control over access and visibility
p. 65 social steganography. hiding messages in plain sight
p. 69 subtweeting. encoding content
p. 70 living with surveillance . Foucault Discipline and Punish
p. 77 addition. what makes teens obsessed w social media.
p. 81 Ivan Goldberg coined the term internet addiction disorder. jokingly
p. 89 the decision to introduce programmed activities and limit unstructured time is not unwarranted; research has shown a correlation between boredom and deviance.
My interview with Myra, a middle-class white fifteen-year-old from Iowa, turned funny and sad when “lack of time” became a verbal trick in response to every question. From learning Czech to trakc, from orchestra to work in a nursery, she told me that her mother organized “98%” of her daily routine. Myra did not like all of these activities, but her mother thought they were important.
Myra noted that her mother meant well, but she was exhausted and felt socially disconnected because she did not have time to connect with friends outside of class.
p. 100 danger
are sexual predators lurking everywhere
p. 128 bullying. is social media amplifying meanness and cruelty.
p. 131 defining bullying in a digital era. p. 131 Dan Olweus narrowed in the 70s bulling to three components: aggression, repetition and imbalance on power. p. 152 SM has not radically altered the dynamics of bullying, but it has made these dynamics more visible to more people. we must use this visibility not to justify increased punishment, but to help youth who are actually crying out for attention.
p. 153 inequality. can SM resolve social divisions?
p. 176 literacy. are today’s youth digital natives? p. 178 Barlow and Rushkoff p. 179 Prensky. p. 180 youth need new literacies. p. 181 youth must become media literate. when they engage with media–either as consumers or producers–they need to have the skills to ask questions about the construction and dissemination of particular media artifacts. what biases are embedded in the artifact? how did the creator intend for an audience to interpret the artifact, and what are the consequences of that interpretation.
p. 183 the politics of algorithms (see also these IMS blog entries https://blog.stcloudstate.edu/ims?s=algorithms) Wikipedia and google are fundamentally different sites. p. 186 Eli Pariser, The Filter Bubble: the personalization algorithms produce social divisions that undermine any ability to crate an informed public. Harvard’s Berkman Center have shown, search engines like Google shape the quality of information experienced by youth.
p. 192 digital inequality. p. 194 (bottom) 195 Eszter Hargittai: there are signifficant difference in media literacy and technical skills even within age cohorts. teens technological skills are strongly correlated with socio-economic status. Hargittai argues that many youth, far from being digital natives, are quite digitally naive.
p. 195 Dmitry  Epstein: when society frames the digital divide as a problem of access, we see government and industry as the responsible party for the addressing the issue. If DD as skills issue, we place the onus on learning how to manage on individuals and families.
p. 196 beyond digital natives

Palfrey, J., & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives (1 edition). New York: Basic Books.

John Palfrey, Urs Gasser: Born Digital
Digital Natives share a common global culture that is defined not by age, strictly, but by certain attributes and experience related to how they interact with information technologies, information itself, one another, and other people and institutions. Those who were not “born digital’ can be just as connected, if not more so, than their younger counterparts. And not everyone born since, say 1982, happens to be a digital native.” (see also https://blog.stcloudstate.edu/ims/2018/04/15/no-millennials-gen-z-gen-x/

p. 197. digital native rhetoric is worse than inaccurate: it is dangerous
many of the media literacy skills needed to be digitally savvy require a level of engagement that goes far beyond what the average teen pick up hanging out with friends on FB or Twitter. Technical skills, such as the ability to build online spaces requires active cultivation. Why some search queries return some content before others. Why social media push young people to learn how to to build their own systems, versus simply using a social media platforms. teens social status and position alone do not determine how fluent or informed they are via-a-vis technology.
p. 199 Searching for a public on their own

++++++++++++

Daum, M. (2018, August 24). My Affair With the Intellectual Dark Web – Great Escape. Retrieved October 9, 2018, from https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059

the intellectual dark web

++++++++++++
more on media literacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=media+literacy

fake news in this IMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

Cybersecurity Risks in schools

FBI Warns Educators and Parents About Edtech’s Cybersecurity Risks

By Tina Nazerian     Sep 14, 2018

https://www.edsurge.com/news/2018-09-14-fbi-warns-educators-and-parents-about-edtech-s-cybersecurity-risks

The FBI has released a public service announcement warning educators and parents that edtech can create cybersecurity risks for students.

In April 2017, security researchers found a flaw in Schoolzilla’s data configuration settings. And in May 2017, a hacker reportedly stole 77 million user accounts from Edmodo.

Amelia Vance, the director of the Education Privacy Project at the Future of Privacy Forum, writes in an email to EdSurge that the FBI likely wanted to make sure that as the new school year starts, parents and schools are aware of potential security risks. And while she thinks it’s “great” that the FBI is bringing more attention to this issue, she wishes the public service announcement had also addressed another crucial challenge.

“Schools across the country lack funding to provide and maintain adequate security,” she writes. “Now that the FBI has focused attention on these concerns, policymakers must step up and fund impactful security programs.”

According to Vance, a better approach might involve encouraging parents to have conversations with their children’s’ school about how it keeps student data safe.

++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

Encyclopedia of Criminal Activities and the Deep Web

>>>>>>> Publishing Opportunity <<<<<<<<<<<<<<

Encyclopedia of Criminal Activities and the Deep Web

Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.

In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.

You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).

Recommended topics for papers include, but are not limited to:

  • Bitcoin and Crime
  • Botnets and Crime
  • Child Exploitation
  • Contract Killing
  • Criminology
  • Cryptocurrency
  • Cyber Espionage
  • Cyber Stalking
  • Cybercrime
  • Cybercriminals
  • Cybersecurity Legislation
  • Cyberterrorism Fraud
  • Dark Web
  • Dark Web Vendors
  • Darknets
  • Data Privacy
  • Dating Websites and Crime
  • Deep Web
  • Drug Trafficking
  • E-Banking Fraud
  • Email Scams
  • Fraud and Internet
  • Gaming and Crime
  • Government Regulations of the Dark Web
  • Hacking and Crime
  • Hacktivism
  • Human Trafficking
  • Identity Theft
  • International Regulations of the Dark Web
  • Internet Privacy
  • Internet Regulations
  • Internet Safety & Crime
  • Online Advertisement Websites and Crime
  • Online Blackmail
  • Online Forums and Crime
  • Online Hate Crimes
  • Online Predators
  • Online Privacy
  • Social Media Deception
  • Social Networking Traps
  • Undercover Dark Web Busts
  • Undercover Operations
  • Vigilante Justice
  • Virtual Currencies & Crime
  • Whistleblowing

IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018

Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication. 

Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com

Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Encyclopedia of Criminal Activities and the Deep Web
EncyclopediaCADW@igi-global.com

AI for Education

The Promise (and Pitfalls) of AI for Education

Artificial intelligence could have a profound impact on learning, but it also raises key questions.

By Dennis Pierce, Alice Hathaway 08/29/18

https://thejournal.com/articles/2018/08/29/the-promise-of-ai-for-education.aspx

Artificial intelligence (AI) and machine learning are no longer fantastical prospects seen only in science fiction. Products like Amazon Echo and Siri have brought AI into many homes,

Kelly Calhoun Williams, an education analyst for the technology research firm Gartner Inc., cautions there is a clear gap between the promise of AI and the reality of AI.

Artificial intelligence is a broad term used to describe any technology that emulates human intelligence, such as by understanding complex information, drawing its own conclusions and engaging in natural dialog with people.

Machine learning is a subset of AI in which the software can learn or adapt like a human can. Essentially, it analyzes huge amounts of data and looks for patterns in order to classify information or make predictions. The addition of a feedback loop allows the software to “learn” as it goes by modifying its approach based on whether the conclusions it draws are right or wrong.

AI can process far more information than a human can, and it can perform tasks much faster and with more accuracy. Some curriculum software developers have begun harnessing these capabilities to create programs that can adapt to each student’s unique circumstances.

For instance, a Seattle-based nonprofit company called Enlearn has developed an adaptive learning platform that uses machine learning technology to create highly individualized learning paths that can accelerate learning for every student. (My note: about learning and technology, Alfie Kohn in https://blog.stcloudstate.edu/ims/2018/09/11/educational-technology/

GoGuardian, a Los Angeles company, uses machine learning technology to improve the accuracy of its cloud-based Internet filtering and monitoring software for Chromebooks. (My note: that smells Big Brother).Instead of blocking students’ access to questionable material based on a website’s address or domain name, GoGuardian’s software uses AI to analyze the actual content of a page in real time to determine whether it’s appropriate for students. (my note: privacy)

serious privacy concerns. It requires an increased focus not only on data quality and accuracy, but also on the responsible stewardship of this information. “School leaders need to get ready for AI from a policy standpoint,” Calhoun Williams said. For instance: What steps will administrators take to secure student data and ensure the privacy of this information?

++++++++++++
more on AI in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=artifical+intelligence

student-centered social media policy

How to Craft Useful, Student-Centered Social Media Policies

08/09/18  Tanner Higgin

https://thejournal.com/articles/2018/08/09/how-to-craft-useful-student-centered-social-media-policies.aspx

Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat.

Use policy creation as an opportunity to take inventory of your students’ needs, how social media is already being used by your teachers, and how policy can support both responsibly.

1. Create parent opt-out forms that specifically address social media use.

2. Establish baseline guidelines for protecting and respecting student privacy.

3. Make social media use transparent to students

4. Most important: As with any technology, attach social media use to clearly articulated goals for student learning

Moving from Policy to Practice

Social media isn’t a novel phenomenon requiring separate attention. Ed tech, and the tech world in general, wants to tout every new development as a revolution. Most, however, are an iteration. While we get caught up re-inventing everything to wrestle with a perceived social media sea change, our students see it simply as a part of school life.

++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

 

blockchain and information professions

Blockchain: Recommendations for the Information Profession

Monday, September 24, 2018 12:00 pm
Central Daylight Time (Chicago, GMT-05:00)

Blockchain technology is being discussed widely, but without clear directions for library applications. The Blockchain National Forum, funded by IMLS and held at San Jose State University’s iSchool in Summer 2018, brought together notable experts in the information professions, business, government, and urban planning to discuss the issues and develop recommendations on the future uses of blockchain technology within the information professions. In this free webinar, Drs. Sandy Hirsh and Sue Alman, co-PIs of the project, will present the recommendations made throughout the year in the Blockchain blog, Library 2.0 Conference, Blockchain Applied: Impact on the Information Profession, and the National Forum.

157 – 200 participants in the workshop

 

 

 

 

Basics: What is Blockchain Technology?

IMLS funded project goal
San Jose State U School of Information awarded this grant: https://ischoolblogs.sjsu.edu/blockchains

Blockchain: Apps and Ideas

http://www.youtube.com/c/Library20

now what is blockchain, and not how to implement, but only certain issues will be discussed.

Issues: legal, security and standards and Applications: academic, public and archives

BLockchain and the Law bt Primavera De Felippi and Aaron Wright : http://www.hup.harvard.edu/catalog.php?isbn=9780674976429

Privacy: https://www.investopedia.com/terms/g/general-data-protection-regulation-gdpr.asp

Is Blockchain (BC) content or provider?

Q/S TO ASK: WHAT KINDS OF DATA AND RECORDS MUST BE STORED AND PRESERVES exactly the way they were created (provenance records, transcripts). what kinds of info are at risk to be altered and compromised by changing circumstances (personally identifiable data)

Security issues: https://www.technologyreview.com/magazine/2018/05/

515 rule: BC can be hacked if attacked by a group of miners controlling more than 50% of the network

Standards Issues: BC systems- open ledger technology for managing metadata. baseline standards will impact future options. can BC make management of metadata worth. Is it worth, or more cautious.

Potential Use cases: archives and special collections where provenance and authenticity are essential for authoritative tracking. digital preservation to track distributed digital assets. BC-based currencies for international financial transactions (to avoid exchange rates ILL and publishing) . potential to improve ownership and first sale record management. credentialing: personal & academic documents (MIT already has transcripts and diplomas of students in BC – personal data management and credentialing electronically).

public libraries: house docs of temporarily displaced or immigrants. but power usage and storage usage became problems.

Victoria Lemieux

a city south of Denver CO is build right now, and will be build on these principles.

benefits for recordkeeping: LOCKSS (lot of copies keeps stuff safe) – Stanford U; chain of custody (SAA Glossary); Trust and Immutability (BC) vs confidentiality and performance (dbase)

Libarians role: need to understand BC (how does it work and what can it do for us; provide BC education for users; use BC in various applications

recommendations from National Forum:

ASIS&T presentation in Vancouver, Nov. 2018; MOOC on BLockchain Basics; Libary Futures Series, BOok3 Alman & Hirsh

https://www.forbes.com/sites/tomvanderark/2018/08/20/26-ways-blockchain-will-transform-ok-may-improve-education/#3b2e442d4ac9

from Miriam Childs to All Participants:
Blockchain is suing Blockchain: https://nulltx.com/blockchain-is-suing-blockchain-things-are-getting-messy-in-crypto-world/

from Lilia Samusenko to All Participants:
Sounds like blockchain also can support the Library-Of-Things initiatives. What do you think?

 

+++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Firefox blocks trackers

If you haven’t already switched to Firefox, do it now

Firefox has announced plans to block all third-party trackers. Why haven’t you switched yet?

Katharine Schwab

https://amp-fastcompany-com.cdn.ampproject.org/c/s/amp.fastcompany.com/90230864/if-you-havent-already-switched-to-firefox-do-it-now

This week, Mozilla announced that its browser Firefox will start blocking all cross-site third-party trackers–the cookies hiding in the background that follow your clicks across the web, reporting your activity to advertisers as you move between websites.

Trackers don’t just track you–they also slow download times for websites. Mozilla cites a study by the ad-blocker Ghostery, which found that 55% of the time required to load a website is spent loading third-party trackers. Without these trackers, sites will load faster, making the overall user experience better. Mozilla will be testing how much blocking trackers impact load times in September–if its approach to blocking trackers does reduce load times, it will roll out the same technology to the regular Firefox browser later this year. If you’re interested in trying it out now, you can download Firefox Nightly to see how the features work.

It’s important that these changes will be integrated into the Firefox browser by default–something other tech platforms haven’t done. Companies like Apple and YouTube have started rolling out features to address the addictive nature of their interfaces, claiming they are giving users more control over their digital lives. These features are similar to Firefox’s new settings–they’re all in the name of giving users a better experience–but they still require users to dig through their settings to reap the benefits. Mozilla is making the choice that’s best for users automatically. You can opt-out if you want to, but for the many who will never bother to look through their browser settings, they’ll be protected from the get-go.

AI tracks students writings

Schools are using AI to track what students write on their computers

By Simone Stolzoff August 19, 2018
50 million k-12 students in the US
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like GaggleSecurly, and GoGuardian to surface potentially worrisome communications to school administrators
In an age of mass school-shootings and increased student suicides, SMPs Safety Management Platforms can play a vital role in preventing harm before it happens. Each of these companies has case studies where an intercepted message helped save lives.
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal at Facebook and other recent data breaches from companies like Equifax, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety

+++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

more on surveillance  in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

1 12 13 14 15 16 23